Why Not Network Centric Acquisition?

Similar documents
UNCLASSIFIED FY 2016 OCO. FY 2016 Base

FORCE XXI BATTLE COMMAND, BRIGADE AND BELOW (FBCB2)

Department of Defense DIRECTIVE

COMMON AVIATION COMMAND AND CONTROL SYSTEM

THE 2008 VERSION of Field Manual (FM) 3-0 initiated a comprehensive

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Mr. James Hondo Geurts Deputy Director for Acquisition United States Special Operations Command

Force 2025 and Beyond

Integrating Software Architecture Evaluation in a DoD System Acquisition

Department of Defense DIRECTIVE

NDIA Ground Robotics Symposium

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Net Centricity FY 2012 OCO

UNCLASSIFIED. FY 2011 Total Estimate

UNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 7 R-1 Line #31

REQUIREMENTS TO CAPABILITIES

GLOBAL BROADCAST SERVICE (GBS)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

Fiscal Year (FY) 2011 Budget Estimates

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

AUSA BACKGROUND BRIEF

UNCLASSIFIED R-1 ITEM NOMENCLATURE

2009 ARMY MODERNIZATION WHITE PAPER ARMY MODERNIZATION: WE NEVER WANT TO SEND OUR SOLDIERS INTO A FAIR FIGHT

Cybersecurity United States National Security Strategy President Barack Obama

The Tactical Engagement Team Concept: Operational Employment of DCGS-A in Support of Mission Command

The Future of US Ground Forces: Some Thoughts to Consider

UNCLASSIFIED. R-1 Program Element (Number/Name) PE F / Distributed Common Ground/Surface Systems. Prior Years FY 2013 FY 2014 FY 2015

Department of Defense DIRECTIVE. SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures

Joint Improvised-Threat Defeat Organization - Mission -

THE JOINT STAFF Research, Development, Test and Evaluation (RDT&E), Defense-Wide Fiscal Year (FY) 2009 Budget Estimates

THE JOINT STAFF Fiscal Year (FY) 2008/2009 Budget Estimates Research, Development, Test and Evaluation (RDT&E), Defense-Wide

This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Software Sustainment: Continuous Engineering to

Global Vigilance, Global Reach, Global Power for America

The Concept of C2 Communication and Information Support

From Stove-pipe to Network Centric Leveraging Technology to Present a Unified View

UNITED STATES SPECIAL OPERATIONS COMMAND

When and Where to Apply the Family of Architecture- Centric Methods

Mission-Based Test & Evaluation Strategy: Creating Linkages between Technology Development and Mission Capability

The pace of change and level of effort has increased dramatically with

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

ARMY G-8

Exhibit R-2, RDT&E Budget Item Justification Date: February 2008 Appropriation/Budget Activity RDT&E, Dw BA 07

Revolution in Army Doctrine: The 2008 Field Manual 3-0, Operations

Deputy Director, C5 Integration

Collaborative coordination of fire support mission execution

CMMI: The DoD Perspective

NET-CENTRIC CONVERSATIONS: THE UNIT OF WORK FOR NETWORK CENTRIC WARFARE AND NETWORK CENTRIC OPERATIONS

UNCLASSIFIED. FY 2017 Base FY 2017 OCO

Conducting. Joint, Inter-Organizational and Multi-National (JIM) Training, Testing, Experimentation. in a. Distributive Environment

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 7 R-1 Line #73

The 19th edition of the Army s capstone operational doctrine

Joint Program Executive Office Joint Tactical Radio System

UNCLASSIFIED. UNCLASSIFIED Defense Information Systems Agency Page 1 of 12 R-1 Line #203

JOINT STAFF FY 2006/2007 Budget Estimates Submissions Research, Development, Test, and Evaluation (RDT&E), Defense-Wide

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

UNCLASSIFIED. FY 2016 Base FY 2016 OCO. Quantity of RDT&E Articles

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Common Joint Tactical Information. FY 2011 Total Estimate. FY 2011 OCO Estimate

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

James T. Conway General, U.S. Marine Corps, Commandant of the Marine Corps

Public Affairs Operations

U.S. Air Force Electronic Systems Center

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

Prepared Statement. Vice Admiral Raquel Bono, M.D. Director, Defense Health Agency REGARDING ELECTRONIC HEALTH RECORD MANAGEMENT BEFORE THE

Department of Defense DIRECTIVE

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

UNCLASSIFIED R-1 ITEM NOMENCLATURE

WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT (WMSA&IS)

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

A Call to the Future

2013 Program Excellence Award. Phase I Submission Name of Program: Counter Rocket, Artillery, and Mortar Command and Control (C-RAM C2)

DEPARTMENT OF DEFENSE TRAINING TRANSFORMATION IMPLEMENTATION PLAN

Power Projection: - Where We Were - Where We Are - Where We Need To Be

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE A: Distributive Interactive Simulations (DIS) - Eng Dev FY 2013 OCO

Department of Defense INSTRUCTION

Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations

UNCLASSIFIED R-1 ITEM NOMENCLATURE

INSTRUCTION. Department of Defense. NUMBER May 22, 2008 USD(P) SUBJECT: Joint Deployment Process Owner

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

C4I System Solutions.

UNCLASSIFIED. Cost To Complete Total Program Element : Integrated Broadcast Service FY 2015

Network Centric Operations Urban Warfare

America s Army Reserve Ready Now; Shaping Tomorrow

THINKING DIFFERENTLY ABOUT NETWORK RESILIENCE

UNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / International Intelligence Technology and Architectures. Prior Years FY 2013 FY 2014

DoD Analysis Update: Support to T&E in a Net-Centric World

Navy Medicine. Commander s Guidance

Capability Integration

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,

Test and Evaluation of Highly Complex Systems

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED FY 2008/2009 RDT&E,N BUDGET ITEM JUSTIFICATION SHEET DATE: February 2007 Exhibit R-2

STATEMENT OF. MICHAEL J. McCABE, REAR ADMIRAL, U.S. NAVY DIRECTOR, AIR WARFARE DIVISION BEFORE THE SEAPOWER SUBCOMMITTEE OF THE

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE

CHIEF OF AIR FORCE COMMANDER S INTENT. Our Air Force Potent, Competent, Effective and Essential

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE A: Distributed Common Ground/Surface Systems FY 2012 OCO

Transcription:

Why Not Network Centric Acquisition? Conference on Acquisition of Software Intensive Systems 26-28 January 2004 Ira Monarch, Frank Sisti, Kate Ambrose and Stephen Blanchette Acquisition Support Program Software Engineering Institute (SEI) Carnegie Mellon University Pittsburgh, PA 15213 2003 by Carnegie Mellon University page 1

Topics to be Covered Lessons Learned from Iraq: The Need for Continued Transformation and Network Centrism Network Centric Warfare (NCW) Network Centric Acquisition (NCA) Breakthroughs in Technology: The Military s Role in the Evolution of Complex Technological Systems Keys to Realizing NCA Envisioning NCA in Practice: Army Strategic Software Improvement Program (ASSIP) 2003 by Carnegie Mellon University page 2

Lessons Learned in Iraq Operations Enduring/Iraqi Freedom Showed that interdependency and interoperability reduce sensing-to-decision-to-engagement time Confirmed that Military Transformation is on the right track That lessons from fighting insurgents [are] mostly negative, also confirms the need for Continued Transformation. Loren B. Thompson, Lexington Institute Georgetown University, November 18, 2003 Continuing Transformation must cast a more comprehensive net for a Future Army more adapted to its ecology. 2003 by Carnegie Mellon University page 3

Lessons Learned for Transformation Lessons for Transformation include: Clearly identifying the enemy by new emphasis on intelligence, cultural sensitivity and information processing. Countering an enemy s adaptability to technologies by spiraling in refinements/replacements across doctrine, organizations, training, acquisition, personnel and facilities. Preparing for new forms of military conflict using modular organizational constructs networked to fit very different situations. Utilizing the criticality of the network by conducting information operations that both exploit it and keep it secure. Adapted from The Army in 2020 White Paper by John M. Riggs 2003 by Carnegie Mellon University page 4

The Future Army will be Network Centric The Army is becoming Network Centric as networks become more the center of attention. As this continues, everything the Army does will be Network Centric, including its: Operations Doctrine Organizations Training, Leaders and Education Personnel Facilities Acquisition The Future will have a Joint, Network Centric mindset. Adopted from The Army in 2020 White Paper by LTG John M. Riggs 2003 by Carnegie Mellon University page 5

Network Centrism Being Network Centric is taking the form of complex system that puts networks center stage based on both military and commercial development and use of communication, information and network technologies derived from experience of developing/using the Internet. Nodes in network centric systems are: relatively autonomous and can act rapidly and effectively almost always networks themselves constrained by their place in the network. 2003 by Carnegie Mellon University page 6

What is Network Centric Warfare? NCW is the application of a networked force to achieve a decisive warfighting advantage. NCW translates information superiority into superior combat power. Characterized by: effectively linking friendly forces against enemy forces shared awareness between decision makers and soldiers increased speed of command More discrete control over tempo of operations greater force effectiveness increased adaptability (as a complex adaptive system) a degree of self-synchronization or self organization. Controlled by: Body of doctrine to support the actions Communication among subunits facilitating self-organizing Clear commander s intent sensitive to both negative and positive feed-back Arthur K. Cebrowski, Network Centric Warfare, Military Technology, MILTEC 5/2003 2003 by Carnegie Mellon University page 7

How is NCW Doing In Iraq What can be learned: The war is not over. Lessons will look a lot different depending on outcomes. Many significant lessons will remain secret. Review process may be subject to Transformation bias and other perspective bias. Lessons up to now are that some capabilities were: high performing joint integration/adaptive planning, joint force synergy, special ops integration (SATCOM, ADOCS) effective but need improvement urban operations, ISR (SBIRS, Global Hawk, JSTARS, ABCS effective in command centers but not always for troops) not up to expectations or needs fratricide prevention, deployment planning and execution, reserve mobilization, troops often missing visual displays (SIGINT) Since conventional combat ended, U.S. forces have faced growing guerrilla resistance lessons mostly negative. Iraq experience validates Cebrowski view that networked warfare isn t just about technology. See Lessons of Iraq, by Loren B. Thompson, Lexington Institute, 11/03 Joint Forces Command Study, 8/03 2003 by Carnegie Mellon University page 8

What is Network Centric Acquisition Network Centric Acquisition can avoid redundant costs by supporting achievement of commonality facilitate interoperability provide resources and infrastructure for evolutionary upgrades shorten response times to provide technology when under threat ensure preparedness by designing industrial base partnerships by leveraging communication, information and network technologies to: design and enter into new partnerships services, industrial base and multi-national capture experience and information that can be turned into actionable knowledge both - internally through organizational learning and experience factories - Inter-organizationally via joint risk management and libraries of reusable software. See Network-Centric Acquisition: The Key to Joint Warfighting, by R.A. Lefande, DAU PM 2002 2003 by Carnegie Mellon University page 9

Can Current Acquisition Achieve NCA Challenge from VADM Cebrowski (Director of DoD s Force Transformation): The operational side is agile, adaptive and high speed; whereas the acquisition side is very ponderous, not agile, time lines are long and response problematic. (Inside the Navy 11/02) Operational Acquisition: Soldiers fighting in Operation Enduring Freedom identified the need to confront underground targets through use of rapid development of thermobaric weapons used in Afghanistan. Because this was on the operational side, versions of the weapon were developed and delivered quickly. (Cebrowski, Inside the Navy 11/02) Can the Acquisition Side Deliver? 2003 by Carnegie Mellon University page 10

Other NCA Issues NCA has many issues in common with acquiring Complex System of Systems (CSOS) (Boehm and Basili, (Complex System of Systems - CSOS, SIS Acquisition Conference, 2003). Does managing CSOS projects via Lead System Integrators (LSIs) work? Little experience so far and the jury is not in. Some CSOS have been tested, successfully fielded, refined and evolved without an LSI and without any show-stopping problems. Is the complexity of CSOS manageable by standard software engineering practices? Conflict between and number of quality attributes makes tradeoff analysis very difficult. Number of and interlinking of software modules makes creating and changing the software and the software architecture very difficult Is there something to learn from looking at CSOS as Complex Adaptive Systems? Perhaps they are amenable to a degree of self organization involving new, perhaps more open-ended, forms of partnership. 2003 by Carnegie Mellon University page 11

Present Acquisition Structure Issues The goal of equipping a Joint Force to prepare for NCW is impeded by: separated Services broken down into Programs and PEOs specializing in particular kinds of warfare product or product line - usually no interoperability across products within a PEO, let alone product lines within and across PEOs and services - redundancy of products and product lines across Programs, PEOs and Services Congress insistence on the auditable separateness of the Programs and contract awards traced to their districts. 2003 by Carnegie Mellon University page 12

Targeting Software to Achieve NCA Software has no production phase the design, development and documentation of the software is the product can insure interoperability but is also the primary cause of failed interoperability is redundantly developed at the subsystem level, and this is tolerated so that risk can be transferred to the contactor. If the government owns the design, source code and documentation resulting from the development of the software, it is possible to make the software available in an online library where it can become standardized for reuse define a common what, where and when standard enabling exchange of this type of data with any other system that makes the same investment. See Network-Centric Acquisition: The Key to Joint Warfighting, by R.A. Lefande, DAU PM 2002 See A Few Choice Words Can Make Network-Centric Warfare a Reality Today, by Rich Byrne, www.afcea.org/signal 2003 by Carnegie Mellon University page 13

Software Changes the Essence of Systems Well designed and implemented software can be changed in minutes or hours versus the weeks and months required for hardware modification, thus permitting flexibility to address rapidly evolving mission requirements. software governs most of the interfaces of today's systems [which because of] [t]he flexibility of software enables us to quickly integrate separately developed systems permitting horizontal integration primarily through effective software application. software enables systems to adapt to new environments, new threats, and new concepts of operation. This adaptability is a key enabler to reaping the benefits of rapid technological change and providing the transformational battlefield envisioned by Joint Vision 2020 John M. Gilligan, Military Use Software, Department of the Air Force, CrossTalk 01/04 2003 by Carnegie Mellon University page 14

SW Intensive Systems Need Discipline The flexibility to address rapidly evolving mission requirements quickly integrate separately developed systems adapt to new environments, new threats, and new concepts of operation (John M. Gilligan, CrossTalk 01/04) may require modification of discipline to fit the new context. Otherwise, unrealistic expectations of what can be accomplished through software and data interoperability the quickness of modifying software will have untoward impacts on architecture, configuration management and testing. 2003 by Carnegie Mellon University page 15

Even a New Form of Discipline The impact of software on complex technology systems has not been sufficiently understood by PMs, Contractors or even the Software and Systems Engineering disciplines. Software is not simply one component among others. New software capabilities and discipline have to be integrated into overall systems engineering processes. What is needed is an interdisciplinary culture of software professionals with a complex software intensive system enterprise perspective. 2003 by Carnegie Mellon University page 16

All Complex Technological Systems are Networks An important historical lesson is that all complex technological systems can be described as networks. (see Thomas Hughes, American Genesis and also Rescuing Prometheus) Many of these complex technological systems have been built by military sponsored or supported projects. Examples from World War II and after are: Manhattan Project SAGE Atlas ARPANET 2003 by Carnegie Mellon University page 17

Network Centric Systems are Software Intensive Systems After World War II, complex technological systems began to be infused with a new kind of technology, software, that changed the essence of systems. From that point on, complex technological systems were typically software intensive systems. Software is capable of networking relatively stand-alone technical systems into systems of systems. Software intensive systems support linking stand-alone organizations into networks of learning enterprises but only if social factors are central to the design. These technical and social networks co-evolve as Network Centric Systems (NCSs). Perhaps the paradigm of a network centric/software intensive system (NC/SIS) project was the ARPANET. 2003 by Carnegie Mellon University page 18

ARPANET: Network Centric/Software Intensive Packet Switching ARPA-IPTO sufficient resources in the 60s and 70s to provide the necessary glue for building, operating and extending the Internet Layering Communications (IMPs and Routing), Hosts, Applications (email) Routing was self-adaptive in that each IMP decided independently where to send packets adapting to changes in network configuration and traffic. Development (ARPA supported BBN, UCLA, NAC) Network Working Group s Requests for Comments Body of Knowledge via the ARPANET and evolving standards informally (telnet, ftp ) Deploy, Operate and Refine (Significant User Involvement) 2003 by Carnegie Mellon University page 19

ARPANET 1971 2003 by Carnegie Mellon University page 20

ARPANET Users Users significantly transformed the ARPANET Developed alternative terminal interface systems which ARPA began to fund. Replaced resource sharing and distributed computing unexpectedly with email as the service of choice. Created tools for accounting and editing. 2003 by Carnegie Mellon University page 21

ARPANET 1980 2003 by Carnegie Mellon University page 22

Visualization Study of the NSFNET, Donna Cox and Robert Patterson 1992 2003 by Carnegie Mellon University page 23

The ARPANET Became Part of the Social Network that was Creating It Just as the ARPANET co-evolves and integrates with the network using and building it so too network centric technologies co-evolve and integrate with their NCW users and other network centric technologies coevolve and integrate with their NCA participants. Similarly, NCW has to co-evolve and integrate with NCA. 2003 by Carnegie Mellon University page 24

ARPANET and Internet Successes Managing, developing and using the ARPANET (and eventually the Internet) stemmed from and extended a culture that Avoided the sort of High Control that imposes needless layers of bureaucracy that interferes with the delivery of needed capabilities elaborate procedural models where lighter-weight methods can be applied Encouraged Agile Control by encouraging new forms of information-sharing, communication and participation ways of forming virtual teams, organizations and colaboratories use of the ARPANET to build bodies of knowledge (RFCs) approaches of evolving standards informally 2003 by Carnegie Mellon University page 25

also Brought Potential Failures These potential failures are now targeted in the rise of: a security industry needed for network survivability new forms of software engineering to handle the immense expectations and risks of networking various weapons and C 4 I capabilities into systems of systems a large literature on organizational and interorganizational learning from risk and failure. 2003 by Carnegie Mellon University page 26

Are Networks and Communities That Learn from Failure: The Key? Network Centric Systems (NCSs) like other innovative complex technological systems grow or die according to how well they address repeated failures. NCSs may fail more but they also can provide more timely and sustained support for learning from failure and making corrections. Responding to repeated failures requires knowledge creating communities and knowledge networks. These new social environments of joint learning can be powerfully supported by knowledge bases and experience factories of failures, successes, risks and opportunities. 2003 by Carnegie Mellon University page 27

Boundary Spanning Learning Historians of technology have repeatedly found that the locus of technological knowledge spans across: Disciplines Organizations Policy Makers Producers Users Examples are: American inventor entrepreneurs (like Sperry etc.) who used patents as indicators of open problems and the leading edge of invention ARPANET builders/users who participated in the Network Working Group through exchange of Requests for Comments over the ARAPANET 2003 by Carnegie Mellon University page 28

Inter-Organizational Learning and Knowledge Networks Complex technological systems like the ARPANET are produced by projects. The knowledge created in these complex technological projects is often disseminated through the circulation of people. This knowledge can be more durably circulated if the interorganizational partnerships forged in the projects are maintained through longer term alliances. There are many examples of such knowledge networks or virtual organizations in the bio-technology and computer/software industry. 2003 by Carnegie Mellon University page 29

Taking Steps Toward NCA Integration of software into our overall system engineering processes requires a new culture with a strong emphasis on training and education and a focus on the integrated enterprise as the target environment. (John M. Gilligan, Department of the Air Force). How might such a culture of more durable enterprise knowledge be built? By combining, new types of partnerships with boundary spanning networks and information and network technologies durable knowledge networks and the new culture could result. It might therefore be feasible and beneficial for the Army if the Army Software Systems Improvement Program (ASSIP) would help create such an Army Knowledge Network (AKN). 2003 by Carnegie Mellon University page 30

ASSIP Recent History and Desired Outcomes Fall of 2002 ASA(ALT) agrees with SEI to execute the Army Software Systems Improvement Plan (ASSIP); with a 02 09 target The ASSIP calls for Dramatically Improving the Acquisition of Army Software Intensive Systems Task scope is Army or Enterprise-Wide ASSIP calls for: - Inter-organizational perspectives - Virtual-organizational applications - Made up of Army Acquisition community components 2003 by Carnegie Mellon University page 31

Policy Level The Network Structure of ASSIP Authority ASA(ALT) Plan Army FY SSIMP Implementation Policy Guidance Decisions ($) Pilots Training Metrics Score Card { Schedule Implementation Level PEOs X,Y &Z Action Level Includes input from: -AMC/RDEC Recommendations -TRADOC Data Sources -Test community -Other communities PM X Benchmarking Activities & Surveys PM X Benchmark Data Sources PEO SAIP PM SAIP { { Guidance Decisions ($) Initiate Pilot Efforts Metrics Score Card Institute Best Practices Process Improvements Other Specific Improvements Other Specific Activities Score Card 2003 by Carnegie Mellon University page 32

ASSIP as a Learning Enterprise: Scaffolding for a Story to Come? ASSIP concept provides an executable structure ASSIP concept is identifying a set of acquisition Benchmarks ASSIP concept provides a forum for crafting SIS acquisition improvement ASSIP structure produces an actionable plan for each FY ASSIP responds to Section 804 guidance 2003 by Carnegie Mellon University page 33

The Challenge Remains The Operational components of the DOD are embracing NCW as a means to attain the goals of Joint 2020 through Transformation. The Acquisition components of the DOD should consider the potential of concepts such as those driving NCW and Transformation to attain similar goals. While the future is yet to be realized, work is beginning across the Services. 2003 by Carnegie Mellon University page 34