Agents for Net-Centric Warfare and Time Critical Targets
ثبت نشده
چکیده
“Terrorists don’t think and move the way armies do. In Afghanistan they learned to hide when they suspected American Bombers were targeting them. To defeat groups like alQaeda, you have to attack as soon as you find them. With speed you can deny sanctuary to terrorists. In Afghanistan the Pentagon was able to reduce that time (the kill chain) to less than 10 minutes. But in those several minutes...at Tora Bora al-Qaeda fighters were able to escape due to delays in striking targets. In the future U.S. forces will have to locate targets and drop bombs in the time it takes to watch a couple of TV commercials. But speed has to be balanced with reliability (and accuracy), as at least a half-dozen accidental attacks on Afghan civilians and U.S. troops showed.” From a recent article in USA Today (“Afghanistan’s Lessons Shaping New Military”, Oct. 8, 2002).
منابع مشابه
Toward Using Intelligent Agents to Detect, Assess, and Counter Cyberattacks in a Network- Centric Environment
The network-centric warfare philosophy is becoming more firmly entrenched in US military doctrine and operations. As a result, the state and trustworthiness of the network and its computational resources are becoming even more important for commanders, particularly as the network itself is becoming an ever more lucrative target for cyber attack. In cyberspace, however, given human limitations a...
متن کاملTowards Net-Centric Cyber Survivability for Ballistic Missile Defense
The United States Department of Defense (DoD) is engaged in a mission to unify its software systems towards a “net-centric” vision— where commanders gain advantage by rapidly producing, consuming, and sharing information using service oriented architectures (SOAs). In this paper, we study the cyber survivability of mission-critical net-centric systems, focusing on Ballistic-Missile-Defense (BMD...
متن کاملToward an Adaptive Data Distribution Service for Dynamic Large-Scale Network-Centric Operation and Warfare (NCOW) SystemsTo be sumitted to the 2008 Military Communications Conference
To achieve the goal of information dominance, the DoD has adopted the doctrine of net-centric operations and warfare (NCOW). The Global Information Grid (GIG), Future Combat System (FCS), C2 Constellation, and FORCEnet are examples of net-centric operations where multiple systems-of-systems integrate thousands of platforms, sensors, decision nodes, weapons, and warfighters through heterogeneous...
متن کاملUsing a Layered Model to place EW in Context within the Information Sphere
In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and otherconstructs haveemerged. This paper proposes a threelayer model in an attemptto provide a new perspective on this discussion. Each layeris defined and the rolesand relationships between EW, IW...
متن کاملA Proposal For A Department Of Defense (DoD) Command And Control Strategy
To evolve C2, it is necessary that a continuous operational evolution to netcentric warfare take place. We must focus on DoD C2 as the major force multiplier of Net-Centric Warfare. This focus will enable accelerated evolution of DOTMLPF changes across the DoD C2 enterprise. By providing all users, with shared access to C2 information, regardless of COCOM boundaries, will enable new levels of c...
متن کامل