Agents for Net-Centric Warfare and Time Critical Targets

ثبت نشده
چکیده

“Terrorists don’t think and move the way armies do. In Afghanistan they learned to hide when they suspected American Bombers were targeting them. To defeat groups like alQaeda, you have to attack as soon as you find them. With speed you can deny sanctuary to terrorists. In Afghanistan the Pentagon was able to reduce that time (the kill chain) to less than 10 minutes. But in those several minutes...at Tora Bora al-Qaeda fighters were able to escape due to delays in striking targets. In the future U.S. forces will have to locate targets and drop bombs in the time it takes to watch a couple of TV commercials. But speed has to be balanced with reliability (and accuracy), as at least a half-dozen accidental attacks on Afghan civilians and U.S. troops showed.” From a recent article in USA Today (“Afghanistan’s Lessons Shaping New Military”, Oct. 8, 2002).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward Using Intelligent Agents to Detect, Assess, and Counter Cyberattacks in a Network- Centric Environment

The network-centric warfare philosophy is becoming more firmly entrenched in US military doctrine and operations. As a result, the state and trustworthiness of the network and its computational resources are becoming even more important for commanders, particularly as the network itself is becoming an ever more lucrative target for cyber attack. In cyberspace, however, given human limitations a...

متن کامل

Towards Net-Centric Cyber Survivability for Ballistic Missile Defense

The United States Department of Defense (DoD) is engaged in a mission to unify its software systems towards a “net-centric” vision— where commanders gain advantage by rapidly producing, consuming, and sharing information using service oriented architectures (SOAs). In this paper, we study the cyber survivability of mission-critical net-centric systems, focusing on Ballistic-Missile-Defense (BMD...

متن کامل

Toward an Adaptive Data Distribution Service for Dynamic Large-Scale Network-Centric Operation and Warfare (NCOW) SystemsTo be sumitted to the 2008 Military Communications Conference

To achieve the goal of information dominance, the DoD has adopted the doctrine of net-centric operations and warfare (NCOW). The Global Information Grid (GIG), Future Combat System (FCS), C2 Constellation, and FORCEnet are examples of net-centric operations where multiple systems-of-systems integrate thousands of platforms, sensors, decision nodes, weapons, and warfighters through heterogeneous...

متن کامل

Using a Layered Model to place EW in Context within the Information Sphere

In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and otherconstructs haveemerged. This paper proposes a threelayer model in an attemptto provide a new perspective on this discussion. Each layeris defined and the rolesand relationships between EW, IW...

متن کامل

A Proposal For A Department Of Defense (DoD) Command And Control Strategy

To evolve C2, it is necessary that a continuous operational evolution to netcentric warfare take place. We must focus on DoD C2 as the major force multiplier of Net-Centric Warfare. This focus will enable accelerated evolution of DOTMLPF changes across the DoD C2 enterprise. By providing all users, with shared access to C2 information, regardless of COCOM boundaries, will enable new levels of c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005