Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Computer Security Lowered on 9/10
#5
From WikiPedia ( http://en.wikipedia.org/wiki/Network-centric_warfare ) :

"Network centric warfare can trace its immediate origins to 1996 when Admiral William Owens introduced the concept of a 'system of systems' in a paper of the same name published by the Institute National Security Studies. Owens described the serendipitous evolution of a system of intelligence sensors, command and control systems, and precision weapons that enabled enhanced situational awareness, rapid target assessment, and distributed weapon assignment. Also in 1996, the Joint Chiefs of Staff released Joint Vision 2010, which introduced the military concept of full-spectrum dominance. Full Spectrum Dominance described the ability of the US military to dominate the battlespace from peace operations through to the outright application of military power that stemmed from the advantages of information superiority.
[edit] Network Centric Warfare

The term "network-centric warfare" and associated concepts first appeared in the Department of Navy's publication, "Copernicus: C4ISR for the 21st Century." The ideas of networking sensors, commanders, and shooters to flatten the hierarchy, reduce the operational pause, enhance precision, and increase speed of command were captured in this document. Many of these ideas were further refined and developed through models developed by the consulting firm Booz Allen Hamilton working with the Joint Staff in the Pentagon in the mid to late 1990s.
As a distinct concept, however, network-centric warfare first appeared publicly in a 1998 US Naval Institute Proceedings article by Vice Admiral Arthur K. Cebrowski and John Gartska. The concepts were later given greater depth in the book, Network Centric Warfare coauthored by Gartska, David S. Alberts (Director of Research, OASD-NII), and Fred Stein of The MITRE Corporation.
Published by the Command and Control Research Program (CCRP), the book derived a new theory of warfare from a series of case studies on how business was using information and communication technologies to improve situation analysis, accurately control inventory and production, as well as monitor customer relations.
[edit] Understanding Information Age Warfare

Network-centric warfare was followed in 2001 by Understanding Information Age Warfare (UIAW), jointly authored by Alberts, Gartska, Richard Hayes of Evidence Based Research and David S. Signori of RAND. UIAW pushed the implications of the shifts identified by network-centric warfare in order to derive an operational theory of warfare.
Starting with a series of premises on how the environment is sensed, UIAW posits a structure of three domains. The physical domain is where events take place and are perceived by sensors and individuals. Data emerging from the physical domain is transmitted through an information domain.
Data is subsequently received and processed by a cognitive domain where it is assessed and acted upon. The process replicates the "observe, orient, decide, act" loop first described by Col. John Boyd of the USAF.....


Network-centric warfare/operations is a cornerstone of the ongoing transformation effort at the Department of Defense initiated by former Secretary of Defense Donald Rumsfeld. It is also one of the five goals of the Office of Force Transformation, Office of the Secretary of Defense.


See Revolution in Military Affairs for further information on what is now known as "defense transformation" or "transformation".
"
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply


Messages In This Thread
Computer Security Lowered on 9/10 - by Ed Jewett - 26-09-2010, 03:14 AM
Computer Security Lowered on 9/10 - by Ed Jewett - 26-09-2010, 03:18 AM
Computer Security Lowered on 9/10 - by Ed Jewett - 26-09-2010, 08:16 PM
Computer Security Lowered on 9/10 - by Ed Jewett - 26-09-2010, 08:28 PM
Computer Security Lowered on 9/10 - by Ed Jewett - 26-09-2010, 08:37 PM
Computer Security Lowered on 9/10 - by Ed Jewett - 26-09-2010, 08:40 PM
Computer Security Lowered on 9/10 - by Ed Jewett - 26-09-2010, 11:38 PM
Computer Security Lowered on 9/10 - by Mark Stapleton - 27-09-2010, 07:57 AM
Computer Security Lowered on 9/10 - by Ed Jewett - 27-09-2010, 06:55 PM
Computer Security Lowered on 9/10 - by Mark Stapleton - 28-09-2010, 09:44 AM

Possibly Related Threads…
Thread Author Replies Views Last Post
  The Practice of 'Threat Inflation' (Hyping Terror Threats) and Homeland Security Adele Edisen 2 3,847 25-05-2012, 05:09 AM
Last Post: Adele Edisen
  Where did the bodies go? 3,000 "deaths" from 9/11 not in Social Security death index James H. Fetzer 19 8,104 05-08-2011, 05:45 AM
Last Post: Ed Jewett
  Citizen Investigation Team's "National Security Alert" Ed Jewett 1 2,697 07-01-2011, 06:38 PM
Last Post: Ed Jewett
  TSA (Transportation Security Admin.), division of Homeland Security Peter Lemkin 0 3,975 04-10-2008, 06:17 AM
Last Post: Peter Lemkin

Forum Jump:


Users browsing this thread: 1 Guest(s)