Global Threats Demand Credible Response in Less Time
![]() |
Today’s afloat command center relies heavily on command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) technologies to maintain situational awareness. The requirement to share information is increasing and becoming more complicated as the U.S. armed forces are called upon to support not only military operations but also humanitarian efforts. |
The complexity of the command, control, communications, computers, intelligence, surveillance and reconnaissance environment has increased significantly during the diverse operations the
The continued introduction of information technology—today and on the horizon—is aimed at addressing the same challenges that have defined warfighting superiority throughout the ages—making better decisions faster and with fewer people in uncertain situations where the ramifications of poor decisions can be catastrophic. No matter how far technology advances, in the end it will be up to the individual often working as part of a team to understand the meaning of information and to determine the best possible course of action given the potential grave consequences associated with military actions.
These challenges are more difficult than ever in light of the growing number of varied threats that can occur, potentially simultaneously. Threats are now more global in nature, they can move and change with increasing speed, and less and less time is allowed before a credible response must be fully underway. Moreover, the military is being given increasing responsibility for a variety of new or nontraditional missions, including humanitarian assistance and maritime domain awareness in support of homeland defense. These demands will require the armed forces to create new partnerships and new capabilities never imagined for fighting forces.
In addition, there are far-reaching and often surprising implications when massive amounts of information are available and when information can be distributed worldwide nearly instantly. In practice, it may be difficult to make sense out of the glut; there are more needles but many more haystacks as well. The definitions of the battle and the battlespace have been expanding to encompass a greater breadth of meaning and scope of volume. An adversary can strike in many different domains, anywhere and any time.
One strategy being developed for achieving omniscient awareness at lower risk over the scope of the battlespace is the use of autonomous systems in every domain. Maintaining pervasive and persistent surveillance over this infinite range of possibilities effectively presents significant challenges for achieving better decisions faster with fewer people.
The military role has expanded to include humanitarian assistance and disaster relief as well. For example, a naval commander may have to accomplish a diverse set of operational requirements during the same deployment. Expeditionary Strike Group 5’s experience in the December 2004 time frame is one example. After departing
The expeditionary group provided simultaneous support to Indonesian authorities, coalition partners such as
In a recent address to the
The U.S. Marine Corps response during the battle for Fallujah in
![]() |
The Space and Naval Warfare enterprise and its industry partners are developing the U.S. Navy’s Composeable FORCEnet. Composeability uses open public distributed Web services, specifications and standards to help introduce new warfighting capabilities into the field faster. |
The battle for Fallujah dealt a major blow to the insurgency in
Technology also can assist in providing humanitarian aid within the
It is clear from the responses of all of the federal agencies that they—and in particular the Defense Department—must provide substantial logistics support to move tons of water and food as well as medical services to people in disaster areas. Hurricane Katrina illustrated the necessity of inherent military C2 capability in the early stages of a catastrophic event.
Even as the military begins to develop technologies that discover useful information in distributed environments, frustration is increasing over the ability to gain access to and interact with information under the control of organizations beyond a single chain of command. One of the most significant challenges is dealing with differences in security, architectures, procedures, policies and the law. Networked knowledge workers in every field are discovering that the axiom “knowledge is power” applies as much to the desire to share knowledge as to the importance of accumulating it. Strong cultural barriers exist against sharing knowledge if it might diminish an individual’s job, importance or effectiveness.
However, several concepts and issues are emerging. The promise of network centricity is in the concept of reach-back where distributed or aggregated experts operating over the network enhance or even substitute for local expertise. This more effective use of subject matter expertise could have significant manpower savings implications. A tremendous amount of work remains to be done before the promises of reach-back can be realized. Issues such as information discovery, mediation, security, dissemination strategies and bandwidth constraints and new concepts of operations and associated business rules—as well as techniques and supporting technology for effective collaboration—must be better understood and resolved.
“Composeability,” currently instantiated as Composeable FORCEnet, is an emerging concept in the implementation of the U.S. Navy’s FORCEnet. It is borne out in efforts within the Space and Naval Warfare enterprise and its industry partners and is currently undergoing operational experimentation in a number of fleet commands. Composeability provides a new paradigm for the rapid instantiation of new warfighting capabilities out of Web-enabled information, Web services and Web tool components. Composeability is based on the utilization of open public distributed Web services, specifications and standards. These standards will enable users to plug and play—or, as warfighters, to plug and fight—with new capabilities, new organizations and new tactics on the fly that are inherently interoperable as the operational and tactical situation dictates. This approach is distinctly different from the current military model of achieving interoperability through large-scale integration by engineering a system of systems.
Advanced information technologies have not proven to be a panacea for the issues facing military commanders. During the last 10 years, warfighters have become more vocal about the fact that the most advanced technology cannot be a substitute for human intellect. For technology to enhance the user’s innate capabilities, technologists must develop a deep understanding of human perceptual and cognitive capabilities and must create new ways to design an optimal system to support users. Recognition has grown that poorly designed interfaces to complex systems can result in critical errors under combat conditions. They also can result in the inefficient use of expensive system capabilities, increased manning levels and high training costs.
Dr. Jeff Grossman is senior technology research associate, Command and Control Department, at the Space and Naval Warfare Systems Command Systems Center–San Diego, and Richard Akita is the director of command, control, communications and intelligence business development–West Coast at SRA Incorporated, San Diego.
The role of command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) in military operations will be the topic of discussion at the 2006 C4ISR conference, “From New Orleans to Baghdad: Addressing Emergent C4ISR Requirements—Making Better Decisions Faster with Fewer People.” The event is co-sponsored by AFCEA International’s San Diego Chapter and the Space and Naval Warfare Systems Command (SPAWAR) Systems Center–San Diego. It takes place at the Four Point Sheraton Hotel and |