Information Age C2 Concepts
David S. AlbertsDirector, Research and Strategic Planning,
OASD(C3I)
Agenda
• Why Revisit C2
• Origin and Evolution of Cn
• The Essence of C2
• Enduring C2 Principles• Spectrum of C2 Approaches• Industrial Age C2
• Characteristics of the Information Age • Information Age DoD• Focus on Agility• Information Age Force Management Concepts
Why Revisit C2?
• Nature of DoD Transformation
• Co-Evolution of MCPs
• Industrial Age Constraints
Why Revisit C2?
• Nature of DoD Transformation
Why Revisit C2?
• Co-Evolution of MCP
Why Revisit C2?
• Industrial Age C2 constrains potential effectiveness
Why Revisit C2?
Why Revisit C2?
Origin of Cn & its Usage Over Time
“The first qualification in a general is a cool head - that is, a head which receives accurate impressions, and estimates things and objects at their real value.”
Started with Command
Origin of Cn & its Usage Over Time
CommandControl
CommunicationsIntelligence
SurveillanceReconnaissance
Origin of Cn & its Usage Over Time
CommandControl
Communications
IntelligenceSurveillance
Reconnaissance
Origin of Cn & its Usage Over Time
CommandControl
Communications
IntelligenceSurveillance
Reconnaissance
Computers
Essence of C2
• Role of command
• Relationships among force participants
• Philosophy of control.
Awareness
Operating Environment
Understanding Command Intent
Battlespace
Cognitive Domain
Physical Domain
Information Domain
BattlespaceMonitoring
Management
Synchronization
Information Systems
Enduring Principles
Sensemaking
Spectrum of C2 Approaches
Industrial Age C2
• Specialized bureaucracies
Industrial Age C2
• HierarchiesNCA
SupportingCINC
SupportingCINC
CJTF
JFLCC JFMCC JFSOCC
Air Force Army Navy MarineCorps
Operational Command, including Unit Assignment
Coordination & Planning
Logistics Support Replacement of Major Equipment
Parts, Personnel, Non-Commodity Supply Support
Commodity (Fuel, Food, Ammo, etc.) Supply Support
Intelligence Requests & Asset Tasking
Intelligence Reports Fusion Function
Intelligence Dissemination Exploitation Function Units:
Parent
Parent
Svc Org
DFSA
DLAIntel
SupportedCINC
Parent
Parent
Parent
JFACC
Logistics Intelligence Combat Parent
AirUnits
GroundUnits
MaritimeUnits
SOFUnits
ServiceParent
Industrial Age C2
• Functional differentiation
Industrial Age C2: Stovepipes
Industrial Age C2
• Interchangeable parts
Industrial Age C2
• Control by plan
InformationDomain
CognitiveDomain
Physical Domain
Orient Decide
Observe Act
Implications of Industrial Age C2
CollaborationInformation
Sharing
SocialNetworking
&
Industrial Age C2 Characteristics
• Synchronous /sequential /cyclical
• Inflexible
• Fragile
• Simple control [plan minus fog/friction]
• Deconfliction as a goal
• Optimization
Attributes of Information Age
• Security Environment
• Information Age Organization
Attributes of Information Age
• Security Environment
– Full mission spectrum [beyond combat to full mission spectrum]
– Complex missions [military part of a larger team EBO v. attrition]
– Dynamic situations [ROE changes, strategic corporal]
– Requires agility
Attributes of Information Age
• Information Age Organization
– Information available from everywhere [post v. pull]
– Asynchronous in time/space
– Dynamic virtual task organizations
– Collaborative interactions among participants
– Widespread information sharing within/without
– Role management• Creates/modifies conditions of ROE• Communicates intent• Supports edge• Provide requisite agility
Information Age C2: Tenets of NCW
• A robustly networked force improves information sharing
• Information sharing and collaboration enhance:the quality of information and shared situational awareness
• Shared situational awareness enables self-synchronization
• These, in turn, dramatically increase mission effectiveness
X
X
X
Information Age C2
• Control as an emergent property
BattlespaceAwareness
Decisionmaking
BattleManagement
Enduring Principles
Enduring Principles
Information Age C2
• Power at the Center
Information Age C2
• Power to the Edge
Conclusions
• Information Age C2 concepts needed to satisfy demands of Information Age security challenges
• Networked relationships– Bring all information to bear– Bring all assets to bear– Ability to be agile– Ability to be proactive