National Academies Press: OpenBook

Army Science and Technology for Homeland Security: Report 2: C4ISR (2004)

Chapter: Appendix E C4ISR Capabilities for the Future Force

« Previous: Appendix D Army Acquisition System
Suggested Citation:"Appendix E C4ISR Capabilities for the Future Force." National Research Council. 2004. Army Science and Technology for Homeland Security: Report 2: C4ISR. Washington, DC: The National Academies Press. doi: 10.17226/11053.
×

Appendix E
C4ISR Capabilities for the Future Force

Some of the anticipated operational capabilities to be afforded to the Future Force by C4ISR are listed below. Consistent with the rest of the report, this appendix is organized in the following groupings: command, control, and computers (C3); communications (C); and intelligence, surveillance, and reconnaissance (ISR). The sections for C3 and communications are further divided under the subheadings “See First,” “Understand First,” and “Act First” and augmented by another important parameter, “Ensure Reliability.” Each capability is listed under the parameter that fits it best; however, it is noted that these capabilities usually support other parameters and components to some extent as well.

ANTICIPATED OPERATIONAL CAPABILITIES DERIVED FROM COMMAND, CONTROL, AND COMPUTERS

See First
  • Commanders will have access to a common operational picture (COP) with timely updates to ensure near-perfect situational awareness and to overcome the fog of war.

  • Information will be automatically “pushed” to the commander as well as being “pulled” from the network in accord with immediate needs.

  • The Future Force Warrior (FFW) will use forward sensor fusion and ubiquitous, assured network communications to enable improved battle management, command and control, and situational awareness.

Suggested Citation:"Appendix E C4ISR Capabilities for the Future Force." National Research Council. 2004. Army Science and Technology for Homeland Security: Report 2: C4ISR. Washington, DC: The National Academies Press. doi: 10.17226/11053.
×
Understand First
  • Information will be fused at the commander’s level to avoid information overload and enable complete situational understanding.

  • Automated event-tracking capability will alert commanders to deviations from the operations plan or to unanticipated exigencies.

  • Commanders will be provided state-of-the-art collaborative, distributed, real-time decision aids to facilitate informed decisions.

  • Computer systems will be designed to enable individual soldiers to be recognized by any system and to be uniquely identified with appropriate rank, priority, and information needs.

  • The FFW will be integrated, interoperable, and interfaced with the unit of action systems and is capable of independent operations with joint assets and firepower.

  • The FFW will have command and control of organic tactical mobile robots and can interface with Future Combat Systems (FCS) robotic platforms.

Act First
  • The operations plan will be continuously updated with inputs from higher and lower echelons as events unfold.

  • The command post will be wherever the commander is located, be that location mounted, dismounted, or airborne.

  • Changes in leadership on the battlefield will be automatically accommodated on the fly to ensure continuity of command.

  • Automated synchronization of maneuver, firepower, and reconnaissance, surveillance, and target acquisition (RSTA) will be provided.

  • Ad hoc sensor-command-shooter links will be automatically or semi-automatically established to maximize effective firepower.

Ensure Reliability
  • Computer hardware will be robust and rugged for operations in the field.

  • Computer system components will be modular for easy and rapid repairs in the field or for upgrades.

  • Computers will be protected against hostile penetration with advanced firewalls and other security systems.

  • Software applications will be robust and flexible to accommodate interruptions in network services and changes in data rates without crashing.

  • Software will be readily serviced or upgraded in the field via the information network, without on-site technicians.

Suggested Citation:"Appendix E C4ISR Capabilities for the Future Force." National Research Council. 2004. Army Science and Technology for Homeland Security: Report 2: C4ISR. Washington, DC: The National Academies Press. doi: 10.17226/11053.
×

ANTICIPATED OPERATIONAL CAPABILITIES DERIVED FROM COMMUNICATIONS

See First
  • The network will utilize ground, airborne, and space communication line-of-sight and non-line-of-sight links to achieve continuous, uninterrupted connectivity on the move.

  • Networks will provide continuous position and navigation functions of all blue (friendly) entities with minimum self-disclosure to enemy.

  • Entities (including individual soldiers) will be connected to the network to enable each warfighter to have access to needed information and to enable each system/sensor to contribute relevant data that it may collect to the knowledge pool.

Understand First
  • The network will facilitate battlefield Identification: Friend or Foe by providing local situational awareness to engaged tactical units.

  • The network will provide reach-back through the global information grid (GIG) for national source information, as well as providing administrative and logistic support for all combat support and combat service functions.

  • Connectivity will be provided to local military or civilian networks as required.

  • The network will be backward-compatible to extend to legacy systems.

  • Above all, the communications system must be robust to ensure that critical information is provided to the warfighters when needed.

  • Network management will be essentially built in, requiring little to no on-site support. Upgrades or servicing can be done remotely via the network itself.

Act First
  • The network will be ad hoc, that is, self-configuring, allowing entities and nodes to enter and leave automatically without operator involvement.

  • The network will make maximum use of all available spectral bandwidth by dynamically adapting to battlefield exigencies and the commander’s priorities.

  • Network capabilities will allow voice, data, and video in accord with the commander’s intent and priorities and the battlefield situation.

  • The network is tied into the GIG to enable variable joint and coalition connectivity and operations.

Suggested Citation:"Appendix E C4ISR Capabilities for the Future Force." National Research Council. 2004. Army Science and Technology for Homeland Security: Report 2: C4ISR. Washington, DC: The National Academies Press. doi: 10.17226/11053.
×
  • Network protocols will facilitate multiple levels of security.

  • Network protocols will accommodate temporary interruptions in connectivity (for example, if a vehicle passes under a bridge) without requiring resetting.

Ensure Reliability
  • The network will be robust against environmental effects such as rain, fog, foliage, buildings, and structures.

  • The network will be robust against jamming countermeasures, taking automatic counter-countermeasures to minimize adverse effects.

  • Networks will be assured as well as secure, providing protection against insertion of specious data and denying access to hostile or unauthorized personnel or forces.

  • To the extent possible, the network will preclude interception and network analysis by hostile forces.

  • The network hardware and protocols will be commercially based to the maximum extent possible in order to facilitate technology insertions as they evolve.

ANTICIPATED OPERATIONAL CAPABILITIES DERIVED FROM INTELLIGENCE, SURVEILLANCE, AND RECONNAISSANCE

See First
  • Manned and unmanned ground, air, and space systems will extend vision beyond the line of sight to provide continuous, ubiquitous battlefield monitoring through both passive and aggressive RSTA.

  • Sensors will be available to see through walls in urban operations.

  • The ISR system will employ the full range of operational variables—terrain; weather; friendly and enemy forces; and noncombatants—and detect threat actions in all environments.

  • The ISR system will manage the overall application of organic sensor assets in accord with the commander’s intent and needs.

  • The ISR system will provide standoff means to detect mines, booby traps, and command-detonated munitions “in stride” so as to maintain operational tempo.

  • Semiautomated pattern analysis will be performed to detect, locate, and identify enemy combatants and systems.

  • Control of sensors and information collection, as well as analysis, will be distributed via the network to eliminate single-point vulnerability.

Suggested Citation:"Appendix E C4ISR Capabilities for the Future Force." National Research Council. 2004. Army Science and Technology for Homeland Security: Report 2: C4ISR. Washington, DC: The National Academies Press. doi: 10.17226/11053.
×
  • The sensor system will be designed to operate in all weather and all terrain, against enemy entities that are dispersed, covered and concealed, masked, and fleeting.

  • Joint combat identification measures will be integrated.

Understand First
  • Sensor data collected from both manned and unattended sensor networks will be processed, networked, and fused into an integrated COP for unprecedented situational awareness and understanding.

  • Commanders will be able automatically or with software decision aids to sort out from a variety of enemy data entries which are most dangerous and which have higher payoffs for engagement at tactical standoff.

  • Highly precise data on targets will flow from sensor to shooter and enable reliable and timely battlefield damage assessment.

  • Joint, Army, and coalition manned and unmanned air, ground, and space RSTA assets will be used synergistically to gain and maintain contact with enemy elements and to provide high-resolution combat information on terrain and weather.

  • Near-real-time friend, foe, or noncombatant identification across the spectrum of operations will be achieved through platform-to-platform, platform-to-soldier, soldier-to-platform, and soldier-to-soldier interrogation.

  • Means will be provided to sort through decoys, deception, and disinformation.

  • Robotic systems will be employed for certain high-risk situations.

  • Means will be provided to defeat the enemy’s ISR systems through the use of obscurants, jamming, signature reduction, deception, and pattern avoidance techniques in order to see, understand, and act first.

Suggested Citation:"Appendix E C4ISR Capabilities for the Future Force." National Research Council. 2004. Army Science and Technology for Homeland Security: Report 2: C4ISR. Washington, DC: The National Academies Press. doi: 10.17226/11053.
×
Page 137
Suggested Citation:"Appendix E C4ISR Capabilities for the Future Force." National Research Council. 2004. Army Science and Technology for Homeland Security: Report 2: C4ISR. Washington, DC: The National Academies Press. doi: 10.17226/11053.
×
Page 138
Suggested Citation:"Appendix E C4ISR Capabilities for the Future Force." National Research Council. 2004. Army Science and Technology for Homeland Security: Report 2: C4ISR. Washington, DC: The National Academies Press. doi: 10.17226/11053.
×
Page 139
Suggested Citation:"Appendix E C4ISR Capabilities for the Future Force." National Research Council. 2004. Army Science and Technology for Homeland Security: Report 2: C4ISR. Washington, DC: The National Academies Press. doi: 10.17226/11053.
×
Page 140
Suggested Citation:"Appendix E C4ISR Capabilities for the Future Force." National Research Council. 2004. Army Science and Technology for Homeland Security: Report 2: C4ISR. Washington, DC: The National Academies Press. doi: 10.17226/11053.
×
Page 141
Next: Appendix F C4ISR Capabilities for Civilian Emergency Responders »
Army Science and Technology for Homeland Security: Report 2: C4ISR Get This Book
×
 Army Science and Technology for Homeland Security: Report 2: C4ISR
Buy Paperback | $54.00 Buy Ebook | $43.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Shortly after the events of September 11, 2001, the U.S. Army asked the National Research Council (NRC) for a series of reports on how science and technology could assist the Army meet its Homeland defense obligations. The first report, Science and Technology for Army Homeland Security—Report 1, presented a survey of a road range of technologies and recommended applying Future Force technologies to homeland security wherever possible. In particular, the report noted that the Army should play a major role in providing emergency command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) capabilities and that the technology and architecture needed for homeland security C4ISR was compatible with that of the Army’s Future Force. This second report focuses on C4ISR and how it can facilitate the Army’s efforts to assist the Department of Homeland Security (DHS) and emergency responders meet a catastrophic event.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!