Command and control

Last updated
A watchstander at her station in the combat information center of USS Carl Vinson in the year 2001. CIC-USS-CarlVinson-2001.jpg
A watchstander at her station in the combat information center of USS Carl Vinson in the year 2001.

Command and control is a "set of organizational and technical attributes and processes ... [that] employs human, physical, and information resources to solve problems and accomplish missions" to achieve the goals of an organization or enterprise, according to a 2015 definition by military scientists Marius Vassiliou, David S. Alberts, and Jonathan R. Agre. [1] [2] The term often refers to a military system.

Contents

Versions of the United States Army Field Manual 3-0 circulated circa 1999 define C2 in a military organization as the exercise of authority and direction by a properly designated commanding officer over assigned and attached forces in the accomplishment of a mission. [3] [4]

A 1988 NATO definition is that command and control is the exercise of authority and direction by a properly designated individual over assigned resources in the accomplishment of a common goal. [5] An Australian Defence Force definition, similar to that of NATO, emphasises that C2 is the system empowering designated personnel to exercise lawful authority and direction over assigned forces for the accomplishment of missions and tasks. [6] (The Australian doctrine goes on to state: The use of agreed terminology and definitions is fundamental to any C2 system and the development of joint doctrine and procedures. The definitions in the following paragraphs have some agreement internationally, although not every potential ally will use the terms with exactly the same meaning. [6] )

Overview

US perspective

The US Department of Defense Dictionary of Military and Associated Terms [7] defines command and control as: "The exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission. Also called C2. Source: JP 1". [8]

The edition of the Dictionary "As Amended Through April 2010" elaborates, "Command and control functions are performed through an arrangement of personnel, equipment, communications, facilities, and procedures employed by a commander in planning, directing, coordinating, and controlling forces and operations in the accomplishment of the mission." [9] However, this sentence is missing from the "command and control" entry for the edition "As Amended Through 15 August 2014." [10]

Commanding officers are assisted in executing these tasks by specialized staff officers and enlisted personnel. These military staff are a group of officers and enlisted personnel that provides a bi-directional flow of information between a commanding officer and subordinate military units.[ citation needed ]

The purpose of a military staff is mainly that of providing accurate, timely information which by category represents information on which command decisions are based. The key application is that of decisions that effectively manage unit resources. While information flow toward the commander is a priority, information that is useful or contingent in nature is communicated to lower staffs and units.[ citation needed ]

Computer security industry

This term is also in common use within the computer security industry and in the context of cyberwarfare. Here the term refers to the influence an attacker has over a compromised computer system that they control. For example, a valid usage of the term is to say that attackers use "command and control infrastructure" to issue "command and control instructions" to their victims. Advanced analysis of command and control methodologies can be used to identify attackers, associate attacks, and disrupt ongoing malicious activity. [11]

Derivative terms

There are a plethora of derivative terms which emphasise different aspects, uses and sub-domains of C2. These terms come with a plethora of associated abbreviations – for example, in addition to C2, command and control is also often abbreviated as C2, and sometimes as C&C.

Embraer R-99 MULTI INTEL, an example of aircraft with C3I capabilities Embraer R-99 6750 (9502952605).jpg
Embraer R-99 MULTI INTEL, an example of aircraft with C3I capabilities

Command and control have been coupled with

and others.

Some of the more common variations include:

and others.

Command: The exercise of authority based upon certain knowledge to attain an objective.
Control: The process of verifying and correcting activity such that the objective or goal of command is accomplished.
Communication: Ability to exercise the necessary liaison to exercise effective command between tactical or strategic units to command.
Computers: The computer systems and compatibility of computer systems. Also includes data processing.
Intelligence: Includes collection as well as analysis and distribution of information.

Command and control centers

A command and control center is typically a secure room or building in a government, military or prison facility that operates as the agency's dispatch center, surveillance monitoring center, coordination office and alarm monitoring center all in one. Command and control centers are operated by a government or municipal agency.

Various branches of the US military such as the US Coast Guard and Navy have command and control centers. They are also common in many large correctional facilities.

A command and control center that is used by a military unit in a deployed location is usually called a "command post". [17] A warship has a combat information center for tactical control of the ship's resources, but commanding a fleet or joint operation requires additional space for commanders and staff plus C4I facilities provided on a flagship (e.g., aircraft carriers), sometimes a command ship or upgraded logistics ship such as USS Coronado.

Command and control warfare

Command and control warfare encompasses all the military tactics that use communications technology. It can be abbreviated as C2W. An older name for these tactics is "signals warfare", derived from the name given to communications by the military. Newer names include information operations and information warfare.

The following techniques are combined:

with the physical destruction of enemy communications facilities. The objective is to deny information to the enemy and so disrupt its command and control capabilities. At the same time precautions are taken to protect friendly command and control capabilities against retaliation.

In addition to targeting the enemy's command and control, information warfare can be directed to the enemy's politicians and other civilian communications.

See also

US and other NATO specific:

Other

Related Research Articles

Northrop Grumman E-8 Joint STARS airborne ground surveillance aircraft based on Boeing 707 airframe

The Northrop Grumman E-8 Joint Surveillance Target Attack Radar System is a United States Air Force airborne ground surveillance, battle management and command and control aircraft. It tracks ground vehicles and some aircraft, collects imagery, and relays tactical pictures to ground and air theater commanders. The aircraft is operated by both active duty U.S. Air Force and Air National Guard units and also carries specially trained U.S. Army personnel as additional flight crew.

Communications security

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.

Electronic warfare (EW) is any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults. The purpose of electronic warfare is to deny the opponent the advantage of, and ensure friendly unimpeded access to, the EM spectrum. EW can be applied from air, sea, land, and/or space by manned and unmanned systems, and can target communication, radar, or other assets.

Intelligence, surveillance, target acquisition, and reconnaissance

ISTAR stands for intelligence, surveillance, target acquisition, and reconnaissance. In its macroscopic sense, ISTAR is a practice that links several battlefield functions together to assist a combat force in employing its sensors and managing the information they gather.

Electronic Systems Center

Electronic Systems Center was a product center of Air Force Materiel Command (AFMC) headquartered at Hanscom Air Force Base, Massachusetts. Its mission was to develop and acquire command and control, communications, computer, and intelligence systems. ESC consisted of professional teams specializing in engineering, computer science, and business management. The teams supervised the design, development, testing, production, and deployment of command and control systems. Two of ESC's most well-known developments were the Airborne Warning and Control System (AWACS), developed in the 1970s, and the Joint Surveillance Target Attack Radar System (JointSTARS), developed in the 1980s.

United States Strategic Command Unified combatant command of the United States Armed Forces responsible for strategic, nuclear, and space operations

United States Strategic Command (USSTRATCOM) is one of the eleven unified combatant commands in the United States Department of Defense. Headquartered at Offutt Air Force Base, Nebraska, USSTRATCOM is responsible for strategic deterrence, global strike, and operating the Defense Department's Global Information Grid. It also provides a host of capabilities to support the other combatant commands, including integrated missile defense; and global command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR). This command exists to give national leadership a unified resource for greater understanding of specific threats around the world and the means to respond to those threats rapidly.

C4ISR may refer to:

Network-centric warfare, also called network-centric operations or net-centric warfare, is a military doctrine or theory of war that seeks to translate an information advantage, enabled in part by information technology, into a competitive advantage through the robust computer networking of well informed geographically dispersed forces. It was pioneered by the United States Department of Defense in the 1990s.

United States Army Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance and Reconnaissance Center

The Combat Capabilities Development Command (CCDC) C5ISR Center, formerly the Communications-Electronics RD&E Center (CERDEC), is the United States Army information technologies and integrated systems center. CCDC C5ISR Center is headquartered at Aberdeen Proving Ground in Maryland, with activities at Fort Belvoir in Virginia and Joint Base McGuire-Dix-Lakehurst in New Jersey.

Air Force Intelligence, Surveillance and Reconnaissance Agency Former field operating agency of the USAF

The Air Force Intelligence, Surveillance and Reconnaissance Agency was until 29 September 2014 a field operating agency of the United States Air Force headquartered at Lackland Air Force Base, Texas. On that date it was redesignated Twenty-Fifth Air Force and aligned as a numbered air force (NAF) of the Air Combat Command.

NATO Communications and Information Systems Services Agency

The NATO Communication and Information Systems Services Agency , was a service provider to its NATO and national customers. Wherever NATO deployed on operations or exercises, NCSA was there, providing communication and information systems (CIS) services in support of the mission. Equally important, NCSA supported NATO’s ten major headquarters in Europe, North America, and Asia.

Naval Information Warfare Center Pacific

Naval Information Warfare Center Pacific, formerly Space and Naval Warfare Systems Center Pacific provides the US Navy with research, development, delivery and support of integrated command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR), cyber and space systems and capabilities across all warfighting domains. The only Naval technical center headquartered in a major fleet concentration area, NIWC Pacific manages strategic locations both in the Pacific theater and around the world.

Missile and Space Intelligence Center

The Missile and Space Intelligence Center (MSIC) is a component of the U.S. Defense Intelligence Agency. MSIC is located at Redstone Arsenal in Huntsville, Alabama.

Naval Information Warfare Systems Command

The Naval Information Warfare Systems Command (NAVWARSYSCOM), based in San Diego, is one of six SYSCOM Echelon II organizations within the United States Navy and is the Navy's technical authority and acquisition command for C4ISR, business information technology and space systems. Echelon II means that the organization reports to someone who, in turn, reports directly to the Chief of Naval Operations on the military side. From a civilian perspective, NAVWARSYSCOM reports to the Assistant Secretary of the Navy (RDA). The command was formerly known as SPAWAR, or the Space and Naval Warfare Systems Command and was renamed in June 2019 to better align its identity with its mission.

A program executive officer, or PEO, is one of a few key individuals in the United States military acquisition process. As can be seen from the examples below, a program executive officer may be responsible for a specific program, or for an entire portfolio of similar programs.

The Combined Federated Battle Laboratories Network (CFBLNet) is a laboratory environment which utilizes a distributed Wide Area Network (WAN) as the vehicle to simulate training environments and to de-risk command and control (C2) and intelligence capabilities by conducting Research and Development, Training, Trials and Assessment (RDTT&A) on command, control, communication, computer, intelligence, surveillance and reconnaissance (C4ISR) initiatives and training events. Since 2001, membership has been established and represented by three core parties: the U.S. Joint Staff, the Combined Communications and Electronics Board, and the North Atlantic Treaty Organization. Besides the core parties to the CFBLNet Technical Arrangement, four nations have become Guest Mission Partners under rules contained in CFBLNet governance documentation referred to as Publication 1.

Battle command

Battle command (BC) is the discipline of visualizing, describing, directing, and leading forces in operations against a hostile, thinking, and adaptive enemy. Battle command applies leadership to translate decision into actions, by synchronizing forces and warfighting functions in time, space, and purpose, to accomplish missions. Battle command refers both to processes triggered by commanders and executed by soldiers and to the system of systems (SoS) that directly enables those processes.

NATO Communications and Information Agency

The NATO Communications and Information Agency is NATO's technology and cyber hub.

Twenty-Fifth Air Force Numbered air force of the United States Air Force responsible for intelligence forces

Twenty-Fifth Air Force, also known as Air Force Intelligence, was a numbered air force (NAF) within the United States Air Force (USAF), and served as the Air Force's premier military intelligence organization. 25 AF was established on 29 September 2014 by redesignating the Air Force Intelligence, Surveillance and Reconnaissance Agency under Headquarters, United States Air Force, to a numbered air force aligned under Air Combat Command. The USAF also realigned the 9th Reconnaissance Wing and the 55th Wing under the new NAF. It was headquartered at Lackland Air Force Base, Texas.

The Fourth Department (4PLA) of the Chinese People's Liberation Army (PLA) Joint Staff Department (JSD) is also known as the Electronic Countermeasures and Radar Department. It is charged with the PLA's offensive electronic warfare (EW) and information warfare (IW) missions, to include offensive cyber operations. Based on PLA doctrine and 4PLA's mission, this department will almost certainly play a major role in future conflicts, including conflicts with the U.S. While information on 4PLA can be sparse, this paper will attempt to pull together many sources to provide an overview of 4PLA, to include its history, the role of an important 4PLA leader and the doctrine that he produced, 4PLA's responsibilities and mission, its organizational structure, 4PLA's relationship with other organizations in China, its locations and size, and how 4PLA and its related doctrine could be used in battle.

References

Citations

  1. Vassiliou, Marius, David S. Alberts, and Jonathan R. Agre (2015). C2 Re-Envisioned: the Future of the Enterprise . CRC Press; New York; p. 1, ISBN   9781466595804.
  2. See also Ross Pigeau; Carol McCann (Spring 2002). "Re-conceptualizing Command and Control" (PDF). Canadian Military Journal. 3 (1): 53–63. Archived (PDF) from the original on 20 November 2013. Retrieved 1 March 2014.
  3. para 5-2, United States Army Field Manual: FM 3–0
    Headquarters, Department of the Army (14 June 2001). FM 3–0, Operations. Washington, DC: GPO. OCLC   50597897. Archived from the original (PDF inside ZIPSFX) on 19 February 2002. Retrieved 19 August 2013.
    Newer versions of FM 3-0 Archived 4 March 2016 at the Wayback Machine do not define Command and control, even though they use the term extensively.
  4. Builder, Carl H., Bankes, Steven C., Nordin, Richard, "Command Concepts – A Theory Derived from the Practice of Command and Control" Archived 2 October 2012 at the Wayback Machine , MR775, RAND, ISBN   0-8330-2450-7, 1999
  5. Neville Stanton; Christopher Baber; Don Harris (1 January 2008). Modelling Command and Control: Event Analysis of Systemic Teamwork. Ashgate Publishing, Ltd. ISBN   9780754670278. Archived from the original on 17 May 2016. Retrieved 15 November 2015.
  6. 1 2 "ADDP 00.1 Command and Control" (PDF). Commonwealth of Australia. 27 May 2009. pp. 1–2. Archived (PDF) from the original on 14 February 2014. Retrieved 1 March 2014.
  7. DoD Dictionary of Military and Associated Terms Archived 10 October 2016 at the Wayback Machine , www.dtic.mil
  8. Command and control Archived 29 June 2011 at the Wayback Machine , Dictionary of Military and Associated Terms, www.dtic.mil
  9. Joint Chiefs of Staff (U.S.) (8 November 2010). "Command and Control". Joint Publication 1-02. Department of Defense Dictionary of Military and Associated Terms (As Amended Through 31 January 2011) (PDF). p. 65. Archived (PDF) from the original on 18 September 2014. Retrieved 3 November 2014.
  10. Joint Chiefs of Staff (U.S.) (8 November 2010). "Command and Control". Joint Publication 1-02. Department of Defense Dictionary of Military and Associated Terms (As Amended Through 15 August 2014) (PDF). p. 44. Archived (PDF) from the original on 24 August 2014. Retrieved 3 November 2014.
  11. Command Five Pty Ltd, "Command and Control in the Fifth Domain" Archived 27 February 2012 at the Wayback Machine , February 2012, www.commandfive.com
  12. In modern warfare, computers have become a key component as cyberspace is now seen as "the fifth domain of warfare" – refer: Clarke, Richard A. (2010). Cyber War. HarperCollins. and
    "Cyberwar: War in the Fifth Domain". Economist. 1 July 2010. Archived from the original on 7 December 2013. Retrieved 23 April 2014.
  13. TTCP Groups Archived 5 June 2011 at the Wayback Machine , www.dtic.mil/ttcp/
  14. "Department of Defense Dictionary of Military and Associated Terms" Archived 23 November 2008 at the Wayback Machine , Joint Publication 1-02, US Department of Defense, 17 March 2009.
  15. Sloan, E., "Security and Defence in the Terrorist Era", McGill-Queen's University Press, Montreal, 2005; see Ch. 7 for C4ISTAR discussion.
  16. "The 2019 Annual Report of Lockheed Martin Corporation". the U.S. Securities and Exchange Commission. 7 February 2020.
  17. US Army PEO C3T – Project Manager, Command Posts Archived 11 May 2010 at the Wayback Machine , peoc3t.monmouth.army.mil

Sources