Topic 10: Operational Issues

This topic will address the operational needs, gaps, overlaps, lessons learned, and best practices working the "Mission Partner" (Ministries', Departments', Bureaus', Agencies', Governments', Militaries', Special Operations and Conventional Forces). The papers should articulate how "Mission Partner" engagements and relationships impact operational missions.


Paper 003

Abstract Title: Estimation and Analysis of Information Exchange Requirements for ROK Army's Tactical Netowrks

Point of Contact (POC): Young Ho Kim

POC Email Address: ykim50@daum.net

POC Phone Number: 82-2-961-1829

POC Organization: Korea Institute of Defense Analysis

Country: Korea

Authors: Young Ho Kim

Abstract: In order to achieve Network Centric Operations (NCO) capabilities, ROK Army is currently developing tactical communications system, which is called as Tactical Information Communications Network (TICN). The analysis of Information Exchange Requirements (IERs) is needed for the design of net-ready TICN system to guarantee reliable information transmission and to determine optimal network structure.

In contrast to designing commercial communication systems, the estimation of information bandwidth between echelons under tactical operating conditions and the bandwidth dynamic behavior analysis are essential for the efficient system developments and operational uses.

The paper proposes a new approach to the estimation and analysis of IERs based on operational scenarios, message formats employed by ROK Army C4I systems, and Subject Matter Experts (SMEs).

The paper presents the quantitative estimation of IERs bandwidth from Corps to Regiment echelons for ROK Army's tactical operations up to 2020 years in accordance with three stages of time-frames and battle-field functions. The paper provides the analysis of IERs characterizations in terms of information bandwidth of total aggregation and each battle-field functions, bandwidth dynamic behavior, and some areas to be studied further.


Paper 010

Abstract Title: Target Modeling Adversarial Agility
Point of Contact (POC): Dr. William L. Mitchell
POC Email Address: IMO-11@fak.dk
POC Phone Number: (45) 29 82 94 71
POC Organization: Danish Defence
Country: Denmark
Authors: Dr. William L. Mitchell
C2 & Intelligence
Dept. of Joint Operations
Royal Danish Defence College
Copenhagen, DNK
Tel. (45) 39151240/Cell (45) 29829471
Email: IMO-11@fak.dk

(Full Paper Here)


Paper 037

Abstract Title:  Special Operations Command Mission Partner Engagement
Point of Contact (POC): Ken D. Teske
POC Email Address: ken.teske.ctr@socom.mil
POC Phone Number: 757 510 0915
POC Organization: United States Special Operations Command
Country: US
Authors: Mr. Ken D. Teske. Mr. Michael D. Tisdel, Mr. William C. Fleser

(Full Paper Here)


Paper 038

Abstract Title:  “Mission Networks” Fostering Trust
Point of Contact (POC): Ken D. Teske
POC Email Address: ken.teske.ctr@socom.mil
POC Phone Number: 757 510 0915
POC Organization: United States Special Operations Command
Country: US
Authors: Mr. Ken D. Teske. Mr. Michael D. Tisdel, Mr. William C. Fleser

(Full Paper Here)


Paper 044

Abstract Title: Principled Management of Intelligent Cross-Domain Collaboration and Security

Point of Contact (POC): Jason Bryant

POC Email Address: Jason.Bryant.8@us.af.mil

POC Phone Number: 315-330-7670

POC Organization: Air Force Research Laboratory

Country: US

Authors: Jason Bryant

Abstract: Principle-based management solutions of information for multi-national, federated, and cross-domain environments can combat failures of mission trust, awareness, and assurance. These environments have a unique set of challenges for cyber exploitation and defense, C2ISR mission support, cross-mission supremacy, assurance, and security concerns from demarcated, congested, and contested communication. These concerns are mitigated by executing separation of concern evaluations and modular feature assessments of C2 requirements across information domains. These solutions are demonstrated in establishing policy, sharing and collaboration requirements, and User Defined Operating Picture (UDOP) rules for a complex use case of multi-national air, space, and cyber domains. Our use case application establishes validity tests resulting in a common set of principle driven innovations, driving foundational best practices for these environments.


Paper 101

Abstract Title: Asymmetric warfare and air power

Point of Contact (POC): Murat BILGEN

POC Email Address: mbilgen2011@hotmail.com

POC Phone Number: 0090 543 672 17 30

POC Organization: Turkish Air War College

Country:

Authors: Murat BILGEN

Abstract: Nowadays in the wars main actors are not the states. Instead, non-state actors are rising in the current security environment. Terrorism will continue to be one of the most prevalent threat to national security. According to United States Department of Defense (DOD) data, over 550 guerrilla and terrorist groups are active throughout the world. However states are still superior power of the war theatre, they are the ones which would possibly suffer from these groups most. The terrorist groups have caused the existence of a new approach in the battle arena and been successful to some degree for revealing the conventional powers’ weak side. For countering those kinds of asymmetric threats, a conventional power has to use two effective powers. These are the technology and rational decision process in which Air Force has the proficiency for both. Satellites, unmanned air vehicles and other accurate intelligence systems will help the Air Force to use its superiority over unexpected threats. This paper aims to propose a new perspective on how the Air Force should be designed in the environment containing unpredictable activities of terrorist organizations.