CCRP Publications are now only available via download 

If you are interested in finding out how to obtain a hard copy of a CCRP publication, please contact iccrts@dodccrp.org

All CCRP publications are government products and are provided at no cost to the public.

 


The Agility Advantage: A Survival Guide for Complex Enterprises and Endeavors

David S. Alberts, 2011

Download: PDF [9.6M]
 

This book is a call to action. It is no longer sufficient for an organization to simply be effective. Today’s organizations must also develop agility in order to successfully cope with the complex challenges they face in a dynamic and uncertain world. This book explains why agility, once a nice-to-have capability, is now an imperative. Readers are provided with an in-depth understanding of this essential capability, its enablers and inhibiters, and ways to visualize and measure agility. Experimental results are used to illustrate the agility advantage as well as the adverse consequences of a lack of agility. This book outlines a plan to improve an organization’s agility, and identifies the research needed to improve our understanding of agility.


adapting_thumb.jpg

Adapting Modeling & Simulation for Network Enabled Operations

James Moffat | 2011

Download: PDF [3.6M] 

The essence of this book is to describe how the UK Ministry of Defence has risen to the challenges of complex endeavors and the information age by investing in the development of new analytical tools, in particular closed form simulation modeling, in order to provide the evidence base for improved high level decision-making in government. At the core of the approach is the development of a consistent representation of command and control across the suite of models. This development was itself significantly influenced by the interaction and exchange of ideas drawn from a number of NATO research task groups—and the development of these ideas is still continuing. These developments are brought together in illustrating how they impact the shaping of UK defense policy through informing high level decision-making by officials and government ministers.


Power to the Edge

David S. Alberts and Richard E. Hayes | 2003

Download: PDF [3.2M] | ePub [3.3M] | Kindle [2.9M]

Power to the Edge articulates the principles being used to provide the wideband network that people will trust, populate with information, and use to share awareness, collaborate effectively, and synchronize their actions.

"This book is truly a must-read for anyone interested in decentralization and the social and organizational relevance of shifting power to the edge, whether in a commercial or a defense context." – Ray Ozzie, Chief Software Architect, Microsoft more››

"[Power to the Edge] may be the best written government document of the 21st century so far." – Dan Ancona, Project Director, California VoterConnect more››


Network Centric Warfare eBook

David S. Alberts, John J. Garstka, and Frederick P. Stein | 1999

Download: PDF [1.8M] | ePub [4.8M] | Kindle [2.4M]

This book articulates the nature of the characteristics of Network Centric Warfare, and suggests a process for developing mission capability packages designed to transform NCW concepts into operational capabilities.

"NCW is going to change the way we fight; it is unrealistic to think otherwise when we see the information technology revolution that is taking place all around us."
Thomas Carroll, Wings of Gold more››

"[Network Centric Warfare] is highly recommended for the new generation of officers corps who aspire to command." – LTC Tan Kim Seng, Republic of Singapore Army more››


n2c2m2_book_cover_thumb.jpg

NATO NEC C2 Maturity Model

SAS-065 | 2010

Download: PDF [4.68M]

The NATO NEC C2 Maturity Model (N2C2M2) was developed to build on dearly won insights from the past, but goes beyond them in order that we can exploit Information Age approaches to address new mission challenges. This way of thinking about C2 is thus entirely compatible with current NATO Allied Command Transformation (ACT) thinking on Future Capable Forces which puts the emphasis on Mission Command within federated complex environments and ad hoc coalitions. The N2C2M2 was developed by the RTO SAS-065 Research Task Group over a period of about three years. It starts by defining a number of C2 approaches, ranging from Conflicted C2 to Edge C2, that correspond to different regions within the C2 Approach Space, containing the different possible approaches to accomplish the functions that are associated with command and control. This approach space can be viewed from two perspectives. First, it can be used to think about C2 within existing organizations. Second, it can be used to think about how a disparate set of independent (yet inter-dependent) entities, that is, a collective, can achieve focus and convergence.


Coping with the Bounds

Tom Czerwinski | 2008, orig. 1998

Download: PDF [1.4M]

Conventional analysis is not sufficient to cope with today's and tomorrow's problems. We must augment our efforts with nonlinear insights, and provide a basic understanding of what that involves.


Planning: Complex Endeavors

David S. Alberts and Richard E. Hayes | 2007

Download: PDF [2.1M]

This book presents an approach to planning appropriate for complex endeavors at a level of detail sufficient to formulate and conduct a campaign of experimentation to test, refine, and implement a new approach to planning.


The Logic of Warfighting Experiments

Richard A. Kass | 2006

Download: PDF [2.0M]

Experimentation has proven itself in science and technology, yielding dramatic advances. Can we apply the same experiment methods to the military transformation process?


Complexity, Networking, and Effects-Based Approaches to Operations
Edward A. Smith | 2006
Download: PDF [4.5M]

This publication begins with a detailed description of the problem that effects-based approaches are thought to address and explains why effects-based approaches are so important to understand and to be able to do.


Understanding Command and Control

David S. Alberts and Richard E. Hayes | 2006

Download: PDF [3.2M]

This is the first in a new series of CCRP Publications that will explore the future of Command and Control. This book begins at the beginning: focusing on the problem(s) Command and Control was designed to solve.


38_Agile_Org.jpg

The Agile Organization

Simon Reay Atkinson and James Moffat | 2005

Download: PDF [3.4M] | Award: 2006 NCW Award | Review: RUSI, Spinuzzi

The authors illustrate how organizations and networks function and how the connections between people, nature, societies, and the military can be understood in order to pursue the goal of an agile organization.


Campaigns of Experimentation

David S. Alberts and Richard E. Hayes | 2005

Download: PDF [1.5M]

In this follow-on to the COBP for Experimentation, the concept of a campaign of experimentation is explored in detail, including the need and place for campaigns in transformation, evolution, and achievement of innovation.


Somalia Operations

Kenneth Allard | 2005, orig. 1995

Download: PDF [3.8M]

Colonel Allard examines the challenges and the successes of the U.S. peacekeeping mission to Somalia in 1992-1994. Key topics include planning, deployment, conduct of operations, and support.


Journal of Defence Science

Volume 8, Number 3 | 2003

Download: PDF [6.0M]

This special edition of the UK Journal of Defence Science on Network Enabled Capability aims to stimulate debate and push forward the evolution of ideas.


Complexity Theory and Network Centric Warfare

James Moffat | 2003

Download: PDF [2.3M]

Professor Moffat articulates the models and equations that demonstrate the relationship between warfare and the emergent behaviour of complex systems, and a means to calculate and assess the likely outcomes.


Effects-Based Operations

Edward A. Smith | 2003

Download: PDF [2.7M]

This book speaks directly to what we are trying to accomplish on the fields of battle and argues for changes in the way we decide what effects we want to achieve and what means we will use to achieve them.


The Big Issue

David Potts | 2003

Download: PDF [1.1M]

This Occasional considers command and combat in the Information Age. Defence thinkers everywhere are searching forward for the science and alchemy that will deliver operational success.


Lessons from Kosovo

Larry Wentz | 2002

Download: PDF [4.6M]

Kosovo offered a unique opportunity to conduct C4ISR-focused research in the areas of coalition C2, civil-military cooperation, information assurance, C4ISR interoperability, and information operations


The NATO Code of Best Practice for C2 Assessment

NATO SAS-026, 039 | 2002

Download: PDF [1.7M] | Analyst's Guide [1.0M] | Decisionmaker's Guide [1.0M]

Analysts will be increasingly called upon to examine the impact of new information-related capabilities coupled with new ways of organising and operating in a new environment with reduced levels of fog and friction.


Information Age Transformation

David S. Alberts | 2002

Download: PDF [1.3M] |Review: Air and Space Power

This book deals with the issues associated with a large government institution, a set of formidable impediments, and the nature of the changes being brought about by Information Age concepts and technologies.


Code of Best Practice for Experimentation

David S. Alberts, Richard E. Hayes, et al. | 2002

Download: PDF [4.2M]

Experimentation is the lynch pin in the DoD's strategy for transformation. Without a proper program of experimentation, the DoD will not be able to take full advantage of the opportunities presented by the Information Age.


Information Age Anthology III

David S. Alberts and Daniel S. Papp | 2001

Download: PDF [1.7M]

In what ways will wars and the military be different in the Information Age? What will this mean for the U.S. military? This book explores answers to these vexing questions raised earlier in the Information Age Anthology.


Understanding Information Age Warfare

David S. Alberts, John J. Garstka, Richard E. Hayes, and David T. Signori | 2001

Download: PDF [3.3M] | Review: Aerospace Power

This book presents an alternative to the linear strategies of the Industrial Age. The approach advocated here begins with the premise that adaptation to the Information Age centers around the ability to utilize information.


Information Campaigns for Peace Operations

Kevin Avruch, James L. Narel, and Pascale Combelles Siegel | 2000

Download: PDF [0.6M]

This report asks whether the notion of struggles for control over information identifiable in situations of conflict also has relevance for situations of third-party conflict management-for peace operations.


Information Age Anthology II

David S. Alberts and Daniel S. Papp | 2000

Download: PDF [1.2M]

Is the Information Age bringing new challenges and threats, and if so, what are they? What sorts of dangers will these challenges and threats present? From where will they (and do they) come? Is information warfare a reality?


Behind the Wizard's Curtain

Annette Krygiel | 1999

Download: PDF [0.9M]

Without successfully fielding systems of systems, we will not be able to implement emerging concepts in adaptive and agile command and control, nor will we reap the potential benefits of Network Centric Warfare.


Confrontation Analysis

Nigel Howard | 1999

Download: PDF [1.2M]

A peace operations campaign should be seen as a linked sequence of confrontations. The objective in each confrontation is to bring about certain compliant behavior in other parties, until the campaign objective is reached.


Doing Windows

Bradd C. Hayes and Jeffrey I. Sands | 1999

Download: PDF [1.4M]

This book provides the final results of a project sponsored by the Joint Warfare Analysis Center. The objective was to examine how military operations can support achieving civil stability and peace in states in complex emergencies.


Lessons from Bosnia

Larry Wentz | 1998

Download: PDF [3.7M]

This book tells of the challenges faced and actions taken to ensure that IFOR and Operation Joint Endeavor were successes. This story was pieced together from firsthand experiences, interviews, focused research, and lessons learned.


Information Warfare and International Law

Lawrence T. Greenberg, Seymour E. Goodman, and Kevin J. Soo Hoo | 1998

Download: PDF [1.0M]

The authors have surfaced and explored some profound issues that will shape the legal context within which information warfare may be waged and national information power exerted in the coming years.


Target Bosnia

Pascale Combelles Siegel | 1998

Download: PDF [1.0M]

This book examines the place of PI and PSYOP in peace operations through the prism of NATO operations in Bosnia-Herzegovina.


Information Age Anthology I

David S. Alberts and Daniel S. Papp | 1997

Download: PDF [1.0M]

In this first volume, we will examine: what the Information Age is; how it affects commerce, business, and service; what it means for the government and the military; and how it affects international actors and systems.


Complexity, Global Politics, and National Security

David S. Alberts and Tom Czerwinski | 1997

Download: PDF [1.0M] | Review: Air and Space Power

This work was intended to: (1) push the envelope; (2) emphasize the policy and strategic dimensions of national defense with the implications for Complexity Theory; and (3) get the best talent available in academe.


Defensive Information Warfare

David S. Alberts | 1996

Download: PDF [0.2M]

This overview is the result of an effort to provide background material to participants in a series of interagency meetings exploring the nature of the problem and to identify areas of potential collaboration.


Shock and Awe

Harlan Ullman and James Wade, Jr. | 1996

Download: PDF [0.5M]

This book explores alternative concepts for structuring mission capability packages. (Note: The title and concepts from this book earned widespread popularity in the media in 2003 in reference to the war in Iraq.)


Interagency and Political-Military Dimensions of Peace Operations

Margaret Daly Hayes and Gary F. Wheatley | 1996

Download: PDF [0.2M]

Haiti offered an opportunity to explore interagency relations in an operation that had high visibility and a greater degree of interagency civilian-military coordination and planning than the other operations examined to date.


The Unintended Consequences of Information Age Technologies

David S. Alberts | 1996

Download: PDF [0.1M]

This strategy uses Information Age technologies to identify and avoid adverse unintended consequences associated with the introduction of information technologies, and to capitalize on unexpected opportunities.


Humanitarian and Peace Operations

Lisa Witzig Davidson, Margaret Daly Hayes, and James J. Landon | 1996

Download: PDF [0.4M]

This report documents a workshop organized by the National Defense University, which found that communication need to be improved between the NGO and U.S. Government communities, especially with the military.


Dominant Battlespace Knowledge

Martin C. Libicki and Stuart E. Johnson | 1996

Download: PDF [0.3M] | Review: Air and Space Power

If the United States acquires dominant battlespace knowledge, how might that affect the way it goes to war, the circumstances under which force can be used, and the resulting alterations of the global geomilitary environment?


Information Warfare and Deterrence

Richard E. Hayes and Gary F. Wheatley | 1996

Download: PDF [2.3M]

This report documents a workshop organized by the Institute for National Strategic Studies, which examined information warfare and deterrence as a subject with strong command and control implications.


07_OOTW.jpg

Operations Other Than War

CACT | 1995

Download: PDF [0.2M]

This report documents a workshop organized by the INSS, which sought to determine what technologies are required for OOTW. The group examined the complexities of introducing relevant technologies.


03_Command_Arrangements.jpg

Command Arrangements for Peace Operations

David S. Alberts and Richard E. Hayes | 1995

Download: PDF [2.7M] |Review: Air and Space Power

The U.S. experience shows that traditional C2 approaches, and doctrine are not well suited for peace operations. This book examines alternative command arrangements, and describes the attributes of effective arrangements.


What is Information Warfare?

Martin C. Libicki | 1995

Download: PDF [0.1M]

Is Information Warfare a nascent art, or simply the newest version of a time-honored feature of warfare? Is it a new form of conflict, or an old one that has been given new life by the Information Age?


Feedback

The CCRP constantly strives to improve its publications. If you have any comments or questions regarding specific titles or publications in general, please contact us.