Topic 10: Operational Issues
This topic will address the operational needs, gaps, overlaps, lessons learned, and best practices working the "Mission Partner" (Ministries', Departments', Bureaus', Agencies', Governments', Militaries', Special Operations and Conventional Forces). The papers should articulate how "Mission Partner" engagements and relationships impact operational missions.
Paper 003
Abstract Title: Estimation and Analysis of Information Exchange Requirements for ROK Army's Tactical Netowrks
Point of Contact (POC): Young Ho Kim
POC Email Address: ykim50@daum.net
POC Phone Number: 82-2-961-1829
POC Organization: Korea Institute of Defense Analysis
Country: Korea
Authors: Young Ho Kim
Abstract: In order to achieve Network Centric Operations (NCO) capabilities, ROK Army is currently developing tactical communications system, which is called as Tactical Information Communications Network (TICN). The analysis of Information Exchange Requirements (IERs) is needed for the design of net-ready TICN system to guarantee reliable information transmission and to determine optimal network structure.
In contrast to designing commercial communication systems, the estimation of information bandwidth between echelons under tactical operating conditions and the bandwidth dynamic behavior analysis are essential for the efficient system developments and operational uses.
The paper proposes a new approach to the estimation and analysis of IERs based on operational scenarios, message formats employed by ROK Army C4I systems, and Subject Matter Experts (SMEs).
The paper presents the quantitative estimation of IERs bandwidth from Corps to Regiment echelons for ROK Army's tactical operations up to 2020 years in accordance with three stages of time-frames and battle-field functions. The paper provides the analysis of IERs characterizations in terms of information bandwidth of total aggregation and each battle-field functions, bandwidth dynamic behavior, and some areas to be studied further.
Paper 010
Abstract Title: Target Modeling Adversarial Agility
Point of Contact (POC): Dr. William L. Mitchell
POC Email Address: IMO-11@fak.dk
POC Phone Number: (45) 29 82 94 71
POC Organization: Danish Defence
Country: Denmark
Authors: Dr. William L. Mitchell
C2 & Intelligence
Dept. of Joint Operations
Royal Danish Defence College
Copenhagen, DNK
Tel. (45) 39151240/Cell (45) 29829471
Email: IMO-11@fak.dk
Paper 037
Abstract Title: Special Operations Command Mission Partner Engagement
Point of Contact (POC): Ken D. Teske
POC Email Address: ken.teske.ctr@socom.mil
POC Phone Number: 757 510 0915
POC Organization: United States Special Operations Command
Country: US
Authors: Mr. Ken D. Teske. Mr. Michael D. Tisdel, Mr. William C. Fleser
Paper 038
Abstract Title: “Mission Networks” Fostering Trust
Point of Contact (POC): Ken D. Teske
POC Email Address: ken.teske.ctr@socom.mil
POC Phone Number: 757 510 0915
POC Organization: United States Special Operations Command
Country: US
Authors: Mr. Ken D. Teske. Mr. Michael D. Tisdel, Mr. William C. Fleser
Paper 044
Abstract Title: Principled Management of Intelligent Cross-Domain Collaboration and Security
Point of Contact (POC): Jason Bryant
POC Email Address: Jason.Bryant.8@us.af.mil
POC Phone Number: 315-330-7670
POC Organization: Air Force Research Laboratory
Country: US
Authors: Jason Bryant
Abstract: Principle-based management solutions of information for multi-national, federated, and cross-domain environments can combat failures of mission trust, awareness, and assurance. These environments have a unique set of challenges for cyber exploitation and defense, C2ISR mission support, cross-mission supremacy, assurance, and security concerns from demarcated, congested, and contested communication. These concerns are mitigated by executing separation of concern evaluations and modular feature assessments of C2 requirements across information domains. These solutions are demonstrated in establishing policy, sharing and collaboration requirements, and User Defined Operating Picture (UDOP) rules for a complex use case of multi-national air, space, and cyber domains. Our use case application establishes validity tests resulting in a common set of principle driven innovations, driving foundational best practices for these environments.
Paper 101
Abstract Title: Asymmetric warfare and air power
Point of Contact (POC): Murat BILGEN
POC Email Address: mbilgen2011@hotmail.com
POC Phone Number: 0090 543 672 17 30
POC Organization: Turkish Air War College
Country:
Authors: Murat BILGEN
Abstract: Nowadays in the wars main actors are not the states. Instead, non-state actors are rising in the current security environment. Terrorism will continue to be one of the most prevalent threat to national security. According to United States Department of Defense (DOD) data, over 550 guerrilla and terrorist groups are active throughout the world. However states are still superior power of the war theatre, they are the ones which would possibly suffer from these groups most. The terrorist groups have caused the existence of a new approach in the battle arena and been successful to some degree for revealing the conventional powers’ weak side. For countering those kinds of asymmetric threats, a conventional power has to use two effective powers. These are the technology and rational decision process in which Air Force has the proficiency for both. Satellites, unmanned air vehicles and other accurate intelligence systems will help the Air Force to use its superiority over unexpected threats. This paper aims to propose a new perspective on how the Air Force should be designed in the environment containing unpredictable activities of terrorist organizations.