Operational Command and Control for Stability Operations: A Civilian Deputy to the Military Operational Commander

Author(s):  
Jason K. Brandt
Author(s):  
Denis S. Lapay

The study is devoted to the Moscow Military Railway School activities in the command and control staff qualifying for the Special Corps of Railway Troops during its existence from 1932 to 1941. The relevance of the research is due to the lack of the issues of construction and training studies of the Special Railway Corps military personnel and the little studied aspects of command and control staff training in the Moscow Military Railway School during the period of Russian historiography. Factor analysis of justification of Railway School foundation historical necessity is carried out. We reveal the main activities of the military authorities, management and teaching staff of the school to train specialists for the Railway troops of the Workers’ and Peasants’ Red Army. The experience of deploying the material and training base of the military school within a limited time frame is analyzed. The specificities of the school’s variable staffing system are also noted. The background for the school establishment discontinuing is analyzed, and the conclusion is drawn that this reorganization in March 1941 on the eve of the Great Patriotic War is unjustified, as well as the need to restore historical memory of the school.


2015 ◽  
pp. 1231-1245
Author(s):  
Madjid Tavana ◽  
Dawn A. Trevisani ◽  
Dennis T. Kennedy

The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerability due to system availability and integrity caused by internal vulnerabilities and external threats. Several studies have proposed measures of availability and integrity for the assets in the C2 systems using precise and certain measures (i.e., the exact number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, the effectiveness of the availability and integrity countermeasure in eliminating the threats, and the financial impact of each attack on the availability and integrity of the assets). However, these measures are often uncertain in real-world problems. The source of uncertainty can be vagueness or ambiguity. Fuzzy logic and fuzzy sets can represent vagueness and ambiguity by formalizing inaccuracies inherent in human decision-making. In this paper, the authors extend the risk assessment literature by including fuzzy measures for the number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, and the effectiveness of the availability and integrity countermeasure in eliminating these threats. They analyze the financial impact of each attack on the availability and integrity of the assets and propose a comprehensive cyber-risk assessment system for the Military C2 in the fuzzy environment.


2017 ◽  
Vol 8 (1) ◽  
pp. 15-32
Author(s):  
Dumitru Grigore

Abstract The research described in the paper at had approaches the interaction between the bio-signal and the remote movement control, by introducing an original mathematical model, regarding the psychophysiological inference from the EDA response bio-signals. The experiments were performed using an adequate design, consisting of two different techniques regarding bio-signals, in order to obtain, in variables corresponding to each of them, the same type of electrical behaviour. In order to establish the projective functions, a direct measurement method was used on the levels of potential in the epidermis’s alternative current, of base-(SPL) and response-type (SPR), the acquisition being executed with an integrated technical system, patented by the author in year 2013. The statistical study targets the correlation analysis of the action of multiple stimuli on the EDA functions, respectively the analysis of the multiple correlations between the EEG and EDA patterns. Necessary in sending the remote command and control of a movement, this correlation in the electrical signal can be implemented in the BCI-type systems, offering superior possibilities of using the bio-feedback systems.


2021 ◽  
Vol 10 (2) ◽  
pp. 54-63
Author(s):  
Cezar POPA ◽  
Ion MITULEȚU

With the diversification of risks and threats in the multidimensional operational environment, in variable geometry conflicts, state-of-the-art technology must be used at all times in the architecture of command and control systems. This will ensure optimal response conditions both at the planning level and at the level of the execution of the military operation/action. Real-time communication, horizontally and vertically, between tactical level forces, operational and strategic level command and support structures, and with other institutions with security and defence responsibilities can only be ensured and protected by using advanced technologies. Not to be neglected at all is the training of the human resource for an efficient use of equipment as well as the algorithms and processes for making an efficient decision-making process, in line with technical, technological and artificial intelligence developments.   Keywords: command and control; artificial intelligence; efficiency; technologies; 'Information Technologies.  


2014 ◽  
Vol 1 (3) ◽  
pp. 21-36 ◽  
Author(s):  
Madjid Tavana ◽  
Dawn A. Trevisani ◽  
Dennis T. Kennedy

The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerability due to system availability and integrity caused by internal vulnerabilities and external threats. Several studies have proposed measures of availability and integrity for the assets in the C2 systems using precise and certain measures (i.e., the exact number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, the effectiveness of the availability and integrity countermeasure in eliminating the threats, and the financial impact of each attack on the availability and integrity of the assets). However, these measures are often uncertain in real-world problems. The source of uncertainty can be vagueness or ambiguity. Fuzzy logic and fuzzy sets can represent vagueness and ambiguity by formalizing inaccuracies inherent in human decision-making. In this paper, the authors extend the risk assessment literature by including fuzzy measures for the number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, and the effectiveness of the availability and integrity countermeasure in eliminating these threats. They analyze the financial impact of each attack on the availability and integrity of the assets and propose a comprehensive cyber-risk assessment system for the Military C2 in the fuzzy environment.


2012 ◽  
Vol 2 (3) ◽  
Author(s):  
Darko Galinec ◽  
William Steingartner ◽  
Danijel Macanga

AbstractIn presence of rapid development of information and communications technology (ICT) able to increase data processing, much more data can be stored, used and/or mediated and disseminated. Today, information and knowledge become a resource of strategic importance in complex systems, both business and military. On the other hand the question of credibility of the collected data arises: complex systems have to deal with an increasing access to information with less knowledge about their origins and their quality. Due to this lack of information on information, contemporary organizations suffer from organizational indifference. In this paper the ways and means for ensuring semantic interoperability in order to achieve information superiority in complex systems are examined, with special emphasis to military systems using Command and Control Information Systems (C2IS). Canonical messages (canonical intermediaries) based on canonical forms (canonical data models and formats) reduce the number of transformation maps that system must create and manage. An approach based on canonical messaging within the military domain is presented: Multilateral Interoperability Programme (MIP). If implemented correctly and consistently it should lead to achievement of information superiority.


2020 ◽  
Vol 6 (2) ◽  
pp. 89-99
Author(s):  
Piotr Malinowski

The intensification of the air threat resulting from the emergence of hypersonic weapons in the immediate vicinity of Poland has become a significant challenge for the Polish armed forces, including anti-aircraft defense. The capabilities of the new type of weapon determine not only the need to modernize and acquire systems designed to engage aerial targets, but also the command and control systems that control them. Due to the nature and the limited scope of the article, the deliberations presented in it are generalized results of a research on the scale of the threat posed by hypersonic weapons in the airspace and the need to modernize anti-aircraft defense command and control subsystems, which may be involved in combating them as part of the national air defense system. The presented conclusions also concern the problems of multiplying the current level of automation of the command and control  subsystem. This is related to the need for the effectiveness of the military decision-making process as well as uninterrupted and efficient cooperation with the national and allied elements of the air reconnaissance and air defense assets subsystems, including the components of missile defense, which is predestined to engage hypersonic weapons.   


Author(s):  
V. Pryimak

The article contains the rationale for the thesis that the prevention of corruption is now one of the priorities in the activities of military command and control bodies. Obtaining objective, reliable and reliable conclusions, proposals and recommendations on this problem largely depends on the correct choice of methods of scientific research. Despite a large number of scientific studies related to the legal principles of combating corruption in all areas of public administration, the article identifies certain patterns of the methods of scientific knowledge used in them. The article proves that the methodology of scientific research of the legal aspects of preventing corruption offenses in military command and control bodies is a set of techniques and methods produced by legal and other sciences, the application of which allows a comprehensive study of the subject of research. An element of the system of research methodology for the prevention of corruption offenses is a method – a special way of carrying out scientific activities, allows you to obtain information and data on certain legal phenomena or processes. The article proves that the study of the legal aspects of preventing corruption offenses in the military command and control bodies requires the use of two groups of methods: general, which are used in all branches of scientific knowledge, and special, inherent exclusively in legal science. The general methods, the use of which would be advisable in the study of the phenomenon of corruption in the aspect of the problems we are considering, include the methods of analysis and synthesis, deduction and induction borrowed from logic, the system-structural method produced in systems theory, the modeling method, and a number of others. These methods represent the methods of scientific knowledge of the phenomenon of preventing corruption, classic for modern legal research. Certain features of the subject of the study of expediency determine the use of synergetic, praxeological, axiological and other methods. The special methods of scientific knowledge of the laws of preventing corruption offenses in the military command and control bodies include historical-legal and comparative-legal methods, as well as formal dogmatic, technical-legal, legal-semantic and other methods inherent in legal sciences.


Sign in / Sign up

Export Citation Format

Share Document