Modelling Command and Control in Networks

Author(s):  
E. Jensen

This chapter proposes an approach to modelling the functions of C2 performed over a network of geographically distributed entities. Any kind of command and control (C2) organisation, hierarchical, networked, or combinations thereof, can be represented with this approach. The chapter also discusses why a theory of C2 needs to be expressed in functions in order to support design and evaluation of C2 systems. The basic principle of how to model functions performed by network is borrowed from Cares' network model of warfare, which is also used to model the context in which C2 is performed. The approach requires that C2 is conceived of as fulfilling a set of necessary and sufficient functions. Brehmer proposes such a theoretical model that is at a sufficiently high level of abstraction to illustrate the suggested approach. More detailed models will be required, however, for the approach to be of practical use.

Author(s):  
Beverly G. Knapp ◽  
Annette R. Ensing ◽  
Bruce G. Coury ◽  
Scott L. Godfrey

Information requirements were investigated for operators in two BMD C2 (Ballistic Missile Defense Command and Control) Centers—command level and operations level. The objective was to elicit their underlying perceptions and cognitive structure of incoming data items, to address information display and decision support design requirements. Experts judged information items using an unconstrained sorting task, and data were analyzed using multivariate scaling methods. Findings revealed differences between the two groups in clustering of and associations between information items; e.g., more complex associations were found for the command level center. Also, the utility of the scaling algorithms for the large data sets used was assessed.


2014 ◽  
Vol 635-637 ◽  
pp. 1526-1529
Author(s):  
Na Li ◽  
Yan Hui Du ◽  
Guang Xun Chen

In order to detect hacker attacks and take early countermeasures, this paper introduced a novel mobile botnet called CPbot which uses Google Cloud Messaging (GCM) to spread Trojan on Android devices. First, we presented the network model of this GCM based mobile botnet as well as its command and control (C&C) mechanism. Secondly, we illustrated the different roles that this botnet can play. Finally, we setup a simulation model to discuss the topology of this mobile botnet. The MATLAB simulation result shows that CPbot is robust against single point of failures and has good resiliency to shutdown attempts, its command dissemination is highly efficient and the bot App has very low battery consumption. This analysis indicates that mobile botnet is a leading threat to mobile network security; therefore we must deploy defense strategies against this botnet.


Author(s):  
J. Bobrova ◽  
J. Bobrov

The effective command and control of the Armed Forces of Ukraine and other elements of the defense forces with the aim toachieve the high-level of defense capability of the state which are inextricably related with the appropriate normalization andexercising the practical events of democratic civil control of the military organization of the state.The process of reforming the defense sector is aimed at transforming the system of unified command and control andmilitary command of the Armed Forces of Ukraine. The establishment of a new system of command and control provides for aclear delimitation of authority between the Ministry of Defense and the Armed Forces of Ukraine, the functioning of new typesand branches of troops (forces). Additionally, it is provided for the separation of the functions of planning, generation andimplementation of means and forces within the Armed Forces, and the Ministry of defense has transformed from the body ofmilitary command to the central body of executive authority, responsible for the reform and implementation of the state policy inthe military sphere and the sphere of defense, the military policy in terms of staff, the technical policy and the policy in terms ofdefense purchases etc. One of the major tasks of the Ministry of Defense is the exercise within the framework of authority ofdemocratic civil control of the activity of the Armed Forces of Ukraine, the military-political and administrative command andcontrol of the military organization.The gender equality requires the establishment of equal rights and opportunities for men and women in the matters ofmilitary service, participation in the protection of the state – not only on a legislative but also on a practical level. For a longperiod of time the military profession was solely masculine. It has been related with the significant physical, moral-psychologicalpressure on a human being, the necessity to be firm in overcoming the hard and difficult daily military routine. Currently, the roleof the woman in a society has undergone significant changes. The latter have also touched the military sphere. It is therefore theissue of democratic civil control of the military organization of the state is to be considered through the prism of its genderaspect. For the sole, gender element of this control is the finest measure of its effectiveness, the indicator of absolute control ofcivic society in the military sphere, which assures the accountability of military to civil personnel and totally includes thepossibility of a military coup d’état in a state.


Sign in / Sign up

Export Citation Format

Share Document