Resilient Command and Control: the Need for Distributed Control

Total Page:16

File Type:pdf, Size:1020Kb

Resilient Command and Control: the Need for Distributed Control E-8C Joint Surveillance and Target Attack Radar System aircraft leaves Robins Air Force Base, Georgia (U.S. Air Force/Andrew Lee) Resilient Command and Control The Need for Distributed Control By Gilmary Michael Hostage III and Larry R. Broadwell, Jr. guiding principle that has long While the relevance of this simple, We have grown accustomed to the underpinned the projection of elegant tenet is unquestionable, the benefit of an unfettered network-en- A dominant U.S. Air Force air- simplicity of centralized control and abled battlespace where our networks, power is the tenet of centralized control decentralized execution renders it datalinks, and communications operate and decentralized execution. This foun- incomplete when applied to modern without interruption. Since the advent of dational concept is deeply rooted in Air contested and denied operations. This such capabilities, U.S. and allied forces Force history and remains a cornerstone insufficiency has not and will not be have enjoyed an exclusive advantage. of its doctrine. It informs how we orga- evidenced by our experiences in Iraq, Consequently, it is preposterous to be- nize and train for combat and helps Afghanistan, or Libya as the resiliency of lieve any sophisticated future adversary prioritize the weapons systems and our networks, datalinks, and communi- would not possess at least the desire and, technologies we pursue. It has proved cations went unchallenged. However, in likely, the capability to disrupt our C2 integral to every successful contem- antiaccess/area-denial (A2/AD) envi- architecture. Therefore, we must be pre- porary air campaign by synergizing a ronments, the resilience of our networks, pared to synchronize and project combat single commander capable of balancing datalinks, and communications will al- airpower through distributed control tactical needs with strategic require- most certainly be contested. It is during during periods when our C2 architecture ments with tactical operators capable of these moments that distributed control, is strained by asymmetric challenges fostering initiative and flexibility. not centralized control, will provide the or saturated with intense air activity. If continued orchestration of combat air- the Combined Forces Air Component power. Stated more completely, resilient Commander (CFACC) becomes iso- General Gilmary Michael “Mike” Hostage III, command and control (C2) in an A2/ lated, the concept of distributed control USAF, is Commander of Air Combat Command. AD environment will require centralized empowers subordinate commanders, Lieutenant Colonel Larry R. Broadwell, Jr., USAF, is Executive Officer to the Commander of Air command, distributed control, and decen- organizations, operations centers, and Combat Command. tralized execution. battle management command and 38 Forum / Resilient Command and Control JFQ 74, 3rd Quarter 2014 control (BMC2) platforms to amalgam- areas of more intense fighting. Through would remain under the command ate otherwise disconnected units into the use of established protocols, BMC2 of the CFACC and should evolve as teams of synchronized combat airpower. platforms such as the E-2, E-3, E-8, or expressed in his mission intent orders Stated explicitly, the power of distributed a Control and Reporting Center could about extended periods of lost commu- control is its ability to join otherwise assume additional control activities from nications. These new organizations could disconnected and independent units, thus the AOC after being cut off for a prede- become as robust as an Air Expeditionary increasing the resilience of our overall termined period of time. Finally at the Task Force (AETF), thus husbanding airpower projection. tactical level, flight leads and mission resources from otherwise isolated A resilient C2 architecture is essential commanders regularly exercise distrib- units—fighters, bombers, tankers, and to executing the full range of military uted control by redirecting to alternate intelligence, surveillance, and reconnais- operations in an A2/AD environment. targets or rerolling to a secondary sance (ISR) aircraft—into a composite Resilient C2 is also foundational to mission. They do this based on their fighting force. Again, a distributed con- the conduct of parallel operations and knowledge of the commander’s intent trol construct does not necessitate reinforces the elements of operational and tactical circumstances. the transfer of additional command design—simultaneity, depth, timing, and Distributed control is the process authority from the COMAFFOR, or the tempo. While the resilience of our C2 ar- (or the how) of transitioning control CFACC, to the AETF commander. The chitecture has gone untested for decades, authority from one entity to another. commander of the ad hoc AETF would we cannot assume this will hold true in Distributed control absolutely does retain all previous command authorities, the future. Inevitably, our ability to con- not delegate command authorities or perhaps as a numbered Air Force or wing duct distributed control in the absence of command responsibilities from the commander, while also gaining responsi- or degradation in centralized control will CFACC or a subordinate commander to bility for the tactical control activities of prove essential to providing continued another. Neither the Combined Forces his newly federated forces. COMAFFOR dominant combat airpower for U.S. and Commander nor the Commander of Air command authorities would continue allied warfighters. Force Forces (COMAFFOR) would re- to be retained by the CFACC. The linquish their command authorities under AETF commander would be expected Distributed Control distributed control. Subordinate units, to advance the scope and complexity of Distributed control can be defined as operations centers, or BMC2 platforms operations following the CFACC’s intent the conditional, adaptive delegation or would be delegated or assume additional and utilizing distributed control, all the assumption of control activities through control activities dependent upon their while attempting to reestablish normal orders or protocols to synchronize individual capacity to control and when C2 links. operations, maintain initiative, and specified triggering events have occurred. achieve commander’s intent. Distrib- Distributed control could occur over The Critical Element uted control could occur explicitly or short (minutes to hours) or long (days to In addition to doctrine, organization, implicitly; the CFACC could delegate weeks) periods. For brief C2 disruptions, and technology, our Airmen are crit- some control authority to a subordinate subordinate BMC2 platforms would ical to executing distributed control. unit, or the subordinate unit could simply assume control activities normally Airmen are the ultimate source of our assume a particular level of control performed by the CFACC and continue combat capability. They possess the authority by following predetermined to execute using the guidance provided knowledge, creativity, and drive to lost-communication protocols. Distrib- in the Air Tasking Order (ATO) and overcome highly complex and dynamic uted control occurs largely at the oper- Air Operations Directive. For disrup- challenges whenever and wherever ational and tactical levels of warfare. tions lasting longer than a day, BMC2 the Nation asks. They are possessed At the operational level, the CFACC platforms, in conjunction with lower of a unique air-mindedness. They are might choose to implement distributed echelons of command, could also begin creative, highly adaptive, and capable control to focus his attention on areas executing a series of preplanned ATOs of rapidly making bold decisions. They of more intense combat or, perhaps, covering several days. It is even possible, are our most precious resource and the reduce demands on limited Air Oper- if isolated for many days to weeks, for critical element of successful distributed ations Center (AOC) bandwidth. Just subordinate units to self-organize into control. The trust shared by Airmen below the AOC, subordinate operations larger, more comprehensive units using underpins the process of distributed centers and BMC2 platforms are both distributed control. control; without trust, distributed uniquely capable of executing distrib- Self-organization would only occur control fails. Trusted autonomy allows uted control. Either could be delegated in the direst of circumstances and does Airmen to act with initiative knowing additional authorities by the CFACC not include modifications to the chain of the decisions they make and the actions to control operations in an area expe- command, leaving prehostility command they take will be supported by the riencing a modest level of activity, thus authorities and responsibilities intact. commanders who have placed their allowing the AOC to focus control on Furthermore, any self-organization trust in them. The expectation that JFQ 74, 3rd Quarter 2014 Hostage and Broadwell 39 Crew chief marshals F-16 Fighting Falcon from hardened aircraft shelter in Germany in support of Operation Odyssey Dawn (U.S. Air Force/Benjamin Wilson) Airmen are empowered to operate with the F-16. There was no all-seeing AOC integral to mission success then as it will trusted autonomy is who we are and Link 16, which is the backbone of our be in the future. The battlefields of Iraq how we fight. modern tactical C2 architecture. The and Afghanistan have grown a generation During my first operational assign- real-time, unblinking
Recommended publications
  • Combat Squad Leader's Course Billet Description
    c:\mydocu~1\billetd.lwp 5 May 98 Combat Squad Leader’s Course Billet Description: Infantry Squad Leader A Draft Proposal for inclusion in MCO 1510.35C MCWL 5 May 1998 c:\mydocu~1\billetd.lwp 5 May 98 UNITED STATES MARINE CORPS Marine Corps Warfighting Lab Marine Corps Combat Development Command Quantico, Virginia 22134 5 May 1998 From: Capt Brendan B. McBreen To: Director, MCWL Subj: PROPOSED CHANGE TO MCO 1510.35C: INFANTRY SQUAD LEADER BILLET DESCRIPTION 1. The MOS Manual, MCO P1200.7P (5 Apr 95), contains no duty descriptions for infantrymen. The manual states “For a complete listing of duties and tasks, refer to MCO 1510.35C.” 2. MCO 1510.35C, The Individual Training Standards for Occupational Field 03, contains no duty descriptions either. It merely lists training tasks required for each rank. There is no prioritization. There are no stated minimum requirements. 3. FMFM 6-5 Marine Rifle Squad does not contain a comprehensive description of the duties of the rifle squad leader. 4. This document attempts to fill this gap. The following draft squad leader billet description is proposed for inclusion into MCO 1510.35C. 5. A billet description serves the following purposes: a. Defines the requirements for promotion. A Marine should be competent in his current billet before being considered for promotion. b. Defines the school curriculum. A squad leader course teaches those skills required by the squad leader billet description. Both units and schools refer to a common reference, which resolves differences of opinion. c. Guides training and evaluation. Marines can train and prepare for their next billet.
    [Show full text]
  • Bridging the Gap from Coordination to Integration RUBEL
    BRIDGING THE GAP FROM COORDINATION (Briana Jones) U.S. Air Force TO INTEGRATION By CURTIS V. NEAL, ROBERT B. GREEN, and TROY CARAWAY Legacy AC2 [airspace command and control] elements buy airspace today for tomorrow’s war. Airspace control measures (ACM) such as Restricted Operating Zones . do not inte- grate airspace users . ACMs deconflict users via exclusive volumes of airspace. Because airspace is a finite resource, as the number of airspace users increases, AC2 elements run out of airspace. To effectively put more users in a given volume of airspace, AC2 elements must provide real time separation from other users and fires. Real time control of a volume of airspace, whether positive or procedural, requires communication with all users, a common reference system, and authority to direct/control the users without affecting their flexibility and freedom of maneuver.1 Colonel Curtis V. Neal, USAF (Ret.), is a Theater Air Ground System Senior Advisor in the Joint Integration Division (JID) of Air Combat Command. Colonel Robert B. Green, USA (Ret.), is a Joint Special Operations Forces Senior Advisor in JID. Lieutenant Colonel Troy Caraway, USMC (Ret.), is a Marine Air Ground Task Force and Naval Senior Advisor in JID. Airmen participate in Tactical Air Control Party training mission ndupress.ndu.edu issue 67, 4 th quarter 2012 / JFQ 97 FEATURES | Bridging the Gap from Coordination to Integration RUBEL n the past, when faced with a large of a joint campaign, executing operational- ments integrate organizationally and procedur- number of competing airspace users level actions to achieve strategic effects.2 ally to conduct operations in a more efficient, and limited command and control To maintain responsiveness and flex- linked, and situationally aware manner.
    [Show full text]
  • 2020 Annual Report 2021 Objectives a Letter from the Adjutant General Maj
    This document is made available electronically by the Minnesota Legislative Reference Library as part of an ongoing digital archiving project. http://www.leg.state.mn.us/lrl/lrl.asp MINNESOTA NATIONAL GUARD 2020 Annual Report 2021 Objectives A Letter from the Adjutant General Maj. Gen. Shawn Manke The Adjutant General To the Citizens of Minnesota: As Minnesota’s 32nd adjutant general, Maj. Gen. Shawn Manke is the senior leader of On behalf of the more than 13,000 Soldiers and Airmen of the Minnesota National the Minnesota National Guard. The adjutant Guard, I am pleased to present our annual report for 2020. This report is designed to general is the administrative head of the state’s share an overview of our organization’s missions, activities and accomplishments over Department of Military Affairs whose duties the past year, as well as to articulate a direction for the near future. and responsibilities are defined in Minnesota State Statute 190.09. The adjutant general is a The last year certainly tested the resolve and resiliency of all Minnesotans. Together, we state employee appointed by the governor of faced an unprecedented 2020, and amid angst and uncertainty we were reminded that Minnesota for a seven-year term. people matter most. Learn more about the adjutant general: In 2020, we were also reminded of the National Guard’s value to our communities, https://MinnesotaNationalGuard.ng.mil/TAG state and nation. I’m extremely proud of and grateful for the Airmen and Soldiers from across Minnesota who continue to step up and serve when called upon.
    [Show full text]
  • The Armored Infantry Rifle Company
    POWER AT THE PENTAGON-byPENTAGON4y Jack Raymond NIGHT DROP-The American Airborne Invasion $6.50 of Normandy-by S. 1.L. A. Marshall The engrossing story of one of 'thethe greatest power Preface by Carl Sandburg $6.50 centers thethe world has ever seen-how it came into Hours before dawn on June 6, 1944, thethe American being, and thethe people who make it work. With the 82dB2d and 1101Olst st Airborne Divisions dropped inin Normandy awesome expansion of military power in,in the interests behind Utah Beach. Their mission-to establish a firm of national security during the cold war have come foothold for the invading armies. drastic changes inin the American way of life. Mr. What followed isis one of the great and veritable Raymond says, "in the process we altered some of stories of men at war. Although thethe German defenders our traditionstraditions inin thethe military, in diplomacy, in industry, were spread thin, thethe hedgerow terrain favored them;them; science, education, politics and other aspects of our and the American successes when they eventually did society." We have developed military-civilian action come were bloody,bloody.- sporadic, often accidential. Seldom programs inin he farfar corners of the globe. Basic Western before have Americans at war been so starkly and military strategy depends upon decisions made in candidly described, in both theirtheir cowardice and theirtheir America. Uncle Sam, General Maxwell Taylor has courage. said, has become a world-renowned soldier in spite In these pages thethe reader will meet thethe officers whowho of himself. later went on to become our highest miliary com-com­ DIPLOMAT AMONG WARRIOR5-byWARRI0R-y Robert manders in Korea and after: J.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • Fm 3-21.5 (Fm 22-5)
    FM 3-21.5 (FM 22-5) HEADQUARTERS DEPARTMENT OF THE ARMY JULY 2003 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *FM 3-21.5(FM 22-5) FIELD MANUAL HEADQUARTERS No. 3-21.5 DEPARTMENT OF THE ARMY WASHINGTON, DC, 7 July 2003 DRILL AND CEREMONIES CONTENTS Page PREFACE........................................................................................................................ vii Part One. DRILL CHAPTER 1. INTRODUCTION 1-1. History................................................................................... 1-1 1-2. Military Music....................................................................... 1-2 CHAPTER 2. DRILL INSTRUCTIONS Section I. Instructional Methods ........................................................................ 2-1 2-1. Explanation............................................................................ 2-1 2-2. Demonstration........................................................................ 2-2 2-3. Practice................................................................................... 2-6 Section II. Instructional Techniques.................................................................... 2-6 2-4. Formations ............................................................................. 2-6 2-5. Instructors.............................................................................. 2-8 2-6. Cadence Counting.................................................................. 2-8 CHAPTER 3. COMMANDS AND THE COMMAND VOICE Section I. Commands ........................................................................................
    [Show full text]
  • AFDD 2-8 Command and Control
    Cover Sheet for Air Force Doctrine Document (AFDD) 6-0, Command and Control OPR: LeMay Center/DD 28 July 2011 AFDD numbering has changed to correspond with the joint doctrine publication numbering architecture (the AFDD titles remain unchanged until the doctrine is revised). Any AFDD citations within the documents will list the old AFDD numbers until the doctrine is revised. The changed numbers follow: OLD NEW TITLE AFDD 2-1 changed to AFDD 3-1 Air Warfare AFDD 2-1.1 changed to AFDD 3-01 Counterair Operations AFDD 2-1.2 changed to AFDD 3-70 Strategic Attack AFDD 2-1.3 changed to AFDD 3-03 Counterland Operations AFDD 2-1.4 changed to AFDD 3-04 Countersea Operations AFDD 2-1.6 changed to AFDD 3-50 Personnel Recovery Operations AFDD 2-1.7 changed to AFDD 3-52 Airspace Control AFDD 2-1.8 changed to AFDD 3-40 Counter-CBRN AFDD 2-1.9 changed to AFDD 3-60 Targeting AFDD 2-10 changed to AFDD 3-27 Homeland Operations AFDD 2-12 changed to AFDD 3-72 Nuclear Operations AFDD 2-2 changed to AFDD 3-14 Space Operations AFDD 2-2.1 changed to AFDD 3-14.1 Counterspace Operations AFDD 2-3 changed to AFDD 3-24 Irregular Warfare AFDD 2-3.1 changed to AFDD 3-22 Foreign Internal Defense AFDD 2-4 changed to AFDD 4-0 Combat Support AFDD 2-4.1 changed to AFDD 3-10 Force Protection AFDD 2-4.2 changed to AFDD 4-02 Health Services AFDD 2-4.4 changed to AFDD 4-11 Bases, Infrastructure, and Facilities [Rescinded] AFDD 2-4.5 changed to AFDD 1-04 Legal Support AFDD 2-5 changed to AFDD 3-13 Information Operations AFDD 2-5.1 changed to AFDD 3-13.1 Electronic Warfare AFDD
    [Show full text]
  • Command and Control in Operations and Cyber Security
    COMMAND AND CONTROL IN OPERATIONS AND CYBER SECURITY Jiří Černý, Petr Hrůza Abstract: Command of armies is one of the areas where there occur frequent changes and which is the object of examination in all armies. The combat power of the armed forces does not depend only on equipping them with modern weapons and equipment, but it also depends on how their actions will be planned before the fight and how they are managed in combat. Every military operation conducted around the world is enabled by space as well as cyber operations, domains closely linked and threatened alike. Cyberspace is increasingly becoming a contested domain. Keywords: Command and Control, Communication, Cyber Security 1. Introduction Command and control is a multifaceted art and creative activity consisting of deliberate regulation of combat power to achieve its goals within the specified time and with minimum losses. Commander plays crucial and irreplaceable role. In the process of command, he decides how to use military force and imprints to subordinates his will and intentions. In the process of control, he and his staff, manage and coordinate activities of subordinates to meet the set task. To ensure reliable and effective command and control of combat forces, it is necessary to develop command and control system. It consists of three interlinked components: authorities, processes and means of command and control. Role of Command and Control System (Command and Control - C2) in command of troops is so crucial that no one questions it. Yet, it has to be clear that the system of command is an open system, in which constant changes take place.
    [Show full text]
  • Main Command Post-Operational Detachments
    C O R P O R A T I O N Main Command Post- Operational Detachments (MCP-ODs) and Division Headquarters Readiness Stephen Dalzell, Christopher M. Schnaubelt, Michael E. Linick, Timothy R. Gulden, Lisa Pelled Colabella, Susan G. Straus, James Sladden, Rebecca Jensen, Matthew Olson, Amy Grace Donohue, Jaime L. Hastings, Hilary A. Reininger, Penelope Speed For more information on this publication, visit www.rand.org/t/RR2615 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0225-7 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2019 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report documents research and analysis conducted as part of a project entitled Multi- Component Units and Division Headquarters Readiness sponsored by U.S.
    [Show full text]
  • Joint Targeting and Air Support in Counterinsurgency How to Move to Mission Command
    Feature Joint Targeting and Air Support in Counterinsurgency How to Move to Mission Command LTC Paul Darling, Alaska Army National Guard n December 2006, the US Army and US Marine Corps jointly pub­ lished Field Manual (FM) 3-24 / Marine Corps Warfighting Publica­ tion (MCWP) 3.33.5, Counterinsurgency, to much fanfare and inter­ I 1 est from both the civilian media and military circles. The colead writers of this manual, Gen David H. Petraeus, USA, retired, and Gen James N. Mattis, have both enjoyed professional success and favorable public notices for their efforts. In April 2009, FM 3-24.2, Tactics in Counterinsurgency, appeared, defining in more detail the application of the doctrine originally espoused in FM 3-24/MCWP 3-33.5.2 In October 2009, the Joint Staff followed with Joint Publication (JP) 3-24, Counter­ insurgency Operations, which reiterates many of the basic counter­ insurgency (COIN) principles found in the initial US Army/US Marine September–October 2012 Air & Space Power Journal | 49 Feature Darling Joint Targeting and Air Support in Counterinsurgency Corps document.3 It makes several subtle but important changes, how­ ever, while ignoring others made in FM 3-24/MCWP 3-33.5 as well as FM 3-24.2, thus actively undermining the entire joint effort within COIN operations. Apparently, JP 3-24 did this to reinforce service com­ ponent tenets that do not work in guerilla/low intensity conflicts, as verified by the historical record and research and as addressed by FM 3-24/MCWP 3-33.5 as well as FM 3-24.2.
    [Show full text]
  • Automation and the Future of Command and Control: the End of Auftragstaktik ?
    Automation and the Future of Command and Control: The End of Auftragstaktik ? Lieutenant Colonel Rosario M. Simonetti, Italian Army Marine, Paolo Tripodi Journal of Advanced Military Studies, Volume 11, Number 1, 2020, pp. 127-146 (Article) Published by Marine Corps University Press For additional information about this article https://muse.jhu.edu/article/796245/summary [ Access provided at 2 Oct 2021 14:41 GMT with no institutional affiliation ] This work is licensed under a Creative Commons Attribution 4.0 International License. Automation and the Future of Command and Control The End of Auftragstaktik? Lieutenant Colonel Rosario M. Simonetti, Italian Army Mari- ne, and Paolo Tripodi, PhD1 Abstract: The impact of new technologies and the increased speed in the future battlespace may overcentralize command and control functions at the political or strategic level and, as a result, bypass the advisory role played by a qualified staff. Political and/or strategic leaders might find it appealing to pursue pre- emptive or preventive wars as a strategy to acquire asymmetric advantage over the enemy. This article investigates the roots of this trend, connecting historical perspectives with implications that next-generation technology may have on command and control. Keywords: command and control, technological innovation, mission com- mand, automation he impact of new technologies and the increased tempo of the future battlespace may overcentralize command and control functions at the Tpolitical or strategic level. Political and strategic leaders might pursue preemptive or preventive wars as a strategy to acquire asymmetric advantage over the enemy, not because they must but because they can. As a result, senior leaders may be encouraged to bypass the advisory role played by their quali- fied staff and undermine the autonomy of lower level commanders.
    [Show full text]
  • Comcam Multi-Service Tactics, Techniques, and Procedures for Combat Camera Operations
    COMCAM MULTI-SERVICE TACTICS, TECHNIQUES, AND PROCEDURES FOR COMBAT CAMERA OPERATIONS FM 3-55.12 MCRP 3-33.7A NTTP 3-61.2 AFTTP(I) 3-2.41 MAY 2007 DISTRIBUTION RESTRICTION: This document is approved for public release. Distribution is unlimited. FOREWORD This publication has been prepared under our direction for use by our respective commands and other commands as appropriate. RICHARD J. ROWE, JR. THOMAS L. CONANT Major General, US Army Brigadier General, US Marine Corps Deputy Director/Chief of Staff, Director Army Capabilities Integration Center Capabilities Development Directorate TIMOTHY L. DAVISON ALLEN G. PECK Captain, US Navy Major General, US Air Force Acting Commander Commander Navy Warfare Development Command Headquarters Air Force Doctrine Center This publication is available through the ALSA Web site (www.alsa.mil); through the Army at Army Knowledge Online (AKO) (www.us.army.mil) and at the General Dennis J. Reimer Training and Doctrine Digital Library (www.train.army.mil) Web sites; and through the Air Force at the Air Force Publishing Web site (www.e-publishing.af.mil). PREFACE 1. Purpose Multi-Service Tactics, Techniques, and Procedures (MTTP) for Combat Camera (COMCAM) Operations provides commanders and staffs at all echelons essential information to effectively employ COMCAM capabilities. 2. Scope This publication details procedures to integrate and synchronize tactical and operational COMCAM support for military operations. It is designed for planners and commanders at all levels and details methods to fully integrate visual imagery documentation capabilities with warfighting staffs. 3. Applicability This publication provides guidance for planning, employing, and integrating COMCAM forces. Use of this publication ensures synchronized COMCAM capabilities and visual imagery documentation support by tailored COMCAM force packages.
    [Show full text]