The World Wide Military Command and Control System Evolution and Effectiveness

Total Page:16

File Type:pdf, Size:1020Kb

The World Wide Military Command and Control System Evolution and Effectiveness The World Wide Military Command and Control System Evolution and Effectiveness DAVID E. PEARSON Air University Press Maxwell Air Force Base, Alabama June 2000 Library of Congress Cataloging-in-Publication Data Pearson, David E. (David Eric), 1953- The world wide military command and control system : evolution and effectivenss / David E. Pearson. p. cm. Includes bibliographical references and index. ISBN 1-58566-078-7 1. Worldwide Military Command and Control System—History. I. Title. UB212.P43 2000 355.3’3041’0973—dc21 99-462377 Disclaimer Opinions, conclusions, and recommendations expressed or implied within are solely those of the author and do not necessarily represent the views of Air University, the United States Air Force, the Department of Defense, or any other US government agency. Cleared for public release: distribution unlimited. ii For My Children THIS PAGE INTENTIONALLY LEFT BLANK Contents Chapter Page DISCLAIMER . ii DEDICATION . iii ABOUT THE AUTHOR . ix PREFACE . xi INTRODUCTION . xiii Notes . xx PART I Conceptualization 1 Centralizing the Defense Establishment . 3 Notes . 17 2 Defense Communications Agency and System . 19 Notes . 31 3 National Military Command System . 33 Notes . 49 4 WWMCCS Is Born . 51 Notes . 69 5 Three WWMCCS Failures . 71 Notes . 91 PART II Formalization 6 WWMCCS Automatic Data Processing Upgrade . 95 Notes . 106 v Chapter Page 7 Centralizing Communications Management . 117 Notes . 134 8 The WWMCCS Council and the Modern WWMCCS Structure . 137 Notes . 159 9 The WWMCCS Architect and Architecture . 163 Notes . 182 10 WWMCCS Intercomputer Network . 185 Notes . 196 11 The Carter Administration and the Evolutionary Approach . 199 Notes . 215 12 Crises and Criticisms . 219 Notes . 239 13 Failures at NORAD . 241 Notes . 255 PART III Implementation 14 Strategic Modernization . 259 Notes . 271 15 The C3I Triad: Programs . 281 Notes . 298 16 WWMCCS Information System . 301 Notes . 312 17 Defense Centralization . 315 Notes . 329 18 Defense Communications and the End of the Cold War . 331 Notes . 340 vi Chapter Page 19 Organization, Technology, and Ideology in Command and Control . 343 Notes . 358 EPILOGUE . 363 INDEX . 377 Illustrations Figure 1 The Early Array of Sensors and Sentinels Forwarding Information to NORAD Headquarters . 108 2 Cold War Vigilance: Texas Tower Offshore Radar Platform . 109 3 SAC’s Underground Command Post . 110 4 Defense Communications Agency . 110 5 AUTOSEVOCOM Switches . 111 6 NMCS Personnel in Action . 111 7 USS Northampton , National Emergency Command Post Afloat . 112 8 Artist’s Conception of the National Military Command System . 112 9 Responsibilities for Implementing the National Military Command System . 113 10 Conceptualizing a Command and Control System . 113 11 The National Communications System, Encompassing All Federal Assets . 114 12 World Wide Military Command and Control System as Described by DODD S-5100.30 . 115 vii Chapter Page 13 Conception of WWMCCS System Architecture, Given Revised DODD 5100.30 . 273 14 WWMCCS System Relationships . 274 15 The Elements of WWMCCS . 275 16 PWIN Initial Three-Node Configuration . 276 17 WIN Configuration in the Early 1980s . 277 18 New Organizational Structure for Defense Communications Agency . 278 19 NORAD’s Missile Warning System . 279 20 Communications System Segment Connections . 279 21 Land-based Ballistic Warning and Detection . 280 viii About the Author David E. Pearson, an Army veteran, graduated magna cum laude from the University of Massachusetts at Amherst, received his PhD from Yale University, and was a Fellow in International Security Studies at Ohio State University. He currently teaches sociology at the University of Texas at Brownsville, which is Texas’s southmost college. ix THIS PAGE INTENTIONALLY LEFT BLANK Preface Let me begin by saying what this book is not. It is not the same as the books previously written on command and control by Paul Bracken, Bruce Blair, C. Kenneth Allard, or others. The World Wide Military Command and Control System (WWMCCS) is constituted of four general types of elements: sensors, com - mand posts, computers, and communications networks. Whereas previous books dealt mainly with the first two types, this book is concerned far more strongly with the second two. Nor has any previous writer dealt with WWMCCS comprehen - sively. Allard, for instance, devotes only about two pages to WWMCCS, Blair refers to it on but three occasions, and Bracken does not mention it at all. Here, addressing what the system is and how it got that way are central concerns, and attention is paid to a number of key system factors and elements that re- ceived almost no attention in these earlier works. This book is also not another study of cold war deterrence, nor is it an examination of the (hypothesized) interactivity between the American and Soviet command and control sys - tems under conditions of crisis or war. Perhaps the best single way to summarize it is to view the book as a bureaucratic or organizational history. What I do is to take three distinct historical themes—organization, technol- ogy, and ideology—and examine how each contributed to the development of WWMCCS and its ability (and frequent inabil- ity) to satisfy the demands of national leadership. Whereas earlier works were primarily descriptive, cataloguing the com - mand and control assets then in place or under development, I offer more analysis by focusing on the issue of how and why WWMCCS developed the way it did. While at first glance less provocative, this approach is potentially more useful for de- fense decision makers dealing with complex human and tech- nological systems in the post-cold-war era. It also makes for a better story and, I trust, a more interesting read. By necessity, this work is selective. The elements of WWMCCS are so numerous, and the parameters of the system xi potentially so expansive, that a full treatment is impossible within the compass of a single volume. Indeed, a full treat- ment of even a single WWMCCS asset or subsystem—the De- fense Satellite Communications System, Extremely Low Fre- quency Communications, the National Military Command System, to name but a few—could itself constitute a substan- tial work. In its broadest conceptualization, WWMCCS is the world, and my approach has been to deal with the head of the octopus rather than its myriad tentacles. My initial interest in WWMCCS goes back—what seems like a long, long time—to my graduate school days and a class in national security issues taught at Yale by Garry Brewer, who later became a member of my (non-WWMCCS related) disserta - tion committee. I’m not quite certain whether to thank him or denounce him for starting me on what has proved to be the lengthiest research project I have ever undertaken. Now that the project is completed, thanks, I suppose, is more appropriate. Thanks also go to Charles Perrow, my former dissertation chair, who, at an early stage of my career, introduced me to organiza - tional theory and helped me to think analytically about complex organizations. As to more recent history, this project was for - mally launched during a postdoctoral fellowship year at Ohio State University’s Mershon Center, and a subsequent junior fac- ulty leave from Lafayette College helped advance it. Special thanks go to Charles Hermann, Thomas Norton, and Howard Schneiderman for their encouragement and insight. xii Introduction In the late 1970s, in response to a lengthy series of failures and snafus in various components of the Defense Depart- ment’s World Wide Military Command and Control System (WWMCCS; pronounced “wimex”), a remarkable and rather unlikely team of consultants was assembled at the Pentagon. Their job was to try to figure out how to make the vast, multibillion dollar metasystem of sensors, command centers, and communications links work better. The group included 30 anthropologists and sociologists, mathematicians, control theorists and systems theorists, and representatives from a variety of other scholarly disciplines—“academics with a philo - sophical bent,” as one writer described them. In a series of meetings with a similarly sized group of defense experts, the academics considered ways to deal with WWMCCS’s many problems. All sorts of recommendations were offered up, but, according to one of the consultants, conspicuously lacking was any “critical examination of the dominant paradigm which condones the expenditure of vast resources without even a semblance of a conceptual rationale for the effort.”1 However correct that assessment might have been, and some certainly disputed it, the whole experience was, in a word, unprecedented. The fact that academics had been in - vited to the Pentagon in the first place could be read as an admission that the vast assemblage of technologies and hu- man organizations that was WWMCCS was not up to snuff as the cold war moved into its final tense decade. The meetings were also a not-so-implicit admission that the Pentagon’s tra- ditional problem-solving method in this area, the so-called evolutionary approach to command and control system devel- opment, had come up short; in fact, this approach itself might have represented a major impediment to the formulation of a coherent conceptual basis for the system. After some 20 years of development, the World Wide Military Command and Con - trol System, even in the eyes of some of its most enthusiastic advocates, was judged to be less than effective. xiii The Pentagon’s concern with command and control effective - ness was soon
Recommended publications
  • (Fully) Autonomous Weapon Systems
    (Fully) autonomous weapon systems. Name: Ida Verkleij Supervisor 1: dr. J.L. Reynolds ANR: 226452 Supervisor 2: prof. mr. J. Somsen Table of contents. Introduction. ......................................................................................................................................... 2 Chapter 1: Autonomous weapons systems. ..................................................................................... 7 1.1: The rise of autonomous weapon systems. ................................................................................. 7 1.2: The definition and categorization of autonomous weapon systems. ........................................ 10 1.3: Are (fully) autonomous weapon systems per se unlawful? ...................................................... 13 1.3.1: Unlawful weapon system. .................................................................................................. 13 1.3.2: Unlawful use of a lawful weapon system. .......................................................................... 14 1.4: Conclusion................................................................................................................................. 16 Chapter 2: The doctrine of command responsibility. .................................................................... 18 2.1: Early Post-World War II............................................................................................................. 18 2.2: The doctrine of command responsibility applied by the ad hoc tribunals. ...............................
    [Show full text]
  • Pr-Dvd-Holdings-As-Of-September-18
    CALL # LOCATION TITLE AUTHOR BINGE BOX COMEDIES prmnd Comedies binge box (includes Airplane! --Ferris Bueller's Day Off --The First Wives Club --Happy Gilmore)[videorecording] / Princeton Public Library. BINGE BOX CONCERTS AND MUSICIANSprmnd Concerts and musicians binge box (Includes Brad Paisley: Life Amplified Live Tour, Live from WV --Close to You: Remembering the Carpenters --John Sebastian Presents Folk Rewind: My Music --Roy Orbison and Friends: Black and White Night)[videorecording] / Princeton Public Library. BINGE BOX MUSICALS prmnd Musicals binge box (includes Mamma Mia! --Moulin Rouge --Rodgers and Hammerstein's Cinderella [DVD] --West Side Story) [videorecording] / Princeton Public Library. BINGE BOX ROMANTIC COMEDIESprmnd Romantic comedies binge box (includes Hitch --P.S. I Love You --The Wedding Date --While You Were Sleeping)[videorecording] / Princeton Public Library. DVD 001.942 ALI DISC 1-3 prmdv Aliens, abductions & extraordinary sightings [videorecording]. DVD 001.942 BES prmdv Best of ancient aliens [videorecording] / A&E Television Networks History executive producer, Kevin Burns. DVD 004.09 CRE prmdv The creation of the computer [videorecording] / executive producer, Bob Jaffe written and produced by Donald Sellers created by Bruce Nash History channel executive producers, Charlie Maday, Gerald W. Abrams Jaffe Productions Hearst Entertainment Television in association with the History Channel. DVD 133.3 UNE DISC 1-2 prmdv The unexplained [videorecording] / produced by Towers Productions, Inc. for A&E Network executive producer, Michael Cascio. DVD 158.2 WEL prmdv We'll meet again [videorecording] / producers, Simon Harries [and three others] director, Ashok Prasad [and five others]. DVD 158.2 WEL prmdv We'll meet again. Season 2 [videorecording] / director, Luc Tremoulet producer, Page Shepherd.
    [Show full text]
  • The Fates of American Presidents Who Challenged the Deep State (1963-1980) アメリカの深層国家に抗した大統領の運命(1963-1980)
    The Asia-Pacific Journal | Japan Focus Volume 12 | Issue 43 | Number 4 | Oct 20, 2014 The Fates of American Presidents Who Challenged the Deep State (1963-1980) アメリカの深層国家に抗した大統領の運命(1963-1980) Peter Dale Scott In the last decade it has become more and more another, more shadowy, more obvious that we have in America today what the indefinable government that is not journalists Dana Priest and William Arkin have explained in Civics 101 or called observable to tourists at the White House or the Capitol. The former is two governments: the one its traditional Washington partisan citizens were familiar with, operated politics: the tip of the iceberg that a more or less in the open: the other a public watching C-SPAN sees daily parallel top secret government and which is theoretically whose parts had mushroomed in controllable via elections. The less than a decade into a gigantic, subsurface part of the iceberg I shall sprawling universe of its own, call the Deep State, which operates visible to only a carefully vetted according to its own compass cadre—and its entirety . visible heading regardless of who is 1 only to God. formally in power.3 And in 2013, particularly after the military return I believe that a significant shift in the relationship to power in Egypt, more and more authors between public and deep state power occurred in referred to this second level as America’s “deep the 1960s and 1970s, culminating in the Reagan 2 state.” Here for example is the Republican Revolution of 1980. In this period five presidents analyst Mike Lofgren: sought to curtail the powers of the deep state.
    [Show full text]
  • Stability and Arms Control in Europe: the Role of Military Forces Within a European Security System
    Stability and Arms Control in Europe: The Role of Military Forces within a European Security System A SIPRI Research Report Edited by Dr Gerhard Wachter, Lt-General (Rtd) and Dr Axel Krohn sipri Stockholm International Peace Research Institute July 1989 Copyright © 1989 SIPRI All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN 91-85114-50-2 Typeset and originated by Stockholm International Peace Research Institute Printed and bound in Sweden by Ingeniörskopia Solna Abstract Wachter, G. and Krohn, A., eds, Stability and Arms Control in Europe: The Role of Military Forces within a European Security System, A SIPRI Research Report (SIPRI: Solna, Sweden, 1989), 113 pp. This report presents the outcome of a project which was initiated at SIPRI in 1987. It was supported by a grant from the Volkswagen Stiftung of the Federal Republic of Germany. The introductory chapter by the editors presents a scenario for a possible future European security system. Six essays by active NATO and WTO military officers focus on the role of military forces in such a system. Various approaches to the tasks and size of military forces in this regime of strict non-provocative defence are presented with the intent of providing new ideas for the debate on restructuring of forces in Europe. There are 3 maps, 7 tables and 11 figures. Sponsored by the Volkswagen Stiftung. Contents Preface vi Acknowledgements viii The role of military forces within a European security system 1 G.
    [Show full text]
  • Managing the Human Weapon System: a Vision for an Air Force Human-Performance Doctrine
    Calhoun: The NPS Institutional Archive DSpace Repository Faculty and Researchers Faculty and Researchers Collection 2009 Managing the Human Weapon System: A Vision for an Air Force Human-Performance Doctrine Tvaryanas, A.P. Tvaryanas, A.P., Brown, L., and Miller, N.L. "Managing the Human Weapon System: A Vision for an Air Force Human-Performance Doctrine", Air & Space Power Journal, pp. 34-41, Summer 2009. http://hdl.handle.net/10945/36508 Downloaded from NPS Archive: Calhoun In air combat, “the merge” occurs when opposing aircraft meet and pass each other. Then they usually “mix it up.” In a similar spirit, Air and Space Power Journal’s “Merge” articles present contending ideas. Readers are free to join the intellectual battlespace. Please send comments to [email protected] or [email protected]. Managing the Human Weapon System A Vision for an Air Force Human-Performance Doctrine LT COL ANTHONY P. TVARYANAS, USAF, MC, SFS COL LEX BROWN, USAF, MC, SFS NITA L. MILLER, PHD* The basic planning, development, organization and training of the Air Force must be well rounded, covering every modern means of waging air war. The Air Force doctrines likewise must be !exible at all times and entirely uninhibited by tradition. —Gen Henry H. “Hap” Arnold N A RECENT paper on America’s Air special operations forces’ declaration that Force, Gen T. Michael Moseley asserted “humans are more important than hardware” that we are at a strategic crossroads as a in asymmetric warfare.2 Consistent with this consequence of global dynamics and view, in January 2004, the deputy secretary of Ishifts in the character of future warfare; he defense directed the Joint Staff to “develop also noted that “today’s con!uence of global the next generation of .
    [Show full text]
  • Annual Report 2019-20
    Honeywell Automation India Limited CIN: L29299PN1984PLC017951 Regd. Office: 56 & 57, Hadapsar Industrial Estate, Pune - 411 013, Maharashtra Tel: +91 20 7114 8888 E-mail: [email protected] Website: https://www.honeywell.com/en-us/global/en-in/hail July 25, 2020 To To The Manager – Compliance Department The Manager – Compliance Department National Stock Exchange of India Limited BSE Limited ‘Exchange Plaza’ Bandra Kurla Complex, Floor 25, P.J.Tower, Dalal Street Bandra (East) Mumbai 400051 Mumbai 400001 NSE Symbol: HONAUT BSE Scrip Code: 517174 Dear Sir, Sub: Regulation 34 of the SEBI (Listing Obligation and Disclosure Requirements) Regulations, 2015 - Electronic copy of the Notice of the 36th Annual General Meeting (AGM) and the Annual Report of Honeywell Automation India Limited for the financial year 2019-20 This is further to our letter dated July 17, 2020 wherein the Company had informed that the Annual General Meeting (AGM) of the Company is scheduled to be held on Tuesday, August 18, 2020 at 4.00 p.m. (IST) through Video Conference / Other Audio-Visual Means, in accordance, with the relevant circulars issued by Ministry of Corporate Affairs and Securities and Exchange Board of India (SEBI). In terms of the requirements of Regulation 34(1) of the SEBI (Listing Obligations and Disclosure Requirements) Regulations, 2015, we are submitting herewith the Annual Report of the Company including the Business Responsibility Report and the Notice of AGM for the financial year 2019-20, which is also being sent through electronic mode to the Members. The Annual Report containing the Notice of Annual General Meeting is also uploaded on the Company’s website at https://www.honeywell.com/en-us/global/en-in/hail You are requested to kindly take the above information on record.
    [Show full text]
  • Remembering WWMCCS - Worldwide Military Command and Control System
    Remembering WWMCCS - WorldWide Military Command and Control System Recently I came across a web site describing the history and development of the WorldWide Military Command and Control System (WWMCCS) inter-computer network. This was our nation's first integrated military command and control system. And, back in the early 1970’s, it was one of the largest contracts ever awarded by the federal government. A review of the web site inspired me to recount a brief history about how I came to play a small role in this gigantic computer project. The World-Wide Military Command and Control System (WWMCCS) was a centrally managed information processing and exchange network consisting of large-scale Honeywell 6000 Series computer systems installed worldwide at geographically separate locations and interconnected by a dedicated wide-band, packet-switched communications subsystem. Back in 1971 Honeywell was awarded a $51.3 million (approximately $260 million in 2005 dollars) contract to supply The Department of Defense 27 Honeywell Model 6000 Series large-scale computer systems, all with common programs providing a rapid exchange of information among command centers. The first computer system was installed at the Strategic Air Command’s headquarters at Offutt AFB, Omaha, Nebraska. The dual Model 6070 computer system was shipped in three moving vans with a total weight of 62,898 pounds. My role in this gigantic project began after 1971 when General Electric sold their Computer Information Systems Division to Honeywell. As former GE computer division employee, I now found myself working for the Honeywell Federal Information Systems Division. One of the biggest reasons for the Honeywell’s acquisition of General Electric was to acquire their large scale GE-600 line of computers, as well as General Electric Computer Information Systems Division employees like myself with the knowledge and training to market, install, and support the GE-600 Computer Series.
    [Show full text]
  • The Civilian Impact of Drone Strikes
    THE CIVILIAN IMPACT OF DRONES: UNEXAMINED COSTS, UNANSWERED QUESTIONS Acknowledgements This report is the product of a collaboration between the Human Rights Clinic at Columbia Law School and the Center for Civilians in Conflict. At the Columbia Human Rights Clinic, research and authorship includes: Naureen Shah, Acting Director of the Human Rights Clinic and Associate Director of the Counterterrorism and Human Rights Project, Human Rights Institute at Columbia Law School, Rashmi Chopra, J.D. ‘13, Janine Morna, J.D. ‘12, Chantal Grut, L.L.M. ‘12, Emily Howie, L.L.M. ‘12, Daniel Mule, J.D. ‘13, Zoe Hutchinson, L.L.M. ‘12, Max Abbott, J.D. ‘12. Sarah Holewinski, Executive Director of Center for Civilians in Conflict, led staff from the Center in conceptualization of the report, and additional research and writing, including with Golzar Kheiltash, Erin Osterhaus and Lara Berlin. The report was designed by Marla Keenan of Center for Civilians in Conflict. Liz Lucas of Center for Civilians in Conflict led media outreach with Greta Moseson, pro- gram coordinator at the Human Rights Institute at Columbia Law School. The Columbia Human Rights Clinic and the Columbia Human Rights Institute are grateful to the Open Society Foundations and Bullitt Foundation for their financial support of the Institute’s Counterterrorism and Human Rights Project, and to Columbia Law School for its ongoing support. Copyright © 2012 Center for Civilians in Conflict (formerly CIVIC) and Human Rights Clinic at Columbia Law School All rights reserved Printed in the United States of America. Copies of this report are available for download at: www.civiliansinconflict.org Cover: Shakeel Khan lost his home and members of his family to a drone missile in 2010.
    [Show full text]
  • Standards for Computer Aided Manufacturing
    //? VCr ~ / Ct & AFML-TR-77-145 )R^ yc ' )f f.3 Standards for Computer Aided Manufacturing Office of Developmental Automation and Control Technology Institute for Computer Sciences and Technology National Bureau of Standards Washington, D.C. 20234 January 1977 Final Technical Report, March— December 1977 Distribution limited to U.S. Government agencies only; Test and Evaluation Data; Statement applied November 1976. Other requests for this document must be referred to AFML/LTC, Wright-Patterson AFB, Ohio 45433 Manufacturing Technology Division Air Force Materials Laboratory Wright-Patterson Air Force Base, Ohio 45433 . NOTICES When Government drawings, specifications, or other data are used for any purpose other than in connection with a definitely related Government procurement opera- tion, the United States Government thereby incurs no responsibility nor any obligation whatsoever; and the fact that the Government may have formulated, furnished, or in any way supplied the said drawing, specification, or other data, is not to be regarded by implication or otherwise as in any manner licensing the holder or any person or corporation, or conveying any rights or permission to manufacture, use, or sell any patented invention that may in any way be related thereto Copies of this report should not be returned unless return is required by security considerations, contractual obligations, or notice on a specified document This final report was submitted by the National Bureau of Standards under military interdepartmental procurement request FY1457-76 -00369 , "Manufacturing Methods Project on Standards for Computer Aided Manufacturing." This technical report has been reviewed and is approved for publication. FOR THE COMMANDER: DtiWJNlb L.
    [Show full text]
  • Battle Management Language: History, Employment and NATO Technical Activities
    Battle Management Language: History, Employment and NATO Technical Activities Mr. Kevin Galvin Quintec Mountbatten House, Basing View, Basingstoke Hampshire, RG21 4HJ UNITED KINGDOM [email protected] ABSTRACT This paper is one of a coordinated set prepared for a NATO Modelling and Simulation Group Lecture Series in Command and Control – Simulation Interoperability (C2SIM). This paper provides an introduction to the concept and historical use and employment of Battle Management Language as they have developed, and the technical activities that were started to achieve interoperability between digitised command and control and simulation systems. 1.0 INTRODUCTION This paper provides a background to the historical employment and implementation of Battle Management Languages (BML) and the challenges that face the military forces today as they deploy digitised C2 systems and have increasingly used simulation tools to both stimulate the training of commanders and their staffs at all echelons of command. The specific areas covered within this section include the following: • The current problem space. • Historical background to the development and employment of Battle Management Languages (BML) as technology evolved to communicate within military organisations. • The challenges that NATO and nations face in C2SIM interoperation. • Strategy and Policy Statements on interoperability between C2 and simulation systems. • NATO technical activities that have been instigated to examine C2Sim interoperation. 2.0 CURRENT PROBLEM SPACE “Linking sensors, decision makers and weapon systems so that information can be translated into synchronised and overwhelming military effect at optimum tempo” (Lt Gen Sir Robert Fulton, Deputy Chief of Defence Staff, 29th May 2002) Although General Fulton made that statement in 2002 at a time when the concept of network enabled operations was being formulated by the UK and within other nations, the requirement remains extant.
    [Show full text]
  • Atp 6-02.45 Techniques for Tactical Signal Support To
    ATP 6-02.45 TECHNIQUES FOR TACTICAL SIGNAL SUPPORT TO THEATER OPERATIONS NOVEMBER 2019 DISTRIBUTION RESTRICTION: Approved for public release, distribution is unlimited. This publication supersedes FMI 6-02.45, dated 5 July 2007. Headquarters, Department of the Army This publication is available at the Army Publishing Directorate site (https://armypubs.army.mil/), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard). *ATP 6-02.45 Army Techniques Publication Headquarters No. 6-02.45 Department of the Army Washington, DC, 07 November 2019 Techniques for Tactical Signal Support to Theater Operations Contents Page PREFACE.................................................................................................................... iii INTRODUCTION .......................................................................................................... v Chapter 1 THE OPERATIONAL ENVIRONMENT .................................................................... 1-1 The Information Environment .................................................................................... 1-1 The Tactical Network ................................................................................................. 1-3 Chapter 2 ECHELONS ABOVE CORPS TACTICAL NETWORK ARCHITECTURE .............. 2-1 Section I –Network Architecture and Transport Capabilities ............................. 2-1 Colorless Core Architecture....................................................................................... 2-1 Network Transport Capabilities
    [Show full text]
  • Intelligence Community Programs, Management, and Enduring Issues
    Intelligence Community Programs, Management, and Enduring Issues (name redacted) Analyst in Intelligence and National Security Policy November 8, 2016 Congressional Research Service 7-.... www.crs.gov R44681 Intelligence Community Programs, Management, and Enduring Issues Summary Congress’s and the American public’s ability to oversee and understand how intelligence dollars are spent is limited by the secrecy that surrounds the intelligence budget process. Yet, total spending on the Intelligence Community (IC) programs discussed in this report equates to approximately $70 billion dollars—roughly 10% of national defense spending. This report is designed to shed light on the IC budget—in terms of its programs, management, and enduring issues—using unclassified materials available in the public domain. This report focuses those IC programs, grouped, for the most part, under two labels: (1) the National Intelligence Program (NIP), and (2) the Military Intelligence Program (MIP). Nevertheless, the combined NIP and MIP budgets do not encompass the total of U.S. intelligence- related spending. Intelligence-related programs that are not part of the IC include, for example, the large Office of Intelligence within the Department of Homeland Security’s (DHS’s) Immigration and Customs Enforcement (ICE) division. The ICE Office of Intelligence is not included in the IC because, theoretically, ICE activities primarily support the DHS mission to protect the homeland. This report explains the management structure for the NIP and MIP to include their two separate budget processes and the roles of the Director of National Intelligence and the Under Secretary of Defense (Intelligence). The concluding section of this report considers the ability of the U.S.
    [Show full text]