Command...Control...In the Information

Total Page:16

File Type:pdf, Size:1020Kb

Command...Control...In the Information Information Age Transformation Series Power to the Edge Command... Control... in the Information Age David S. Alberts Richard E. Hayes with a Foreword by John Stenbit About the CCRP The Command and Control Research Program (CCRP) has the mission of improving DoD’s understanding of the national security implications of the Information Age. Focusing upon improving both the state of the art and the state of the practice of command and control, the CCRP helps DoD take full advantage of the opportunities afforded by emerging technologies. The CCRP pursues a broad program of research and analysis in information superiority, information operations, command and control theory, and associated operational concepts that enable us to leverage shared awareness to improve the effectiveness and efficiency of assigned missions. An important aspect of the CCRP program is its ability to serve as a bridge between the operational, technical, analytical, and educational communities. The CCRP provides leadership for the command and control research community by: • articulating critical research issues; • working to strengthen command and control research infrastructure; • sponsoring a series of workshops and symposia; • serving as a clearing house for command and control related research funding; and • disseminating outreach initiatives that include the CCRP Publication Series. This is a continuation in the series of publications produced by the Center for Advanced Concepts and Technology (ACT), which was created as a “skunk works” with funding provided by the CCRP under the auspices of the Assistant Secretary of Defense (NII). This program has demonstrated the importance of having a research program focused on the national security implications of the Information Age. It develops the theoretical foundations to provide DoD with information superiority and highlights the importance of active outreach and dissemination initiatives designed to acquaint senior military personnel and civilians with these emerging issues. The CCRP Publication Series is a key element of this effort. Check our Web site for the latest CCRP activities and publications. www.dodccrp.org DoD Command and Control Research Program Assistant Secretary of Defense (NII) & Chief Information Officer Dr. Linton Wells, II (Acting) Principal Deputy Assistant Secretary of Defense (NII) Dr. Linton Wells, II Special Assistant to the ASD(NII) & Director, Research and Strategic Planning Dr. David S. Alberts Opinions, conclusions, and recommendations expressed or implied within are solely those of the authors. They do not necessarily represent the views of the Department of Defense, or any other U.S. Government agency. Cleared for public release; distribution unlimited. Portions of this publication may be quoted or reprinted without further permission, with credit to the DoD Command and Control Research Program, Washington, D.C. Courtesy copies of reviews would be appreciated. Library of Congress Cataloging-in-Publication Data Alberts, David S. (David Stephen), 1942- Power to the Edge: Command and Control in the Information Age / David S. Alberts, Richard E. Hayes. p. cm. ISBN 1-893723-13-5 1. Command and control systems--United States. 2. Information warfare- -United States. 3. United States--Armed Forces--Reorganization. 4. Military art and science--Effect of technological innovations on--United States. I. Hayes, Richard E., 1942- II. Title. UB212.A43 2003 355.3'3041--dc21 2003007597 1st printing June 2003 2nd printing June 2004 3rd printing April 2005 Information Age Transformation Series Power to the Edge Command... Control... in the Information Age David S. Alberts Richard E. Hayes with a Foreword by John Stenbit Table of Contents List of Figures.............................................vii Acknowledgements ....................................ix Foreword ...................................................xiii Preface ......................................................xix Chapter 1. Introduction ..............................1 Leveraging the Power of Information .........................2 Power to the Edge .......................................................4 Organization of the Book ............................................7 Chapter 2. Command and Control ..........13 Definition of Command and Control .......................14 Domains of Command and Control ........................14 Enduring Principles ...................................................15 Spectrum of C2 Approaches .....................................18 Self-Synchronization .................................................27 Command and Control Approaches in the Information Age ..................................................32 i Chapter 3. Industrial Age C2 ...................37 Industrial Age Command and Control .....................37 Decomposition ..........................................................38 Specialization ............................................................39 Hierarchical Organizations .......................................41 Optimization .............................................................44 Deconfliction .............................................................45 Centralized Planning .................................................46 Decentralized Execution ...........................................48 Industrial Age C2–Simple Adaptive Control Mechanisms .................................................49 Chapter 4. Breakdown of Industrial Age Organizing Principles and Processes .........53 The Industrial Age Legacy.........................................54 Interoperability and Industrial Age Organizations ...56 Agility and the Industrial Age ...................................59 Information and Industrial Age Organizations .........63 A Tale of Two Corporals ...........................................64 Chapter 5. The Information Age ..............71 ii Economics of Information .........................................71 The Power of Information Redefined .......................72 Technology Enablers of Power to the Edge .....................................................74 Post Before Processing ...............................................82 Lessons from the Private Sector ................................83 Efficiency: Hierarchies v. the Robustly Networked Force .......................................................91 Chapter 6. Desired Characteristics of Information Age Forces .........................97 Network Centric Warfare...........................................98 Sensemaking ...........................................................101 Coalition and Interagency Operations ....................103 Appropriate Means .................................................103 Orchestration of Means ..........................................104 Chapter 7. Interoperability .....................107 Need for Interoperability .........................................107 Levels of Interoperability .........................................109 Achieving Interoperability .......................................110 An Edge Approach to Interoperability ....................118 iii Chapter 8. Agility ....................................123 Introduction .............................................................123 Agility: Defined and Placed in an Information Age Context ........................................125 Agile C2 ...................................................................127 Chapter 9. Power and the Edge ..............165 Power .......................................................................166 The Edge .................................................................173 Chapter 10. Power to the Edge ...............179 Edge Organizations .................................................181 Fixed v. Emergent Leadership .................................184 An Edge Infostructure .............................................186 Components of the GIG .........................................187 Edge Applications ...................................................198 Chapter 11. Command…Control… in the Information Age ...........................201 Command in the Information Age .........................203 Control in the Information Age ..............................206 iv Chapter 12. The Power of “Power to the Edge” Organizations .........................213 Hierarchies and Edge Organizations ......................215 Comparison of Hierarchies v. Edge Organizations .................................................218 Chapter 13. Edge-Oriented Mission Capability Packages ................................223 Coevolution of Institutional Processes .....................224 Strategic Planning and Requirements .....................224 Experimentation, Coevolution, and Power to the Edge ...................................................227 Beyond Training and Exercises to Education and Experimentation .............................228 Chapter 14. The Way Ahead ..................233 Bibliography ............................................237 About the Authors....................................257 Catalog of CCRP Publications ..........CAT-1 v List of Figures Figure 1. Nelson’s Innovation at the Battle of Trafalgar ......30 Figure 2. Sample Response Surface .....................................61 Figure 3. Location of the Global Maximum ........................61 Figure 4. Napoleon’s Corporal and the Strategic Corporal .........................................................65 Figure 5. Capabilities of Telephone Information Exchange ........................................................................77
Recommended publications
  • Tipped Over the Edge
    Tipped Over The edge Gender Inequity in the Restaurant Industry BY THE RESTAURANT OPPORTUNITIES CENTERS UNITED AND FAMILY VALUES @ WORK HERvotes COALITION INSTITUTE FOR WOMEN’S POLICY RESEARCH MOMSRISING NATIONAL COALITION ON BLACK CIVIC PARTICIPATION’S BLACK WOMEN’S ROUNDTABLE NATIONAL COUNCIL FOR RESEARCH ON WOMEN NATIONAL ORGANIZATION FOR WOMEN Foundation NATIONAL PARTNERSHIP FOR WOMEN & FAMILIES NATIONAL WOMEN’S LAW CENTER WIDER OPPORTUNITIES FOR WOMEN February 13, 2012 WOMEN OF COLOR POLICY NETWORK, NYU WAGNER 9TO5, National Association OF WORKING WOMEN RESEARCH SUPPORT The Ford Foundation The Moriah Fund The Open Society Foundations The Rockefeller Foundation February 13, 2012 Tipped Over The edge Gender Inequity in the Restaurant Industry AND FAMILY VALUES @ WORK HERvotes COALITION INSTITUTE FOR WOMEN’S POLICY RESEARCH MOMSRISING NATIONAL COALITION ON BLACK CIVIC PARTICIPATION’S BLACK WOMEN’S ROUNDTABLE NATIONAL COUNCIL FOR RESEARCH ON WOMEN NATIONAL ORGANIZATION FOR WOMEN Foundation NATIONAL PARTNERSHIP FOR WOMEN & FAMILIES NATIONAL WOMEN’S LAW CENTER WIDER OPPORTUNITIES FOR WOMEN WOMEN OF COLOR POLICY NETWORK, NYU WAGNER 9TO5, National Association OF WORKING WOMEN RESEARCH SUPPORT The Ford Foundation The Moriah Fund The Open Society Foundations The Rockefeller Foundation February 13, 2012 Tipped Over The edge Gender Inequity in the Restaurant Industry BY THE RESTAURANT OPPORTUNITIES CENTERS UNITED AND FAMILY VALUES @ WORK HERvotes COALITION INSTITUTE FOR WOMEN’S POLICY RESEARCH MOMSRISING NATIONAL COALITION ON BLACK CIVIC PARTICIPATION’S
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • SONG ACTIVITY – Beautiful Day by U2
    SONG ACTIVITY – Beautiful Day by U2 Name: Group: Date: / / 1. Work in small groups. Read the definition for the word “resilient”. Discuss the questions. resilient /rɪˈzɪliənt/ adj 1 able to become strong, healthy or successful again after something bad happens. 2 able to return to an original shape after being pulled, stretched, pressed, bent, etc. Adapted from: https://www.merriam-webster.com/dictionary/resilient a. Can you think of a situation in your life when you or a person you know were resilient? Talk about it. b. What can teenagers do to develop resilience? c. What do you usually do when you are having a difficult day? 2. Work with a partner. You are going to listen to the song Beautiful Day, by U2. The words in the cloud are in the lyrics of the song. How do you associate them with a beautiful day? Discuss your ideas and take notes in the lines below. ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ 3. Now listen to the song. Were the words in Activity 2 associated to the idea of a beautiful day in the way you imagined? SONG ACTIVITY – Beautiful Day by U2 4. Listen to the song again. Check (✓) the alternative that best explains the lines in italics, in the context of the song. a. The heart is a bloom / Shoots up through the stony ground. [ ] Love is resilient and can overcome all difficulties. [ ] Love is blind to all problems and difficulties. b. The traffic is stuck / And you’re not moving anywhere. [ ] Traffic jams can ruin even the most beautiful day.
    [Show full text]
  • Off the Beaten Track
    Off the Beaten Track To have your recording considered for review in Sing Out!, please submit two copies (one for one of our reviewers and one for in- house editorial work, song selection for the magazine and eventual inclusion in the Sing Out! Resource Center). All recordings received are included in “Publication Noted” (which follows “Off the Beaten Track”). Send two copies of your recording, and the appropriate background material, to Sing Out!, P.O. Box 5460 (for shipping: 512 E. Fourth St.), Bethlehem, PA 18015, Attention “Off The Beaten Track.” Sincere thanks to this issue’s panel of musical experts: Richard Dorsett, Tom Druckenmiller, Mark Greenberg, Victor K. Heyman, Stephanie P. Ledgin, John Lupton, Angela Page, Mike Regenstreif, Seth Rogovoy, Ken Roseman, Peter Spencer, Michael Tearson, Theodoros Toskos, Rich Warren, Matt Watroba, Rob Weir and Sule Greg Wilson. that led to a career traveling across coun- the two keyboard instruments. How I try as “The Singing Troubadour.” He per- would have loved to hear some of the more formed in a variety of settings with a rep- unusual groupings of instruments as pic- ertoire that ranged from opera to traditional tured in the notes. The sound of saxo- songs. He also began an investigation of phones, trumpets, violins and cellos must the music of various utopian societies in have been glorious! The singing is strong America. and sincere with nary a hint of sophistica- With his investigation of the music of tion, as of course it should be, as the Shak- VARIOUS the Shakers he found a sect which both ers were hardly ostentatious.
    [Show full text]
  • Extending the Enterprise to the Edge Your Guide to Converging Operational and Information Technology
    Extending the Enterprise to the Edge Your Guide to Converging Operational and Information Technology Traditionally, agencies have approached information technology as a separate discipline from operational technology, which includes data acquisition systems, control systems, industrial-class networks, and a wide variety of internet-connected devices that operate far beyond the walls of the data center. However, it is increasingly clear that the data gathered at the edge of operations can provide in- sights that agencies can use to improve the efficiency of their operations and deliver new services to support the mission. The key? Converging OT capabilities with enterprise-class IT systems in single box and deploying them at the edge. GovLoop, Affigent and Hewlett Packard Enterprise (HPE) collaborated on this worksheet to help you take advantage of this new wave of edge computing. Three Ways to Leverage OT-IT Convergence The benefits of converging OT and IT systems fall into three main categories: Physical systems Software and data Process convergence convergence convergence IT systems (compute, storage, Enterprise IT applications IT and OT teams agree to collaborate management, and security) collaborating with OT applications on end-to-end workflows and integrate in the same system chassis are applied to both traditional dataflows. with OT systems (data acquisition enterprise data and data derived systems, control systems, and at the edge. industrial networks). Leveraging Data at the Edge: A Framework By integrating OT and IT systems, agencies can create a flow of data from the enterprise out to the edge. By integrating this data, agencies can see greater insights into their operations and services.
    [Show full text]
  • Exhibit Designs for Girls' Engagement a Guide to the EDGE Design Attributes
    Exhibit Designs for Girls’ Engagement A Guide to the EDGE Design Attributes EDGE visitor research Toni Dancstep (née Dancu) and Lisa Sindorf & evaluation This material is based upon work supported by the National Science Foundation under Grant No. 1323806. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. How to cite: Dancstep (née Dancu), T. & Sindorf, L. (2016). Exhibit Designs for Girls’ Engagement: A Guide to the EDGE Design Attributes. San Francisco: Exploratorium. 2 EXHIBIT DESIGNS FOR GIRLS’ ENGAGEMENT Table of Contents 4–7 Introduction 8 –27 The EDGE Design Attributes 28 –41 Case Studies 42 –57 Appendix A: Assessing Exhibits 58 –61 Appendix B: Tested Design Attributes 62–65 References 66 –67 Acknowledgments EXHIBIT DESIGNS FOR GIRLS’ ENGAGEMENT | Table of Contents 3 Introduction 4 EXHIBIT DESIGNS FOR GIRLS’ ENGAGEMENT | Introduction As a child, Alice’s family encouraged her to Unfortunately, science museums aren’t always engage with science. But her visits to science working as well for girls as for boys, and many museums were less than positive. She remem- girls’ experiences may be similar to Alice’s. bers, “I would stand there, trying to figure out Some research has shown that girls visit what was so interesting, and usually fail at science museums less frequently than boys.4 doing so” and “I thought that I had to be able And once inside, girls often have different ex- to ‘figure out’ each exhibit to be ‘using the periences at exhibits than boys.
    [Show full text]
  • U2 3D Talent: Bono, the Edge, Larry Mullen, Adam Clayton. Directors
    U2 3D Talent: Bono, The Edge, Larry Mullen, Adam Clayton. Directors: Mark Pellington and Catherine Owens Duration: 85 minutes Classification: G We rate it: 3 and a half stars. There’s no denying that Irish rock band U2 are probably still the biggest live musical act in the world, even after twenty-odd years of touring. Aside from maybe the great outdoor extravaganzas mounted during the 1970s and 80s by Pink Floyd, U2’s live gigs are renowned as dazzling, cutting-edge spectacles, as politically and ideologically provocative as they are musically engaging. Bono, the acknowledged master of making fame itself humanely useful, still struts his stuff as if he’s a 25-year- old, and the band that supports him is as skilled as rock bands get. To see this chart- topping foursome filmed playing before staggeringly large crowds in state-of-the-art digital 3D and surround sound is, admittedly, quite a spectacle. The peculiar thing, however, about sitting in a cinema and watching U2 3D is that throughout the experience, stunning as it is, one can’t help but reflect upon the fact that one is sitting in a darkened room watching film of a band playing live in front of crowds of a hundred thousand people. There’s something decidedly strange about sitting passively and observing (through the suitably nerdy polarising 3D glasses) this massive rock show, whose actual filmed audiences just don’t stop screaming and waving for a second. As one ruminatively chews one’s popcorn and sips one’s soft- drink, one can’t help but feel faintly left out, to say the least.
    [Show full text]
  • Notations Spring 2011
    The ASCAP Foundation Making music grow since 1975 www.ascapfoundation.org Notations Spring 2011 Tony Bennett & Susan Benedetto Honored at ASCAP Foundation Awards The ASCAP Foundation held its 15th Annual Awards Ceremony at the Allen Room, Frederick P. Rose Hall, Home of Jazz at Lincoln Center, in New York City on December 8, 2010. Hosted by ASCAP Foundation President, Paul Williams, the event honored vocal legend Tony Bennett and his wife, Susan Benedetto, with The ASCAP Foundation Champion Award in recognition of their unique and significant efforts in arts education. ASCAP Foundation Champion Award recipients Susan Benedetto (l) & Tony Bennett with Mary Rodgers (2nd from left), Mary Ellin A wide variety of ASCAP Foundation Scholarship Barrett (2nd from right), and ASCAP Foundation President Paul and Award recipients were also honored at the Williams (r). event, which included special performances by some of the honorees. For more details and photos of the event, please see our website. Bart Howard provides a Musical Gift The ASCAP Foundation is pleased to announce that composer, lyricist, pianist and ASCAP member Bart Howard (1915-2004) named The ASCAP Foundation as a major beneficiary of all royalties and copyrights from his musical compositions. In line with this generous bequest, The ASCAP Foundation has established programs designed to ensure the preservation of Bart Howard’s name and legacy. These efforts include: Songwriters: The Next Generation, presented by The ASCAP Foundation and made possible by the Bart Howard Estate which showcases the work of emerging songwriters and composers who perform on the Kennedy Center’s Millennium Stage. The ASCAP Foundation Bart Howard Songwriting Scholarship at Berklee College recog- nizes talent, professionalism, musical ability and career potential in songwriting.
    [Show full text]
  • 2018 RBA Annual Report
    2 018 RADIO BROADCASTERS ASSOCIATION ANNUAL REPORT www.rba.co.nz THE YEAR BY NUMBERS NUMBER OF PEOPLE EMPLOYED BY RBA COMMERCIAL STATIONS – IN THE REGION OF 1,800 ANNUAL RADIO REVENUE $ 279.4 MILLION % OF ALL NZ ADVERTISING REVENUE 10.63% # OF COMMERCIAL RADIO FREQUENCIES– 103 AM & 678 FM 781 # OF LISTENERS AGED 10+ TO ALL RADIO AS AT S4 DECEMBER 2018 84% OF ALL NEW ZEALANDERS* 3.59 MILLION # OF LISTENERS AGED 10+ TO COMMERCIAL RADIO AS AT S4 DECEMBER 2018 78% OF ALL NEW ZEALANDERS* 3.32 MILLION # OF RADIO STUDENTS IN 2018 With almost 3.6 million people listening to radio each week and 3.3 million of those listening to commercial radio, we are one 173 of, if not the most used media channels every week in New Zealand. We need to shout this loudly and proudly. Jana Rangooni, RBA CEO www.rba.co.nz FROM THE RBA CHAIRMAN, FROM THE RBA CEO, NORM COLLISON JANA RANGOONI 2018 was a challenging As I write our support of a thriving mainstream year for all organisations in this report music industry in New Zealand. the media throughout New I, like so • We have revised the radio agency Zealand as we faced more many in the accreditation scheme and increased competition at a global level. industry, the number of agencies participating. It was pleasing therefore to are still see radio yet again hold its grieving • We have developed a new plan own in terms of audiences the loss with Civil Defence to engage with and advertising revenue. of our the 16 CDEM regions to ensure the Memorandum of Understanding with We ended the year with over 3.3 million New Zealanders colleague Darryl Paton who so many MCDEM is activated across New listening to commercial radio each week and $279.4 million in know from his years at The Edge and The Zealand.
    [Show full text]
  • Integrated Helicopter Survivability
    Cranfield University Nicholas G. Law Integrated Helicopter Survivability Aeromechanical Systems Group Cranfield Defence and Security PhD DSTL/PUB36228 Cranfield University Cranfield Defence and Security Aeromechanical Systems Group PhD 2011 Nicholas G. Law Integrated Helicopter Survivability Supervisor: Prof. Kevin Knowles May 2011 © Crown copyright 2011. Published with the permission of the Defence Science and Technology Laboratory on behalf of the Controller of HMSO. DISCLAIMER Any views expressed are those of the author and do not necessarily represent those of Dstl, MOD or any other UK government department. ABSTRACT A high level of survivability is important to protect military personnel and equipment and is central to UK defence policy. Integrated Survivability is the systems engineering methodology to achieve optimum survivability at an affordable cost, enabling a mission to be completed successfully in the face of a hostile environment. “Integrated Helicopter Survivability” is an emerging discipline that is applying this systems engineering approach within the helicopter domain. Philosophically the overall survivability objective is ‘zero attrition’, even though this is unobtainable in practice. The research question was: “How can helicopter survivability be assessed in an integrated way so that the best possible level of survivability can be achieved within the constraints and how will the associated methods support the acquisition process?” The research found that principles from safety management could be applied to the survivability problem, in particular reducing survivability risk to as low as reasonably practicable (ALARP). A survivability assessment process was developed to support this approach and was linked into the military helicopter life cycle. This process positioned the survivability assessment methods and associated input data derivation activities.
    [Show full text]
  • Commercial Radio Reaches 3.3 Million New Zealanders. Total NZ Survey 1 2020
    EMBARGOED UNTIL 1PM (NZST) THURS APR 23 2020 Commercial Radio Reaches 3.3 Million New Zealanders. Total NZ Survey 1 2020 The New Zealand Commercial Radio Industry released the S1 first quarter Radio Audience Data into the market today and it reveals that over 3.6 million New Zealanders were listening to radio every week as the country went into lockdown and over 3.3 million of those listen to commercial radio stations. The GfK Radio Audience Measurement survey contacts at least 14,000 respondents across New Zealand every year. The fieldwork for this survey ceased in late March just before the lockdown was announced. RBA CEO Jana Rangooni says “This is an unprecedented situation for the country and the Industry agreed at this time to suspend all fieldwork until at least late June. This means there will be no S2 Release as originally scheduled for June 25th. We hope to make a decision about options for the remainder of the year by the end of May.” NZME CEO Michael Boggs says Radio’s incredible value to New Zealanders has been reinforced in recent weeks, as it invariably does in times of crisis and uncertainty. “Radio, like all media has been focused on supporting our audiences through this period. Whether it be supporting the Government as a Civil Defence Emergency broadcast partner, delivering round the clock local, national and international news coverage or by keeping New Zealanders entertained and connected, Radio is delivering for audiences as it always does in times like these.” MediaWorks CEO Michael Anderson says that it's clear that New Zealanders are turning to Radio as a trusted source for news and entertainment especially through breaking events like Covid-19.
    [Show full text]
  • National Drug Threat Assessment 2004: Threat Matrix
    National Drug Threat Assessment 2004: Threat Matrix Seized Primary Markets Wholesale Retail Source Transit Entry Points Key Illicit Drug en route/within and Principal Price Range Price Range Retailers Projections Locations Countries into U.S. Developments U.S. in 2002 Suppliers in the U.S. in the U.S. Foreign: Colombia, 101,877.8 kg Mexico, Central SWB states (Texas, Atlanta: Mexican, Dominican $10,000-$38,000 per kg $20-$200 per gram African American and DEA Cocaine Signature Potential worldwide cocaine Peru, Bolivia (352,000 kg reportedly American countries, California, Arizona, Chicago: Mexican, Colombian, (powder) (powder) Hispanic criminal groups Program data indicate production will likely decrease Domestic: None available to U.S. markets) Caribbean island nations New Mexico), Dominican $5-$100 per rock (crack) and street gangs; that average wholesale slightly due to increases in Miami/S Florida, Houston: Mexican, Colombian Caucasian local cocaine purity may be eradication and coca spray New York Los Angeles: Mexican, independent dealers; increasing after previous operations as well as a Cocaine Colombian Dominican, Haitian, decreases each year resumption of the Airbridge Miami: Colombian Jamaican, Mexican, between 1999 and 2002. Denial Program. This may New York: Colombian, Mexican, Native American, and result in a decrease in Dominican (also Jamaican, Puerto Rican criminal cocaine availability in the Puerto Rican, and Traditional groups United States. Organized Crime groups) Foreign: Mexico and, 2,512.6 kg Mexican: Direct from
    [Show full text]