Agility. David S. Alberts Kathy Conley. April 2015 Approved for public release; distribution is unlimited. Log: H IDA Document NS D-5499

Similar documents
NEC2 Effectiveness and Agility: Analysis Methodology, Metrics, and Experimental Results*

I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD Agility Quotient (AQ) David S. Alberts

Agility, Automation, and Autonomy

Improving Strategic Decision and Senior-level Teamwork in U.S. National Security Organizations

Obsolescence Management for Structural, Mechanical, and Electrical Items in Conjunction with Electronics

Issues for Future Systems Costing

Achieving Agile C2 by Adopting Higher Levels of C2 Maturity

NATO Research & Technology Organization Studies, Analysis and Simulation Panel Lectures Series 222. Computer Generated Forces Future Needs

Predicting Disposal Costs for United States Air Force Aircraft (Presentation)

AGILITY QUOTIENT (AQ) without specifying the nature of the mission or the circumstances under which it will be conducted?

NATO Research & Technology Organization Studies, Analysis and Simulation Panel Lectures Series 222

Joint Logistics Strategic Plan

Synergizing Logistics Training and Education EWS Subject Area Training

Systems Engineering Processes Applied To Ground Vehicle Integration at US Army Tank Automotive Research, Development, and Engineering Center (TARDEC)

Biased Cramer-Rao lower bound calculations for inequality-constrained estimators (Preprint)

Earned Value Management on Firm Fixed Price Contracts: The DoD Perspective

Towards Better Control of Information Assurance Assessments in Exercise Settings

An Open Strategy for the Acquisition of Models and Simulations. Rudolph P. Darken Director, MOVES Institute

TITLE: A Novel Urinary Catheter with Tailorable Bactericidal Behavior. CONTRACTING ORGANIZATION: LONDON HEALTH SCIENCES CENTRE RESEARCH London N6C 2R5

Measuring Agility. 16 th ICCRTS Quebec City June Dr. David S. Alberts Director, Research OASD/NII & DoD CIO. presented to

Defense Business Board

Application of the HEC-5 Hydropower Routines

Tailoring Earned Value Management

Contemporary Issue Sense and Respond Logistics Now Submitted by: Captain B.K. Sanchez CG #12, FACAD: Major B.J. Nownes 8 February 2005

TITLE: Molecular Determinants Fundamental to Axon Regeneration after SCI

Agile Integration of Complex Systems

Satisfying DoD Contract Reporting With Agile Artifacts

Requirements Management for the Oceanographic Information System at the Naval Oceanographic Office

Product Support and Human Capital

AF Future Logistics Concepts

Implementing Open Architecture. Dr. Tom Huynh Naval Postgraduate School

Army Systems Engineering Career Development Model

NDCEE. Landscape Modeling Technologies for Sustainable Forests. National Defense Center for Energy and Environment. Ms. Donna S.

Robustness of Communication Networks in Complex Environments - A simulations using agent-based modelling

ITEA LVC Special Session on W&A

Implementation of the Best in Class Project Management and Contract Management Initiative at the U.S. Department of Energy s Office of Environmental

TITLE: Regenerative Medicine and Restoration of Joint Function

DoD Command and Control Research Strategic Plan Agile C2 for Complex Endeavors

Service Incentive Towards an SOA Friendly Acquisition Process

TITLE: Identification of Protein Kinases Required for NF2 Signaling

Software And Systems Engineering Risk Management

Panel 5 - Open Architecture, Open Business Models and Collaboration for Acquisition

Joint JAA/EUROCONTROL Task- Force on UAVs

Geothermal Energy Demonstration at Fort Indiantown Gap

INVASIVE SPECIES IMPACT ON THE DEPARTMENT OF DEFENSE

DEPLOYED BASE SOLAR POWER (BRIEFING SLIDES)

Quality Control Review of Air Force Audit Agency s Special Access Program Audits (Report No. D )

Improvements to Hazardous Materials Audit Program Prove Effective

11. KEYNOTE 2 : Rebuilding the Tower of Babel Better Communication with Standards

Red Teaming Agility. Dr. Kira Hutchinson TRADOC G2 Forward

Cataloging Green Items

Army Quality Assurance & Administration of Strategically Sourced Services

Bio-Response Operational Testing & Evaluation (BOTE) Project

73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation

Strategic Sustainability Assessment

Paper: 219. Experiments into the operation and effectiveness of Edge Organizations

NDCEE. Ecosystem Banking Best Practices. Elizabeth Keysar, NDCEE/CTC. National Defense Center for Energy and Environment

Supply Chain Modeling: Downstream Risk Assessment Methodology (DRAM)

Tactical Equipment Maintenance Facilities (TEMF) Update To The Industry Workshop

Operationalizing Agility

Report Documentation Page

PREPARED FOR: U.S. Army Medical Research and Materiel Command Fort Detrick, Maryland

DoD Environmental Information Technology Management (EITM) Program

Systems Engineering Processes Applied To Ground Vehicle Integration at US Army Tank Automotive Research, Development, and Engineering Center (TARDEC)

AFRL-VA-WP-TP

Augmenting Task-Centered Design With Operator State Assessment Technologies

Engineered Resilient Systems

FUEL REFORMING TECHNOLOGIES (BRIEFING SLIDES)

Model based Approaches for Service Oriented Architectures. Mel Greer

TITLE: Molecular Targeting of the P13K/Akt Pathway to Prevent the Development Hormone Resistant Prostate Cancer

Stakeholder Needs and Expectations

SEPG Using the Mission Diagnostic: Lessons Learned. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213

Simulation Based Acquisition for the. Artemis Program

PREPARED FOR: U.S. Army Medical Research and Materiel Command Fort Detrick, Maryland

Big Data: Big Confusion? Big Challenges?

Based on historical data, a large percentage of U.S. military systems struggle to

DoD LVC Architecture Roadmap (LVCAR) Study Status

Life Cycle Metrics and OSD Oversight: Discipline With Flexibility

4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER W911 QX-11-C-0023

This Brief is Unclassified

Defining a Maturity Scale for Governing Operational Resilience

A Primer on. Software Licensing. Charlene Gross Software Engineering Institute. Do You Own It or Not? Charlene Gross, April 19-23, 2010

What is an ecosystem and what is ecosystem- based management?

CONTRACTING ORGANIZATION: Henry M. Jackson Foundation for the Advancement of Military Medicine Rockville, MD 20852

CONTRACTING ORGANIZATION: Albert Einstein College of Medicine Bronx, NY 10461

United States Army Logistics Integration Agency (USALIA)

Inferring Patterns in Network Traffic: Time Scales and Variation

DoD CIO Interoperability Process

SE Tools Overview & Advanced Systems Engineering Lab (ASEL)

Ranked Set Sampling: a combination of statistics & expert judgment

USMC Environmental and Corrosion Control Issues. Andrew Sheetz USMC CPAC Engineering Manager

Analytics at the Institute for Defense Analyses (IDA)

Fort Belvoir Compliance-Focused EMS. E2S2 Symposium Session June 16, 2010

Integrated Systems Engineering and Test & Evaluation. Paul Waters AIR FORCE FLIGHT TEST CENTER EDWARDS AFB, CA. 16 August 2011

CMMI Level 2 for Practitioners: A Focused Course for Your Level 2 Efforts

22 nd Annual Systems & Software Technology Conference. Salt Lake City, Utah April 2010

US Naval Open Systems Architecture Strategy

Applying Software Architecture Principles in a DoD Acquisition

Issues in Using a Process as a Game Changer

Traditional Project. Can t We All Get Along

Transcription:

INSTITUTE FOR DEFENSE ANALYSES Agility C2 Approach Autonomy David S. Alberts Kathy Conley April 2015 Approved for public release; distribution is unlimited. Log: H 15-000491 IDA Document NS D-5499 INSTITUTE FOR DEFENSE ANALYSES 4850 Mark Center Drive Alexandria, Virginia 22311-1882

About This Publication The views, opinions, and findings should not be construed as representing the official position of either the Department of Defense or the sponsoring organization. Copyright Notice 2015 Institute for Defense Analyses 4850 Mark Center Drive, Alexandria, Virginia 22311-1882 (703) 845-2000. This material may be reproduced by or for the U.S. Government pursuant to the copyright license under the clause at DFARS 252.227-7013 (a)(16) [Sep 2011].

INSTITUTE FOR DEFENSE ANALYSES IDA NS D-5499 Agility C2 Approach Autonomy David S. Alberts Kathy Conley

Agility C2 Approach Autonomy Concepts and Challenges David SAlberts Kathy Conley Institute for Defense Analyses prepared for DSB Summer Study on Autonomy April 30, 2015 Presentation Overview Review the evolution of command and control concepts and approaches in response to Desire to take advantage of the power of information age technologies Need to respond to the complexities of 21 st mission challenges Suggest that recent developments in C2 theory and concepts provide an appropriate conceptual framework for thinking about how to design autonomous systems and integrate them into operations 2 1

Do we need to change our approach to C2? Advancing Technology opportunities requirements Changing Missions and Environments the future of the military enterprise Theory suggestions experiences State of the Practice 3 Yes We Need New C2 Approaches Legacy approaches to C2 are insufficient because: They cannot satisfy critical mission requirements They can not fully leverage increasingly automated / autonomous capabilities We have an opportunity to do C2 differently because: The economics of C2 related technologies have changed significantly They continue to change at a rapid pace We now understand how to deliberately manipulate C2 But, new approaches to C2 will not arise naturally Long held assumptions impede the design, development, and adoption of new approaches 4 2

C2 Approach Space There are a great many possible approaches to accomplishing the functions that we associate with Command and Control. Developing the option space for Command and Control requires that major differences between possible approaches are identified. Centralized v. Decentralized Fixed Vertical Stovepipes v. Dynamic Task Organized Limited information dissemination (need to know) v. broad dissemination (need to share) These difference are reflected in the dimensions of the C2 Approach Space (options available) Allocation of Decision Rights (within an entity or to the collective) Patterns of Interaction Distribution of Information 5 The C2 Approach Space 6 3

NATO C2 Conceptual Reference Model* An approach to C2 determines the nature of the endeavor, the way individuals and organizations relate to one another, and determines the information positions of all participants C2 Approach Sensemaking Individual Characteristics & Behaviors Team Characteristics & Behaviors Awareness & Understanding Shared Awareness & Understanding Decision Making Decisions Actions -Intent -Roles -Relationships -Information flows -ROE -Resources Information Information Collection & Dissemination Direct Effects Consequences State (t), State (t+ t) *NATO NEC2 Short SAS 050 Course Module 1 Traditional C 2 33 7 Network Enabled C2 Approaches Broad None Unconstrained Edge C2 Approach Collaborative C2 Approach Coordinated C2 Approach Tightly Constrained None De-Conflicted C2 Approach Conflicted C2 Approach Broad Source: SAS 065 NATO NEC C2 Maturity Model 8 4

Network Enabled C2 Approaches Broad None Unconstrained Edge C2 Approach Collaborative C2 Approach Coordinated C2 Approach Tightly Constrained None De-Conflicted C2 Approach Conflicted C2 Approach Broad Source: SAS 065 NATO NEC C2 Maturity Model 9 Harmonizing a Mix of C2 Approaches within an enterprise or a collective Collaborative Edge Classic Hierarchy 10 5

Harmonizing a Mix of C2 Approaches within an enterprise or a collective How does the approach to C2 practiced by one entity (unit or system) affect the ability of the Enterprise to function? -How does Collaborative it affect the distribution of information? - How does it change the patterns of interactions? -What happens when an entity does not cede any decision rights to the enterprise? Edge Classic Hierarchy 11 C2 Shapes and Employs C2 both shapes the force and employs it Shaping is C2 at the Enterprise level Creates the Force Determines Capabilities over time Shaping Determines What is Possible Employing Determines the What and How of an Operation Employing is C2 at the Mission level Establishes Intent Creates/Instantiates a Mission Capability Package at time t for purpose p C2 creates the initial conditions for an operation and dynamically adjusts 12 6

Complex Endeavors and Enterprises Complex Endeavors are characterized by multidimensional, interdependent effects spaces and profound levels of uncertainty Complex Endeavors involve Complex Enterprises, a heterogeneous collection of networked military and civilian partners and systems that each can function with varying degrees of autonomy (a multi genre, composite network) There will, of necessity, need to be multiple approaches to C2 and the processes that support C2 Operations, to be effective, will require developing synergies between and among the actions taken by individual entities and collections of entities (human and machine ) Complexity, with in inherent lack of predictability greatly increases the need for and value of Agility 13 Agility Agility is the capability to successfully effect, cope with, and/or exploit changes in missions and circumstances. Its enablers include: Responsiveness Versatility Flexibility Resilience Adaptability Innovativeness Agility is a necessary response to growing mission complexity and uncertainty and have expressed a desire for more agile forces Agility is applicable to individuals, organizations, material, systems, and collections of these Agility is much too important to be left to chance 14 7

C2 Agility Step 1: Adopt the Appropriate Approach Endeavor Space C2 Approach Space This is a most appropriate C2 Approach for this particular mission and set of circumstances 15 C2 Agility Step 2: Adapt C2 Approach as Circumstances Change Endeavor Space C2 Approach Space When circumstances change, a different C2 Approach may be more appropriate. 16 8

C2 Agility C2 Agility = f (C2 Approach Agility, C2 Maneuver Agility) Endeavor Space C2 Agility C2 Approach Agility is the area of the region in the Endeavor Space where an entity can operate successfully by employing a given approach to C2 C2 Maneuver Agility is the ability to recognize the C2 approach appropriate for the circumstances and transition to this approach in a timely manner. It is a function of the set of C2 Approaches available to the entity. Set of Available C2 Approaches 17 Traditional v Agile C2 Traditional C2 Agile C2 Approach one way set of options Decision Rights limited delegation of decision rights as appropriate Interactions prescribed interactions tailored Information Dissemination System Requirements limited need to know point to point support established processes access as appropriate need to share network support emergent processes 18 9

Traditional v Agile C2 Which approach is more appropriate for autonomous forces? Traditional C2 Agile C2 Approach one way set of options Decision Rights limited delegation of decision rights as appropriate Interactions prescribed interactions tailored Information Dissemination System Requirements limited need to know point to point support established processes access as appropriate need to share network support emergent processes 19 C2 Research and Analysis Findings No single approach to accomplishing the functions associated with C2 fits all missions or situations whether for a single entity or a collection of interdependent entities Thus, the most network enabled approach is not always the most appropriate Rather, the most appropriate approach will be a function of the endeavor and the prevailing condition and circumstances The manifested C2 Approach can be significantly difference from the intended C2 Approach due to conditions and circumstances Therefore, Entities will need to be able to appropriately employ more than one C2 approach and monitor it Collections of interdependent entities will need to harmonize their approaches to C2 20 10

Comparative Agility Map for Organization Approach options Organization Approach Options Edge Collaborative Coordinated De-conflicted Endeavor Space with varying conditions of signal to noise and with varying requirements for shared situation awareness and response time Source: Alberts, D.S. The Agility Imperative, 2010 Part V: Agility Experiments 21 Simulation Results Base C2 Approach S Development Time (Days) 40 30 20 10 0 Average Joint Targeting List (JTL) Target Development Time JTLSimple JTLMedium JTLHard Location/Target Type S Start point currently: Target Folders are distributed for development through e mail (fixed allocation) and the decision boards follow a specific timetable (no targets getting vetted/validated outside this process) # of Target Folders 120 100 80 60 40 20 0 AFTC Targeteer Resource Utilization AOC Targeteer Coalition Targeteer JFC Targeteer JRISE Targeteer 22 11

New, Co Evolved C2 Approach N S Allow for priority targets to be vetted/validated outside standard operating procedure (as ready v. specific time) and resources to be assigned based on utilization (shared folder v. email) Development Time (Days) 8 6 4 2 0 N Average Priority Target Development Time PriorityTgtDevTime Development Time (Days) 40 35 30 25 20 15 10 5 0 120 100 80 60 40 20 0 Average JTL Targeting Development Time JTLSimple JTLMedium JTLHard AFTC Targeteer Resource Utilization AOC Targeteer Coalition Targeteer JFC Targeteer Overall JTL & Priority Target Development Time Decreases and Resource Utilization Levels out # of Target Folders S N JRISE Targeteer 23 C2, Automation and Autonomy Automation involves the delegation of selected decision rights to agents that operate within specified rules of engagement (doctrine) Autonomy is the delegation of decision rights within the context of command intent Applies to humans, robots, and software agents Can command intent be dynamic? Both can be thought of in terms of the C2 Approach Space Their accesses to information How they interact with other automated entities and/or human (human in the loop v. human on the loop ) Both automated and autonomous entities can possess varying degrees of Agility 24 12

C2 Questions Relevant to Autonomy Operational Approach Strategic End State Purpose End State Relevant Actors C2 Approach Decision Rights Interactions Access to Information Authorities clear? Decision rights allocated appropriately? Right relationships established? Adequate collaboration? Information flowing appropriately? Source: C2 by Design, DoD CCRP (2015) p. 27 25 Thanks for your attention. Questions? Comments? 26 13

Assessing the C2 Approach 13 Are we doing things right? Are we doing the right things? CC2IR 13 CCRP, C2 by Design, pg 26. 27 C2 Questions Relevant to Autonomy 14 Can be derived from the Strategic End State Are we doing the right things? C2 Method C2 Approach C2 Activities Are we doing things right? 14 CCRP, C2 by Design, pg 27. 28 14

Tenets of NCW NCW provides opportunities to employ new C2 approaches and warfighting concepts A robustly networked force* improves Information Sharing Information Sharing and Collaboration enhances Quality of Information and Shared Situational Awareness Shared situational awareness enables Collaboration and Self-synchronization These, in turn, dramatically increase mission effectiveness. * Networking the Force entails much more than providing connectivity among force components. It involves the development of distributed collaboration processes designed to ensure that all pertinent available information is shared and that all appropriate assets can be brought to bear Network Centric Warfare Report to the Congress March 2001 29 C2 and NCW NCW, in its most mature form, involves profound changes in the role of a commander and the relationships between a commander, a commander s staff, subordinates, and superiors. 30 15

C2 and NCW Automation / Autonomy NCW, in its most mature form, involves profound changes in the role of a commander and the relationships between a commander, a commander s staff, subordinates, and superiors. 31 Evidence Continues to Accumulate a few examples NCW book provided examples of how leveraging shared awareness results in increased combat power http://www.dodccrp.org/files/alberts_ncw.pdf NATO SAS 065 reports on cases studies and experiments that address the link between various C2 approaches and mission success http://www.dodccrp.org/files/n2c2m2_web_optimized.pdf NATO SAS 085 provides results from case studies and from an analysis of data from a variety of experiments that support the need for more network enabled and agile C2 C2 by Design contains supporting evidence C2 Re envisioned: The Future of the Enterprise provides an analysis of C2 failures and successes http://www.crcpress.com/product/isbn/9781466595804 NATO SAS 104 is currently working to help member nations and NATO organizations create awareness of C2 Agility and is gathering evidence of its mission impacts http://www.dodccrp test.org/sas 104 http://www.dodccrp.org/html4/sas 085.html http://www.dodccrp.org/files/c2agility_handbook.pdf 32 16

Challenges Make the leap from thinking about the network as ICT to thinking in terms of a multi genre composite network that needs to be designed and operated in an integrated fashion Move beyond optimizing C2 for a given mission or scenario to developing more agile C2 Approaches and learning to maneuver in the C2 Approach Space Forge the partnerships necessary to create a transformation ecosystem linking research, analysis, experimentation, concept development and doctrine, education and training, acquisition, force development, and lessons learned Undertake real experimentation and exercises that are not scripted but that are properly instrumented, create unfamiliar situations, and stress people, processes and systems 33 Challenges: The Science of C2 Recognize that the performance and behaviors of communications, information, and C2 networks and their embedded automated processes are inter dependent and can not be studied in isolation Recognize that these networks are subject to damage and a variety of stresses that can cascade within individual networks and across network boundaries Appreciate that C2 is not an end unto itself but needs to be considered in mission and enterprise terms Recognize that automated processes constitute a delegation of decision rights and the need to find an appropriate balance The tenets of NCW apply to the research community every bit as much as they do to the operational community 34 17

REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD- MM- YY) 2. REPORT TYPE 3. DATES COVERED (From To) xx-4-2015 Final 4. TITLE AND SUBTITLE 5 a. CONTRACT NO. C2 Approach Agility Autonomy HQ0034-14-D-0001 5 b. GRANT NO. 5 c. PROGRAM ELEMENT NO(S). 6. AUTHOR(S) 5 d. PROJECT NO. David S. Alberts, Kathy Conley 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Institute for Defense Analyses 4850 Mark Center Drive Alexandria, VA 22311-1882 5 e. TASK NO. SFRDOH 5 f. WORK UNIT NO. 8. PERFORMING ORGANIZATION REPORT NO. IDA NS Document D-5499 H 15-000491 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR S / MONITOR S ACRONYM(S) Institute for Defense Analyses 4850 Mark Center Drive Alexandria, VA 22311-1882 IDA 11. SPONSOR S / MONITOR S REPORT NO(S). 12. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release; distribution is unlimited. 13. SUPPLEMENTARY NOTES 14. ABSTRACT Autonomy is, in fact, an approach to command and control (C2) as it involves a delegation of decision rights to the autonomous entity and with it, either implicitly or explicitly, access to information. Agility has been shown to be a function of the approach to C2. Thus, these three concepts are intimately related. As a result of the inter-relationships that exist, the conceptual framework developed by the DoD Command and Control Research Program with its international partners over the years provides a systematic way to think about and assess autonomy options.. 15. SUBJECT TERMS C2, Agility, Autonomy 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NO. OF PAGES 17 19a. NAME OF RESPONSIBLE PERSON David S. Alberts a. REPORT b. ABSTRACT c. THIS PAGE 19b. TELEPHONE NUMBER (Include Area U U U Code) 703-845-2411