This thesis examines the structure and functions of a generalized tactical intelligence collection system. Included are its position in the intelligence system structure, relationship with other activities in the intelligence system, and the organization and control of its components. A mathematical optimization model of a simplified intelligence collection system is developed to explore several issues related to intelligence collection. An interactive multiattribute decision aid useful in the...
Topics: Tactical intelligence, Intelligence collection management, Intelligence collection model,...
This research explores use of executable architectures to guide design decisions in the early stages of system development. Decisions made early in the system development cycle determine a majority of the total lifecycle costs as well as establish a baseline for long term system performance and thus it is vital to program success to choose favorable design alternatives. The development of a representative architecture followed the Architecture Based Evaluation Process as it provides a logical...
Topics: DTIC Archive, Popisal,Ryan M, Air Force Institute of Technology WPAFB United States, TACTICAL...
This thesis is an investigation into the value of intelligence on enemy position and strength during a simulated battle experience. An experiment was conducted to determine if there was an amount of intelligence which could statistically be shown to be optimal, with more or less intelligence resulting in a degradation in performance by the decision maker. A variation of chess was utilized as the basic war gaming model. Subjects were provided different levels of intelligence on the enemy's...
Topics: DTIC Archive, O'Bryant,K M, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *TACTICAL INTELLIGENCE,...
This thesis examines the structure and functions of a generalized intelligence collection system. Included are its position in the intelligence system structure, relationship with other activities in the intelligence system, and the organization and control of its components. A mathematical optimization model of a simplified intelligence collection system is developed to explore several issues related to intelligence collection. An interactive multiattribute decision aid useful in the...
Topics: DTIC Archive, Gandy,T A, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *MILITARY INTELLIGENCE, *TACTICAL...
ICTAP CHARTER Purpose: Forum for principal managers at TACOM and Senior Executives from industry and review issues of common interest concerns OBJECTIVES: Forum for discussion and exchange of views Feedback from senior industry representatives Discuss DoD, Army and TACOM Policies Discuss emerging issues in Government and try which affect readiness of tank/automotive is systems
Topics: DTIC Archive, NATIONAL DEFENSE INDUSTRIAL ASSOCIATIONARLINGTON VA, *OPERATIONAL READINESS,...
This final report on the Audit of Unattended Ground Sensor Systems is for your information and use. Comments on the draft were considered in preparing the final report and changes have been made where appropriate. We performed the audit from February through August 1990. The objective was to evaluate a DoD Hotline complaint alleging mismanagement, waste, and abuse in the acquisition of the Marine Corps Tactical Remote Sensor System (TRSS). Also, we evaluated management of the Army's Improved...
Topics: DTIC Archive, INSPECTOR GENERAL DEPT OF DEFENSE ARLINGTON VA, *GROUND LEVEL, *DETECTORS,...
The increasing demand for the United Nations (UN) intervention in peacekeeping operation has caused the UN to reconsider the lifelong objection it has had against collecting intelligence information against any nation state. The United States (U.S.) historically provided the UN with critical national level intelligence. The last two United States administrations took a proactive stance trying to initiate reforms in a number of UN functions. Intelligence is one of the area's prime for change....
Topics: DTIC Archive, Davidson, Ronald, ARMY WAR COLL CARLISLE BARRACKS PA, *MILITARY INTELLIGENCE, *UNITED...
As requested, we reviewed the Army Mohawk surveillance system's (1) cost, (2) phase-out schedule, (3) planned upgrade, (4) alternatives to the upgrade, and (5) the status of other moving target surveillance systems. Although the Army recently terminated the planned upgrade, we are reporting the results of our analysis in the case the schedules for other planned moving target surveillance systems slip and the Army reconsiders the Mohawk upgrade to cover the capability gap. (rh)
Topics: DTIC Archive, GENERAL ACCOUNTING OFFICE WASHINGTON DC NATIONAL SECURITY AND INTERNATIONAL AFFAIRS...
Its provisions cover all DoD elements engaged in institutional general intelligence and general intelligence-related training that support operations contained in the General Defense Intelligence Program (GDIP), Tactical Intelligence and Related Activities (TIARA), and other noncryptologic intelligence support commitments.
Topics: DTIC Archive, OFFICE OF THE UNDER SECRETARY OF DEFENSE RESEARCH AND ENGINEERING WASHINGTON DC,...
We address the problem of finding an unbiased estimate of the battlefield state given that the data available is dynamic, noisy, and given in a multiplicity of representations. The approach proposed in the study is unique because it does not attempt to transform the data to a common representation. Rather we establish a framework which we call the Multiple Agent Hybrid Estimation Architecture (MAHEA) in which we allow heterogeneous data to flow between individual agents in the network to...
Topics: DTIC Archive, Kohn, Wolf, INTERMETRICS INC BURLINGTON MA, *DATA FUSION, *TACTICAL INTELLIGENCE,...
Commanders require relevant information about background information in order to exercise effective command and control (C2). METT-TC factors (Mission, Enemy, Terrain & Weather, Troops, Time Available and Civil Considerations) represent the canonical, militarily significant background against which information is evaluated and military decisions are made. If this background is to be encoded, shared, and, ultimately, processed and reasoned about by computers or computer-assisted C2 systems,...
Topics: DTIC Archive, Ulicny, Brian, VISTOLOGY INC FRAMINGHAM MA, *COMMAND CONTROL COMMUNICATIONS,...
Commanders require relevant information about background information in order to exercise effective command and control (C2). METT-TC factors (Mission, Enemy, Terrain & Weather, Troops, Time Available and Civil Considerations) represent the canonical, militarily significant background against which information is evaluated and military decisions are made. If this background is to be encoded, shared, and, ultimately, processed and reasoned about by computers or computer-assisted C2 systems,...
Topics: DTIC Archive, Ulicny, Brian, VISTOLOGY INC FRAMINGHAM MA, *COMMAND CONTROL COMMUNICATIONS,...
The U.S. Army is in urgent need of improved methods of modeling Intelligent and Electronic Warfare (IEW) in its battlefield simulations. We present a detailed methodology for modeling the all source fusion part of IEW. The approach draws on Artificial Intelligence techniques that have been used to successfully model human expertise in a variety of areas. A rule-based architecture with highly structured knowledge and data representations is developed. It will automatically correlate and...
Topics: DTIC Archive, Antonisse,H J, MITRE CORP MCLEAN VA MITRE C3I DIV, *Military intelligence,...
Topics: DTIC Archive, Harvey, Charles, NAVAL WAR COLL NEWPORT RI, *MILITARY DOCTRINE, *MILITARY TACTICS,...
One of the primary tools available to a Joint Commander-in-Chief (CINC) for training his staff on their joint mission essential tasks is a command post exercise (CPX) supported by a computer simulation model. This is commonly referred to as a Computer Aided Exercise (CAX). Computer Aided Exercises are an essential part of training a component staff; however, one weakness with these valuable tools lies in the measurement of the level of training received by the players. In most CPXs the players...
Topics: DTIC Archive, Gordon, Kerry T., NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *MILITARY EXERCISES,...
This report consists of a viewgraph presentation summarizing comparisons of data from several earth observation sensors. Text annotations only are included.
Topics: DTIC Archive, Tyler, William A., ENVIRONMENTAL RESEARCH INST OF MICHIGAN ANN ARBOR, *IMAGE...
One of the major strengths of the U.S. Army conventional force, and its doctrinal methods, is the ability to conduct operational and tactical maneuver out of contact with an enemy force. This allows the U.S. to decide the time, place, and conditions of contact. Under this system national, strategic, and operational intelligence systems generate, analyze, and disseminate intelligence to maneuver units. When major conventional operations conclude, or in operations where they never take place,...
Topics: DTIC Archive, Masson, Scott R, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *OPERATIONAL EFFECTIVENESS,...
The objective was to assess management controls and compliance with laws and regulations over automated data processing equipment in the physical possession of NORAD and USSPACECOM.
Topics: DTIC Archive, INSPECTOR GENERAL DEPT OF DEFENSE ARLINGTON VA, *MANAGEMENT INFORMATION SYSTEMS,...
Activity-based intelligence (ABI) is a discipline of intelligence where the analysis and subsequent collection are focused on the activity and transactions associated with an entity, a population or an area of interest. It is considered a new intelligence tradecraft. This report offers a survey of algorithmic-level literature that has been directly applied to ABI analysis. Areas considered include, ABI- and tactical intelligence-specific approaches, approaches for assessing stages of political...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF ELECTRICAL AND COMPUTER ENGINEERING,...
The Assistant Chief of Staff, G2, has been serving American combat commanders for over fifty years. The duty is complex and demanding, and considered by many as the epitome of the tactical intelligence profession. Nevertheless, the military intelligence community has generated very little literature describing the G2 experience. Generations of new G2s have undertaken this duty armed with only their own experiences as preparation. This paper describes one G2's experience. It serves primarily to...
Topics: DTIC Archive, Quirk, III, Richard J, ARMY WAR COLL CARLISLE BARRACKS PA, *MILITARY INTELLIGENCE,...
MISSION: Advocacy within the Intelligence Community is required to focus the proper attention on open source issues and opportunities. The STIC-OSS Mission is fourfold: (1) Advocate open source information and the formation of DCI level advocacy committees or mechanisms; (2) Advocate the development and use of analytical tools to cope with the volume of textual information; (3) Provide a forum for representations of the technical analysis community to share information about open source...
Topics: DTIC Archive, CENTRAL INTELLIGENCE AGENCY WASHINGTONDC SCIENTIFIC AND TECHNICAL INTELLIGENCE...
The thesis of this article is that strategic surprise is difficult to prevent, even in the face of accurate and timely intelligence (including overhead imagery), because it is based on exploiting a leader's or nation's personality and characteristics as well as the bureaucracies that serve them. Historical evidence seems to indicate that strategic surprise in the twentieth century has rarely been prevented despite a plethora of available intelligence. If the presence of reliable and timely...
Topics: DTIC Archive, O'Leary, Jeffrey, AIR WAR COLL MAXWELL AFB AL, *MILITARY INTELLIGENCE, *COMBAT...
This report provides a descriptive summary of the results of the terrain and concept development phase of the BSI contract with IBM. It sets forth an operational concept for the use of IPB products in real time and describes the demonstrations that displayed the use of automated terrain data. The report advances the thesis that IPB(A) provides a standard analytical methodology for the integrated evaluation of the three factors of combat intelligence: enemy, weather and terrain. It serves as a...
Topics: DTIC Archive, IBM FEDERAL SYSTEMS DIV ARLINGTON VA, *BATTLEFIELDS, *TACTICAL INTELLIGENCE,...
Topics: DTIC Archive, Simon, Jeffrey D, RAND CORP SANTA MONICA CA, *COUNTERMEASURES, *TERRORISM, *PUBLIC...
Joint Stars is a joint Air Force and Army wide-area surveillance and target attack radar system being designed to detect, track, classify, and support the attack of moving and stationary ground targets. The program consists of air and ground segments; refurbished 707 aircraft (designated the E-8) equipped with radar, operation and control, data processing, and communications subsystems, as well as ground stations equipped with communications and data processing subsystems. The program is...
Topics: DTIC Archive, GENERAL ACCOUNTING OFFICE WASHINGTON DC NATIONAL SECURITY AND INTERNATIONAL AFFAIRS...
The purpose of this article is to describe the principles of the fair use doctrine and the legal authorities on which the doctrine is based and to explain why most Army intelligence uses of copyrighted material fall under the fair use doctrine.
Topics: DTIC Archive, Bowman, Gary M, JUDGE ADVOCATE GENERAL'S SCHOOL CHARLOTTESVILLE VA, *DOCTRINE,...
This study is an historical analysis of the Chinese Communist intervention in the Korean War from the perspective of the intelligence available to General Douglas MacArthur prior to the Chinese Communist counteroffensive. It answers whether MacArthur should have known his drive toward the Yalu River would provoke the Chinese Communists' overt military intervention in the Korean War on 25 November 1950. This thesis considers the significant, credible intelligence available to the various levels...
Topics: DTIC Archive, Bremer, August W , Jr, ARMY COMMAND AND GENERAL STAFF COLL FORT LEAVENWORTH KS,...
The increasing sophistication of intelligence collection and analysis systems has given US decision makers a powerful tool to evaluate the actions and intentions of our potential adversaries. At the same time, however, these advances have in some respects increased our susceptability to the skillful use of cover and deception techniques. Throughout history, the potential success of Cover and Deception (C & D) operations has been determined soley by the skill of the practitioner, regardless...
Topics: DTIC Archive, Goldsmith, R. P., Gerenz, R. F., BETAC CORP NORTH BILLERICA MA, *DECISION MAKING,...
This study examines how Lieutenant General Ulysses S. Grant and the Army of the Potomac used tactical intelligence during the Overland Campaign. Although Grant did not achieve his operational objective to defeat General Robert E. Lee in the field, tactical intelligence allowed him to continue the operational maneuver of the Army of the Potomac, which later contributed to the eventual defeat of Lee in April of 1865. The examination of tactical intelligence in the Army of the Potomac covers the...
Topics: DTIC Archive, Morgan, Todd T, ARMY COMMAND AND GENERAL STAFF COLL FORT LEAVENWORTH KS, *MILITARY...
This document is the Final Report for the referenced contract, AI techniques for Plan Revision. It presents the INTACVAL aiding concept and the details of implementation of the INTACVAL system prototype. The report integrates the reporting requirements for the User's Manual (A004), Knowledge Base Manual (A005), and System Manual (A006), as well at the Final Report (A002) . Keywords: Artificial intelligence; Decision aids; Tactical planning aids; Intelligent tactical planning.
Topics: DTIC Archive, Brenner, Mayer A, PERCEPTRONICS INC WOODLAND HILLS CA, *DECISION AIDS, *PROTOTYPES,...
The current explosion of information technologies has had a broad impact on the manner in which all of the Service and Intelligence community organizations conduct business. The use of geospatial information and services in the geographic intelligence arena is in its infancy, but growing rapidly. The formation of the National Imagery and Mapping Agency (NIMA) in October 1996, fundamentally changed the means by which the National Command Authority (NCA) and Commander-in-Chiefs (CINC's) exploit...
Topics: DTIC Archive, Eyes, Douglas J., NAVAL WAR COLL NEWPORT RI, *AERIAL RECONNAISSANCE, *MILITARY...
In the post Cold War environment, the threats to the United States have grown increasingly complex, dynamic, and uncertain. This new security paradigm poses significant challenges to military intelligence in dealing with a wider array of threats than during the Cold War. At the same time, the information technology revolution offers unbound opportunities to meet these new challenges. This paper will examine how the Army Military Intelligence Corps might reorganize its tactical intelligence...
Topics: DTIC Archive, Chiu, John M, ARMY WAR COLL CARLISLE BARRACKS PA, *ARMY INTELLIGENCE, DEPLOYMENT,...
How can nuclear powered submarines (SSNs) contribute to joint force protection? Are these submarines essential to a joint force commander's concept of operations? Would their absence significantly alter his branch and sequel plans? Although SSNs represent a significant combat capability, do they possess the necessary range of capabilities to enhance operational protection in a given theater? SSNs can be a force multiplier in the right scenario. 'The modern attack submarine is a versatile...
Topics: DTIC Archive, Govan, Dale R., NAVAL WAR COLL NEWPORT RI, *TACTICAL INTELLIGENCE, *NUCLEAR POWERED...
AI/ENCOA is a prototype decision aid designed to assist Army tactical intelligence analysts in evaluating alternative Enemy Courses of Action. AI/ ENCOA combines the use of additive Multi-attribute Utility (MAU) models for course of action evaluation with rule-based procedures for assigning parameter values (scores and weights) to the MAU model. AI/ENCOA is composed of two parts: a generic software package that implements a combined AI/MAU architecture, and two COA 'rule bases' for evaluating...
Topics: DTIC Archive, Lehner, Paul E, PAR TECHNOLOGY CORP MCLEAN VA, *DECISION MAKING, *TACTICAL...
This study examines the financial feasibility, technological improvements, and construction procedures that are occurring in the space industry with respect to the feasibility of developing a small lightweight tactical intelligence, surveillance, and reconnaissance (ISR) satellite system dedicated to the warfighter. The current space based ISR support to the warfighter is through systems that were designed and built to support the National Command Authority (NCA) and the strategic level. The...
Topics: DTIC Archive, Hodge, Donald M., ARMY COMMAND AND GENERAL STAFF COLL FORT LEAVENWORTH KS, *FINANCIAL...
This paper addresses the problem of developing an expert system to aid the G2 intelligence analyst in performing the tactical indications of warning task. These include assimilating numerous reports based on sensor and intelligence data (in signal and symbol form); combining such knowledge with information pertaining to terrain, weather patterns, enemy organization, equipment and general capabilities; and predicting significant events in a battlefield environment such as numerical changes of...
Topics: DTIC Archive, Kiremidjian, G, Clarkson, Albert, Lenat, Douglas, ESL INC SUNNYVALE CA, *INFORMATION...
Military Deception has been a component of warfare throughout history, and evidence shows that it is usually successful, despite the best efforts of the target to detect the intentions and capabilities of the deceiver. Such notable military thinkers as Sun Tzu and Clausewitz have written about the merits of deception, indicating that when applied successfully, it can enable smaller, weaker forces to master larger, stronger forces. Analysis of historical cases proves that the most successful...
Topics: DTIC Archive, McNair, Philip A., NAVAL WAR COLL NEWPORT RI, *MILITARY COMMANDERS, *DECEPTION,...
The second volume of this three-volume report discusses the JAWP's participation in Millennium Challenge 00 (Appendix D), and the JAWP development of an operational concept and implementation plan for a Joint Strike Force (JSF) during FY2OOO (Appendices E and F, respectively). The JSF is a rapidly deployable joint combat force capable of achieving national security objectives in small-scale contingencies. Described are the motivation for developing a JSF, the perceived short-falls in existing...
Topics: DTIC Archive, INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA JOINT ADVANCED WARFIGHTING PROGRAM,...
The absence of an operational level Intelligence Preparation of the Battlefield (IPB) for SOF, which fuses national and theater level intelligence with tactical intelligence, hinders the capability of a Joint Forces Commander (JFC) and Joint Task Force Commander (JTF) to effectively support the critical intelligence requests and requirements of a Joint Special Operations Task Force (JSOTF) and its SOF components.
Topics: DTIC Archive, Don, Peter J, NAVAL WAR COLL NEWPORT RI JOINT MILITARY OPERATIONS DEPT, *MILITARY...
This document summarizes two days of discussion between a number of cognitive and behavioural scientists and professional intelligence analysts from 12 countries and a multilateral organization, which was co-hosted in Ottawa by DRDC, Canada's Privy Council Office, and the US Department of State, February 23-24, 2009. This experimental roundtable explored the question of whether and how behavioural and cognitive sciences can contribute to improved intelligence analysis. It concluded that there...
Topics: DTIC Archive, DEFENCE RESEARCH AND DEVELOPMENT TORONTO (CANADA), *BEHAVIORAL SCIENCES,...
This study examines the tactical intelligence effort for Operations RESTORE HOPE and CONTINUE HOPE in Somalia from December 1992 to 31 March 1994. The doctrinal principles for intelligence support to force projection operations provide the framework for the examination of tactical intelligence support in Somalia. The doctrinal principles of intelligence support for force projection operations are: 'the commander drives intelligence'; 'intelligence synchronization'; 'split-based operations';...
Topics: DTIC Archive, Stuteville, James M., ARMY COMMAND AND GENERAL STAFF COLL FORT LEAVENWORTH KS,...
The Tactical Signal Intelligence (SIGINT) Technology (TST) program objective was to develop optically controlled positive-intrinsic negative (PIN) diode radio frequency (RF) switches and demonstrate their feasibility to enhance electromagnetic interference (EMI) immunity, sensitivity, speed, and reliability in front-end SIGINT systems. Project members surveyed, analyzed, and selected U.S. Army, Air Force, and Navy SIGINT systems for optoelectronic switch development goals; developed switch...
Topics: DTIC Archive, Jacobs, W, SPACE AND NAVAL WARFARE SYSTEMS CENTER SAN DIEGO CA, *OPTICAL SWITCHING,...
content="Hydrology, Limnology and Potamology, Civil Engineering">
Topics: DTIC Archive, Coward, John R, ARMY MISSILE COMMAND REDSTONE ARSENAL AL, *DATA PROCESSING SECURITY,...
This article discusses the Navy's development of the C4I system Copernicus. The Navy's goal is to make Copernicus the pillar for Naval C4I responsive to warfighers; to field these systems quickly; to capitalize on advances in technology; and to shape Naval doctrine to reflect these changes. Designed as a user-centered C4I architecture it provided a blueprint for capturing technological change. It answered critical C4I problems and articulated the essence of modern command and control.
Topics: DTIC Archive, OFFICE OF THE CHIEF OF NAVAL OPERATIONSWASHINGTON DC, *COMMAND AND CONTROL SYSTEMS,...
Since Operation DESERT STORM, the military community has been engaged in a wide ranging dialog regarding introduction of advanced technology to the battlefield. Much of this discussion has focused on sophisticated command, control, communication, and computer systems and their effect on the manner in which the United States wages war. The ongoing 'C4I For The Warrior' program (C4IFTW) is a living reminder of the direction in which the armed services are moving. C4IFTW carries with it a vision...
Topics: DTIC Archive, Bean, David F., NAVAL WAR COLL NEWPORT RI, *COMMAND AND CONTROL SYSTEMS, *TACTICAL...
Deception is a traditional component of political and military conflict. Indeed, many argue that it is intrinsic to all human interaction. It is sometimes mistakenly confused with unintentional confusion or misinformation. Disinformation, intentional deception, should not be confused with misinformation. Deception depends on two criteria: first, it is intentional; and, second, it is designed to gain an advantage for the practitioner. Deception in the forms of concealment and activity designed...
Topics: DTIC Archive, Caddell, Joseph W, ARMY WAR COLL STRATEGIC STUDIES INST CARLISLE BARRACKS PA,...
The Composite Event Detection and Monitoring System (CEDMOS) addresses a need for a general, domain independent event processing technology. CEDMOS recognizes patterns of events called complex events according to user authored event specifications. CEDMOS is a general event processing technology that includes: (1) a core infrastructure for event detection which implements a general, efficient event processing mode; (2) a graphical programming environment for the creation and manipulation of...
Topics: DTIC Archive, Baker, Donald, MICROELECTRONICS AND COMPUTER TECHNOLOGY CORP AUSTIN TX, *TACTICAL...
The Army has embarked upon a coordinated program to develop and field a collection of automated command control, communications, and intelligence (C3I) systems to provide the effective battle management that is required if we ar to overcome the numerical superiority of the Soviet Block. The Army Battlefield Interface Concept 1979 (1) describes the basic architecture for integrating these systems into a functional and interoperating network. The purpose of this paper is to discuss some of the...
Topics: DTIC Archive, Banister,Grady H, ARMY ELECTRONIC PROVING GROUND FORT HUACHUCA AZ, *COMMUNICATIONS...
Current Army and Air Force doctrine concedes strategic surprise in the face of overhead surveillance. Has strategic surprise been eclipsed by the eye in the sky? This paper examines the nature, foundation and potential of strategic surprise. Further, it offers a military definition for the term 'surprise,' more relevant than the lexical one offered in Webster's Dictionary. Overall, there appears to be a fundamental misunderstanding of the nature of strategic surprise in AFM 1-1 and FM-100. The...
Topics: DTIC Archive, O'Leary, Jeffrey C, NAVAL WAR COLL NEWPORT RI, *MILITARY INTELLIGENCE, *MILITARY...
This report describes concepts, techniques, and results from experiments conducted using an experimental display device configured for display of map information and symbol presentations on a single viewing surface. (Author)
Topics: DTIC Archive, Bramley,Jenny, ARMY ENGINEER TOPOGRAPHIC LABS FORT BELVOIR VA, *TELEVISION DISPLAY...