Command and control
||The examples and perspective in this article may not represent a worldwide view of the subject. (April 2012)|
Older versions of U.S. Army FM 3-0 state: Command and control, or C2, in a military organization is the exercise of authority and direction by a properly designated commanding officer over assigned and attached forces in the accomplishment of the mission. The term may also refer to command and control systems within a military system.
The 1988 NATO definition: Command and control is the exercise of authority and direction by a properly designated [individual] over assigned [resources] in the accomplishment of a [common goal].
The Australian Defence Force definition is similar: C2 is the system empowering designated personnel to exercise lawful authority and direction over assigned forces for the accomplishment of missions and tasks. (The Australian doctrine goes on to state: The use of agreed terminology and definitions is fundamental to any C2 system and the development of joint doctrine and procedures. The definitions in the following paragraphs have some agreement internationally, although not every potential ally will use the terms with exactly the same meaning.)
Canadian defence scientists Ross Pigeau and Carol McCann discuss the issues and uncertainties related to the definition of command & control in their article in the Canadian Military Journal.
The U.S. Department of Defense Dictionary of Military and Associated Terms. defines command and control as: "The exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission. Also called C2. Source: JP 1".
Command and control functions are performed through an arrangement of personnel, equipment, communications, facilities, and procedures employed by a commander in planning, directing, coordinating, and controlling forces and operations in the accomplishment of the mission.
Commanding officers are assisted in executing these tasks by specialized staff officers and enlisted personnel. These military staff are a group of officers and enlisted personnel that provides a bi-directional flow of information between a commanding officer and subordinate military units.
The purpose of a military staff is mainly that of providing accurate, timely information which by category represents information on which command decisions are based. The key application is that of decisions that effectively manage unit resources. While information flow toward the commander is a priority, information that is useful or contingent in nature is communicated to lower staffs and units.
Computer security industry
This term is also in common use within the computer security industry and in the context of cyberwarfare. Here the term refers to the influence an attacker has over a compromised computer system that they control. For example, a valid usage of the term is to say that attackers use "command and control infrastructure" to issue "command and control instructions" to their victims. Advanced analysis of command and control methodologies can be used to identify attackers, associate attacks, and disrupt ongoing malicious activity.
There is a plethora of derivative terms which emphasise different aspects, uses and sub-domains of C2. These terms come with a plethora of associated abbreviations – for example, in addition to C2, command and control is also often abbreviated as C2, and sometimes as C&C.
Command and control have been coupled with
- Communication / Communications
- (Military) Intelligence
- Information / Information Systems
- Computers / Computing
- Target acquisition
- Combat systems
- Electronic Warfare
Some of the more common variations include:
- C2I – Command, Control & Intelligence
- C2I – Command, Control & Information (A less common usage)
- C2IS – Command and Control Information Systems
- C2ISR – C2I plus Surveillance and Reconnaissance
- C2ISTAR – C2 plus ISTAR (Intelligence, Surveillance, Target Acquisition, and Reconnaissance)
- C3 – Command, Control & Communication (Human activity focus)
- C3 – Command, Control & Communications (Technology focus)
- C3 – Consultation, Command, and Control [NATO]
- C3I – 4 possibilities; the most common is Command, Control, Communications & Intelligence
- C3ISTAR – C3 plus ISTAR
- C3ISREW – C2ISR plus Communications plus Electronic Warfare (Technology focus)
- C4, C4I, C4ISR, C4ISTAR, C4ISREW – plus Computers (Technology focus) or Computing (Human activity focus)
- C4I2 – Command, Control, Communications, Computers, Intelligence, and Interoperability
- C5I – Command, Control, Communications, Computers, Combat systems and Intelligence
- Command: The exercise of authority based upon certain knowledge to attain an objective.
- Control: The process of verifying and correcting activity such that the objective or goal of command is accomplished.
- Communication: Ability to exercise the necessary liaison to exercise effective command between tactical or strategic units to command.
- Computers: The computer systems and compatibility of computer systems. Also includes data processing.
- Intelligence: Includes collection as well as analysis and distribution of information.
Command and Control Centers
A Command and Control Center is typically a secure room or building in a government, military or prison facility that operates as the agency's dispatch center, surveillance monitoring center, coordination office and alarm monitoring center all in one. Command and control centers are operated by a government or municipal agency.
A command and control center that is used by a military unit in a deployed location is usually called a "command post". A warship has a Combat Information Center for tactical control of the ship's resources, but commanding a fleet or joint operation requires additional space for commanders and staff plus C4I facilities provided on a Flagship (e.g., aircraft carriers), sometimes a Command ship or upgraded logistics ship such as USS Coronado.
Command and control warfare
Command and control warfare encompasses all the military tactics that use communications technology. It can be abbreviated as C2W. An older name for these tactics is "signals warfare", derived from the name given to communications by the military. Newer names include information operations and information warfare
The following techniques are combined:
- Operations security (OPSEC)
- Military deception
- Psychological operations (PSYOP)
- Electronic warfare (EW)
- Psychological warfare
with the physical destruction of enemy communications facilities. The objective is to deny information to the enemy and so disrupt its command and control capabilities. At the same time precautions are taken to protect friendly command and control capabilities against retaliation.
- Battle command
- Command and control warfare
- Command center
- Command ship
- Communications protection
- Defence Information Infrastructure
- Electronic warfare
- Fog of war
- Intent (Military)
- Military communications
- Mission Command
- Mission-type tactics
- Network-centric warfare
- Reconnaissance, surveillance, and target acquisition (RSTA)
- Signal Corps (disambiguation)
- Signals intelligence (SIGINT)
- Surveillance and Target Acquisition (STA)
US and other NATO specific:
- 505th Command and Control Wing
- Command and Control Research Program (CCRP)
- Deployable Joint Command and Control
- Future Combat Systems Command and Control Vehicle
- Global Command and Control System
- Joint Force Air Component Headquarters
- Joint Interoperability of Tactical Command and Control Systems
- NATO Communications and Information Systems Agency
- NATO Consultation, Command and Control Agency
- Worldwide Military Command and Control System
- para 5-2, United States Army Field Manual: FM 3–0
Headquarters, Department of the Army (14 June 2001). FM 3–0, Operations (PDF inside ZIP–SFX). Washington, DC: GPO. OCLC 50597897. Archived from the original on 19 February 2002. Retrieved 19 August 2013.
Newer versions of FM 3-0 do not define Command and control, even though they use the term extensively.
- Builder, Carl H., Bankes, Steven C., Nordin, Richard, "Command Concepts – A Theory Derived from the Practice of Command and Control", MR775, RAND, ISBN 0-8330-2450-7, 1999
- Neville Stanton, Christopher Baber, Don Harris (1 January 2008). Modelling Command and Control: Event Analysis of Systemic Teamwork. Ashgate Publishing, Ltd.
- "ADDP 00.1 Command and Control". Commonwealth of Australia. 27 May 2009. pp. 1–2.
- Ross Pigeau and Carol McCann (Spring 2002). "Re-conceptualizing Command and Control". Canadian Military Journal 3 (1): 53–63.
- DoD Dictionary of Military and Associated Terms, www.dtic.mil
- Command and control, Dictionary of Military and Associated Terms, www.dtic.mil
- Command Five Pty Ltd, "Command and Control in the Fifth Domain", February 2012, www.commandfive.com
- In modern warfare, computers have become a key component as cyberspace is now seen as "the fifth domain of warfare" – refer: Clarke, Richard A. (2010). Cyber War. HarperCollins. and
"Cyberwar: War in the Fifth Domain". Economist. 1 July 2010.
- TTCP Groups, www.dtic.mil/ttcp/
- "Department of Defense Dictionary of Military and Associated Terms", Joint Publication 1-02, US Department of Defense, 17 March 2009.
- Sloan, E., "Security and Defence in the Terrorist Era", McGill-Queen's University Press, Montreal, 2005; see Ch. 7 for C4ISTAR discussion.
- US Army PEO C3T – Project Manager, Command Posts, peoc3t.monmouth.army.mil
- This article incorporates public domain material from the United States Department of Defense document "Dictionary of Military and Associated Terms".
- This article incorporates public domain material from the General Services Administration document "Federal Standard 1037C".
|Look up C4ISR in Wiktionary, the free dictionary.|