> > TAKE HEED - - VERY IMPORTANT INFORMATION < <
Regarding Jade Helm 15, I have been of the mindset for a while now that one of the main purposes for this drill is to test and gauge Americans' reaction to troops, spies, military equipment, on American soil, in their backyard, etc, etc, mainly because Jade Helm 15 has so intentionally been publicised, not only in the so-called Alternative Media, but also here and there in the Mainstream Media, with outright admissions that Texas has been deemed "enemy territory" . . and the list goes on and on . . of course there are those who are convinced that the exercise will go Live, with Martial Law, maybe even under the UN, as the end result . .
Well, I implore anyone who is searching for clues and information about how our future may be being completely designed by Artificial Intelligence (AI), complete with allowing the AI to decide who should continue to exist, and who should not. This exercise could well be just that, an exercise, but to make an extended large step toward the AI being put in charge. The info is presented without dramatic and emotional hype, put together by what appears to be a very good researcher.
Please try to take some time to watch/listen to the video just below . .
Caravan To Midnight - Episode 309 Jade Helm Decoded
Episode 309 – Jade Helm 2 Decoded: Today we welcome a learned
network/software engineer’s analysis of what’s really behind the
exercise.
Air Date – 6-11-15
Air Date – 6-11-15
[ I do not really like posting BIN articles, as so many of them are fear-mongering exaggerations, but it is the only place I could find this important article . . . I do find it interesting that the date-stamp on the article below is a few days earlier than the show above was recorded ]
Jade Helm is a Computer Driven Exercise
Sunday, June 7, 2015
By Clark Hay – June 7, 2015
The following excerpts are straight from military and related sources.
These excerpts provide strong evidence that behind JADE Helm 2015 are a set of
computer programs constantly directing and updating directives based on
information fed into the system from JADE Helm workstations.
These excerpts provide strong evidence that behind JADE Helm 2015 are a set of
computer programs constantly directing and updating directives based on
information fed into the system from JADE Helm workstations.
Much like the old IBM program “Deep Blue” was programmed to consider
every possible move and strategy to beat the world’s best human chess player,
the set of programs being used in the JADE [at the] Helm [for]
2015 exercise combines all the best military strategies and lessons learned
with easily updatable information about:
every possible move and strategy to beat the world’s best human chess player,
the set of programs being used in the JADE [at the] Helm [for]
2015 exercise combines all the best military strategies and lessons learned
with easily updatable information about:
·
Political situations and events
Political situations and events
·
Military realities activities and inclinations
Military realities activities and inclinations
·
Economic factors of all sides
Economic factors of all sides
·
Social affiliations, relations, profiles, belief systems
Social affiliations, relations, profiles, belief systems
·
Infrastructure – key facilities, essential services, and
installations that affect the overall stability of an area and their relevance
to the population
Infrastructure – key facilities, essential services, and
installations that affect the overall stability of an area and their relevance
to the population
·
Information routes and relevance
Information routes and relevance
·
Physical Environment – how terrain affects people, equipment, trafficability,
visibility, and
Physical Environment – how terrain affects people, equipment, trafficability,
visibility, and
·
Time sensitive elements
Time sensitive elements
JADE can process all of this information and issue battle plan
directives to command and control centers in under 1 hour. Any new data or
changes to any element of the campaign can be fed into the system from a “Human
Domain workstation” to get a new and more relevant set of battle plans – almost
in real time. This is a real plus in the ever changing conditions on the
ground, or in the air, or behind the scenes.
directives to command and control centers in under 1 hour. Any new data or
changes to any element of the campaign can be fed into the system from a “Human
Domain workstation” to get a new and more relevant set of battle plans – almost
in real time. This is a real plus in the ever changing conditions on the
ground, or in the air, or behind the scenes.
The above is what the phrase “Mastering the Human Domain” is all about.
As you will see from the excerpts below, JADE can even make predictions
for preemptive strikes.
for preemptive strikes.
The large scale exercise of JADE this summer will be a test of all
aspects of this complex system.
aspects of this complex system.
Will the test “go live” if real life events “warrant” a real response?
Will false flags occur between now and then? Is this the beginning of a
computer controlled military similar to Cyberdyne from the Terminator movies?
Will JADE’s predictive programming lead to a world like the one in the movie
“Majority Report”? … Maybe. But that’s the subject speculators, fear mongers
and the producers of doom porn.
Will false flags occur between now and then? Is this the beginning of a
computer controlled military similar to Cyberdyne from the Terminator movies?
Will JADE’s predictive programming lead to a world like the one in the movie
“Majority Report”? … Maybe. But that’s the subject speculators, fear mongers
and the producers of doom porn.
All I know is that we’re not in Kansas anymore.
Now for the excerpts:
The 1998 JADE Project – can generate an 80%
logistics solution in less than an hour
logistics solution in less than an hour
The Joint Assistant for Deployment and Execution (JADE)
is an integrated mixed-initiative prototype whose goal is to provide military
planners with the ability to generate a skeleton deployment plan within an
extremely fast time period. That is, JADE
can generate an 80% logistics solution in less than an hour. [Emphasis
mine]
is an integrated mixed-initiative prototype whose goal is to provide military
planners with the ability to generate a skeleton deployment plan within an
extremely fast time period. That is, JADE
can generate an 80% logistics solution in less than an hour. [Emphasis
mine]
JADE – The OTHER Definition
P. 14
3.3.2 DEEP Agents
The DEEP ["Deep
Episodic Exploratory Planning"] system uses two different types of
agents. The first type is called an interface or planning agent
and the second type is a critic agent.
Episodic Exploratory Planning"] system uses two different types of
agents. The first type is called an interface or planning agent
and the second type is a critic agent.
Agents in the DEEP
architecture extend and use the Java Agent
DEvelopment (JADE) framework (Bellifemine, 2006). DEEP requires a
distributed multi-agent system and a framework to help simplify the
implementation of this system. JADE was chosen because it is fully implemented
in Java, and supports these requirements.
architecture extend and use the Java Agent
DEvelopment (JADE) framework (Bellifemine, 2006). DEEP requires a
distributed multi-agent system and a framework to help simplify the
implementation of this system. JADE was chosen because it is fully implemented
in Java, and supports these requirements.
The role of DEEP in the JADE Helm exercise:
Abstract
This report
describes an overview and the progress to date of the Distributed Episodic Exploratory
Planning (DEEP) project. DEEP is a
mixed-initiative decision support system that utilizes past experiences to
suggest courses of action for new situations. It has been designed
as a distributed multi-agent system, using agents to maintain and exploit the
experiences of individual commanders as well as to transform suggested past plans
into potential solutions for new problems. The
system is mixed-initiative in the sense that a commander, through his or her
agent, can view and modify the contents of the shared repository as needed. The
agents interact through a common knowledge repository, represented by a
blackboard in the initial architecture. The blackboard architecture is
well-suited for dealing with ill-defined, complex situations such as warfare.
describes an overview and the progress to date of the Distributed Episodic Exploratory
Planning (DEEP) project. DEEP is a
mixed-initiative decision support system that utilizes past experiences to
suggest courses of action for new situations. It has been designed
as a distributed multi-agent system, using agents to maintain and exploit the
experiences of individual commanders as well as to transform suggested past plans
into potential solutions for new problems. The
system is mixed-initiative in the sense that a commander, through his or her
agent, can view and modify the contents of the shared repository as needed. The
agents interact through a common knowledge repository, represented by a
blackboard in the initial architecture. The blackboard architecture is
well-suited for dealing with ill-defined, complex situations such as warfare.
Part of the program (DEEP) uses Artificial
Intelligence:
Intelligence:
3.3.1 Blackboard –
The Distributed Shared Knowledge Structure
The Distributed Shared Knowledge Structure
As can be seen from
the DEEP architecture in Figure 1, the various DEEP systems rely on a shared
knowledge structure to act as a medium of communication and interaction.
the DEEP architecture in Figure 1, the various DEEP systems rely on a shared
knowledge structure to act as a medium of communication and interaction.
Also, in order to
support the NCO vision discussed in Section 2.1, the DEEP architecture requires
a mechanism that supports reach-back in a distributed system. A blackboard
system was chosen to fulfill this need as it not only functions as a shared
memory for the DEEP system, but as we discussed in Section 3.1, it provides
other functionality as well.
support the NCO vision discussed in Section 2.1, the DEEP architecture requires
a mechanism that supports reach-back in a distributed system. A blackboard
system was chosen to fulfill this need as it not only functions as a shared
memory for the DEEP system, but as we discussed in Section 3.1, it provides
other functionality as well.
A blackboard system is an opportunistic artificial
intelligence application based on the blackboard architectural software engineering
paradigm (Corkill, 1991).The blackboard system functions as a central knowledge
store facilitating communication and interaction between the different software
systems, including interface agents, critic agents, and simulation
engines (explained later in this chapter). These interactions are made possible
by the sharing and passing of objects.
intelligence application based on the blackboard architectural software engineering
paradigm (Corkill, 1991).The blackboard system functions as a central knowledge
store facilitating communication and interaction between the different software
systems, including interface agents, critic agents, and simulation
engines (explained later in this chapter). These interactions are made possible
by the sharing and passing of objects.
To fully meet the
requirements of the DEEP vision for distributed C2, a distributed blackboard
system was required. Current commercial and open source blackboard system
implementations are not distributed, so the paradigm needed to be extended from
a monolithic to a distributed environment. The current DEEP blackboard, shown
in Figure 4, was designed and implemented following this extended view using
design patterns described in (Hughes & Hughes, 2003).
requirements of the DEEP vision for distributed C2, a distributed blackboard
system was required. Current commercial and open source blackboard system
implementations are not distributed, so the paradigm needed to be extended from
a monolithic to a distributed environment. The current DEEP blackboard, shown
in Figure 4, was designed and implemented following this extended view using
design patterns described in (Hughes & Hughes, 2003).
The Predictive and Preemptive Capability of
JADE – ala the Minority Report
JADE – ala the Minority Report
p. 3
Experience with
recent operations also reveals that the C2
process must transition from a process of observation and reaction to one of prediction
and preemption. [Emphasis mine] To achieve this, we will need
to go beyond the focus of military operations, and instead address the entire spectrum
of Political, Military, Economics, Social, Infrastructure, and Information (PMESII)
(Alberts & Hayes, 2007).
recent operations also reveals that the C2
process must transition from a process of observation and reaction to one of prediction
and preemption. [Emphasis mine] To achieve this, we will need
to go beyond the focus of military operations, and instead address the entire spectrum
of Political, Military, Economics, Social, Infrastructure, and Information (PMESII)
(Alberts & Hayes, 2007).
To that end, the
focus of the research reported here is on developing a C2 environment that
supports the vision of Network Centric Operations (NCO) (Alberts & Hayes,
2007).
focus of the research reported here is on developing a C2 environment that
supports the vision of Network Centric Operations (NCO) (Alberts & Hayes,
2007).
The tenets of NCO
are:
are:
• Information
sharing
sharing
• Shared
situational awareness
situational awareness
• Knowledge of
commander’s intent
commander’s intent
JADE can select its own course of action
p. 18
3.3.4.3 Execution
Selection Critic Agents
Selection Critic Agents
Once there are several plans that have been
instantiated, adapted, and scored by the various agents in the DEEP system ["Deep
Episodic Exploratory Planning"], a
final agent is responsible for selecting the top scoring plan(s) and sending
them off for execution. This agent is known as the Execution Selection Critic
Agent. Its specialization is taking all of the information on the blackboard
and using it to evaluate and rank the plans. It then either decides which
plan(s) are to be executed by either prompting the user for mixed-initiative
input, or selecting one on its own. [Emphasis mine]…
instantiated, adapted, and scored by the various agents in the DEEP system ["Deep
Episodic Exploratory Planning"], a
final agent is responsible for selecting the top scoring plan(s) and sending
them off for execution. This agent is known as the Execution Selection Critic
Agent. Its specialization is taking all of the information on the blackboard
and using it to evaluate and rank the plans. It then either decides which
plan(s) are to be executed by either prompting the user for mixed-initiative
input, or selecting one on its own. [Emphasis mine]…
After the agent
realizes that the plans have converged, it then sorts the plans in order of best
to worst. In order to sort the plans, it uses the scores associated with each
plan to rate them. This functionality does not currently assign a weight to the
scores; however, in the future it should …
realizes that the plans have converged, it then sorts the plans in order of best
to worst. In order to sort the plans, it uses the scores associated with each
plan to rate them. This functionality does not currently assign a weight to the
scores; however, in the future it should …
So what is the Human Domain?
From the “Cognitive
Joint Force Entry White Paper” – 26 September 2014
Joint Force Entry White Paper” – 26 September 2014
3-2. Central Idea.
The United States Army Special Operations Command (USASOC) provides Cognitive
Joint Force Entry capability to support Geographic Combatant Commanders (GCC)
and Joint Force Commanders (JFC) using information and influence activities to prepare
the environment for follow-on actions. Cognitive
Joint Force Entry is a proactive, Human Domain-centered strategy that
synchronizes and employs all components of the global information environment
to predispose populations of a foreign country or countries to favorably view
U.S. activities or operations. It reflects campaigning to win in the
shaping phase of an operation, and it is a component to achieve persistent
influence within the operating environment to create decisive influence. It achieves strategic depth, builds
cognitive security, and it provides scalable options to achieve favorable
outcomes.
The United States Army Special Operations Command (USASOC) provides Cognitive
Joint Force Entry capability to support Geographic Combatant Commanders (GCC)
and Joint Force Commanders (JFC) using information and influence activities to prepare
the environment for follow-on actions. Cognitive
Joint Force Entry is a proactive, Human Domain-centered strategy that
synchronizes and employs all components of the global information environment
to predispose populations of a foreign country or countries to favorably view
U.S. activities or operations. It reflects campaigning to win in the
shaping phase of an operation, and it is a component to achieve persistent
influence within the operating environment to create decisive influence. It achieves strategic depth, builds
cognitive security, and it provides scalable options to achieve favorable
outcomes.
3-3. Solution
Concepts and Components.
Concepts and Components.
a. Win in the Human
Domain. Cognitive Joint Force Entry is part of Strategic Landpower designed to
prevail in the Human Domain. In COMUSSOCOM’s Posture Statement to the House
Armed Services committee on 11 Mar 2014, Admiral McRaven described the Human
Domain. He stated: “Our SOF engagement takes place in the Human Domain — the totality of the physical,
cultural, and social environments that influence human behavior in a
population-centric conflict. [Emphasis mine] The Human
Domain is about developing an understanding of, and nurturing influence among,
critical populaces. SOF is uniquely suited for operations that win
population-centric conflicts, oftentimes, and preferably, before they
start.”3 Success within the Human Domain “depends on the application
of unique capabilities that are designed to influence, fight, and win in
population-centric conflicts.”4 To achieve the goal of nurturing influence
and winning in population-centric conflicts, the
ARSOF approach will be to “first understand the population within the
context of the operational environment and then take meaningful action to
effectively influence human behavior toward achieving the desired
outcome.”5 Cognitive Joint Force Entry provides the mechanism for ARSOF to
set the conditions for success in the Human Domain.
Domain. Cognitive Joint Force Entry is part of Strategic Landpower designed to
prevail in the Human Domain. In COMUSSOCOM’s Posture Statement to the House
Armed Services committee on 11 Mar 2014, Admiral McRaven described the Human
Domain. He stated: “Our SOF engagement takes place in the Human Domain — the totality of the physical,
cultural, and social environments that influence human behavior in a
population-centric conflict. [Emphasis mine] The Human
Domain is about developing an understanding of, and nurturing influence among,
critical populaces. SOF is uniquely suited for operations that win
population-centric conflicts, oftentimes, and preferably, before they
start.”3 Success within the Human Domain “depends on the application
of unique capabilities that are designed to influence, fight, and win in
population-centric conflicts.”4 To achieve the goal of nurturing influence
and winning in population-centric conflicts, the
ARSOF approach will be to “first understand the population within the
context of the operational environment and then take meaningful action to
effectively influence human behavior toward achieving the desired
outcome.”5 Cognitive Joint Force Entry provides the mechanism for ARSOF to
set the conditions for success in the Human Domain.
b. Establish a
pro-active posture. ARSOF will employ Cognitive Joint Force Entry activities in
the earliest stage to shape the future operating environment and achieve
favorable outcomes before conflicts start. As the USSOCOM input to the 2014
Quadrennial Defense Review (QDR) recommended, “Preventing war through
presence and an innovative, small-footprint, low-cost, and responsive approach
to posture is far cheaper than waging war and mitigating the instability and
radiating effects that come with waging war.”6 Cognitive Joint Force Entry
addresses a key notion of that cost calculus by using information and influence
activities to shape the environment beginning in pre-conflict stages. ARSOF
achieves this by maintaining a persistent, continuous awareness of the global
information environment, which provides the ability to anticipate challenges
and identify opportunities for early and responsive
pro-active posture. ARSOF will employ Cognitive Joint Force Entry activities in
the earliest stage to shape the future operating environment and achieve
favorable outcomes before conflicts start. As the USSOCOM input to the 2014
Quadrennial Defense Review (QDR) recommended, “Preventing war through
presence and an innovative, small-footprint, low-cost, and responsive approach
to posture is far cheaper than waging war and mitigating the instability and
radiating effects that come with waging war.”6 Cognitive Joint Force Entry
addresses a key notion of that cost calculus by using information and influence
activities to shape the environment beginning in pre-conflict stages. ARSOF
achieves this by maintaining a persistent, continuous awareness of the global
information environment, which provides the ability to anticipate challenges
and identify opportunities for early and responsive
5
actions. The
pro-active posture provided by Cognitive Joint Force Entry will preclude
shortfalls in the past where “the US was slow to recognize the importance
of information and the battle for the narrative in achieving objectives at all
levels,”7 and the proactive posture addresses the critique that “the
US response to the emergent battle for the narrative was characterized by an
initial lack of leadership emphasis and resources that addressed information as
an instrument of national power.”8 Cognitive Joint Force Entry provides a
vital capability in a critical domain at strategic windows of opportunity where
other instruments of national power may not or cannot function. Adopting a
pro-active posture through Cognitive Joint Force Entry will gain the initiative
in setting the conditions for success by achieving favorable outcomes before
conflicts start.
pro-active posture provided by Cognitive Joint Force Entry will preclude
shortfalls in the past where “the US was slow to recognize the importance
of information and the battle for the narrative in achieving objectives at all
levels,”7 and the proactive posture addresses the critique that “the
US response to the emergent battle for the narrative was characterized by an
initial lack of leadership emphasis and resources that addressed information as
an instrument of national power.”8 Cognitive Joint Force Entry provides a
vital capability in a critical domain at strategic windows of opportunity where
other instruments of national power may not or cannot function. Adopting a
pro-active posture through Cognitive Joint Force Entry will gain the initiative
in setting the conditions for success by achieving favorable outcomes before
conflicts start.
c. Dominate
Cognitive Depth. For the purposes of this paper,
Cognitive Depth is a dimension of the operating environment encompassing a
populations’ realm of perceptions, beliefs, opinions, and attitudes. It can
have a global scope and includes the dimension of time. These components
present a highly complex challenge for successfully generating persistent influence
and preparing the environment for follow on actions.
Cognitive Depth. For the purposes of this paper,
Cognitive Depth is a dimension of the operating environment encompassing a
populations’ realm of perceptions, beliefs, opinions, and attitudes. It can
have a global scope and includes the dimension of time. These components
present a highly complex challenge for successfully generating persistent influence
and preparing the environment for follow on actions.
1) The concept of Cognitive Depth can be viewed through
a combination of terms drawn from psychology linked to doctrine. It is a
dimension influenced by an extremely broad range of factors, “to include
individual and cultural beliefs, norms, vulnerabilities, motivation, emotion,
experiences, morals, education, mental health, identities, and
ideologies.” 9 That broad scope is formed over time and
incorporates multiple references in a complex framework of attitudes, beliefs,
and behaviors, which are acquired.10 The source of attitudes are “culture,
social role, laws, mass media, institutes, schools, parents, family, peers and
others, various groups and direct experience.”11 Cognitive Depth, therefore, is formed, informed, and modulated by a
whole-of-environment interaction. Understanding that complex arena to create
effective strategies for the initial, shaping phase of a campaign requires
significant skill, deep knowledge, and supporting capacity.
a combination of terms drawn from psychology linked to doctrine. It is a
dimension influenced by an extremely broad range of factors, “to include
individual and cultural beliefs, norms, vulnerabilities, motivation, emotion,
experiences, morals, education, mental health, identities, and
ideologies.” 9 That broad scope is formed over time and
incorporates multiple references in a complex framework of attitudes, beliefs,
and behaviors, which are acquired.10 The source of attitudes are “culture,
social role, laws, mass media, institutes, schools, parents, family, peers and
others, various groups and direct experience.”11 Cognitive Depth, therefore, is formed, informed, and modulated by a
whole-of-environment interaction. Understanding that complex arena to create
effective strategies for the initial, shaping phase of a campaign requires
significant skill, deep knowledge, and supporting capacity.
2) While Cognitive
Depth may be formed by multiple factors, its
potential scale can range from individuals and groups to populaces and nations.
As Global Trends 2030 has described an interconnected world with instant
information access, it is possible that the perceptions, dispositions, and
attitudes of people, groups, and populations can be exposed to a near limitless
realm of influence, including global, virtual sources of influence. Cognitive Depth can therefore be both local and
global and can range from the tactical to the strategic level. The
global context may possess multiple strata where attitudes, perceptions,
beliefs, and opinions can potentially create a range of decisions and
behaviors. It includes what JP 2-0 calls “human factors affecting a leader’s
or key actor’s decision-making influences.12 Those decisions and
Depth may be formed by multiple factors, its
potential scale can range from individuals and groups to populaces and nations.
As Global Trends 2030 has described an interconnected world with instant
information access, it is possible that the perceptions, dispositions, and
attitudes of people, groups, and populations can be exposed to a near limitless
realm of influence, including global, virtual sources of influence. Cognitive Depth can therefore be both local and
global and can range from the tactical to the strategic level. The
global context may possess multiple strata where attitudes, perceptions,
beliefs, and opinions can potentially create a range of decisions and
behaviors. It includes what JP 2-0 calls “human factors affecting a leader’s
or key actor’s decision-making influences.12 Those decisions and
6
behaviors could
include various degrees of influence impacting a campaign. Therefore,
understanding and assessing the complex, global nature of Cognitive Depth will
become essential. Joint Publication 5-0 indicates “As planners assess
complex human behaviors…they draw on multiple sources across the operational
environment, including both analytical and subjective measures that support a
more informed assessment.”13 The new information environment will be
inherently dynamic and requires maintaining a persistent awareness to know how
and where influence and information activities can be applied. Achieving persistent awareness will be a necessary
precondition to effectively apply influence and information activities. Having
the capacity to maintain persistent awareness remains an essential ingredient
to success in the earliest stage of a campaign.
include various degrees of influence impacting a campaign. Therefore,
understanding and assessing the complex, global nature of Cognitive Depth will
become essential. Joint Publication 5-0 indicates “As planners assess
complex human behaviors…they draw on multiple sources across the operational
environment, including both analytical and subjective measures that support a
more informed assessment.”13 The new information environment will be
inherently dynamic and requires maintaining a persistent awareness to know how
and where influence and information activities can be applied. Achieving persistent awareness will be a necessary
precondition to effectively apply influence and information activities. Having
the capacity to maintain persistent awareness remains an essential ingredient
to success in the earliest stage of a campaign.
3) As Cognitive
Depth has a wide range and includes the realm of perceptions, beliefs,
opinions, and attitudes, it also incorporates the dimension of time, past,
present, and future. This characteristic
requires a capacity to maintain persistent engagement in the information
environment, understanding the past and looking into the future. The
Joint Publication 3-13, Information Operations, states: “the cognitive
dimension encompasses the minds of those who transmit, receive and respond to
or act on information.”14 That description points to a space with
processes working at the present time in the here and now. But because
cognition is “a general term of the higher mental processes by which
people acquire knowledge, solve problems, and plan for the future,”15 it
also spans the past in terms of memory, functions in the present, and reaches
into the future in terms of conceptualization. Maintaining persistent
engagement will enable an understanding of the continuum of the information
environment, which is necessary to implementing influence and information
activities. The combination of persistent
awareness and persistent engagement will yield deep cultural knowledge to craft
and implement activities specifically tailored to the environment.
Depth has a wide range and includes the realm of perceptions, beliefs,
opinions, and attitudes, it also incorporates the dimension of time, past,
present, and future. This characteristic
requires a capacity to maintain persistent engagement in the information
environment, understanding the past and looking into the future. The
Joint Publication 3-13, Information Operations, states: “the cognitive
dimension encompasses the minds of those who transmit, receive and respond to
or act on information.”14 That description points to a space with
processes working at the present time in the here and now. But because
cognition is “a general term of the higher mental processes by which
people acquire knowledge, solve problems, and plan for the future,”15 it
also spans the past in terms of memory, functions in the present, and reaches
into the future in terms of conceptualization. Maintaining persistent
engagement will enable an understanding of the continuum of the information
environment, which is necessary to implementing influence and information
activities. The combination of persistent
awareness and persistent engagement will yield deep cultural knowledge to craft
and implement activities specifically tailored to the environment.
4) Another aspect of
time as it relates to Cognitive Depth is the tempo at which change occurs, and
- within the cognitive domain – change takes time. Because change takes time, implementing influence and information
activities should occur as early as possible in order to achieve persistent
influence. Due to the complexity in the way opinions and attitudes are
formed and held, and because aspects of the cognitive domain directly relate to
the notion of identity and the way individuals interact with the world, changes
in the cognitive domain occur over time. Psychology texts refer to the
complexity of attitudes and why they are fundamental aspects of individuals.
“Attitudes help [people] to function in the social world”16 and
result from “the multiple processes by which humans adapt to their
environment.”17 It indicates that attitudes are integral to the way that
people function in relation to others and how individuals relate to the world.
These primal factors contribute to the lengthy process where change occurs.
Because of the lengthy process and the long lead times to effect change,
information and
time as it relates to Cognitive Depth is the tempo at which change occurs, and
- within the cognitive domain – change takes time. Because change takes time, implementing influence and information
activities should occur as early as possible in order to achieve persistent
influence. Due to the complexity in the way opinions and attitudes are
formed and held, and because aspects of the cognitive domain directly relate to
the notion of identity and the way individuals interact with the world, changes
in the cognitive domain occur over time. Psychology texts refer to the
complexity of attitudes and why they are fundamental aspects of individuals.
“Attitudes help [people] to function in the social world”16 and
result from “the multiple processes by which humans adapt to their
environment.”17 It indicates that attitudes are integral to the way that
people function in relation to others and how individuals relate to the world.
These primal factors contribute to the lengthy process where change occurs.
Because of the lengthy process and the long lead times to effect change,
information and
7
influence activities should be planned strategically
and applied pro-actively to develop decisive influence in the earliest stage of
campaigning. It should be planned through a whole-of-government approach
and should be implemented in early, whole-of-government manner to achieve
sustainable, persistent influence.
and applied pro-actively to develop decisive influence in the earliest stage of
campaigning. It should be planned through a whole-of-government approach
and should be implemented in early, whole-of-government manner to achieve
sustainable, persistent influence.
Pre-solicitation for a Human Domain
Workstation:
Workstation:
Solicitation Number:
W909MY-05-R-T020
Notice Type :
Presolicitation
Synopsis :
Added: April 19,
2005
2005
This is a Sole
Source requirement for a one year, Time and Materials T&M, Indefinite
Delivery Indefinite Quantity contract, with four, one year options to be issued
to Northrop Grumman Information Technology Inc., 12005 Sunrise Valley Dr.,
Reston, VA 20191-3404. Authority for Other Than Full and Open Competition is 10
USC 2304 c 1 and FAR 6.302-1, Only One Responsible Source. All responsible
sources may submit a written proposal which shall be considered by the agency
for the procurement of engineering/technical support for the
Counterintelligence/Human Intelligence (CI/HUMINT) Automation Management
Software (CHAMS) and Human Domain
Workstation (HDWS) Software Systems. The CHAMS and HDWS are the two
software baselines within the CI/HUMINT Management System (CHIMS). CHIMS is a
family of intelligence automation systems that facilitate the collection,
reporting, analysis and management of human intelligence. The
engineering/technical support will include system engineering, design, software
development, hardware integration, testing, training development, program
support, system security accreditation activities, and configuration
management. The proposed effort will provide for the continued development of
CHAMS, including enhancements to the current system, and initiatives to support
future Army requirements in support of CI-HUMINT automation, and enhancements to
the HDWS to meet requirements established jointly by Program Manager (PM),
CHIMS and Program Manager, Distributed Common Ground Station-Ar my (PM DCGS-A).
Please be advised that the response date included in this notice is a forecast
date, see the solicitation document on the IBOP website for the actual response
date. Previous procurement history will be in the solicitation. Drawings are
not available. The U.S. Army Communications-Electronics Life Cycle Management
Command (C-E LCMC) Acquisition Center has established a World Wide Business
Opportunity Page at https://abop.monmouth.army.mil, to provide electronic
transmittal of Request for Proposals (RFPs), Invitation for Bids (IFBs) and
Request for Quotes (RFQs) for Government to Industry. All parties interested in
doing business with C-E LCMC are invited to access, operate, and send and
receive information for the C-E LCMC Acquisition Center World Wide Business
Opportunities Page. Upon accessing the webpage, click on CECOM Business
Opportunities Page. Registration for a user ID and password will only be
necessary when you are considering the submission of proposals to the Business
Opportunities Page. The solicitation W909MY-05-R-T020 will be uploaded to the
internet site set forth above in or about 15 days. See note 22.***** Please
contact the IBOP help desk, toll free at 1-888-414-BOSS (2677) for technical
assistance with the IBOP. Please contact or e-mail
evonne.lipscomb@cacw.army.mil to request information. The contracting officer
for this proposal action is Rosetta Wisdo m-Russell 703-325-1717. SEE NOTE 22.
Source requirement for a one year, Time and Materials T&M, Indefinite
Delivery Indefinite Quantity contract, with four, one year options to be issued
to Northrop Grumman Information Technology Inc., 12005 Sunrise Valley Dr.,
Reston, VA 20191-3404. Authority for Other Than Full and Open Competition is 10
USC 2304 c 1 and FAR 6.302-1, Only One Responsible Source. All responsible
sources may submit a written proposal which shall be considered by the agency
for the procurement of engineering/technical support for the
Counterintelligence/Human Intelligence (CI/HUMINT) Automation Management
Software (CHAMS) and Human Domain
Workstation (HDWS) Software Systems. The CHAMS and HDWS are the two
software baselines within the CI/HUMINT Management System (CHIMS). CHIMS is a
family of intelligence automation systems that facilitate the collection,
reporting, analysis and management of human intelligence. The
engineering/technical support will include system engineering, design, software
development, hardware integration, testing, training development, program
support, system security accreditation activities, and configuration
management. The proposed effort will provide for the continued development of
CHAMS, including enhancements to the current system, and initiatives to support
future Army requirements in support of CI-HUMINT automation, and enhancements to
the HDWS to meet requirements established jointly by Program Manager (PM),
CHIMS and Program Manager, Distributed Common Ground Station-Ar my (PM DCGS-A).
Please be advised that the response date included in this notice is a forecast
date, see the solicitation document on the IBOP website for the actual response
date. Previous procurement history will be in the solicitation. Drawings are
not available. The U.S. Army Communications-Electronics Life Cycle Management
Command (C-E LCMC) Acquisition Center has established a World Wide Business
Opportunity Page at https://abop.monmouth.army.mil, to provide electronic
transmittal of Request for Proposals (RFPs), Invitation for Bids (IFBs) and
Request for Quotes (RFQs) for Government to Industry. All parties interested in
doing business with C-E LCMC are invited to access, operate, and send and
receive information for the C-E LCMC Acquisition Center World Wide Business
Opportunities Page. Upon accessing the webpage, click on CECOM Business
Opportunities Page. Registration for a user ID and password will only be
necessary when you are considering the submission of proposals to the Business
Opportunities Page. The solicitation W909MY-05-R-T020 will be uploaded to the
internet site set forth above in or about 15 days. See note 22.***** Please
contact the IBOP help desk, toll free at 1-888-414-BOSS (2677) for technical
assistance with the IBOP. Please contact or e-mail
evonne.lipscomb@cacw.army.mil to request information. The contracting officer
for this proposal action is Rosetta Wisdo m-Russell 703-325-1717. SEE NOTE 22.
Contracting Office
Address :
Address :
US Army
Communications-Electronics Command, CECOM Acquisition Center Washington, ATTN:
AMSEL-AC-W, 2461 Eisenhower Avenue, Alexandria, VA 22331-0700
Communications-Electronics Command, CECOM Acquisition Center Washington, ATTN:
AMSEL-AC-W, 2461 Eisenhower Avenue, Alexandria, VA 22331-0700
Place of Performance
:
:
US Army
Communications-Electronics Life Cycle Mangement Command, Acquisition Center
Washington ATTN: AMSEL-AC-W, 2461 Eisenhower Avenue Alexandria VA
22331-0700
Communications-Electronics Life Cycle Mangement Command, Acquisition Center
Washington ATTN: AMSEL-AC-W, 2461 Eisenhower Avenue Alexandria VA
22331-0700
Point of Contact(s)
:
:
Angle Trimmier,
7033335802
US Army7033335802
Communications-Electronics Command, CECOM Acquisition Center Washington
Northrop has a Human Domain Workstation:
BALTIMORE, March 2,
2007 (GLOBE NEWSWIRE) — A team led by Northrop Grumman Corporation (NYSE:NOC)
has developed and demonstrated technology for users of the U.S. Army’s
battlefield networks that allows access to
actionable intelligence from virtually anywhere in the field.
2007 (GLOBE NEWSWIRE) — A team led by Northrop Grumman Corporation (NYSE:NOC)
has developed and demonstrated technology for users of the U.S. Army’s
battlefield networks that allows access to
actionable intelligence from virtually anywhere in the field.
Northrop Grumman and
teammates General Dynamics, Lockheed Martin, and Science Applications
International Corp. were chartered by the U.S. Army to integrate multiple,
existing intelligence, surveillance and reconnaissance (ISR) systems into a
single multi-intelligence system called the Distributed Common Ground System -
Army (DCGS-A). This team is officially named the DCGS-A Industry Team, with
Northrop Grumman acting as the system integrator.
teammates General Dynamics, Lockheed Martin, and Science Applications
International Corp. were chartered by the U.S. Army to integrate multiple,
existing intelligence, surveillance and reconnaissance (ISR) systems into a
single multi-intelligence system called the Distributed Common Ground System -
Army (DCGS-A). This team is officially named the DCGS-A Industry Team, with
Northrop Grumman acting as the system integrator.
The team
successfully conducted several DCGS-A, Version 4, Proof of Concept (PoC) demonstrations
at Ft. Belvoir, Va.; Ft. Huachuca, Ariz.; and Northrop Grumman laboratory
facilities in Baltimore from August through December 2006. These efforts
resulted in a new model for moving battlefield data and intelligence in support
of tactically deployed combat commanders. The system uses queried/access
methodology, and is designed to operate within a distributed-operations,
enterprise environment.
successfully conducted several DCGS-A, Version 4, Proof of Concept (PoC) demonstrations
at Ft. Belvoir, Va.; Ft. Huachuca, Ariz.; and Northrop Grumman laboratory
facilities in Baltimore from August through December 2006. These efforts
resulted in a new model for moving battlefield data and intelligence in support
of tactically deployed combat commanders. The system uses queried/access
methodology, and is designed to operate within a distributed-operations,
enterprise environment.
Participating
systems included the Army’s Joint STARS Common Ground System, the Joint STARS
Work Station, the Human Domain Work Station,
the Digital Terrain Support System, the Integrated Meteorological System, the
V3 Joint Intelligence Operations Capability – Iraq (JIOC-I) work suites and
selected components of the Navy’s DCGS Multi-Intelligence Segment integrated
with the DCGS Integration Backbone (DIB).
systems included the Army’s Joint STARS Common Ground System, the Joint STARS
Work Station, the Human Domain Work Station,
the Digital Terrain Support System, the Integrated Meteorological System, the
V3 Joint Intelligence Operations Capability – Iraq (JIOC-I) work suites and
selected components of the Navy’s DCGS Multi-Intelligence Segment integrated
with the DCGS Integration Backbone (DIB).
Data interchange
within the PoC was achieved using a combination of a commercially available
Enterprise Service Bus and the U.S. Department of Defense DIB. The
demonstration adhered to DoD’s guidance to remain consistent with DIB
standards, be interoperable with existing components and be facilitated by the
use of DIB architecture.
within the PoC was achieved using a combination of a commercially available
Enterprise Service Bus and the U.S. Department of Defense DIB. The
demonstration adhered to DoD’s guidance to remain consistent with DIB
standards, be interoperable with existing components and be facilitated by the
use of DIB architecture.
The Northrop
Grumman-led DCGS-A Industry Team has continued to expand the Army’s net-cetric
enterprise capability with DCGS-A, Version 4. Previous DCGS versions included
the Army’s Version 2, Joint Intelligence Operations Capability-Iraq (JIOC-I)
and the DCGS-A Version 3, battle command interoperability.
Grumman-led DCGS-A Industry Team has continued to expand the Army’s net-cetric
enterprise capability with DCGS-A, Version 4. Previous DCGS versions included
the Army’s Version 2, Joint Intelligence Operations Capability-Iraq (JIOC-I)
and the DCGS-A Version 3, battle command interoperability.
“Our team is committed to designing and delivering the
best capabilities for producing actionable intelligence rapidly available to
the warfighter,” said Ken Wilson, vice president of C4ISRT
Networked Systems for Northrop Grumman’s Electronic Systems sector. “Our
approach makes the best of the Army’s investment in ISR technologies. By
working with our government and industry partners, we will continue to
integrate ‘best of breed’ applications and services from multiple sources in an
open service-oriented architecture environment.”
best capabilities for producing actionable intelligence rapidly available to
the warfighter,” said Ken Wilson, vice president of C4ISRT
Networked Systems for Northrop Grumman’s Electronic Systems sector. “Our
approach makes the best of the Army’s investment in ISR technologies. By
working with our government and industry partners, we will continue to
integrate ‘best of breed’ applications and services from multiple sources in an
open service-oriented architecture environment.”
Northrop Grumman
Corporation is a $30 billion global defense and technology company whose
120,000 employees provide innovative systems, products, and solutions in
information and services, electronics, aerospace and shipbuilding to government
and commercial customers worldwide.
Corporation is a $30 billion global defense and technology company whose
120,000 employees provide innovative systems, products, and solutions in
information and services, electronics, aerospace and shipbuilding to government
and commercial customers worldwide.
CONTACT: Paul
Cabellon
Cabellon
Northrop
Grumman Electronic Systems
Grumman Electronic Systems
(410)
765-7192
765-7192
PMESII – An Acrostic for the Spectrum of
Data Gathered
Data Gathered
p. 38
PMESII Political, Military, Economics, Social,
Infrastructure, and Information
Infrastructure, and Information
More on what PMESII is:
In Document “CTC-A-COIN-Guidebook.pdf”
p. 11
As with ASCOPE3xD,
equal consideration must be given to the insurgent, counterinsurgent, and the
population when using ASCOPE/PMESII
equal consideration must be given to the insurgent, counterinsurgent, and the
population when using ASCOPE/PMESII
However, through the
use of PMESII Counterinsurgents can begin to further analyze the information
and
use of PMESII Counterinsurgents can begin to further analyze the information
and
civil considerations
provided by ASCOPE3xD.
provided by ASCOPE3xD.
In this regard, PMESII is defined as a set of interrelated
operational variables that provides counterinsurgents with a method to analyze
the OE through specific filters.
operational variables that provides counterinsurgents with a method to analyze
the OE through specific filters.
Thus,
counterinsurgents consider the following factors and their relevance to the OE
as they relate to the civil considerations of ASCOPE:
counterinsurgents consider the following factors and their relevance to the OE
as they relate to the civil considerations of ASCOPE:
·
Political: Key
elements of the formal, informal, and shadow governance and how they are
relevant to the population and overall stability in the area.
Political: Key
elements of the formal, informal, and shadow governance and how they are
relevant to the population and overall stability in the area.
·
Military: Key
elements influencing the security situation and overall stability in the area.
Military: Key
elements influencing the security situation and overall stability in the area.
·
Economic: Key
elements of overall economic stability and activity in the area.
Economic: Key
elements of overall economic stability and activity in the area.
·
Social: Key
elements that influence traditional social dynamics in the area.
Social: Key
elements that influence traditional social dynamics in the area.
·
Infrastructure: Key
facilities, essential services, and installations that affect the overall
stability of an area and their relevance to the population
Infrastructure: Key
facilities, essential services, and installations that affect the overall
stability of an area and their relevance to the population
·
Information: Key
elements that facilitate the transfer of information amongst the local
population and their relevance to the population.
Information: Key
elements that facilitate the transfer of information amongst the local
population and their relevance to the population.
·
Physical Environment:
Key terrain affects people, equipment, trafficability, visibility, and the
employment of many weapons.
Physical Environment:
Key terrain affects people, equipment, trafficability, visibility, and the
employment of many weapons.
·
Time: The
population, counterinsurgent, and insurgent often view time differently.
Time: The
population, counterinsurgent, and insurgent often view time differently.
Also See Internet provider Comcast’s
involvement: https://home.comcast.net/~dshartley3/DIMEPMESIIGroup/DPGroup.htm
involvement: https://home.comcast.net/~dshartley3/DIMEPMESIIGroup/DPGroup.htm
Related topics at
bottom of page:
bottom of page:
·
CERDEC’s HSCB
Testbed project
CERDEC’s HSCB
Testbed project
·
DMSO’s OOTW Toolbox
DMSO’s OOTW Toolbox
·
The Interim Semi-static Stability Model (ISSM)
The Interim Semi-static Stability Model (ISSM)
·
MORS’ Workshop on Consequence
Management
MORS’ Workshop on Consequence
Management
·
MORS’ Workshop on Impact of
Emerging Societies on National Security
MORS’ Workshop on Impact of
Emerging Societies on National Security
·
MORS’ Workshop on Global War on
Terrorism
MORS’ Workshop on Global War on
Terrorism
·
A tool for Verification
& Validation of DIME/PMESII models
A tool for Verification
& Validation of DIME/PMESII models
No comments:
Post a Comment