Almost EVERYTHING we have been told (and are still being told) are lies . . . the sooner that humanity admits that it has been duped, the sooner something gets done about it . . .
Showing posts with label endtime prophecies. Show all posts
Showing posts with label endtime prophecies. Show all posts
Friday, June 17, 2016
Gotthard Tunnel Ritual Reveals The PORTAL To The Underworld - CERN UNLEASHED
Gotthard Tunnel, CERN, & the Collapse of Time & Space. ~links below
Link to full original ceremony video:
https://youtu.be/I4NU0Tok1T4
Labels:
CERN,
darkness,
endtime prophecies,
spiritual warfare
Tuesday, June 14, 2016
This is Real Proof We are in the End Times! (2016-2017)
Published on Jun 12, 2016
Page: https://www.facebook.com/End-Times-Wa...
Events from the Past Week from a Prophetic Perspective Shocking News from around the world you need to see this something is going on new world order orlando mass shooting terror attack united states america end times transgender jason a channel
Events from the Past Week from a Prophetic Perspective Shocking News from around the world you need to see this something is going on new world order orlando mass shooting terror attack united states america end times transgender jason a channel
Labels:
darkness,
endtime prophecies,
Luciferianism,
Satanism
Tuesday, December 15, 2015
Childhoods End – The Coming Great Deception…
L.A. Marzulli's Blog
Please take a good look at the picture.
Now take a look at the Baphomet statue which was unveiled this year.
Similarities anyone?
This is where we are as a culture, where we are constantly being
bombarded by the media, pop culture, the record industry, movies and TV.
Now, Arthur C. Clarke’s, Childhoods End, is being televised on the SCI-FI channel. I’m going to watch it on the net at some point today.
In my Nephilim Trilogy, the third book is called, The Revealing. It
is the last book in the series and it ends with hundreds of UFOs
appearing in the skies above earth. The character Johanen tells the
protagonist MacKenzie, or Mac, that they—these “intruders”—will tell the
world they created us, genetically manipulated us, started the world’s
first civilizations and religions and now at this critical juncture in
human history they, The Overlords (although I don’t refer to
them as that in the book, I’m using Clarke’s verbiage.) are here and
they will usher mankind into a golden age.
The problem is this, the overlords or what I believe are the entities
that are in the craft, are from the second heaven and are in fact, in
my opinion, The Fallen Angels. They are—as Jacque Vallee states—messengers of deception. They come bearing gifts and knowledge but with a price.
We are told in The Biblical Prophetic Narrative that there will be a
one world religious system at the end of days. When we look at the
global religious tension, and realize the disparity between religious
ideology this prophecy seems to be absurd! Yet, what was written will come to pass. What was foretold will unfold.
It’s going to happen and I would posit the way it does maybe will be with a scenario just like Childhoods End, depicts.
In closing todays post. If these are the last days, and I believe
they are, then we’re right on track and events are proceeding as
planned. The Fallen One and those who serve him, will reveal themselves
at some point. We are in the midst of a Cosmic Regime Change. The
King is going to return because that’s the only way to oust the evil
entities who control the planet and wish to destroy mankind. The Fallen
Cherub wants to be worshipped. He will set his man, The Anti-Messiah,
in the rebuilt temple in Jerusalem. In the end, The Rider on the White
Horse, Yeshua/Jesus will return with the armies of heaven riding with
Him. This is the only solution to what mankind faces. He will set up
his Millennial kingdom on earth and once more, He will rule from Jerusalem.
Tuesday, October 27, 2015
Zionist TV Commercial shows Demons beheading 'Sheeple'
Labels:
Bible Prophecy,
darkness,
demons,
endtime prophecies,
mainstream media,
spiritual warfare,
Zionism,
zombie nation
Wednesday, August 12, 2015
Saturday, August 8, 2015
CERN, Carbon 7, Metatron's Cube, Giza, Saturn Connection ~ Anthony Patch w/ ETMN
CLICK HERE FOR MY PAGE DEDICATED TO CERN VIDEOS
Hangout Date: March 26, 2015
Description:
By End Times Matrix News:
AUTHOR Anthony Patch of 2048 Diamonds Joining us Re the #Airbus320 Crash and how it possibly relates to #CERN
We will be discussing the Giza Pyramids connection to the occult and CERN in Our Opinion.
How does this connect to the 7 planets the 7 chakras & #Carbon7
Will CERN OPEN A PORTAL
Why is Cern shaped like 3 6’s #666 and will they try to bring in the 661 the 7th
when the AX falls
Tuesday, July 7, 2015
End Time Current Events: 7-7-15
scan over this and check out the links - - while some of the links are to sites that I would consider fear-mongering shills, etc, there is also a lot of information that is useful

Marc Faber: Greek 'Contagion' Likelihood Very High - 'Wake Up, Greece Will Come To Your Neighborhood Very Soon'
PAPER: GREEK BANKS PREPARE TO RAID DEPOSITS
WARNING! “Economic Armageddon just hit Europe.”
Caution Some Language: Greek Anarchists Beat Up And Kick Out Riot Police
Bill Fleckenstein – 'There Is No Time Left' As Greek Crisis Is Poised To Go Global, Plus A Bonus Q&A
Zimbabwe To Make You Think…'They went from set for life here in Zim to not being able to afford a loaf of bread in 2 days.'
There Is NO WAY Out Of A Pan-Global Economic Collapse--By Gregory Mannarino
Officials: US jets scramble to intercept Russian bombers off California, Alaska coasts on July 4
Exterminating 40 Million Americans In Re-Education Camps Is the Goal: Do you think that mall conversions and school conversions to FEMA camps coupled with stadium and arena conversions add up to 80 million Americans incarcerated &..!
Tom DeLay Knows Of Secret DOJ Memo To Legalize '12 New Perversions,' Including Bestiality And Pedophilia
The Ten Plagues Of Gay Marriage: Conservatives Warn Of Terrorist Attacks, War And Prison Due To SCOTUS Ruling
Tom DeLay Urges Americans To Defy The 'Ten' Justices Of The Supreme Court
EU Security Head: “Political Islam” is the Future of Europe
SLAUGHTER IN THE AMPHITHEATER:
ISIS forces child executioners to shoot Syrian soldiers...
Carried out in front of bloodthirsty crowds at ancient ruin...
Militants claim fired rockets at Israel from Sinai...
Pennsylvania Public School Teachers Attend Mosque To Better Serve Muslim Students
California Family Supports 4-Year-Old’s Decision To Transition From Male To Female
California’s rural poor hit hardest as groundwater vanishes in long drought
California dumping water because they conserved too much
Oregon launches program to tax drivers by the mile...
Oregon declares war on Christian faith
Video: Man Gets 8 MONTHS in Federal Prison For Driving Away From Internal Checkpoint yet illegal aliens are allowed to pour into America everyday and given every incentive to do so!!!
Where is the Mainstream Media Outrage?? BRUTAL FOOTAGE of Unsuspecting Navy Veteran Walking with a Cane Knocked Out by a Black Thug in “Knockout Attack” (VIDEO) The Navy veteran NEVER saw it coming.
HORROR! Black Youths Mock and Laugh at Unconscious and Bloody Victim After July 4th Beatdown (VIDEO)--Police had to rescue the man from an attacking mob of about forty Black people
Illegal Alien Confesses to Murdering Wife with Hammer in Texas -- Deported Four Times...
La Raza to host national conference...Hillary to address...
110,000 African immigrants resettled in Minnesota (many Muslim)...Townhall gets heated...
Screaming Illegal Aliens Disrupt Ann Coulter Signing...Destroy books...
She Fires Back: 'At least they weren't molesting any 4-year-olds'...
Trump defends inflammatory comments & asks: Who is doing the raping?
WASH POST LEAD FRIDAY: Obama goes for integration over deportation for illegals...
'Infectious disease pouring across the open border'...
Kenyan lawmaker warns Obama not to push abortion during trip
Pioneering doctor reveals the science behind abortion reversals - and the babies saved
REPORT: Schools implant IUDs in 6th grade girls -- no parental notice...
Judge blocks KS ban on 2nd-trimester abortion procedure
Reunification Rumors Swirl As Pope Francis Makes Overtures To Russian Orthodox Patriarch Kirill
The Kennel--By: Elijah Green, a.k.a.: Kent Hovind--Kent Hovind Exposes the United States Prison System... From the Inside
New eAudio: End Time Current Events: 7-5-15
End Time Current Events: 7-2-15
Lifetime TV’s “Preach” – False Prophetesses of The End Times
CW’s ‘The Messengers’ – End Times Deception
Preacher’s Daughters Season 3: Children of Blasphemy
From: LA
Subject: Temple Mount news...
Dr. Johnson, This is the Temple Institute Facebook page - apparently, they have a big news announcement in July 12! (news is near the top right hand) https://www.facebook.com/pages/The-Temple-Institute/22738684968
From: AHB
Subject: Woman Faces Jail Time for Heroically Saving Dog on Tracks
http://www.lifewithdogs.tv/2015/07/woman-faces-jail-time-for-heroically-saving-dog-on-tracks/ "Who knew that inanimate train tracks could be put into such jeopardy, and are afforded more protection than living beings?"
From: LA
To: Scott Johnson
Subject: Could you add this to your next ETCE newsletter?
bro Scott, I just saw this gospel tract exposing the gap theory through and through - it is excellent! http://creation.com/images/pdfs/flyers/gap-theory.pdf
It really pains me that this damnable heresy has caused a lot of confusion and divisions among the KJB body of Christ, as KJB ministries like Greg Miller are really pushing it now. And this heresy is also in KJB commentaries like Peter Ruckman's and David Hoffman's. Believe me, I am staunchly KJB, but again it really pains me to see contending for the faith KJB ministries pushing it now. The truth about this heresy needs to be exposed! bro Steven
10 Faraday Cages You Can Make at Home
Scott Johnson's Main Website at: http://contendingfortruth.com/
Alternate Website
Subscribe to the Free Online Newsletter at: http://eepurl.com/d2RhL
Free Gifts: Salvation & the TRUE Gospel/Good News!

End Time Current Events: 7-7-15 Contending For Truth - Scott Johnson
Greece Votes NO – Let The Chaos Begin…Marc Faber: Greek 'Contagion' Likelihood Very High - 'Wake Up, Greece Will Come To Your Neighborhood Very Soon'
PAPER: GREEK BANKS PREPARE TO RAID DEPOSITS
WARNING! “Economic Armageddon just hit Europe.”
Caution Some Language: Greek Anarchists Beat Up And Kick Out Riot Police
Bill Fleckenstein – 'There Is No Time Left' As Greek Crisis Is Poised To Go Global, Plus A Bonus Q&A
Zimbabwe To Make You Think…'They went from set for life here in Zim to not being able to afford a loaf of bread in 2 days.'
There Is NO WAY Out Of A Pan-Global Economic Collapse--By Gregory Mannarino
Officials: US jets scramble to intercept Russian bombers off California, Alaska coasts on July 4
Exterminating 40 Million Americans In Re-Education Camps Is the Goal: Do you think that mall conversions and school conversions to FEMA camps coupled with stadium and arena conversions add up to 80 million Americans incarcerated &..!
Tom DeLay Knows Of Secret DOJ Memo To Legalize '12 New Perversions,' Including Bestiality And Pedophilia
The Ten Plagues Of Gay Marriage: Conservatives Warn Of Terrorist Attacks, War And Prison Due To SCOTUS Ruling
Tom DeLay Urges Americans To Defy The 'Ten' Justices Of The Supreme Court
EU Security Head: “Political Islam” is the Future of Europe
SLAUGHTER IN THE AMPHITHEATER:
ISIS forces child executioners to shoot Syrian soldiers...
Carried out in front of bloodthirsty crowds at ancient ruin...
Militants claim fired rockets at Israel from Sinai...
Pennsylvania Public School Teachers Attend Mosque To Better Serve Muslim Students
California Family Supports 4-Year-Old’s Decision To Transition From Male To Female
California’s rural poor hit hardest as groundwater vanishes in long drought
California dumping water because they conserved too much
Oregon launches program to tax drivers by the mile...
Oregon declares war on Christian faith
Video: Man Gets 8 MONTHS in Federal Prison For Driving Away From Internal Checkpoint yet illegal aliens are allowed to pour into America everyday and given every incentive to do so!!!
Where is the Mainstream Media Outrage?? BRUTAL FOOTAGE of Unsuspecting Navy Veteran Walking with a Cane Knocked Out by a Black Thug in “Knockout Attack” (VIDEO) The Navy veteran NEVER saw it coming.
HORROR! Black Youths Mock and Laugh at Unconscious and Bloody Victim After July 4th Beatdown (VIDEO)--Police had to rescue the man from an attacking mob of about forty Black people
Illegal Alien Confesses to Murdering Wife with Hammer in Texas -- Deported Four Times...
La Raza to host national conference...Hillary to address...
110,000 African immigrants resettled in Minnesota (many Muslim)...Townhall gets heated...
Screaming Illegal Aliens Disrupt Ann Coulter Signing...Destroy books...
She Fires Back: 'At least they weren't molesting any 4-year-olds'...
Trump defends inflammatory comments & asks: Who is doing the raping?
WASH POST LEAD FRIDAY: Obama goes for integration over deportation for illegals...
'Infectious disease pouring across the open border'...
Kenyan lawmaker warns Obama not to push abortion during trip
Pioneering doctor reveals the science behind abortion reversals - and the babies saved
REPORT: Schools implant IUDs in 6th grade girls -- no parental notice...
Judge blocks KS ban on 2nd-trimester abortion procedure
Reunification Rumors Swirl As Pope Francis Makes Overtures To Russian Orthodox Patriarch Kirill
The Kennel--By: Elijah Green, a.k.a.: Kent Hovind--Kent Hovind Exposes the United States Prison System... From the Inside
New eAudio: End Time Current Events: 7-5-15
End Time Current Events: 7-2-15
Lifetime TV’s “Preach” – False Prophetesses of The End Times
CW’s ‘The Messengers’ – End Times Deception
Preacher’s Daughters Season 3: Children of Blasphemy
From: LA
Subject: Temple Mount news...
Dr. Johnson, This is the Temple Institute Facebook page - apparently, they have a big news announcement in July 12! (news is near the top right hand) https://www.facebook.com/pages/The-Temple-Institute/22738684968
From: AHB
Subject: Woman Faces Jail Time for Heroically Saving Dog on Tracks
http://www.lifewithdogs.tv/2015/07/woman-faces-jail-time-for-heroically-saving-dog-on-tracks/ "Who knew that inanimate train tracks could be put into such jeopardy, and are afforded more protection than living beings?"
From: LA
To: Scott Johnson
Subject: Could you add this to your next ETCE newsletter?
bro Scott, I just saw this gospel tract exposing the gap theory through and through - it is excellent! http://creation.com/images/pdfs/flyers/gap-theory.pdf
It really pains me that this damnable heresy has caused a lot of confusion and divisions among the KJB body of Christ, as KJB ministries like Greg Miller are really pushing it now. And this heresy is also in KJB commentaries like Peter Ruckman's and David Hoffman's. Believe me, I am staunchly KJB, but again it really pains me to see contending for the faith KJB ministries pushing it now. The truth about this heresy needs to be exposed! bro Steven
10 Faraday Cages You Can Make at Home
Scott Johnson's Main Website at: http://contendingfortruth.com/
Alternate Website
Subscribe to the Free Online Newsletter at: http://eepurl.com/d2RhL
Free Gifts: Salvation & the TRUE Gospel/Good News!
Thursday, June 25, 2015
Jade Helm 2 Decoded - Allowing Artificial Intelligence / Quantum Computers To Decide Who Is Allowed To Exist in the "New" World
> > TAKE HEED - - VERY IMPORTANT INFORMATION < <
Regarding Jade Helm 15, I have been of the mindset for a while now that one of the main purposes for this drill is to test and gauge Americans' reaction to troops, spies, military equipment, on American soil, in their backyard, etc, etc, mainly because Jade Helm 15 has so intentionally been publicised, not only in the so-called Alternative Media, but also here and there in the Mainstream Media, with outright admissions that Texas has been deemed "enemy territory" . . and the list goes on and on . . of course there are those who are convinced that the exercise will go Live, with Martial Law, maybe even under the UN, as the end result . .
Well, I implore anyone who is searching for clues and information about how our future may be being completely designed by Artificial Intelligence (AI), complete with allowing the AI to decide who should continue to exist, and who should not. This exercise could well be just that, an exercise, but to make an extended large step toward the AI being put in charge. The info is presented without dramatic and emotional hype, put together by what appears to be a very good researcher.
Please try to take some time to watch/listen to the video just below . .
Caravan To Midnight - Episode 309 Jade Helm Decoded
Episode 309 – Jade Helm 2 Decoded: Today we welcome a learned
network/software engineer’s analysis of what’s really behind the
exercise.
Air Date – 6-11-15
Air Date – 6-11-15
[ I do not really like posting BIN articles, as so many of them are fear-mongering exaggerations, but it is the only place I could find this important article . . . I do find it interesting that the date-stamp on the article below is a few days earlier than the show above was recorded ]
Jade Helm is a Computer Driven Exercise
Sunday, June 7, 2015
By Clark Hay – June 7, 2015
The following excerpts are straight from military and related sources.
These excerpts provide strong evidence that behind JADE Helm 2015 are a set of
computer programs constantly directing and updating directives based on
information fed into the system from JADE Helm workstations.
These excerpts provide strong evidence that behind JADE Helm 2015 are a set of
computer programs constantly directing and updating directives based on
information fed into the system from JADE Helm workstations.
Much like the old IBM program “Deep Blue” was programmed to consider
every possible move and strategy to beat the world’s best human chess player,
the set of programs being used in the JADE [at the] Helm [for]
2015 exercise combines all the best military strategies and lessons learned
with easily updatable information about:
every possible move and strategy to beat the world’s best human chess player,
the set of programs being used in the JADE [at the] Helm [for]
2015 exercise combines all the best military strategies and lessons learned
with easily updatable information about:
·
Political situations and events
Political situations and events
·
Military realities activities and inclinations
Military realities activities and inclinations
·
Economic factors of all sides
Economic factors of all sides
·
Social affiliations, relations, profiles, belief systems
Social affiliations, relations, profiles, belief systems
·
Infrastructure – key facilities, essential services, and
installations that affect the overall stability of an area and their relevance
to the population
Infrastructure – key facilities, essential services, and
installations that affect the overall stability of an area and their relevance
to the population
·
Information routes and relevance
Information routes and relevance
·
Physical Environment – how terrain affects people, equipment, trafficability,
visibility, and
Physical Environment – how terrain affects people, equipment, trafficability,
visibility, and
·
Time sensitive elements
Time sensitive elements
JADE can process all of this information and issue battle plan
directives to command and control centers in under 1 hour. Any new data or
changes to any element of the campaign can be fed into the system from a “Human
Domain workstation” to get a new and more relevant set of battle plans – almost
in real time. This is a real plus in the ever changing conditions on the
ground, or in the air, or behind the scenes.
directives to command and control centers in under 1 hour. Any new data or
changes to any element of the campaign can be fed into the system from a “Human
Domain workstation” to get a new and more relevant set of battle plans – almost
in real time. This is a real plus in the ever changing conditions on the
ground, or in the air, or behind the scenes.
The above is what the phrase “Mastering the Human Domain” is all about.
As you will see from the excerpts below, JADE can even make predictions
for preemptive strikes.
for preemptive strikes.
The large scale exercise of JADE this summer will be a test of all
aspects of this complex system.
aspects of this complex system.
Will the test “go live” if real life events “warrant” a real response?
Will false flags occur between now and then? Is this the beginning of a
computer controlled military similar to Cyberdyne from the Terminator movies?
Will JADE’s predictive programming lead to a world like the one in the movie
“Majority Report”? … Maybe. But that’s the subject speculators, fear mongers
and the producers of doom porn.
Will false flags occur between now and then? Is this the beginning of a
computer controlled military similar to Cyberdyne from the Terminator movies?
Will JADE’s predictive programming lead to a world like the one in the movie
“Majority Report”? … Maybe. But that’s the subject speculators, fear mongers
and the producers of doom porn.
All I know is that we’re not in Kansas anymore.
Now for the excerpts:
The 1998 JADE Project – can generate an 80%
logistics solution in less than an hour
logistics solution in less than an hour
The Joint Assistant for Deployment and Execution (JADE)
is an integrated mixed-initiative prototype whose goal is to provide military
planners with the ability to generate a skeleton deployment plan within an
extremely fast time period. That is, JADE
can generate an 80% logistics solution in less than an hour. [Emphasis
mine]
is an integrated mixed-initiative prototype whose goal is to provide military
planners with the ability to generate a skeleton deployment plan within an
extremely fast time period. That is, JADE
can generate an 80% logistics solution in less than an hour. [Emphasis
mine]
JADE – The OTHER Definition
P. 14
3.3.2 DEEP Agents
The DEEP ["Deep
Episodic Exploratory Planning"] system uses two different types of
agents. The first type is called an interface or planning agent
and the second type is a critic agent.
Episodic Exploratory Planning"] system uses two different types of
agents. The first type is called an interface or planning agent
and the second type is a critic agent.
Agents in the DEEP
architecture extend and use the Java Agent
DEvelopment (JADE) framework (Bellifemine, 2006). DEEP requires a
distributed multi-agent system and a framework to help simplify the
implementation of this system. JADE was chosen because it is fully implemented
in Java, and supports these requirements.
architecture extend and use the Java Agent
DEvelopment (JADE) framework (Bellifemine, 2006). DEEP requires a
distributed multi-agent system and a framework to help simplify the
implementation of this system. JADE was chosen because it is fully implemented
in Java, and supports these requirements.
The role of DEEP in the JADE Helm exercise:
Abstract
This report
describes an overview and the progress to date of the Distributed Episodic Exploratory
Planning (DEEP) project. DEEP is a
mixed-initiative decision support system that utilizes past experiences to
suggest courses of action for new situations. It has been designed
as a distributed multi-agent system, using agents to maintain and exploit the
experiences of individual commanders as well as to transform suggested past plans
into potential solutions for new problems. The
system is mixed-initiative in the sense that a commander, through his or her
agent, can view and modify the contents of the shared repository as needed. The
agents interact through a common knowledge repository, represented by a
blackboard in the initial architecture. The blackboard architecture is
well-suited for dealing with ill-defined, complex situations such as warfare.
describes an overview and the progress to date of the Distributed Episodic Exploratory
Planning (DEEP) project. DEEP is a
mixed-initiative decision support system that utilizes past experiences to
suggest courses of action for new situations. It has been designed
as a distributed multi-agent system, using agents to maintain and exploit the
experiences of individual commanders as well as to transform suggested past plans
into potential solutions for new problems. The
system is mixed-initiative in the sense that a commander, through his or her
agent, can view and modify the contents of the shared repository as needed. The
agents interact through a common knowledge repository, represented by a
blackboard in the initial architecture. The blackboard architecture is
well-suited for dealing with ill-defined, complex situations such as warfare.
Part of the program (DEEP) uses Artificial
Intelligence:
Intelligence:
3.3.1 Blackboard –
The Distributed Shared Knowledge Structure
The Distributed Shared Knowledge Structure
As can be seen from
the DEEP architecture in Figure 1, the various DEEP systems rely on a shared
knowledge structure to act as a medium of communication and interaction.
the DEEP architecture in Figure 1, the various DEEP systems rely on a shared
knowledge structure to act as a medium of communication and interaction.
Also, in order to
support the NCO vision discussed in Section 2.1, the DEEP architecture requires
a mechanism that supports reach-back in a distributed system. A blackboard
system was chosen to fulfill this need as it not only functions as a shared
memory for the DEEP system, but as we discussed in Section 3.1, it provides
other functionality as well.
support the NCO vision discussed in Section 2.1, the DEEP architecture requires
a mechanism that supports reach-back in a distributed system. A blackboard
system was chosen to fulfill this need as it not only functions as a shared
memory for the DEEP system, but as we discussed in Section 3.1, it provides
other functionality as well.
A blackboard system is an opportunistic artificial
intelligence application based on the blackboard architectural software engineering
paradigm (Corkill, 1991).The blackboard system functions as a central knowledge
store facilitating communication and interaction between the different software
systems, including interface agents, critic agents, and simulation
engines (explained later in this chapter). These interactions are made possible
by the sharing and passing of objects.
intelligence application based on the blackboard architectural software engineering
paradigm (Corkill, 1991).The blackboard system functions as a central knowledge
store facilitating communication and interaction between the different software
systems, including interface agents, critic agents, and simulation
engines (explained later in this chapter). These interactions are made possible
by the sharing and passing of objects.
To fully meet the
requirements of the DEEP vision for distributed C2, a distributed blackboard
system was required. Current commercial and open source blackboard system
implementations are not distributed, so the paradigm needed to be extended from
a monolithic to a distributed environment. The current DEEP blackboard, shown
in Figure 4, was designed and implemented following this extended view using
design patterns described in (Hughes & Hughes, 2003).
requirements of the DEEP vision for distributed C2, a distributed blackboard
system was required. Current commercial and open source blackboard system
implementations are not distributed, so the paradigm needed to be extended from
a monolithic to a distributed environment. The current DEEP blackboard, shown
in Figure 4, was designed and implemented following this extended view using
design patterns described in (Hughes & Hughes, 2003).
The Predictive and Preemptive Capability of
JADE – ala the Minority Report
JADE – ala the Minority Report
p. 3
Experience with
recent operations also reveals that the C2
process must transition from a process of observation and reaction to one of prediction
and preemption. [Emphasis mine] To achieve this, we will need
to go beyond the focus of military operations, and instead address the entire spectrum
of Political, Military, Economics, Social, Infrastructure, and Information (PMESII)
(Alberts & Hayes, 2007).
recent operations also reveals that the C2
process must transition from a process of observation and reaction to one of prediction
and preemption. [Emphasis mine] To achieve this, we will need
to go beyond the focus of military operations, and instead address the entire spectrum
of Political, Military, Economics, Social, Infrastructure, and Information (PMESII)
(Alberts & Hayes, 2007).
To that end, the
focus of the research reported here is on developing a C2 environment that
supports the vision of Network Centric Operations (NCO) (Alberts & Hayes,
2007).
focus of the research reported here is on developing a C2 environment that
supports the vision of Network Centric Operations (NCO) (Alberts & Hayes,
2007).
The tenets of NCO
are:
are:
• Information
sharing
sharing
• Shared
situational awareness
situational awareness
• Knowledge of
commander’s intent
commander’s intent
JADE can select its own course of action
p. 18
3.3.4.3 Execution
Selection Critic Agents
Selection Critic Agents
Once there are several plans that have been
instantiated, adapted, and scored by the various agents in the DEEP system ["Deep
Episodic Exploratory Planning"], a
final agent is responsible for selecting the top scoring plan(s) and sending
them off for execution. This agent is known as the Execution Selection Critic
Agent. Its specialization is taking all of the information on the blackboard
and using it to evaluate and rank the plans. It then either decides which
plan(s) are to be executed by either prompting the user for mixed-initiative
input, or selecting one on its own. [Emphasis mine]…
instantiated, adapted, and scored by the various agents in the DEEP system ["Deep
Episodic Exploratory Planning"], a
final agent is responsible for selecting the top scoring plan(s) and sending
them off for execution. This agent is known as the Execution Selection Critic
Agent. Its specialization is taking all of the information on the blackboard
and using it to evaluate and rank the plans. It then either decides which
plan(s) are to be executed by either prompting the user for mixed-initiative
input, or selecting one on its own. [Emphasis mine]…
After the agent
realizes that the plans have converged, it then sorts the plans in order of best
to worst. In order to sort the plans, it uses the scores associated with each
plan to rate them. This functionality does not currently assign a weight to the
scores; however, in the future it should …
realizes that the plans have converged, it then sorts the plans in order of best
to worst. In order to sort the plans, it uses the scores associated with each
plan to rate them. This functionality does not currently assign a weight to the
scores; however, in the future it should …
So what is the Human Domain?
From the “Cognitive
Joint Force Entry White Paper” – 26 September 2014
Joint Force Entry White Paper” – 26 September 2014
3-2. Central Idea.
The United States Army Special Operations Command (USASOC) provides Cognitive
Joint Force Entry capability to support Geographic Combatant Commanders (GCC)
and Joint Force Commanders (JFC) using information and influence activities to prepare
the environment for follow-on actions. Cognitive
Joint Force Entry is a proactive, Human Domain-centered strategy that
synchronizes and employs all components of the global information environment
to predispose populations of a foreign country or countries to favorably view
U.S. activities or operations. It reflects campaigning to win in the
shaping phase of an operation, and it is a component to achieve persistent
influence within the operating environment to create decisive influence. It achieves strategic depth, builds
cognitive security, and it provides scalable options to achieve favorable
outcomes.
The United States Army Special Operations Command (USASOC) provides Cognitive
Joint Force Entry capability to support Geographic Combatant Commanders (GCC)
and Joint Force Commanders (JFC) using information and influence activities to prepare
the environment for follow-on actions. Cognitive
Joint Force Entry is a proactive, Human Domain-centered strategy that
synchronizes and employs all components of the global information environment
to predispose populations of a foreign country or countries to favorably view
U.S. activities or operations. It reflects campaigning to win in the
shaping phase of an operation, and it is a component to achieve persistent
influence within the operating environment to create decisive influence. It achieves strategic depth, builds
cognitive security, and it provides scalable options to achieve favorable
outcomes.
3-3. Solution
Concepts and Components.
Concepts and Components.
a. Win in the Human
Domain. Cognitive Joint Force Entry is part of Strategic Landpower designed to
prevail in the Human Domain. In COMUSSOCOM’s Posture Statement to the House
Armed Services committee on 11 Mar 2014, Admiral McRaven described the Human
Domain. He stated: “Our SOF engagement takes place in the Human Domain — the totality of the physical,
cultural, and social environments that influence human behavior in a
population-centric conflict. [Emphasis mine] The Human
Domain is about developing an understanding of, and nurturing influence among,
critical populaces. SOF is uniquely suited for operations that win
population-centric conflicts, oftentimes, and preferably, before they
start.”3 Success within the Human Domain “depends on the application
of unique capabilities that are designed to influence, fight, and win in
population-centric conflicts.”4 To achieve the goal of nurturing influence
and winning in population-centric conflicts, the
ARSOF approach will be to “first understand the population within the
context of the operational environment and then take meaningful action to
effectively influence human behavior toward achieving the desired
outcome.”5 Cognitive Joint Force Entry provides the mechanism for ARSOF to
set the conditions for success in the Human Domain.
Domain. Cognitive Joint Force Entry is part of Strategic Landpower designed to
prevail in the Human Domain. In COMUSSOCOM’s Posture Statement to the House
Armed Services committee on 11 Mar 2014, Admiral McRaven described the Human
Domain. He stated: “Our SOF engagement takes place in the Human Domain — the totality of the physical,
cultural, and social environments that influence human behavior in a
population-centric conflict. [Emphasis mine] The Human
Domain is about developing an understanding of, and nurturing influence among,
critical populaces. SOF is uniquely suited for operations that win
population-centric conflicts, oftentimes, and preferably, before they
start.”3 Success within the Human Domain “depends on the application
of unique capabilities that are designed to influence, fight, and win in
population-centric conflicts.”4 To achieve the goal of nurturing influence
and winning in population-centric conflicts, the
ARSOF approach will be to “first understand the population within the
context of the operational environment and then take meaningful action to
effectively influence human behavior toward achieving the desired
outcome.”5 Cognitive Joint Force Entry provides the mechanism for ARSOF to
set the conditions for success in the Human Domain.
b. Establish a
pro-active posture. ARSOF will employ Cognitive Joint Force Entry activities in
the earliest stage to shape the future operating environment and achieve
favorable outcomes before conflicts start. As the USSOCOM input to the 2014
Quadrennial Defense Review (QDR) recommended, “Preventing war through
presence and an innovative, small-footprint, low-cost, and responsive approach
to posture is far cheaper than waging war and mitigating the instability and
radiating effects that come with waging war.”6 Cognitive Joint Force Entry
addresses a key notion of that cost calculus by using information and influence
activities to shape the environment beginning in pre-conflict stages. ARSOF
achieves this by maintaining a persistent, continuous awareness of the global
information environment, which provides the ability to anticipate challenges
and identify opportunities for early and responsive
pro-active posture. ARSOF will employ Cognitive Joint Force Entry activities in
the earliest stage to shape the future operating environment and achieve
favorable outcomes before conflicts start. As the USSOCOM input to the 2014
Quadrennial Defense Review (QDR) recommended, “Preventing war through
presence and an innovative, small-footprint, low-cost, and responsive approach
to posture is far cheaper than waging war and mitigating the instability and
radiating effects that come with waging war.”6 Cognitive Joint Force Entry
addresses a key notion of that cost calculus by using information and influence
activities to shape the environment beginning in pre-conflict stages. ARSOF
achieves this by maintaining a persistent, continuous awareness of the global
information environment, which provides the ability to anticipate challenges
and identify opportunities for early and responsive
5
actions. The
pro-active posture provided by Cognitive Joint Force Entry will preclude
shortfalls in the past where “the US was slow to recognize the importance
of information and the battle for the narrative in achieving objectives at all
levels,”7 and the proactive posture addresses the critique that “the
US response to the emergent battle for the narrative was characterized by an
initial lack of leadership emphasis and resources that addressed information as
an instrument of national power.”8 Cognitive Joint Force Entry provides a
vital capability in a critical domain at strategic windows of opportunity where
other instruments of national power may not or cannot function. Adopting a
pro-active posture through Cognitive Joint Force Entry will gain the initiative
in setting the conditions for success by achieving favorable outcomes before
conflicts start.
pro-active posture provided by Cognitive Joint Force Entry will preclude
shortfalls in the past where “the US was slow to recognize the importance
of information and the battle for the narrative in achieving objectives at all
levels,”7 and the proactive posture addresses the critique that “the
US response to the emergent battle for the narrative was characterized by an
initial lack of leadership emphasis and resources that addressed information as
an instrument of national power.”8 Cognitive Joint Force Entry provides a
vital capability in a critical domain at strategic windows of opportunity where
other instruments of national power may not or cannot function. Adopting a
pro-active posture through Cognitive Joint Force Entry will gain the initiative
in setting the conditions for success by achieving favorable outcomes before
conflicts start.
c. Dominate
Cognitive Depth. For the purposes of this paper,
Cognitive Depth is a dimension of the operating environment encompassing a
populations’ realm of perceptions, beliefs, opinions, and attitudes. It can
have a global scope and includes the dimension of time. These components
present a highly complex challenge for successfully generating persistent influence
and preparing the environment for follow on actions.
Cognitive Depth. For the purposes of this paper,
Cognitive Depth is a dimension of the operating environment encompassing a
populations’ realm of perceptions, beliefs, opinions, and attitudes. It can
have a global scope and includes the dimension of time. These components
present a highly complex challenge for successfully generating persistent influence
and preparing the environment for follow on actions.
1) The concept of Cognitive Depth can be viewed through
a combination of terms drawn from psychology linked to doctrine. It is a
dimension influenced by an extremely broad range of factors, “to include
individual and cultural beliefs, norms, vulnerabilities, motivation, emotion,
experiences, morals, education, mental health, identities, and
ideologies.” 9 That broad scope is formed over time and
incorporates multiple references in a complex framework of attitudes, beliefs,
and behaviors, which are acquired.10 The source of attitudes are “culture,
social role, laws, mass media, institutes, schools, parents, family, peers and
others, various groups and direct experience.”11 Cognitive Depth, therefore, is formed, informed, and modulated by a
whole-of-environment interaction. Understanding that complex arena to create
effective strategies for the initial, shaping phase of a campaign requires
significant skill, deep knowledge, and supporting capacity.
a combination of terms drawn from psychology linked to doctrine. It is a
dimension influenced by an extremely broad range of factors, “to include
individual and cultural beliefs, norms, vulnerabilities, motivation, emotion,
experiences, morals, education, mental health, identities, and
ideologies.” 9 That broad scope is formed over time and
incorporates multiple references in a complex framework of attitudes, beliefs,
and behaviors, which are acquired.10 The source of attitudes are “culture,
social role, laws, mass media, institutes, schools, parents, family, peers and
others, various groups and direct experience.”11 Cognitive Depth, therefore, is formed, informed, and modulated by a
whole-of-environment interaction. Understanding that complex arena to create
effective strategies for the initial, shaping phase of a campaign requires
significant skill, deep knowledge, and supporting capacity.
2) While Cognitive
Depth may be formed by multiple factors, its
potential scale can range from individuals and groups to populaces and nations.
As Global Trends 2030 has described an interconnected world with instant
information access, it is possible that the perceptions, dispositions, and
attitudes of people, groups, and populations can be exposed to a near limitless
realm of influence, including global, virtual sources of influence. Cognitive Depth can therefore be both local and
global and can range from the tactical to the strategic level. The
global context may possess multiple strata where attitudes, perceptions,
beliefs, and opinions can potentially create a range of decisions and
behaviors. It includes what JP 2-0 calls “human factors affecting a leader’s
or key actor’s decision-making influences.12 Those decisions and
Depth may be formed by multiple factors, its
potential scale can range from individuals and groups to populaces and nations.
As Global Trends 2030 has described an interconnected world with instant
information access, it is possible that the perceptions, dispositions, and
attitudes of people, groups, and populations can be exposed to a near limitless
realm of influence, including global, virtual sources of influence. Cognitive Depth can therefore be both local and
global and can range from the tactical to the strategic level. The
global context may possess multiple strata where attitudes, perceptions,
beliefs, and opinions can potentially create a range of decisions and
behaviors. It includes what JP 2-0 calls “human factors affecting a leader’s
or key actor’s decision-making influences.12 Those decisions and
6
behaviors could
include various degrees of influence impacting a campaign. Therefore,
understanding and assessing the complex, global nature of Cognitive Depth will
become essential. Joint Publication 5-0 indicates “As planners assess
complex human behaviors…they draw on multiple sources across the operational
environment, including both analytical and subjective measures that support a
more informed assessment.”13 The new information environment will be
inherently dynamic and requires maintaining a persistent awareness to know how
and where influence and information activities can be applied. Achieving persistent awareness will be a necessary
precondition to effectively apply influence and information activities. Having
the capacity to maintain persistent awareness remains an essential ingredient
to success in the earliest stage of a campaign.
include various degrees of influence impacting a campaign. Therefore,
understanding and assessing the complex, global nature of Cognitive Depth will
become essential. Joint Publication 5-0 indicates “As planners assess
complex human behaviors…they draw on multiple sources across the operational
environment, including both analytical and subjective measures that support a
more informed assessment.”13 The new information environment will be
inherently dynamic and requires maintaining a persistent awareness to know how
and where influence and information activities can be applied. Achieving persistent awareness will be a necessary
precondition to effectively apply influence and information activities. Having
the capacity to maintain persistent awareness remains an essential ingredient
to success in the earliest stage of a campaign.
3) As Cognitive
Depth has a wide range and includes the realm of perceptions, beliefs,
opinions, and attitudes, it also incorporates the dimension of time, past,
present, and future. This characteristic
requires a capacity to maintain persistent engagement in the information
environment, understanding the past and looking into the future. The
Joint Publication 3-13, Information Operations, states: “the cognitive
dimension encompasses the minds of those who transmit, receive and respond to
or act on information.”14 That description points to a space with
processes working at the present time in the here and now. But because
cognition is “a general term of the higher mental processes by which
people acquire knowledge, solve problems, and plan for the future,”15 it
also spans the past in terms of memory, functions in the present, and reaches
into the future in terms of conceptualization. Maintaining persistent
engagement will enable an understanding of the continuum of the information
environment, which is necessary to implementing influence and information
activities. The combination of persistent
awareness and persistent engagement will yield deep cultural knowledge to craft
and implement activities specifically tailored to the environment.
Depth has a wide range and includes the realm of perceptions, beliefs,
opinions, and attitudes, it also incorporates the dimension of time, past,
present, and future. This characteristic
requires a capacity to maintain persistent engagement in the information
environment, understanding the past and looking into the future. The
Joint Publication 3-13, Information Operations, states: “the cognitive
dimension encompasses the minds of those who transmit, receive and respond to
or act on information.”14 That description points to a space with
processes working at the present time in the here and now. But because
cognition is “a general term of the higher mental processes by which
people acquire knowledge, solve problems, and plan for the future,”15 it
also spans the past in terms of memory, functions in the present, and reaches
into the future in terms of conceptualization. Maintaining persistent
engagement will enable an understanding of the continuum of the information
environment, which is necessary to implementing influence and information
activities. The combination of persistent
awareness and persistent engagement will yield deep cultural knowledge to craft
and implement activities specifically tailored to the environment.
4) Another aspect of
time as it relates to Cognitive Depth is the tempo at which change occurs, and
- within the cognitive domain – change takes time. Because change takes time, implementing influence and information
activities should occur as early as possible in order to achieve persistent
influence. Due to the complexity in the way opinions and attitudes are
formed and held, and because aspects of the cognitive domain directly relate to
the notion of identity and the way individuals interact with the world, changes
in the cognitive domain occur over time. Psychology texts refer to the
complexity of attitudes and why they are fundamental aspects of individuals.
“Attitudes help [people] to function in the social world”16 and
result from “the multiple processes by which humans adapt to their
environment.”17 It indicates that attitudes are integral to the way that
people function in relation to others and how individuals relate to the world.
These primal factors contribute to the lengthy process where change occurs.
Because of the lengthy process and the long lead times to effect change,
information and
time as it relates to Cognitive Depth is the tempo at which change occurs, and
- within the cognitive domain – change takes time. Because change takes time, implementing influence and information
activities should occur as early as possible in order to achieve persistent
influence. Due to the complexity in the way opinions and attitudes are
formed and held, and because aspects of the cognitive domain directly relate to
the notion of identity and the way individuals interact with the world, changes
in the cognitive domain occur over time. Psychology texts refer to the
complexity of attitudes and why they are fundamental aspects of individuals.
“Attitudes help [people] to function in the social world”16 and
result from “the multiple processes by which humans adapt to their
environment.”17 It indicates that attitudes are integral to the way that
people function in relation to others and how individuals relate to the world.
These primal factors contribute to the lengthy process where change occurs.
Because of the lengthy process and the long lead times to effect change,
information and
7
influence activities should be planned strategically
and applied pro-actively to develop decisive influence in the earliest stage of
campaigning. It should be planned through a whole-of-government approach
and should be implemented in early, whole-of-government manner to achieve
sustainable, persistent influence.
and applied pro-actively to develop decisive influence in the earliest stage of
campaigning. It should be planned through a whole-of-government approach
and should be implemented in early, whole-of-government manner to achieve
sustainable, persistent influence.
Pre-solicitation for a Human Domain
Workstation:
Workstation:
Solicitation Number:
W909MY-05-R-T020
Notice Type :
Presolicitation
Synopsis :
Added: April 19,
2005
2005
This is a Sole
Source requirement for a one year, Time and Materials T&M, Indefinite
Delivery Indefinite Quantity contract, with four, one year options to be issued
to Northrop Grumman Information Technology Inc., 12005 Sunrise Valley Dr.,
Reston, VA 20191-3404. Authority for Other Than Full and Open Competition is 10
USC 2304 c 1 and FAR 6.302-1, Only One Responsible Source. All responsible
sources may submit a written proposal which shall be considered by the agency
for the procurement of engineering/technical support for the
Counterintelligence/Human Intelligence (CI/HUMINT) Automation Management
Software (CHAMS) and Human Domain
Workstation (HDWS) Software Systems. The CHAMS and HDWS are the two
software baselines within the CI/HUMINT Management System (CHIMS). CHIMS is a
family of intelligence automation systems that facilitate the collection,
reporting, analysis and management of human intelligence. The
engineering/technical support will include system engineering, design, software
development, hardware integration, testing, training development, program
support, system security accreditation activities, and configuration
management. The proposed effort will provide for the continued development of
CHAMS, including enhancements to the current system, and initiatives to support
future Army requirements in support of CI-HUMINT automation, and enhancements to
the HDWS to meet requirements established jointly by Program Manager (PM),
CHIMS and Program Manager, Distributed Common Ground Station-Ar my (PM DCGS-A).
Please be advised that the response date included in this notice is a forecast
date, see the solicitation document on the IBOP website for the actual response
date. Previous procurement history will be in the solicitation. Drawings are
not available. The U.S. Army Communications-Electronics Life Cycle Management
Command (C-E LCMC) Acquisition Center has established a World Wide Business
Opportunity Page at https://abop.monmouth.army.mil, to provide electronic
transmittal of Request for Proposals (RFPs), Invitation for Bids (IFBs) and
Request for Quotes (RFQs) for Government to Industry. All parties interested in
doing business with C-E LCMC are invited to access, operate, and send and
receive information for the C-E LCMC Acquisition Center World Wide Business
Opportunities Page. Upon accessing the webpage, click on CECOM Business
Opportunities Page. Registration for a user ID and password will only be
necessary when you are considering the submission of proposals to the Business
Opportunities Page. The solicitation W909MY-05-R-T020 will be uploaded to the
internet site set forth above in or about 15 days. See note 22.***** Please
contact the IBOP help desk, toll free at 1-888-414-BOSS (2677) for technical
assistance with the IBOP. Please contact or e-mail
evonne.lipscomb@cacw.army.mil to request information. The contracting officer
for this proposal action is Rosetta Wisdo m-Russell 703-325-1717. SEE NOTE 22.
Source requirement for a one year, Time and Materials T&M, Indefinite
Delivery Indefinite Quantity contract, with four, one year options to be issued
to Northrop Grumman Information Technology Inc., 12005 Sunrise Valley Dr.,
Reston, VA 20191-3404. Authority for Other Than Full and Open Competition is 10
USC 2304 c 1 and FAR 6.302-1, Only One Responsible Source. All responsible
sources may submit a written proposal which shall be considered by the agency
for the procurement of engineering/technical support for the
Counterintelligence/Human Intelligence (CI/HUMINT) Automation Management
Software (CHAMS) and Human Domain
Workstation (HDWS) Software Systems. The CHAMS and HDWS are the two
software baselines within the CI/HUMINT Management System (CHIMS). CHIMS is a
family of intelligence automation systems that facilitate the collection,
reporting, analysis and management of human intelligence. The
engineering/technical support will include system engineering, design, software
development, hardware integration, testing, training development, program
support, system security accreditation activities, and configuration
management. The proposed effort will provide for the continued development of
CHAMS, including enhancements to the current system, and initiatives to support
future Army requirements in support of CI-HUMINT automation, and enhancements to
the HDWS to meet requirements established jointly by Program Manager (PM),
CHIMS and Program Manager, Distributed Common Ground Station-Ar my (PM DCGS-A).
Please be advised that the response date included in this notice is a forecast
date, see the solicitation document on the IBOP website for the actual response
date. Previous procurement history will be in the solicitation. Drawings are
not available. The U.S. Army Communications-Electronics Life Cycle Management
Command (C-E LCMC) Acquisition Center has established a World Wide Business
Opportunity Page at https://abop.monmouth.army.mil, to provide electronic
transmittal of Request for Proposals (RFPs), Invitation for Bids (IFBs) and
Request for Quotes (RFQs) for Government to Industry. All parties interested in
doing business with C-E LCMC are invited to access, operate, and send and
receive information for the C-E LCMC Acquisition Center World Wide Business
Opportunities Page. Upon accessing the webpage, click on CECOM Business
Opportunities Page. Registration for a user ID and password will only be
necessary when you are considering the submission of proposals to the Business
Opportunities Page. The solicitation W909MY-05-R-T020 will be uploaded to the
internet site set forth above in or about 15 days. See note 22.***** Please
contact the IBOP help desk, toll free at 1-888-414-BOSS (2677) for technical
assistance with the IBOP. Please contact or e-mail
evonne.lipscomb@cacw.army.mil to request information. The contracting officer
for this proposal action is Rosetta Wisdo m-Russell 703-325-1717. SEE NOTE 22.
Contracting Office
Address :
Address :
US Army
Communications-Electronics Command, CECOM Acquisition Center Washington, ATTN:
AMSEL-AC-W, 2461 Eisenhower Avenue, Alexandria, VA 22331-0700
Communications-Electronics Command, CECOM Acquisition Center Washington, ATTN:
AMSEL-AC-W, 2461 Eisenhower Avenue, Alexandria, VA 22331-0700
Place of Performance
:
:
US Army
Communications-Electronics Life Cycle Mangement Command, Acquisition Center
Washington ATTN: AMSEL-AC-W, 2461 Eisenhower Avenue Alexandria VA
22331-0700
Communications-Electronics Life Cycle Mangement Command, Acquisition Center
Washington ATTN: AMSEL-AC-W, 2461 Eisenhower Avenue Alexandria VA
22331-0700
Point of Contact(s)
:
:
Angle Trimmier,
7033335802
US Army7033335802
Communications-Electronics Command, CECOM Acquisition Center Washington
Northrop has a Human Domain Workstation:
BALTIMORE, March 2,
2007 (GLOBE NEWSWIRE) — A team led by Northrop Grumman Corporation (NYSE:NOC)
has developed and demonstrated technology for users of the U.S. Army’s
battlefield networks that allows access to
actionable intelligence from virtually anywhere in the field.
2007 (GLOBE NEWSWIRE) — A team led by Northrop Grumman Corporation (NYSE:NOC)
has developed and demonstrated technology for users of the U.S. Army’s
battlefield networks that allows access to
actionable intelligence from virtually anywhere in the field.
Northrop Grumman and
teammates General Dynamics, Lockheed Martin, and Science Applications
International Corp. were chartered by the U.S. Army to integrate multiple,
existing intelligence, surveillance and reconnaissance (ISR) systems into a
single multi-intelligence system called the Distributed Common Ground System -
Army (DCGS-A). This team is officially named the DCGS-A Industry Team, with
Northrop Grumman acting as the system integrator.
teammates General Dynamics, Lockheed Martin, and Science Applications
International Corp. were chartered by the U.S. Army to integrate multiple,
existing intelligence, surveillance and reconnaissance (ISR) systems into a
single multi-intelligence system called the Distributed Common Ground System -
Army (DCGS-A). This team is officially named the DCGS-A Industry Team, with
Northrop Grumman acting as the system integrator.
The team
successfully conducted several DCGS-A, Version 4, Proof of Concept (PoC) demonstrations
at Ft. Belvoir, Va.; Ft. Huachuca, Ariz.; and Northrop Grumman laboratory
facilities in Baltimore from August through December 2006. These efforts
resulted in a new model for moving battlefield data and intelligence in support
of tactically deployed combat commanders. The system uses queried/access
methodology, and is designed to operate within a distributed-operations,
enterprise environment.
successfully conducted several DCGS-A, Version 4, Proof of Concept (PoC) demonstrations
at Ft. Belvoir, Va.; Ft. Huachuca, Ariz.; and Northrop Grumman laboratory
facilities in Baltimore from August through December 2006. These efforts
resulted in a new model for moving battlefield data and intelligence in support
of tactically deployed combat commanders. The system uses queried/access
methodology, and is designed to operate within a distributed-operations,
enterprise environment.
Participating
systems included the Army’s Joint STARS Common Ground System, the Joint STARS
Work Station, the Human Domain Work Station,
the Digital Terrain Support System, the Integrated Meteorological System, the
V3 Joint Intelligence Operations Capability – Iraq (JIOC-I) work suites and
selected components of the Navy’s DCGS Multi-Intelligence Segment integrated
with the DCGS Integration Backbone (DIB).
systems included the Army’s Joint STARS Common Ground System, the Joint STARS
Work Station, the Human Domain Work Station,
the Digital Terrain Support System, the Integrated Meteorological System, the
V3 Joint Intelligence Operations Capability – Iraq (JIOC-I) work suites and
selected components of the Navy’s DCGS Multi-Intelligence Segment integrated
with the DCGS Integration Backbone (DIB).
Data interchange
within the PoC was achieved using a combination of a commercially available
Enterprise Service Bus and the U.S. Department of Defense DIB. The
demonstration adhered to DoD’s guidance to remain consistent with DIB
standards, be interoperable with existing components and be facilitated by the
use of DIB architecture.
within the PoC was achieved using a combination of a commercially available
Enterprise Service Bus and the U.S. Department of Defense DIB. The
demonstration adhered to DoD’s guidance to remain consistent with DIB
standards, be interoperable with existing components and be facilitated by the
use of DIB architecture.
The Northrop
Grumman-led DCGS-A Industry Team has continued to expand the Army’s net-cetric
enterprise capability with DCGS-A, Version 4. Previous DCGS versions included
the Army’s Version 2, Joint Intelligence Operations Capability-Iraq (JIOC-I)
and the DCGS-A Version 3, battle command interoperability.
Grumman-led DCGS-A Industry Team has continued to expand the Army’s net-cetric
enterprise capability with DCGS-A, Version 4. Previous DCGS versions included
the Army’s Version 2, Joint Intelligence Operations Capability-Iraq (JIOC-I)
and the DCGS-A Version 3, battle command interoperability.
“Our team is committed to designing and delivering the
best capabilities for producing actionable intelligence rapidly available to
the warfighter,” said Ken Wilson, vice president of C4ISRT
Networked Systems for Northrop Grumman’s Electronic Systems sector. “Our
approach makes the best of the Army’s investment in ISR technologies. By
working with our government and industry partners, we will continue to
integrate ‘best of breed’ applications and services from multiple sources in an
open service-oriented architecture environment.”
best capabilities for producing actionable intelligence rapidly available to
the warfighter,” said Ken Wilson, vice president of C4ISRT
Networked Systems for Northrop Grumman’s Electronic Systems sector. “Our
approach makes the best of the Army’s investment in ISR technologies. By
working with our government and industry partners, we will continue to
integrate ‘best of breed’ applications and services from multiple sources in an
open service-oriented architecture environment.”
Northrop Grumman
Corporation is a $30 billion global defense and technology company whose
120,000 employees provide innovative systems, products, and solutions in
information and services, electronics, aerospace and shipbuilding to government
and commercial customers worldwide.
Corporation is a $30 billion global defense and technology company whose
120,000 employees provide innovative systems, products, and solutions in
information and services, electronics, aerospace and shipbuilding to government
and commercial customers worldwide.
CONTACT: Paul
Cabellon
Cabellon
Northrop
Grumman Electronic Systems
Grumman Electronic Systems
(410)
765-7192
765-7192
PMESII – An Acrostic for the Spectrum of
Data Gathered
Data Gathered
p. 38
PMESII Political, Military, Economics, Social,
Infrastructure, and Information
Infrastructure, and Information
More on what PMESII is:
In Document “CTC-A-COIN-Guidebook.pdf”
p. 11
As with ASCOPE3xD,
equal consideration must be given to the insurgent, counterinsurgent, and the
population when using ASCOPE/PMESII
equal consideration must be given to the insurgent, counterinsurgent, and the
population when using ASCOPE/PMESII
However, through the
use of PMESII Counterinsurgents can begin to further analyze the information
and
use of PMESII Counterinsurgents can begin to further analyze the information
and
civil considerations
provided by ASCOPE3xD.
provided by ASCOPE3xD.
In this regard, PMESII is defined as a set of interrelated
operational variables that provides counterinsurgents with a method to analyze
the OE through specific filters.
operational variables that provides counterinsurgents with a method to analyze
the OE through specific filters.
Thus,
counterinsurgents consider the following factors and their relevance to the OE
as they relate to the civil considerations of ASCOPE:
counterinsurgents consider the following factors and their relevance to the OE
as they relate to the civil considerations of ASCOPE:
·
Political: Key
elements of the formal, informal, and shadow governance and how they are
relevant to the population and overall stability in the area.
Political: Key
elements of the formal, informal, and shadow governance and how they are
relevant to the population and overall stability in the area.
·
Military: Key
elements influencing the security situation and overall stability in the area.
Military: Key
elements influencing the security situation and overall stability in the area.
·
Economic: Key
elements of overall economic stability and activity in the area.
Economic: Key
elements of overall economic stability and activity in the area.
·
Social: Key
elements that influence traditional social dynamics in the area.
Social: Key
elements that influence traditional social dynamics in the area.
·
Infrastructure: Key
facilities, essential services, and installations that affect the overall
stability of an area and their relevance to the population
Infrastructure: Key
facilities, essential services, and installations that affect the overall
stability of an area and their relevance to the population
·
Information: Key
elements that facilitate the transfer of information amongst the local
population and their relevance to the population.
Information: Key
elements that facilitate the transfer of information amongst the local
population and their relevance to the population.
·
Physical Environment:
Key terrain affects people, equipment, trafficability, visibility, and the
employment of many weapons.
Physical Environment:
Key terrain affects people, equipment, trafficability, visibility, and the
employment of many weapons.
·
Time: The
population, counterinsurgent, and insurgent often view time differently.
Time: The
population, counterinsurgent, and insurgent often view time differently.
Also See Internet provider Comcast’s
involvement: https://home.comcast.net/~dshartley3/DIMEPMESIIGroup/DPGroup.htm
involvement: https://home.comcast.net/~dshartley3/DIMEPMESIIGroup/DPGroup.htm
Related topics at
bottom of page:
bottom of page:
·
CERDEC’s HSCB
Testbed project
CERDEC’s HSCB
Testbed project
·
DMSO’s OOTW Toolbox
DMSO’s OOTW Toolbox
·
The Interim Semi-static Stability Model (ISSM)
The Interim Semi-static Stability Model (ISSM)
·
MORS’ Workshop on Consequence
Management
MORS’ Workshop on Consequence
Management
·
MORS’ Workshop on Impact of
Emerging Societies on National Security
MORS’ Workshop on Impact of
Emerging Societies on National Security
·
MORS’ Workshop on Global War on
Terrorism
MORS’ Workshop on Global War on
Terrorism
·
A tool for Verification
& Validation of DIME/PMESII models
A tool for Verification
& Validation of DIME/PMESII models
Subscribe to:
Comments (Atom)
Sheeple
The Black Sheep tries to warn its friends with the truth it has seen, unfortunately herd mentality kicks in for the Sheeple, and they run in fear from the black sheep and keep to the safety of their flock.
Having tried to no avail to awaken his peers, the Black Sheep have no other choice but to unite with each other and escape the impending doom.
What color Sheep are you?
.
100627




