CCRP Publications are now only available via download
If you are interested in finding out how to obtain a hard copy of a CCRP publication, please contact email@example.com
All CCRP publications are government products and are provided at no cost to the public.
This book is a call to action. It is no longer sufficient for an organization to simply be effective. Today’s organizations must also develop agility in order to successfully cope with the complex challenges they face in a dynamic and uncertain world. This book explains why agility, once a nice-to-have capability, is now an imperative. Readers are provided with an in-depth understanding of this essential capability, its enablers and inhibiters, and ways to visualize and measure agility. Experimental results are used to illustrate the agility advantage as well as the adverse consequences of a lack of agility. This book outlines a plan to improve an organization’s agility, and identifies the research needed to improve our understanding of agility.
The essence of this book is to describe how the UK Ministry of Defence has risen to the challenges of complex endeavors and the information age by investing in the development of new analytical tools, in particular closed form simulation modeling, in order to provide the evidence base for improved high level decision-making in government. At the core of the approach is the development of a consistent representation of command and control across the suite of models. This development was itself significantly influenced by the interaction and exchange of ideas drawn from a number of NATO research task groups—and the development of these ideas is still continuing. These developments are brought together in illustrating how they impact the shaping of UK defense policy through informing high level decision-making by officials and government ministers.
Power to the Edge articulates the principles being used to provide the wideband network that people will trust, populate with information, and use to share awareness, collaborate effectively, and synchronize their actions.
"This book is truly a must-read for anyone interested in decentralization and the social and organizational relevance of shifting power to the edge, whether in a commercial or a defense context." – Ray Ozzie, Chief Software Architect, Microsoft more››
"[Power to the Edge] may be the best written government document of the 21st century so far." – Dan Ancona, Project Director, California VoterConnect more››
This book articulates the nature of the characteristics of Network Centric Warfare, and suggests a process for developing mission capability packages designed to transform NCW concepts into operational capabilities.
"NCW is going to change the way we fight; it is unrealistic to think otherwise when we see the information technology revolution that is taking place all around us."
– Thomas Carroll, Wings of Gold more››
"[Network Centric Warfare] is highly recommended for the new generation of officers corps who aspire to command." – LTC Tan Kim Seng, Republic of Singapore Army more››
The NATO NEC C2 Maturity Model (N2C2M2) was developed to build on dearly won insights from the past, but goes beyond them in order that we can exploit Information Age approaches to address new mission challenges. This way of thinking about C2 is thus entirely compatible with current NATO Allied Command Transformation (ACT) thinking on Future Capable Forces which puts the emphasis on Mission Command within federated complex environments and ad hoc coalitions. The N2C2M2 was developed by the RTO SAS-065 Research Task Group over a period of about three years. It starts by defining a number of C2 approaches, ranging from Conflicted C2 to Edge C2, that correspond to different regions within the C2 Approach Space, containing the different possible approaches to accomplish the functions that are associated with command and control. This approach space can be viewed from two perspectives. First, it can be used to think about C2 within existing organizations. Second, it can be used to think about how a disparate set of independent (yet inter-dependent) entities, that is, a collective, can achieve focus and convergence.
Conventional analysis is not sufficient to cope with today's and tomorrow's problems. We must augment our efforts with nonlinear insights, and provide a basic understanding of what that involves.
This book presents an approach to planning appropriate for complex endeavors at a level of detail sufficient to formulate and conduct a campaign of experimentation to test, refine, and implement a new approach to planning.
Experimentation has proven itself in science and technology, yielding dramatic advances. Can we apply the same experiment methods to the military transformation process?
This publication begins with a detailed description of the problem that effects-based approaches are thought to address and explains why effects-based approaches are so important to understand and to be able to do.
This is the first in a new series of CCRP Publications that will explore the future of Command and Control. This book begins at the beginning: focusing on the problem(s) Command and Control was designed to solve.
The authors illustrate how organizations and networks function and how the connections between people, nature, societies, and the military can be understood in order to pursue the goal of an agile organization.
In this follow-on to the COBP for Experimentation, the concept of a campaign of experimentation is explored in detail, including the need and place for campaigns in transformation, evolution, and achievement of innovation.
Colonel Allard examines the challenges and the successes of the U.S. peacekeeping mission to Somalia in 1992-1994. Key topics include planning, deployment, conduct of operations, and support.
This special edition of the UK Journal of Defence Science on Network Enabled Capability aims to stimulate debate and push forward the evolution of ideas.
Professor Moffat articulates the models and equations that demonstrate the relationship between warfare and the emergent behaviour of complex systems, and a means to calculate and assess the likely outcomes.
This book speaks directly to what we are trying to accomplish on the fields of battle and argues for changes in the way we decide what effects we want to achieve and what means we will use to achieve them.
This Occasional considers command and combat in the Information Age. Defence thinkers everywhere are searching forward for the science and alchemy that will deliver operational success.
Kosovo offered a unique opportunity to conduct C4ISR-focused research in the areas of coalition C2, civil-military cooperation, information assurance, C4ISR interoperability, and information operations
Analysts will be increasingly called upon to examine the impact of new information-related capabilities coupled with new ways of organising and operating in a new environment with reduced levels of fog and friction.
This book deals with the issues associated with a large government institution, a set of formidable impediments, and the nature of the changes being brought about by Information Age concepts and technologies.
Experimentation is the lynch pin in the DoD's strategy for transformation. Without a proper program of experimentation, the DoD will not be able to take full advantage of the opportunities presented by the Information Age.
In what ways will wars and the military be different in the Information Age? What will this mean for the U.S. military? This book explores answers to these vexing questions raised earlier in the Information Age Anthology.
This book presents an alternative to the linear strategies of the Industrial Age. The approach advocated here begins with the premise that adaptation to the Information Age centers around the ability to utilize information.
This report asks whether the notion of struggles for control over information identifiable in situations of conflict also has relevance for situations of third-party conflict management-for peace operations.
Is the Information Age bringing new challenges and threats, and if so, what are they? What sorts of dangers will these challenges and threats present? From where will they (and do they) come? Is information warfare a reality?
Without successfully fielding systems of systems, we will not be able to implement emerging concepts in adaptive and agile command and control, nor will we reap the potential benefits of Network Centric Warfare.
A peace operations campaign should be seen as a linked sequence of confrontations. The objective in each confrontation is to bring about certain compliant behavior in other parties, until the campaign objective is reached.
This book provides the final results of a project sponsored by the Joint Warfare Analysis Center. The objective was to examine how military operations can support achieving civil stability and peace in states in complex emergencies.
This book tells of the challenges faced and actions taken to ensure that IFOR and Operation Joint Endeavor were successes. This story was pieced together from firsthand experiences, interviews, focused research, and lessons learned.
The authors have surfaced and explored some profound issues that will shape the legal context within which information warfare may be waged and national information power exerted in the coming years.
This book examines the place of PI and PSYOP in peace operations through the prism of NATO operations in Bosnia-Herzegovina.
In this first volume, we will examine: what the Information Age is; how it affects commerce, business, and service; what it means for the government and the military; and how it affects international actors and systems.
This work was intended to: (1) push the envelope; (2) emphasize the policy and strategic dimensions of national defense with the implications for Complexity Theory; and (3) get the best talent available in academe.
This overview is the result of an effort to provide background material to participants in a series of interagency meetings exploring the nature of the problem and to identify areas of potential collaboration.
This book explores alternative concepts for structuring mission capability packages. (Note: The title and concepts from this book earned widespread popularity in the media in 2003 in reference to the war in Iraq.)
Haiti offered an opportunity to explore interagency relations in an operation that had high visibility and a greater degree of interagency civilian-military coordination and planning than the other operations examined to date.
This strategy uses Information Age technologies to identify and avoid adverse unintended consequences associated with the introduction of information technologies, and to capitalize on unexpected opportunities.
This report documents a workshop organized by the National Defense University, which found that communication need to be improved between the NGO and U.S. Government communities, especially with the military.
If the United States acquires dominant battlespace knowledge, how might that affect the way it goes to war, the circumstances under which force can be used, and the resulting alterations of the global geomilitary environment?
This report documents a workshop organized by the Institute for National Strategic Studies, which examined information warfare and deterrence as a subject with strong command and control implications.
This report documents a workshop organized by the INSS, which sought to determine what technologies are required for OOTW. The group examined the complexities of introducing relevant technologies.
The U.S. experience shows that traditional C2 approaches, and doctrine are not well suited for peace operations. This book examines alternative command arrangements, and describes the attributes of effective arrangements.
Is Information Warfare a nascent art, or simply the newest version of a time-honored feature of warfare? Is it a new form of conflict, or an old one that has been given new life by the Information Age?
The CCRP constantly strives to improve its publications. If you have any comments or questions regarding specific titles or publications in general, please contact us.