Terms to be familiar with for the COPC as of 14 April 2016
|
|
- Robert Lucas
- 7 years ago
- Views:
Transcription
1 Terms to be familiar with for the COPC as of 14 April 2016 Note: * s denote proposals to the COPD for improved clarity of terms. Critical Capability (Ability*) (CC): the primary ability (or abilities) that gives an DFWRU V&entre of Gravity (COG) 1 its strength. What are the primary means that enables the COG to gain and maintain dominant influence over an opponent or situation, such as to threaten or coerce an opponent, or to control a population, wealth distribution, or a political system? (COPD, pg. 4-46, Figure 4.11) To be influenced/denied to an opponent and exploited in a friend. (COPD, pg. 4-46, Figure 4.11) The key word is the verb - WKHDELOLW\WR«&23'SJ-46, Figure 4.11) CC Examples: The ability to deploy forces; the ability to gather intelligence Critical Requirement (CR): specific conditions, components or resources that are essential to sustaining those capabilities. What are those key system elements and essential conditions, FKDUDFWHULVWLFVFDSDELOLWLHVUHODWLRQVKLSDQGLQIOXHQFHVUHTXLUHGWRJHQHUDWHDQGVXVWDLQWKH&2* V critical capabilities, such as specific assets, physical resources, and relationships with other actors? (COPD, pg. 4-46, Figure 4.11) To be denied to an opponent and provided to a friend. Nouns, things. (COPD, pg. 4-46, Figure 4.11) Also referred to as critical operational requirements within the COPD. The COPD goes into further detail about critical operational requirements and for the mission analysis phase the COPD lists several items as critical operational requirements that the JOPG needs to consider throughout Phase 3A to include: Information, Knowledge and Intelligence Requirements, Critical Operational Support and Resource Requirements, Preconditions for Success, Rules of Engagement/Use of Force, Requirements for Interaction with Relevant International and National Actors, Strategic Communication/Information Strategy Requirements, and CRMs. (COPD, para 4-26 (i)) Critical Requirements can also be Force Capabilities (FC), see Force Capabilities (FC) described later in this paper. CR Examples: Fuel, Infrastructure, armour units Critical Vulnerability (CV): exists when a critical requirement is deficient, degraded or missing and exposes a critical capability to damage or loss. What are the weaknesses, gaps or deficiencies in the key system elements and essential conditions, characteristics, capabilities, relationship and influences through which the COG may be influenced or neutralised? (COPD, pg. 4-46, Figure 4.11) To be exploited in an opponent and protected in a friend. A noun with modifiers. (COPD, pg. 4-46, Figure 4.11) The identification of Critical Capabilities (CC) will lead to a need for certain Critical Requirements (CR). Once defining what those CRs are planners will think about the inherent Critical Vulnerabilities (CV) associated with those CRs. CV Examples: Extended LLOCs, Insufficient resupply network, incompatible C2 systems Decisive Condition (DC): A combination of circumstances, effects, or a specific key event, critical factor, or function that, when realised, allows commanders to gain a marked advantage over an opponent or contribute materially to achieving an operational objective. (AJP-01(D), Annex 5A, para 5A1 (e)) 1 More information regarding COGs of actors and COG analysis will be provided later on the course. (Reference COPD, para 4-26 (f) and Figure 4.11 for an immediate questions about COG analysis)
2 DCs will need to be supported by at least two measureable Operational Effects (OE), if there is only one OE that the JOPG can identify as supporting a particular DC then the DC is essentially only the OE written in the context of a DC and planners will need to find or create the associated DC that that OE supports. DCs, Conditions to be Established (CE), and OEs developed at this stage of the planning process will assist the JOPG in the development of the operational framework later on in Phase 3A. DC Example: Freedom of Action for UN/IOs/NGOs, Country X forces combat ineffective Condition to be Established (CE): Conditions that must be established and sustained in the operational area in order to achieve objectives and the desired end state. (no strict definition given in applicable references) The operational objectives will establish the conditions that must be achieved to attain the desired end state. Therefore planners analyse these conditions in the context of the different actor systems and their interaction to determine the conditions that must be established and sustained in the operational area. (AJP 5, para 0327 (a)) Conclusions in mission analysis can be labelled as CE and then later on in developing the operational framework the JOPG can determine it this is a Decisive Condition or an Operational Effect. CE Examples: Reference Decisive Conditions and Operational Effects definitions and examples Operational Effect (OE): 'HILQHGDVµ>D@FKDQJHLQWKHVWDWHRIDV\VWHPRUV\VWHPHOHPHQWWKDW UHVXOWVIURPRQHRUPRUHDFWLRQVRURWKHUFDXVHV 'HULYHGIURPREMHFWLYHVHIIHFWVEULGJHWKHJDS between objectives and actions by describing what changes in a system are required. (COPD, Annex A, para 4 (a)) Generally an effect can be considered a result, outcome or consequence of one or more actions or other causes, that will influence the physical or behavioural state of a system (or system elements) thereby contributing towards the realisation of one or more decisive points (old term terminology for decisive conditions) or conditions. (AJP-01(D), Annex 5A, para 5A1 (e)) OEs are changes in system-states generated through actions that are measureable in nature. Effect statements can be written in two ways: (1) Using the present tense to describe the new state of a system or system element as we wish to see it after it has been changed. (2) Using the passive YRLFHZLWKWKHYHUEµWREH DQGWKHSDUWSDUWLFLSOHRf a verb. At the operational level, where the DC is used, the second approach (using the passive voice) is recommended so as not to cause confusion between effects and DCs. (COPD, Annex A, para 4(d)) OE Examples: Insurgency forces attacks reduced, LLOCs secured Operational Action (OA): Operational actions are required to create the OEs and establish the DCs that are described above. Operational actions will establish the operational requirement for the allocation of military capabilities and the prioritisation of training, exercises, and evaluations; therefore, they can be expressed as joint or single service actions as appropriate. (COPD, para 4-27 (g)) Operational Actions (OA) generate Operational Effects (OE) that supports the future establishment of Decisive Conditions (DC). OA Examples: Conduct COIN operations, Secure SPOD Force Capability (FC): Also referred to as primary military capabilities. Under Appreciate Force Capability Requirements paragraph in the COPD Chapter 4 the following is stated: With the input of liaison/planning elements from the designated component commands, the JOPG should appreciate the adequacy of the primary military capabilities described in the option to conduct the MSAs and create the desired effect, taking into account the possible opposition. (COPD, para 4-19 (h))
3 The joint task force utilizes their Force Capabilities (FC) to conduct Operational Actions (OA) which generate Operational Effects (OE) leading to the future establishment of Decisive Conditions (DC). There is linkage between requirements and force capabilities per the following statement: Requirements, initially stated as force capabilities, are refined during subsequent phases of planning by the Joint Headquarters (JHQ) and designated component/subordinate commands in terms of specific force types. (COPD, para 3-41 (b)) Force Capabilities Required: This is a summary description of the major force capabilities required to execute the planning. A combined joint statement of requirements (CJSOR) may be the formal expression of this requirement. (AJP 5-0, para 022 (b)) A Force Capability (FC) can be a Critical Requirement (CR) but a critical requirement is not always going to be a Force Capability (FC). FC examples: Armour units, Theatre Ballistic Missile Defence Complementary Non-Military Action (CNMA): Complementary military, political, economic and civil actions that will support the creation of desired effects in the operational environment. (no strict definition given in applicable references) Appreciate the Use of Complementary Non-Military Actions. In many cases desired strategic effects cannot be created by military action alone or could be created more effectively by political, economic and civil actions, possibly in conjunction with military means. (COPD, para 4-19 (g)) With respect to CNMAs, those changes that require activities beyond the JOA should be identified as pre-conditions for success. (COPD, para 4-27 (h)) CNMA Example: Support efforts of civil actors to establish public works and education projects Lines of Operation: In a campaign or operation, logical line(s) linking effects and decisive conditions in time to an objective. (proposed definition - COPD, pg 4-56, footnote 74) Lines of operation link effects and DCs to an operational objective, with normally one line of operation per objective. (COPD, para 4-27 (i)) Planners will need to know what makes up an operational design for a number of these terms to be better understand. The figure below depicts an operational design and demonstrates how Decisive Conditions (DC) are established starting with Force Capabilities (FC) conducting Operational Actions (OA) that lead to Operational Effects (OE) which support the achievement of DCs along different Lines of Operations leading to Operational Objectives. Complimentary Non-Military Actions (CNMA) also needs to be taken into account in order to support the establishment of OEs and DCs. Decision Points (DP) are also depicted and more information on DPs is directly below this figure.
4 Decision Point (DP): A point in space and time, identified during the planning process, where it is anticipated that the commander must make a decision concerning a specific course of action. (AAP- 06, pg 2-D-2). They should* be linked to assumptions, CCIRs, branches 2 or sequels 3. They can also be related to a transition between phases of an operation. However, decisions associated with DPs related to transitioning phases are made within the context of conducting assessment over time during the actual execution of an operation to determine if conditions have been meet to transition to the next phase or sub-phase of an operation.* [DPs] identified during planning and included in the synchronisation matrix and the* operational design become a key focus for the Commander during execution, which* normally requires* the creation of a Decision Support* Matrix (see decision support matrix example below) based on Commander agreed criteria. (COPD, para 4-35 (h) (6)) Decision Support Matrix Example (More information on CCIRs later in this paper) When considering DPs, it is important to understand that the operational design is an illustration of the changes from the current set of unacceptable systems states to the acceptable set of system states in accordance with the objectives and end state. These required changes in system states are depicted through the DCs and the OEs along different lines of operation that are achieved as a result of actions conducted over time within the constraints and restraints for the execution of an operation. Based upon this understanding of an operational design planners will need to identify events that can occur that are so significant in nature that the identified DCs and OEs annotated along the lines of operation cannot compensate for such a dramatic change within the operational environment. These events are linked to the assumptions that planners will have to make in order to develop lines of operation based upon their understanding of the operational environment in order to achieve the objectives of the operation. When these significant events happen that prove the assumptions not to be valid for planning an operation, there is a need for a DP and an associated branch or sequel plan. The inherent risk with planning assumptions is that the possibility remains that the assumptions are not going to be valid and therefore planners will need to identify those risks associated with their assumptions and then plan accordingly. See figure on the next page. 2 Branches address the µ š]}v}(^ázš](_m Branches are options within a particular phase of an operation, which are planned and executed in response to anticipated opportunity or reversal within that phase, to provide the Commander with the flexibility to retain the initiative and ultimately achieve the original objective. 3 Sequels address the µ š]}v}(^ázš[ væšm_ Sequels are options for subsequent operations within a campaign or the following phase(s) of an operation. They are planned on the basis of the likely outcome of the current operation or phase, in order to provide the Commander with the flexibility to retain the initiative and/or enhance operational tempo and ultimately achieve the objective.
5 In order to further improve understanding of DPs consider that there should be no DP associated with a change in system state (OE or DC) that is already identified along a line of operation on an RSHUDWLRQDOGHVLJQSULRUWRWKHH[HFXWLRQRIWKHRSHUDWLRQ)RULQVWDQFHLIWKHUHLVD'&RIµ&RXQWU\ ; VIRUFHVDUHFRPEDWLQHIIHFWLYH DOUHDG\RQWKHRSHUDWLRQDOdesign then there should be no need for a '3SULRUWRRSHUDWLRQH[HFXWLRQWKDWVWDWHVµ&RXQWU\; VIRUFHVUHPDLQFRPEDWHIIHFWLYH 7KH reason for this is that prior to execution of the operation the JOPG has planned for all of the elements needed to achieve this DC along a line of operation based upon the current understanding of the system states within the operational environment. Therefore there would be nothing to annotate in association with a branch or sequel plan in relation to not achieving this DC because there is already a line of operation within the operational design that captures those elements needed to achieve that DC. See figure below.
6 For each decision point, there would be associated CCIR(s) to trigger those decisions and PIRs to inform the CCIRs. (COPD, pg. 4-56, footnote 77) DP Example: Hostile activity from Country X against Country Y &RPPDQGHU V&ULWLFDO,QIRUPDWLRQ5HTXLUHPHQW&&,5 CCIRs comprise information required for the commander to make timely decisions as required for mission accomplishment. They identify potential changes in the situation and eventualities that would mandate an operational decision or strategic guidance. The JOPG must consider CCIRs from two aspects: 1) any CCIRs essential to the FRPPDQGHU VGHFLVLRQ-PDNLQJDQGGHYHORSPHQWRIWKHSODQVXFKDVUHODWHGWRDSODQ VDVVXPSWLRQV and 2) those CCIRs related to key decisions for plan execution, including decision points for branches or sequels, the transition between phases or a change to the main effort. (COPD, pg 4-47, footnote 56) Information concerning areas that are either critical to the success of the mission or represent a critical threat are expressed as CCIRs. &&,5VFRYHUDOODVSHFWVRIWKHFRPPDQGHU VFRQFHUQ including Friendly Forces Information Requirements (FFIRs), Essential Elements of Friendly Information (EEFI) and Priority Intelligence Requirements (PIRs). (AJP2A RD2). (COPD, pg 4-48, footnote 57) As mentioned in the COPD, CCIRs are always linked to commander decisions. These commander decisions will result in three different ways in which the plan will then need to be executed. These three different ways are the execution of a branch plan, a sequel plan, or a change to prioritization of effort. The chart below provides examples of different CCIRs connected to decisions that would lead to these changes in the ways that the execution of the campaign is conducted. The commander will also have other information requirements that can be referred to as notification requirements, Serious Incident Reports (SIRs), or significant activities (SIGACTs). They encompass information requirements that are important for the commander to be aware of, but are not CCIRs themselves as they are not information required for the commander to make timely decisions as required for mission accomplishment. Examples of these information requirements are: Death of Soldier, any incident that may create negative media for the mission, loss of communications with C2 node for more than 4 hours. Additional CCIR Examples: Indications of aggression from Country X, indications that Country Y is at a near or failed state status.
7 Information Requirement (IR): In intelligence usage, information regarding an adversary or potentially hostile actors and other relevant aspects of the operational environment that needs to be collected and processed to meet the intelligence requirements of a commander. (AAP-6, pg ) Also referred to as Priority Intelligence Requirements. Priority Intelligence Requirements (PIR). PIRs encompass those intelligence requirements for which a commander has an anticipated and stated priority in his tasking of planning and decisionmaking and normally encompass identification and monitoring of areas that represent opportunities and threats to the mission plan. They are a standing set of requirements that drive the collection and production effort, and provide the focus of the overall intelligence mission. They should be limited in number and should provide comprehensive and coherent groupings of key issues. They may be enduring or limited to a particular phase or situation. (AJP2A SD2). (COPD, pg 4-48, footnote 58) Good PIRs ask only one question, focus on a specific fact, event, or activity, and provide intelligence required to support a single decision. PIR Examples: Which bridges over the Y River are intact?, Will the insurgent forces focus attacks along Route X in the Y valley? Friendly Forces Information Requirements (FFIR): Detail information that the Commander needs to know about his own forces, which might affect the commander's ability to accomplish the mission. (AJP2A SD2). (COPD, pg 4-48, footnote 59) FFIR Example: Any loss of medical evacuation assets Essential Elements of Friendly Information is information the commander wants to hide from the enemy. (only defined here in relation to the reference of EEFI in footnote 57 on pg 4-48 of the COPD associated with establishing CCIRs) Assumption (A): In planning, a supposition made about the current situation and/or the future course of events to complete an estimate of the situation and decide on the course of action. (AAP-6 (2012), pg 2-A-20) In such cases where there are some gaps in knowledge and information, certain assumptions will be made as a basis for further planning. To be valid, an assumption must be logical, realistic and necessary for the planning to continue. Assumptions must never assume away critical problems, such as dealing with the opposing capabilities or assuming unrealistic friendly capabilities or successes. (AJP 5, para 0327 (e)) In addition: (1) Assumptions are used in place of something that is unknown and, to be valid, they must be logical, realistic and necessary. (2) Assumptions should not be made which dismiss adversary capabilities or assumed intentions, alter challenging aspects of the situation or presume our own success. (3) Assumptions are treated as facts and therefore need to be analysed. (4) Once adopted, an assumption will apply throughout planning until verified as fact or discarded. To assist in their verification, assumptions will generate information, knowledge or intelligence requirements. (5) Each assumption needs to have a risk evaluation. (6) Each assumption must be evaluated to determine if the requirement for the development of a branch or sequel exists. (COPD, para 4-26 (h)) Planning assumptions are linked to planning risks. See Operational Risks below. Assumption Examples: Country X will not use chemical weapons on NATO forces, Country Y will not collapse before main forces arrive in theatre.
8 Operational Risk (OR): Risk is a situation involving exposure to danger. It is assessed by the likelihood of its occurrence and the gravity of its impact. (AJP 5, para 0211 (d)) At the operational level, risks typically relate to time, space, forces and information factors within the theatre. (AJP 5, para 0327 (i)) $GLVFRQQHFWEHWZHHQRQH VHQGVDQGPHDQVFUHDWHVDFHUWDLQGHJUHHRIULVN7KHOHYHORIULVNFDQQRW be determined with any degree of confidence; assessing it is mainly a matter of judgment. Risks can RFFXUGXHWRPDQ\IDFWRUVVXFKDVRYHUUDWLQJRQH VRZQ capabilities and underestimating the opposing capabilities. They also can be the result of wilful or unintended faulty strategic assumptions. (AJP 5, para 0211 (d)) OR Examples: Attack on SPOD/APOD, widening of conflict with other regional actors The figure below links Assumptions, Risks, Operational Actions (OA), Information Requirements (IR), &RPPDQGHU V&ULWLFDO,QIRUPDWLRQ5HTXLUHPHQWVCCIR), Priority Information Requirements (PIR), Friendly Forces Information Requirements (FFIR), and Decision Points (DP) in support of understanding these terms. Operational Limitation (OL): 7KHPLVVLRQDQDO\VLVVHHNVWRLGHQWLI\DQ\OLPLWDWLRQVRQWKH-)& V freedom of action in accomplishing the mission. These may be imposed by international law, the mandate, caveats of troop contributing nations (TCNs) or by NATO political or military authorities. However, they may also be determined by operational factors that will dictate the time, space and forces to be used. (AJP 5, para 0327 (h)) Limitations include constraints and restraints. (COPD, para 4-26 (g)) Constraint - A requirement placed on a commander that dictates an action. (COPD, pg 4-47, footnote 53) Restraint - A requirement placed on a commander that prohibits an action. (COPD, pg 4-47, footnote 54) OL Example: Constraint - 1$72IRUFHVZLOORQO\XVH7DQDQD V632'DQG$32'IRUthe deployment of forces into the JOA, NATO forces will have to move maritime assets through the Jansen Strait to access the SPOD; Restraint - NATO forces will not deploy until ACTORD, Tactical ISR assets will not fly within two miles of &RXQWU\; V airspace. Rules of Engagement (ROE): Directives to military forces (including individuals) that define the circumstances, conditions, degree, and manner in which force, or actions which might be construed as provocative, may be applied. (MC 362/1, pg 2, part 2)
9 ROE Example: Detention and/or seizure of designated vessels, aircraft, vehicle(s), personnel, goods, cargoes or equipment in designated circumstances is authorised. (MC 362/1, Annex A, A-8) Precondition for Success (PS): Essential conditions that must be established to allow operational success, but that are beyond the influence of the JFC. (AJP 5-0, para 0327, f(3)) PS Example: Country Y allows the flow of equipment and supplies through their nation to support Joint Task Force Operations in Country X. Crisis Response Measures (CRM): Detailed actions which are available to be immediately implemented at the appropriate levels. These actions are prepared in advance. Detailed implementation procedures apply. (NATO Crisis Response System Manual (NCRSM) 2014, Chp 1, Section II, para 4 (b)) CRM Examples: See NCRSM Annex A (NATO Restricted) for examples C2 Requirements (C2R): The JOPG operations, Communication and Information Services (CIS) and Cyber Defence (CD) staff should work together with the component/subordinate command liaison to establish the basic C2 requirements based on the mission analysis and operational factors. (COPD, para 4-28 (b)) C2 requirements are driven by several factors determined during the mission analysis and the development of the operational framework, including: (1) The geographic dispersion of forces in the theatre and the JOA. (2) The different LoOs and the nature and purpose of military actions in concert with relevant national and international actors. (3) The size and functional composition of the deployed force. (4) Critical liaison and coordination requirements. (5) Span of control. (6) CIS points of presence and information exchange requirements (IER). (7) The possibilities for C2 reach back. (8) CD requirements. (9) Political Decisions* (10) Threat in the operational environment* (COPD, para 4-28 (b)) C2R Examples: Task Force Viper is OPCON to the Land Component Command to ensure synchronization of efforts in the defeat of insurgency forces. Strategic Communication (SC): The coordinated and appropriate use of NATO communications activities and capabilities ± Public Diplomacy, Public Affairs, Military Public Affairs, Information Operations and Psychological Operations ± in support of Alliance policies, operations and activities, and in order to advance NATO's aims. (COPD, Annex L, L-5 cited from PO (2009)0141) SC Example: Promote and push narrative that NATO is here to support the improvement of the situation for ALL of the people of Country Y.
LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW
TASK DESCRIPTION: LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW Learn the differences between planning for a campaign in war and planning
More informationJoint Publication 5-00.1. Joint Doctrine for Campaign Planning
Joint Publication 5-00.1 Joint Doctrine for Campaign Planning 25 January 2002 PREFACE 1. Scope This publication provides overarching guidance and principles governing the planning of campaigns at the combatant
More informationNATO UNCLASSIFIED RELEASABLE TO EAPC INTERNATIONAL MILITARY STAFF. ETAT-MAJOR MlLITAIRE INTERNATIONAL
NATO OTAN INTERNATIONAL MILITARY STAFF ETAT-MAJOR MlLITAIRE INTERNATIONAL Vi*S^!^ ^XvU^ March 2003 MC 402/1 (Military Decision) SECRETARY GENERAL, NORTH ATLANTIC TREATY ORGANISATION MILITARY DECISION ON
More informationFM 2-0 INTELLIGENCE MAY 2004. DISTRIBUTION RESTRICTION: Approved for public release, distribution is unlimited HEADQUARTERS DEPARTMENT OF THE ARMY
FM 2-0 INTELLIGENCE MAY 2004 DISTRIBUTION RESTRICTION: Approved for public release, distribution is unlimited HEADQUARTERS DEPARTMENT OF THE ARMY *FM 2-0 Field Manual No. 2-0 Headquarters Department of
More informationJoint Publication 3-0. Doctrine for Joint Operations
Joint Publication 3-0 Doctrine for Joint Operations 10 September 2001 This revised edition of JP 3-0, Doctrine for Joint Operations, represents the latest in a series of updates to joint doctrine. It reflects
More informationNATO UNCLASSIFIED Releasable to the Public MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE GOVERNMENT OF THE REPUBLIC OF FINLAND AND
MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE GOVERNMENT OF THE REPUBLIC OF FINLAND AND HEADQUARTERS, SUPREME ALLIED COMMANDER TRANSFORMATION AS WELL AS SUPREME HEADQUARTERS ALLIED POWERS EUROPE REGARDING
More informationSummary Report for Individual Task 805C-42B-6117 Conduct Human Resources (HR) Planning Using Military Decision Making Process (MDMP) Status: Approved
Report Date: 17 Nov 2014 Summary Report for Individual Task 805C-42B-6117 Conduct Human Resources (HR) Planning Using Military Decision Making Process (MDMP) Status: Approved Distribution Restriction:
More informationADP50 MAY201 HEADQUARTERS,DEPARTMENTOFTHEARMY
ADP50 THEOPERATI ONSPROCESS MAY201 2 DI STRI BUTI ONRESTRI CTI ON: Appr ov edf orpubl i cr el eas e;di s t r i but i oni sunl i mi t ed. HEADQUARTERS,DEPARTMENTOFTHEARMY This publication is available at
More informationThe Guidelines for U.S.-Japan Defense Cooperation April 27, 2015
The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 I. Defense Cooperation and the Aim of the Guidelines In order to ensure Japan s peace and security under any circumstances, from peacetime
More informationSECURITY / INTELLIGENCE / CONSULTING
SECURITY / INTELLIGENCE / CONSULTING Hayes Group International (HGI) is a global security and intelligence consulting and advisory firm specializing in emerging and frontier markets. Focused on development
More informationSummary 1. Module scope and objectives 2. Terms, definitions and abbreviations 3. Introduction 4. The military component
4.40 UN Military Roles and Responsibilities Contents Summary... 1 1. Module scope and objectives... 1 2. Terms, definitions and abbreviations... 2 3. Introduction... 2 4. The military component... 2 4.1.
More informationSafety Regulation Group SAFETY MANAGEMENT SYSTEMS GUIDANCE TO ORGANISATIONS. April 2008 1
Safety Regulation Group SAFETY MANAGEMENT SYSTEMS GUIDANCE TO ORGANISATIONS April 2008 1 Contents 1 Introduction 3 2 Management Systems 2.1 Management Systems Introduction 3 2.2 Quality Management System
More informationNATO STANDARD AJP-3.10.1 ALLIED JOINT DOCTRINE FOR PSYCHOLOGICAL OPERATIONS
NATO STANDARD AJP-3.10.1 ALLIED JOINT DOCTRINE FOR PSYCHOLOGICAL OPERATIONS Edition B Version 1 WITH UK NATIONAL ELEMENTS SEPTEMBER 2014 NORTH ATLANTIC TREATY ORGANIZATION ALLIED JOINT PUBLICATION Published
More informationObjective Oriented Planning Module 1. Stakeholder Analysis
III. Stakeholder Analysis Stakeholders are people, groups, or institutions, which are likely to be affected by a proposed project (either negatively or positively), or those which can affect the outcome
More informationCOUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
More informationDesign: Tools of the Trade
Design: Tools of the Trade by Dr. Jack D. Kem U.S. Army Command and General Staff College U.S. Army Combined Arms Center Fort Leavenworth, Kansas Design: Tools of the Trade by Dr. Jack D. Kem U.S. Army
More informationSoftware Reprogramming Policy for Electronic Warfare and Target Sensing Systems
Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY
More informationRESTRICTED CHAPTER 11 INTRODUCTION TO THE ESTIMATE PROCESS INTRODUCTION
CHAPTER 11 INTRODUCTION TO THE ESTIMATE PROCESS INTRODUCTION 1. An estimate is a logical process of reasoning by which a commander, faced with an ill-structured problem, arrives at a decision in order
More informationJoint Publication 3-13.3. Operations Security
Joint Publication 3-13.3 Operations Security 04 January 2012 PREFACE 1. Scope This publication provides joint doctrine for planning, executing, and assessing operations security in joint operations. 2.
More informationDOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
More informationAnnex 1: Assesing risk: threats, vulnerabilities and capacities
Annex 1: Assesing risk: threats, vulnerabilities and capacities There is no widely accepted definition of risk, but we can say that risk refers to possible events, however uncertain, that result in harm.
More informationSafety Management Systems (SMS) guidance for organisations
Safety and Airspace Regulation Group Safety Management Systems (SMS) guidance for organisations CAP 795 Published by the Civil Aviation Authority, 2014 Civil Aviation Authority, CAA House, 45-59 Kingsway,
More informationAJP-9 NATO CIVIL-MILITARY CO-OPERATION (CIMIC) DOCTRINE
-9 NATO CIVIL-MILITARY CO-OPERATION (CIMIC) DOCTRINE Chapter 1 AJP-9 NATO CIVIL-MILITARY CO-OPERATION (CIMIC) DOCTRINE (JUNE, 2003) i ii AJP Chapter 1 Chapter 1 RECORD OF CHANGES Change Date Date Entered
More informationSEMS/NIMS MANAGEMENT SYSTEM REVISED SEPTEMBER 2007
SEMS/NIMS MANAGEMENT SYSTEM REVISED SEPTEMBER 2007 SEMS/NIMS - SYSTEM (ICS) is the model tool for command, control, and coordination of a response and provides a means to coordinate the efforts of individual
More informationSection A: Introduction, Definitions and Principles of Infrastructure Resilience
Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose
More informationThe Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York
The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York Introduction: the role of economics Economists are not usually associated with debates about wars. Such
More informationORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session
ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session Note by the Chairman I attach for your information a list of the decisions
More informationPlanning for Action: Campaign Concepts and Tools
Planning for Action: Campaign Concepts and Tools by Dr. Jack D. Kem U.S. Army Command and General Staff College U.S. Army Combined Arms Center Fort Leavenworth, Kansas Planning for Action: Campaign Concepts
More informationOPERATIONAL RISK MANAGEMENT B130786 STUDENT HANDOUT
UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 OPERATIONAL RISK MANAGEMENT B130786 STUDENT HANDOUT Basic Officer Course (ORM) Introduction Importance
More informationTraining NATO for an uncertain future: An interview with Major General Erhard Bühler
25 Neil Webb Training NATO for an uncertain future: An interview with Major General Erhard Bühler In facing potential threats, being lean and agile will be critical. Wolff Sintern Major General Erhard
More informationArmy Doctrine Update
Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near
More information5. The Model Strategies and Practical Measures are aimed at providing de jure and de
MODEL STRATEGIES AND PRACTICAL MEASURES ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN IN THE FIELD OF CRIME PREVENTION AND CRIMINAL JUSTICE 1. The multifaceted nature of violence against women suggests
More informationIntegrating Continuity of Operations (COOP) into the Enterprise Architecture
Volume 1, Issue 2 August 2007 Continuity of Operations Leadership Series for Government Integrating Continuity of Operations (COOP) into the Enterprise Architecture Pillar COOP Leadership Series for Government
More informationA PLANNING MODEL FOR ABET ENGINEERING CRITERIA 2000
A PLANNING MODEL FOR ABET ENGINEERING CRITERIA 2000 M. Dayne Aldridge and Larry Benefield College of Engineering Auburn University, AL 36849 Introduction ABET Engineering Criteria 2000 provides a new basis
More informationUSAR Nepal Earthquake Response Technical Evaluation
USAR Nepal Earthquake Response Technical Evaluation KEY FINDINGS 1. Positive contributions were made by smaller, lighter teams and nonclassified teams and this should be further strengthened. 2. The revised
More informationJoint Publication 2-0. Joint Intelligence
Joint Publication 2-0 Joint Intelligence 22 October 2013 This revised edition of JP 2-0, Joint Intelligence, reflects the current guidance for conducting joint and multinational intelligence activities
More informationADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
ADP 3-0 UNIFIED LAND OPERATIONS OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army
More informationHybrid Warfare & Cyber Defence
Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency
More informationPublic Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
More informationIoT & SCADA Cyber Security Services
IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au
More informationPSYOP Campaign Planning
CHAPTER 4 PSYOP Campaign Planning PSYOP campaign development and Implementation are used to modify the behavior of various target audiences in support of U. S. objectives. In practice, the scope of PSYOP
More informationPosition Classification Flysheet for Logistics Management Series, GS-0346
Position Classification Flysheet for Logistics Management Series, GS-0346 Table of Contents SERIES DEFINITION... 2 SERIES COVERAGE... 2 EXCLUSIONS... 4 DISTINGUISHING BETWEEN LOGISTICS MANAGEMENT AND OTHER
More informationAPPROVED BY INTERACTION S BOARD ON JUNE 14, 2006. Suggested Guidance for Implementing InterAction s Minimum Operating Security Standards
APPROVED BY INTERACTION S BOARD ON JUNE 14, 2006 Suggested Guidance for Implementing InterAction s Minimum Operating Security Standards This document seeks to assist InterAction members in the incorporation
More informationCOMMAND AND CONTROL OF DETAINEE OPERATIONS
FMI 3-63.6 COMMAND AND CONTROL OF DETAINEE OPERATIONS September 2005 Expires September 2007 HEADQUARTERS, DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
More informationThe National Intelligence Estimative Product
Iran: Nuclear Intentions and Capabilities November 2007 OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE The Director of National Intelligence serves as the head of the Intelligence Community (IC), overseeing
More informationFinancial Planner Competency Profile
Financial Planner Competency Profile TABLE OF CONTENTS FPSB s Financial Planner Competency Profile...2 Financial Planning Knowledge...3 Financial Planning Knowledge Framework...3 Financial Planning Knowledge
More informationEmergency Support Function (ESF) #5. Emergency Management
Emergency Support Function (ESF) #5 Emergency Management Lead Agency: Support Agencies: Cleburne County Emergency Management Agency Cleburne County Commission I. Introduction A. Purpose B. Scope ESF #5
More informationJoint Publication 3-60. Joint Targeting
Joint Publication 3-60 Joint Targeting 13 April 2007 1. Scope PREFACE This publication provides fundamental principles and doctrinal guidance for the conduct of joint targeting across the range of military
More informationRISK MANAGEMENT POLICY
RISK MANAGEMENT POLICY Regd. Office: Nanubhai Amin Marg, Industrial Area, P.O. Chemical Industries, Vadodara 390 003 CIN: L36990GJ1943PLC000363 1. BACKGROUND Risk Management Policy Jyoti Ltd. (the Company)
More informationFinancial Planning Practice Standards
Financial Planning Practice Standards Financial Planning Practice Standards The Financial Planning Practice Standards have been adopted by the Board of the Institute of Financial Planning (IFP) to provide
More informationIntegrated Inventory Management for Maintenance, Repair and Operations (MRO) Materials By Doug Wallace 1. Introduction
Integrated Inventory Management for Maintenance, Repair and Operations (MRO) Materials By Doug Wallace As appeared in the July-August 07 issue of Reliable Plant 1. Introduction From an operational perspective,
More informationNATO UNCLASSIFIED. 27 February 2012 DOCUMENT C-M(2012)0014 Silence Procedure ends: 16 Mar 2012 16:00
27 February 2012 DOCUMENT Silence Procedure ends: 16 Mar 2012 16:00 Directive on the Management of Records Generated on Operational Deployment Note by the Secretary General 1. In June 2011 the NATO Records
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationImage credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations
More informationReleasability: There are no releasability restrictions on this publication. Approved for public release; distribution is unlimited.
This is the Third Edition of the Commander s Critical Information Requirements (CCIRs) Insights and Best Practices Focus Paper, written by the Deployable Training Division (DTD) of the Joint Staff J7 and
More informationThe Emergency Operations Plan provides guidance for managing emergency communications resources.
Emergency Support Function #2 - Communication ESF # 2 Primary Agency Office of Emergency Preparedness Information Technology University Relations 911 Centers Secondary/Support Agencies Law Enforcement
More informationSecurity Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.
Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc. Executive Summary IFONE provides securable private cellular networks. It presents this paper
More information4.1 Identify what is working well and what needs adjustment. 4.1.1 Outline broad strategies that will help to effect these adjustments.
(Overview) Step 1 Prepare 1.1 Identify specific issues or choices that the planning process should address. 1.2 Develop an organizational profile. 1.3 Identify any information that must be collected to
More informationRisk Management Handbook
Risk Management Handbook 1999 Introduction Risk management is the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost. The analytical risk
More informationActive Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010
1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue
More informationThe Defence Strategy of the Slovak Republic
The Defence Strategy of the Slovak Republic approved by the National Council of the Slovak Republic 23 September 2005 TABLE OF CONTENTS Introduction I II III IV V Slovak Republic in the Changing Security
More informationGUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
More informationDoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
More informationALLIED JOINT LOGISTIC DOCTRINE AJP-4(A)
ALLIED JOINT LOGISTIC DOCTRINE AJP-4(A) DECEMBER 2003 AJP-4(A) ALLIED JOINT LOGISTIC DOCTRINE DECEMBER 2003 I RECORD OF CHANGES AJP-4(A) Change Date Date Entered Effective Date By Whom Entered iv CHAPTER
More informationCyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl
More informationSTANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices
A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards
More informationDefense Security Service
Defense Security Service Defense Security Service Cybersecurity Operations Division Counterintelligence UNCLASSIFIED Defense Security Service DSS Mission DSS Supports national security and the warfighter,
More informationThe Value of Automated Penetration Testing White Paper
The Value of Automated Penetration Testing White Paper Overview As an information security and the security manager of the company, I am well aware of the difficulties of enterprises and organizations
More informationCHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST
More informationA BROAD DEFINITION OF INTEROPERABILITY
Chapter Two A BROAD DEFINITION OF INTEROPERABILITY Interoperability would seem to be a straightforward concept. Put simply, is a measure of the degree to which various organizations or individuals are
More informationProspects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016
Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 NATO is anything but obsolete. It is needed more now than at any point since the end
More informationBio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
More informationHow to achieve excellent enterprise risk management Why risk assessments fail
How to achieve excellent enterprise risk management Why risk assessments fail Overview Risk assessments are a common tool for understanding business issues and potential consequences from uncertainties.
More informationSecurity Management Training Course Notes
Security Management Training Course Notes SECURITY MANAGEMENT Security Management Framework Context Analysis Who are we? Mission Values People Political stance Where are we? Historical background Political
More informationState of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
More informationRear Detachment Commander. Computer-Based Training. Module 10: Training Management
Rear Detachment Commander Computer-Based Training Module 10: Training Management Table of Contents 1. TRAINING MANAGEMENT... 1 1.1. IMPLEMENTING A TRAINING PLAN... 1 1.1.1. Principles Of Training... 2
More informationDoes NATO s Article V Genuinely Protect Its Members?
Does NATO s Article V Genuinely Protect Its Members? NATO has been the most successful alliance of history. We repeat this truth quite frequently, especially now that we celebrate 60 years of its successful
More informationEuropean airlines and the Asian market. A Lufthansa Consulting outlook towards the middle of the next decade
European airlines and the Asian market A Lufthansa Consulting outlook towards the middle of the next decade Lufthansa Consulting GmbH Von-Gablenz-Str. 2-6 50679 Köln Germany Registration: Local Court of
More informationAppendix D Logistics Support Element MISSION ORGANIZATION
Logistics Support Element Effective force projection logistics require a seamless logistics system operating across the strategic, operational, and tactical levels. Elements from CONUS and the theater
More information10721/16 GSC/lt 1 DGB 2B
Council of the European Union Brussels, 28 June 2016 (OR. en) 10721/16 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 28 June 2016 To: Delegations No. prev. doc.: 10320/16 REV 1 Subject:
More informationLAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN ESF-13
LAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN LAW ENFORCEMENT AND SECURITY ESF-13 Coordinates and organizes law enforcement and security resources in preparing for, responding to and recovering from
More informationALLIED MARITIME COMMAND
ALLIED MARITIME COMMAND MARCOM/N350/NSC Vision Iss 1 01 Oct 2015 The NATO Shipping Centre Strategic Vision THE NATO SHIPPING CENTRE (NSC) STRATEGIC VISION OCT 2015 I. Background The NATO Shipping Centre
More informationSUCCESSFUL INTERFACE RISK MANAGEMENT FROM BLAME CULTURE TO JOINT ACTION
SUCCESSFUL INTERFACE RISK MANAGEMENT FROM BLAME CULTURE TO JOINT ACTION SUMMARY Axel Kappeler, Principal James Catmur, Director Interfaces are important because they are everywhere. However, interfaces
More informationPASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationUS Casualties: The Trends in Iraq and Afghanistan
18 K Street, NW Suite 4 Washington, DC 26 Phone: 1.22.775.327 Fax: 1.22.775.3199 Web: www.csis.org/burke/reports US Casualties: The Trends in Iraq and Afghanistan Anthony H. Cordesman Arleigh A. Burke
More informationPurpose of the Governor s strategy. Guiding Principles
Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose
More informationV: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI
V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI Recommendation: The Executive Branch should provide for a central planning and coordination mechanism (likely within an existing entity)
More informationThe Five Most Common Cyber-Attack Myths Debunked
cybereason The Five Most Common Cyber-Attack Myths Debunked 2016 Cybereason. All rights reserved. 1 Cyber attacks show no sign of decreasing any time soon. If anything, hackers have expanded the type of
More informationHow to Conduct A SWOT Analysis. Dr. E. J. Keeley Executive Director, Institutional Effectiveness and Research
How to Conduct A SWOT Analysis Dr. E. J. Keeley Executive Director, Institutional Effectiveness and Research 1 Purpose To provide an overview of environmental scanning and SWOT analysis To develop an understanding
More informationThe Army Universal Task List
Change No. 7 FM 7-15, C7 Headquarters Department of the Army Washington, D.C., 20 May 2011 The Army Universal Task List 1. Change 7 to FM 7-15, 27 February 2009, updates the tasks with civil affairs and
More informationTallinn Airport Ltd. Conditions of infrastructure use for ground handling service providers. Valid since 01.11.2010. Lennart Meri Tallinn Airport
Authorised with the 01 October 2010 Directive of the Chairman of the Management Board no 48 Tallinn Airport Ltd. Conditions of infrastructure use for ground handling service providers Valid since 01.11.2010
More informationSubject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
More informationAchieve. Performance objectives
Achieve Performance objectives Performance objectives are benchmarks of effective performance that describe the types of work activities students and affiliates will be involved in as trainee accountants.
More informationGAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony
GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency
More informationTen steps to better requirements management.
White paper June 2009 Ten steps to better requirements management. Dominic Tavassoli, IBM Actionable enterprise architecture management Page 2 Contents 2 Introduction 2 Defining a good requirement 3 Ten
More informationInnovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence
Innovation. Performance. Security SMARTSCAN man-portable land EW solutions target up-to-the-minute situational intelligence The increasing demands of Electronic Warfare As the digital era takes hold, the
More informationDecember 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
More information2016 OCR AUDIT E-BOOK
!! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that
More informationNEEDS BASED PLANNING FOR IT DISASTER RECOVERY
The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be
More informationOil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
More information