If you are not redirected automatically, follow this link to example. CCRP - Command and Control Research Program

Menu

Books: Main | Downloads | Order Forms

Book downloads

(PDF files require Adobe Reader)


Power to the EdgeThe Agility Advantage: A Survival Guide
For Complex Enterprises and Endeavors

David S. Alberts | 2011
Download: PDF [9.6M]

This book is a call to action. It is no longer sufficient for an organization to simply be effective. Today’s organizations must also develop agility in order to successfully cope with the complex challenges they face in a dynamic and uncertain world. This book explains why agility, once a nice-to-have capability, is now an imperative. Readers are provided with an in-depth understanding of this essential capability, its enablers and inhibiters, and ways to visualize and measure agility. Experimental results are used to illustrate the agility advantage as well as the adverse consequences of a lack of agility. This book outlines a plan to improve an organization’s agility, and identifies the research needed to improve our understanding of agility.


Power to the EdgeAdapting Modeling & Simulation for Network Enabled Operations
James Moffat | 2011
Download: PDF [3.6M]

The essence of this book is to describe how the UK Ministry of Defence has risen to the challenges of complex endeavors and the information age by investing in the development of new analytical tools, in particular closed form simulation modeling, in order to provide the evidence base for improved high level decision-making in government. At the core of the approach is the development of a consistent representation of command and control across the suite of models. This development was itself significantly influenced by the interaction and exchange of ideas drawn from a number of NATO research task groups—and the development of these ideas is still continuing. These developments are brought together in illustrating how they impact the shaping of UK defense policy through informing high level decision-making by officials and government ministers.


Coping with the BoundsNATO NEC C2 Maturity Model
SAS-065 | 2010
Download: PDF [4.68M]

The NATO NEC C2 Maturity Model (N2C2M2) was developed to build on dearly won insights from the past, but goes beyond them in order that we can exploit Information Age approaches to address new mission challenges. This way of thinking about C2 is thus entirely compatible with current NATO Allied Command Transformation (ACT) thinking on Future Capable Forces which puts the emphasis on Mission Command within federated complex environments and ad hoc coalitions. The N2C2M2 was developed by the RTO SAS-065 Research Task Group over a period of about three years. It starts by defining a number of C2 approaches, ranging from Conflicted C2 to Edge C2, that correspond to different regions within the C2 Approach Space, containing the different possible approaches to accomplish the functions that are associated with command and control. This approach space can be viewed from two perspectives. First, it can be used to think about C2 within existing organizations. Second, it can be used to think about how a disparate set of independent (yet inter-dependent) entities, that is, a collective, can achieve focus and convergence.


Coping with the BoundsCoping with the Bounds
Tom Czerwinski | 2008, orig. 1998
Download: PDF [1.4M]

Conventional analysis is not sufficient to cope with today's and tomorrow's problems. We must augment our efforts with nonlinear insights, and provide a basic understanding of what that involves.


Planning: Complex Endeavors
David S. Alberts and Richard E. Hayes | 2007
Download: PDF [2.1M]

This book presents an approach to planning appropriate for complex endeavors at a level of detail sufficient to formulate and conduct a campaign of experimentation to test, refine, and implement a new approach to planning.


The Logic of Warfighting Experiments
Richard A. Kass | 2006
Download: PDF [2.0M]

Experimentation has proven itself in science and technology, yielding dramatic advances. Can we apply the same experiment methods to the military transformation process?


Complexity, Networking, and Effects-Based Approaches to Operations
Edward A. Smith | 2006
Download: PDF [4.5M]

This publication begins with a detailed description of the problem that effects-based approaches are thought to address and explains why effects-based approaches are so important to understand and to be able to do.


Understanding Command and Control
David S. Alberts and Richard E. Hayes | 2006
Download: PDF [3.2M]

This is the first in a new series of CCRP Publications that will explore the future of Command and Control. This book begins at the beginning: focusing on the problem(s) Command and Control was designed to solve.


The Agile Organization
Simon Reay Atkinson and James Moffat | 2005
Download: PDF [3.4M] | Award: 2006 NCW Award | Review: RUSI, Spinuzzi

The authors illustrate how organizations and networks function and how the connections between people, nature, societies, and the military can be understood in order to pursue the goal of an agile organization.


Campaigns of Experimentation
David S. Alberts and Richard E. Hayes | 2005
Download: PDF [1.5M]

In this follow-on to the COBP for Experimentation, the concept of a campaign of experimentation is explored in detail, including the need and place for campaigns in transformation, evolution, and achievement of innovation.


1Somalia Operations
Kenneth Allard | 2005, orig. 1995
Download: PDF [3.8M]

Colonel Allard examines the challenges and the successes of the U.S. peacekeeping mission to Somalia in 1992-1994. Key topics include planning, deployment, conduct of operations, and support.


Journal of Defence Science
Volume 8, Number 3 | 2003
Download: PDF [6.0M]

This special edition of the UK Journal of Defence Science on Network Enabled Capability aims to stimulate debate and push forward the evolution of ideas.



Complexity Theory and Network Centric Warfare
James Moffat | 2003
Download: PDF [2.3M]

Professor Moffat articulates the models and equations that demonstrate the relationship between warfare and the emergent behaviour of complex systems, and a means to calculate and assess the likely outcomes.


Power to the Edge
David S. Alberts and Richard E. Hayes | 2003
Download: PDF [3.2M] | ePub [3.28M] | Kindle [2.87]

Power to the Edge articulates the principles being used to provide the wideband network that people will trust, populate with information, and use to share awareness, collaborate effectively, and synchronize their actions.

QuotationThis book is truly a must-read for anyone interested in decentralization and the social and organizational relevance of shifting power to the edge, whether in a commercial or a defense context." – Ray Ozzie, Chief Software Architect, Microsoft more››

"[Power to the Edge] may be the best written government document of the 21st century so far." – Dan Ancona, Project Director, California VoterConnect more››


Effects-Based Operations
Edward A. Smith | 2003
Download: PDF [2.7M]

This book speaks directly to what we are trying to accomplish on the fields of battle and argues for changes in the way we decide what effects we want to achieve and what means we will use to achieve them.


The Big Issue
David Potts | 2003
Download: PDF [1.1M]

This Occasional considers command and combat in the Information Age. Defence thinkers everywhere are searching forward for the science and alchemy that will deliver operational success.


Lessons from Kosovo
Larry Wentz | 2002
Download: PDF [4.6M]

Kosovo offered a unique opportunity to conduct C4ISR-focused research in the areas of coalition C2, civil-military cooperation, information assurance, C4ISR interoperability, and information operations.


The NATO Code of Best Practice for C2 Assessment
NATO SAS-026, 039 | 2002
Download: PDF [1.7M] | Analyst's Guide [1.0M] | Decisionmaker's Guide [1.0M]

Analysts will be increasingly called upon to examine the impact of new information-related capabilities coupled with new ways of organising and operating in a new environment with reduced levels of fog and friction.


Information Age Transformation
David S. Alberts | 2002
Download: PDF [1.3M] |Review: Air and Space Power

This book deals with the issues associated with a large government institution, a set of formidable impediments, and the nature of the changes being brought about by Information Age concepts and technologies.


Code of Best Practice for Experimentation
David S. Alberts, Richard E. Hayes, et al. | 2002
Download: PDF [4.2M]

Experimentation is the lynch pin in the DoD's strategy for transformation. Without a proper program of experimentation, the DoD will not be able to take full advantage of the opportunities presented by the Information Age.


Information Age Anthology III
David S. Alberts and Daniel S. Papp | 2001
Download: PDF [1.7M]

In what ways will wars and the military be different in the Information Age? What will this mean for the U.S. military? This book explores answers to these vexing questions raised earlier in the Information Age Anthology.


Understanding Information Age Warfare
David S. Alberts, John J. Garstka, Richard E. Hayes, and David T. Signori | 2001
Download: PDF [3.3M] | Review: Aerospace Power

This book presents an alternative to the linear strategies of the Industrial Age. The approach advocated here begins with the premise that adaptation to the Information Age centers around the ability to utilize information.


Information Campaigns for Peace Operations
Kevin Avruch, James L. Narel, and Pascale Combelles Siegel | 2000
Download: PDF [0.6M]

This report asks whether the notion of struggles for control over information identifiable in situations of conflict also has relevance for situations of third-party conflict management-for peace operations.


Information Age Anthology II
David S. Alberts and Daniel S. Papp | 2000
Download: PDF [1.2M]

Is the Information Age bringing new challenges and threats, and if so, what are they? What sorts of dangers will these challenges and threats present? From where will they (and do they) come? Is information warfare a reality?


Behind the Wizard's Curtain
Annette Krygiel | 1999
Download: PDF [0.9M]

Without successfully fielding systems of systems, we will not be able to implement emerging concepts in adaptive and agile command and control, nor will we reap the potential benefits of Network Centric Warfare.


Confrontation Analysis
Nigel Howard | 1999
Download: PDF [1.2M]

A peace operations campaign should be seen as a linked sequence of confrontations. The objective in each confrontation is to bring about certain compliant behavior in other parties, until the campaign objective is reached.


1Network Centric Warfare
David S. Alberts, John J. Garstka, and Frederick P. Stein | 1999
Download: PDF [1.8M] | ePub [4.8M] | Kindle [2.4M]

This book articulates the nature of the characteristics of Network Centric Warfare, and suggests a process for developing mission capability packages designed to transform NCW concepts into operational capabilities.

QuotationNCW is going to change the way we fight; it is unrealistic to think otherwise when we see the information technology revolution that is taking place all around us."
Thomas Carroll, Wings of Gold more››

"[Network Centric Warfare] is highly recommended for the new generation of officers corps who aspire to command." – LTC Tan Kim Seng, Republic of Singapore Army more››


1Doing Windows
Bradd C. Hayes and Jeffrey I. Sands | 1999
Download: PDF [1.4M]

This book provides the final results of a project sponsored by the Joint Warfare Analysis Center. The objective was to examine how military operations can support achieving civil stability and peace in states in complex emergencies.


Lessons from Bosnia
Larry Wentz | 1998
Download: PDF [3.7M]

This book tells of the challenges faced and actions taken to ensure that IFOR and Operation Joint Endeavor were successes. This story was pieced together from firsthand experiences, interviews, focused research, and lessons learned.


Information Warfare and International Law
Lawrence T. Greenberg, Seymour E. Goodman, and Kevin J. Soo Hoo | 1998
Download: PDF [1.0M]

The authors have surfaced and explored some profound issues that will shape the legal context within which information warfare may be waged and national information power exerted in the coming years.


Target Bosnia
Pascale Combelles Siegel | 1998
Download: PDF [1.0M]

This book examines the place of PI and PSYOP in peace operations through the prism of NATO operations in Bosnia-Herzegovina.



Information Age Anthology I
David S. Alberts and Daniel S. Papp | 1997
Download: PDF [1.0M]

In this first volume, we will examine: what the Information Age is; how it affects commerce, business, and service; what it means for the government and the military; and how it affects international actors and systems.


Complexity, Global Politics, and National Security
David S. Alberts and Tom Czerwinski | 1997
Download: PDF [1.0M] | Review: Air and Space Power

This work was intended to: (1) push the envelope; (2) emphasize the policy and strategic dimensions of national defense with the implications for Complexity Theory; and (3) get the best talent available in academe.


Defensive Information Warfare
David S. Alberts | 1996
Download: PDF [0.2M]

This overview is the result of an effort to provide background material to participants in a series of interagency meetings exploring the nature of the problem and to identify areas of potential collaboration.


Shock and Awe
Harlan Ullman and James Wade, Jr. | 1996
Download: PDF [0.5M]

This book explores alternative concepts for structuring mission capability packages. (Note: The title and concepts from this book earned widespread popularity in the media in 2003 in reference to the war in Iraq.)


Interagency and Political-Military Dimensions of Peace Operations
Margaret Daly Hayes and Gary F. Wheatley | 1996
Download: PDF [0.2M]

Haiti offered an opportunity to explore interagency relations in an operation that had high visibility and a greater degree of interagency civilian-military coordination and planning than the other operations examined to date.


The Unintended Consequences of Information Age Technologies
David S. Alberts | 1996
Download: PDF [0.1M]

This strategy uses Information Age technologies to identify and avoid adverse unintended consequences associated with the introduction of information technologies, and to capitalize on unexpected opportunities.


Humanitarian and Peace Operations
Lisa Witzig Davidson, Margaret Daly Hayes, and James J. Landon | 1996
Download: PDF [0.4M]

This report documents a workshop organized by the National Defense University, which found that communication need to be improved between the NGO and U.S. Government communities, especially with the military.


Dominant Battlespace Knowledge
Martin C. Libicki and Stuart E. Johnson | 1996
Download: PDF [0.3M] | Review: Air and Space Power

If the United States acquires dominant battlespace knowledge, how might that affect the way it goes to war, the circumstances under which force can be used, and the resulting alterations of the global geomilitary environment?


1Information Warfare and Deterrence
Richard E. Hayes and Gary F. Wheatley | 1996
Download: PDF [2.3M]

This report documents a workshop organized by the Institute for National Strategic Studies, which examined information warfare and deterrence as a subject with strong command and control implications.


Operations Other Than War
CACT | 1995
Download: PDF [0.2M]

This report documents a workshop organized by the INSS, which sought to determine what technologies are required for OOTW. The group examined the complexities of introducing relevant technologies.


Command Arrangements for Peace Operations
David S. Alberts and Richard E. Hayes | 1995
Download: PDF [2.7M] |Review: Air and Space Power

The U.S. experience shows that traditional C2 approaches, and doctrine are not well suited for peace operations. This book examines alternative command arrangements, and describes the attributes of effective arrangements.


What is Information Warfare?
Martin C. Libicki | 1995
Download: PDF [0.1M]

Is Information Warfare a nascent art, or simply the newest version of a time-honored feature of warfare? Is it a new form of conflict, or an old one that has been given new life by the Information Age?


Feedback

The CCRP constantly strives to improve its publications. If you have any comments or questions regarding specific titles or publications in general, please contact us.