Content deleted Content added
Fixed typo Tags: canned edit summary Mobile edit Mobile app edit iOS app edit |
m Alphabetical order |
||
Line 27:
==Derivative terms==
There are a plethora of derivative terms which emphasise different aspects, uses and sub-domains of C2. These terms come with a plethora of associated abbreviations – for example, in addition to C2, command and control is also often abbreviated as C<sup>2</sup>, and sometimes as C&C.
[[File:Embraer R-99 6750 (9502952605).jpg|thumb
Command and control have been coupled with
* [[Collaboration]]▼
* Communication / communications
* Computers / computing<ref>▼
* (Military) [[Military intelligence|intelligence]]
* Information / information systems
▲* Computers / computing<ref>
In modern warfare, [[computer]]s have become a key component as [[cyberspace]] is now seen as "[[Cyberwarfare|the fifth ___domain of warfare]]" – refer:
{{cite book |author=Clarke, Richard A. |title=Cyber War |publisher=HarperCollins |year=2010}} and<br>
{{cite journal |url=http://www.economist.com/node/16481504?story_id=16481504&source=features_box1 |title=Cyberwar: War in the Fifth Domain |journal=Economist |date=1 July 2010 |access-date=23 April 2014 |archive-url=https://web.archive.org/web/20131207071347/http://www.economist.com/node/16481504?story_id=16481504&source=features_box1 |archive-date=7 December 2013 |url-status=live |df=dmy-all }}
</ref>
* [[Electronic warfare]]▼
* [[Interoperability]]▼
* [[Reconnaissance]]▼
* [[Surveillance]]
* [[Target acquisition]]
▲* [[Reconnaissance]]
▲* [[Interoperability]]
▲* Collaboration
▲* [[Electronic warfare]]
and others.
Line 90 ⟶ 93:
The following techniques are combined:
* [[Operations security]] (OPSEC)▼
* [[Military deception]]▼
* [[Psychological operations]] (PSYOP)▼
* [[Electronic warfare]] (EW)▼
* [[Psychological warfare]]▼
* [[Cyberwarfare|Cyber operations]]
with the physical destruction of enemy communications facilities. The objective is to deny [[information]] to the enemy and so disrupt its command and control capabilities. At the same time precautions are taken to protect friendly command and control capabilities against retaliation.
In addition to targeting the enemy's [[Command and control (military)|command and control]], [[information warfare]] can be directed to the enemy's [[politics|politicians]] and other civilian communications.
▲* [[Electronic warfare]] (EW)
▲* [[Military deception]]
▲* [[Operations security]] (OPSEC)
▲* [[Psychological operations]] (PSYOP)
▲* [[Psychological warfare]]
==See also==
Line 128 ⟶ 131:
* [[505th Command and Control Wing]]
* [[Command and Control Research Program]] (CCRP)
* [[Command systems in the United States Army]]▼
* [[Deployable Joint Command and Control]]
* [[Future Combat Systems Command and Control Vehicle]]
Line 138 ⟶ 142:
* [[NORAD]]
* [[Worldwide Military Command and Control System]]
▲* [[Command systems in the United States Army]]
{{Div col end}}
'''Other'''
* [[Military Institute of Telecommunications and Information Technologies]]
Line 154 ⟶ 158:
==External links==
* {{Wiktionary
* {{Commonscatinline}}
* [http://www.app.college.police.uk/app-content/operations/command-and-control/definitions-and-procedures/ Command and control definitions and procedures], UK College of Policing, www.app.college.police.uk
* [http://www.dodccrp.org The Command and Control Research Program (CCRP)]
|