Improving Army Aviation Situational Awareness with Agent
Transcription
Improving Army Aviation Situational Awareness with Agent
Improving Army Aviation Situational Awareness with Agent-Based Data Discovery Peter Gerken, Stephen Jameson, Brian Sidharta, and Joyce Barton Lockheed Martin Advanced Technology Laboratories Camden, NJ [pgerken, sjameson, bsidhart, jbarton]@atl.lmco.com ABSTRACT The Army Airborne Command and Control System (A2C2S) is being developed to provide situational awareness to the Joint Task Force commander and staff on-the-move in a UH-60 Blackhawk helicopter. The Airborne Manned/Unmanned Systems Technology Demonstration Science and Technology Objective program and the Hunter Standoff Killer Team Advanced Concept Technology Demonstration program are developing the Mobile Commander’s Associate (MCA) decision aiding system to support the command team on board the A2C2S. MCA will improve the command team’s capabilities by providing shared situation awareness, decision aiding, and unmanned air vehicle control and control handover among teamed platforms. Intelligent agents embedded in the MCA decision aiding system offload some of the command staff’s manual-intensive tasks by autonomously monitoring for information that improves the commander’s situational awareness. Lockheed Martin Advanced Technology Laboratories, under contract to the Army’s Aviation Applied Technology Directorate, provides Distributed Data Fusion and Agent-Based Data Discovery components that enable situation awareness for these programs. Introduction Future Army Aviation operations depend on the development of technologies and systems that support effective onthe-move command of airborne and ground-based maneuver forces through shared situational awareness and decision aiding technologies. The operational concepts for these technologies and systems are characterized by the extensive use of mobile sensing systems, unmanned platforms, and decision aiding systems in the forward elements of the combat force. As part of this effort, the A2C2S is being developed to provide situational awareness to the Joint Task Force commander and staff on-the-move in a UH-60 Blackhawk helicopter [1]. The A2C2S combines comprehensive battlefield communication capabilities with a sophisticated computing facility hosting the Army Battle Command System (ABCS) suite of command and control software systems into a mobile command system from which the mobile commander can maintain command and situational awareness both in flight or on the ground. Two A2C2S prototypes are currently deployed with units at Ft. Hood and Ft. Campbell, and a production contract is in place to equip additional aircraft with A2C2S. The Airborne Manned/Unmanned Systems TechnologyDemonstration (AMUST-D) Science and Technology Objective and the Hunter Standoff Killer Team (HSKT) Advanced Concept Technology Demonstration Programs, ____________ Presented at the American Helicopter Society 59th Annual Forum, Phoenix, Arizona, May 6-8, 2003. Copyright © 2003 by the American Helicopter Society International, Inc. All rights reserved. led by the U.S. Army Aviation Applied Technology Directorate (AATD) at Ft. Eustis, VA, are developing additional capabilities to support the mobile commander. The Mobile Commander’s Associate (MCA) decision aiding system being developed under AMUST-D provides capabilities to: improve the commander’s situation awareness, support command of a heterogeneous airborne team, and provide organic control and exploitation of an unmanned air vehicle (UAV). The MCA development effort leverages technology from several previous advanced technology efforts. It incorporates decision aiding, route planning, and data fusion technology developed under the Rotorcraft Pilot’s Associate (RPA) program. Team management technology developed under the Tactical Execution Decision Aid (TEDA) ACT II program and UAV control technology developed under the preceding AMUST-Baseline (AMUST-B) program also contribute to MCA. One primary focus of this technology is to provide improved commander situational awareness. Multi-Sensor Data Fusion, Decision Aiding, and organic control of a UAV all contribute to improving commander situational awareness by improving access to—and utility of data from—a variety of sensor sources. At the command level, however, much of the information that contributes to situational awareness does not come from specific sensors reporting on the battlefield. Instead, much necessary information is contained in a diverse set of heterogeneous distributed data sources such as the Joint Common Data Base (JCDB) that serves as the data repository for the ABCS applications. Making effective use of this information requires tailored retrieval strategies, persistent intelligent monitoring, and complex interoperability protocols. This paper describes the Agent-Based Data Discovery technology and its application in AMUST-D and HSKT. We also describe work that has been done to gather data on the effectiveness and benefits of this technology in promoting situational awareness among a distributed team of platforms. We present the results of this work and offer conclusions about the potential operational benefits of these technologies. Background Army Airborne Command and Control System (A2C2S) The U.S. Army has long recognized the need to have mobile command and control platforms to accommodate the needs of a maneuver commander to provide command on-themove. Such situations can arise during a rapidly evolving high intensity conflict, in a situation like Afghanistan where forces are spread over a large geographic area with no fixed borders between areas of friendly and hostile control, or during humanitarian assistance operations in which on-site presence of the commander is required. Previous systems did not permit access to the increasingly digitized Army and Joint Command and Control infrastructure. To address this shortfall, the U.S. Army Aviation Applied Technology Directorate (AATD) began development of a prototype system in support of PEO C3T and PEO Aviation, designated the Army Airborne Command and Control System (A2C2S), that incorporated comprehensive digital and voice communication capabilities as well as the computing resources required to host a subset of the Army Battle Command System (ABCS). The A2C2S, housed in the rear of a UH-60 Blackhawk helicopter, is configured as a 5-seat mobile command post (Figure 1). Each seat has a flat-panel display and keyboard, which can be independently switched to access one of eight computer processors housed in a rack. These processors run a set of ABCS applications including the Maneuver Control System (MCS), All-Source Analysis System (ASAS), and the Army Field Artillery Tactical Data System (AFATDS). These applications provide the commander with a common picture of the battle through the integration of near-real-time situational information and sensor data into a force level Courtesy of AATD Intelligent Agents, an emerging technology being increasingly applied to military operational problems, are ideally suited to addressing these requirements. ATL has been developing intelligent agent technology and applications for DARPA and DoD laboratories for the past eight years. Under the AMUST-D program, ATL has leveraged this extensive experience to develop the Agent-Based Data Discovery component that provides retrieval, monitoring, and interoperability capabilities to the MCA. Figure 1. Artist’s conception of A2C2S in a UH-60 Blackhawk accommodating the commander and four of his staff. database. Two larger displays at the front of the compartment, also independently switchable, allow important data to be displayed to the entire staff. The A2C2S also includes communication capabilities to permit voice and data access by the commander and his staff to all required channels and tactical data links, including access to the Tactical Internet and voice communication by SINCGARS and SATCOM radios. Two A2C2S prototype systems have been developed to date. Each prototype includes the consoles and displays, rackmounted computing systems, and the required radio systems, installed in a specially modified UH-60L aircraft. The first demonstrator system was deployed with the 4th Infantry Division at Fort Hood, TX, in June 2001, and the second soon thereafter with the 101st Air Assault Division at Fort Campbell, KY. A production contract for an initial buy of eight systems has been let to Raytheon, and the first delivery of production units is scheduled for later this year. Mobile Commander’s Associate (MCA) The MCA is a decision aiding system [2] developed under AMUST-D. It consists of a set of software modules in an open-architecture framework built on top of an Open Source software infrastructure and COTS hardware [3]. Major components of MCA include Decision Aiding, UAV Control, GUI, Data Fusion, and the Agent-Based Data Discovery capability described in this paper. The MCA Decision Aiding components support a maneuver commander in managing a mission involving a mixed team of joint airborne units, including attack helicopters, recon helicopters, Air Force or Navy strike aircraft, and UAVs. Mission management capabilities include creating and editing a mission plan, automated planning and dissemination of routes for team members, managing team composition, and monitoring team routes for threat and other violations. MCA UAV Control includes capabilities to permit a maneuver commander to exploit the capabilities of an organic surveillance UAV in developing situational awareness and monitoring the battle. UAV Control capabilities include managing two-way communication with a UAV via Tactical Common Data Link (TCDL), dissemination of routes to the UAV, managing the UAV sensor, keeping track of area scanned by the sensor, and monitoring UAV flight for threat or other violations. itinerary contains a set of activities from a set of building blocks called tasks. A collection of generic tasks can be written that can be reused in multiple activities. An agent system consists of one or more machines that contain a dock that manages when an agent is launched. When the dock launches an agent, it determines where its activity needs to run and, if necessary, the agent migrates to another dock (Figure 2). The MCA GUI includes sophisticated visualization features to enhance the commander’s situational awareness. Using a common standard look-and-feel, based on the ABCS lookand-feel, the GUI provides capabilities to display battlespace entities, routes, plan features, and other control measures as overlays on a variety of map, chart, and imagery formats. MCA Data Fusion is based on the RPA Data Fusion described in the next section, augmented with the Grapevine capability [4] to provide a Distributed Data Fusion [5] capability linking the MCA with the Warfighter’s Associate being developed under AMUST-D for deployment on the Apache Longbow helicopter. Rotorcraft Pilot’s Associate (RPA) From 1993 to 1999, ATL participated in the Army’s Rotorcraft Pilot’s Associate (RPA) Advanced Technology Demonstration program, sponsored by AATD. ATL developed the multi-sensor Data Fusion (DF) system that provides a common fused track picture to the RPA pilot and RPA decision aiding systems. The DF system fused kinematic and classification data of up to 200 battlefield entities from 14 different types of onboard and offboard sensors in real time. The RPA system was successfully flight demonstrated on an AH-64D in August 1999. Intelligent Agent Technology In the context of this paper, an intelligent agent is defined as a persistent software process that is able to interact with its environment in order to perform tasks on behalf of the user. An intelligent agent has the following three key characteristics. An agent is autonomous because it is given a set of instructions to perform without direct control of a human operator. An agent is adaptive because it is able to adjust what it will do based on its environment. An agent is cooperative because it can work together with other agents or with a human operator to accomplish its goals. ATL has been developing agent technology since 1995 to support various interoperability roles such as data dissemination, retrieval, and monitoring of key information stored in legacy, stove-piped applications. At the core of this agent technology is an agent architecture called Extendable Mobile Agent Architecture (EMAA) [6]. EMAA is a JavaTM based framework that allows a developer to create software agents by building an itinerary for the agent to follow. An Figure 2. Agents may migrate to another dock to access local resources and then return with the information. EMAA agents have been used in a variety of projects beginning with the Domain Adaptive Information System (DAIS). DAIS used agents to query heterogeneous databases over a low bandwidth and unreliable military network. The agents would migrate to where the data was stored, process the data, and return the information analysts needed to perform their jobs. DAIS was deployed with the Army 201st Military Intelligence (MI) brigade at Fort Lewis and became part of their standard operating procedures. During the exercises, the agents were able to find and retrieve valuable information within minutes rather than days. The information the agents gathered was key to accomplishing the exercise’s objective [7]. EMAA agents can connect legacy stove-piped applications together and allow them to interoperate with each other. ATL has participated in six of the last seven Fleet Battle Experiments with the Navy where agents allow the existing applications to share information to solve problems such as: theater air missile defense, time critical targeting, and track management within a coalition environment. Since EMAA agents generally have access to a large amount of data, it is easy for them to also monitor for specific events and alert the user when the events occur. This was first demonstrated in a project for the U.S. Air Force Air Mobility Command where agents were tasked to monitor for scheduling conflicts in an air mobility plan [8]. EMAA agents can improve the quality of the Common Tactical Picture (CTP). Previously, DF would only accept sensor data information. For the Army ACT II proof-ofconcept demonstration at the Army Air Maneuver Battle Laboratory, DF used sentinel agents to find better quality data in the Joint Common Database (JCBD) and fused the new data with the current CTP [4,9]. ATL is leveraging the work done on these and other projects in AMUST-D to allow the agents to find and monitor information in a variety of heterogeneous data sources to give the A2C2S commander improved situational awareness of the battlespace. Agent-Based Data Discovery (ABDD) ABDD’s role in MCA is to use agents to retrieve relevant information from the JCDB, provide interoperability among a variety of applications, monitor for specific events and alert the commander when those events occur. Data Retrieval Agents are tasked to find additional information stored in the JCDB that is not available to Distributed Data Fusion (DDF) through sensor inputs. All of the ABCS systems with in the A2C2S have access to the JCDB and periodically update it with information. Based on the JCDB’s schema, we have discovered that tables exist to store information about blue organizations, red organizations, facilities, and control measures. Agents retrieve this information and store it in an internal cache for use by MCA. Agents supplement the tactical picture by retrieving control measures from the JCDB and forwarding them to MCA for display to the commander. Interoperability One of the main strengths of agents is that they facilitate interoperability within a collection of applications. Knowledge acquisition efforts at the Central Technical Support Facility at Fort Hood, TX and the Air Maneuver Battle Laboratory at Fort Rucker, AL, have identified and verified several applications and their data sources. In AMUST-D, agents will share information among the following components: the Live Feed Server (LFS) provided by ABCS; Distributed Data Fusion (DDF) developed by ATL; and both the Decision Aid (DA) and Link 16 components developed by LM Owego (Figure 3). ABDD, in turn, supplies data to DDF and other MCA components. LFS Blue Platforms, Blue Units, Red Spot Reports DDF Ta ct ica lP Se ict ns ur e or R ep or ts ABCS Tactical Picture, Alerts ABDD JCDB Control Measures, Blue and Red Units DA User-Entered Tracks, Control Measures Tr M ack an N ag um em b en er t Because the tactical picture quality from DDF is limited by the quality of the input sensor reports, agents attempt to improve the tactical picture by connecting to the LFS. The LFS provides friendly platform and unit locations usually once every 10-20 seconds and human-entered spot-reports. The platform-level data is converted into sensor reports and output to DDF. Agents supplement the tactical picture by retrieving control measures from the JCDB—the common data repository for all ABCS components—and forwarding them to MCA for display to the commander. Additionally, by using control measures stored in the JCDB and received from MCA, agents provide control measure monitoring and alerting services to the commander. The AMUST-D program has recently identified the need for DDF to interoperate with Link-16. Link-16 is the tactical data link used by the armed forces to share a common operating picture. To become a participant on Link-16, there is a set of track management responsibilities that must be followed. Each participant has a list of reserved track numbers. These track numbers are assigned to a track and a numeric quality number is assigned. If another participant is tracking the same track with a higher quality value, it assumes reporting responsibilities using the original track number. The book keeping of the track numbers can be a tedious task and is well suited for agents to manage. DDF is able to receive and fuse the tracks coming across Link-16, and uses ABDD in an interoperability role to handle all of the necessary track number management and reporting responsibilities. Monitoring and Alerting Monitor agents are used to continuously check for the occurrence of operationally significant events and send alert messages in such cases. ABDD agents are used to provide timely information on the location of friendly and hostile entities to help avoid fratricide and to aid situational awareness. A2C2S MCA DDF, a multi-sensor data fusion system, provides the platform-level tactical picture for MCA. ABDD receives the tactical picture created by DDF, performs user-specified filtering of entities, and converts the data into a format used by other MCA components. Additionally, agents cache the tactical picture to support monitoring capabilities. Link 16 Figure 3. ABDD allows components within the A2C2S to interoperate with MCA. The agents monitor the current state of a set of control measures. Control measures that can be specified include an Engagement Area (EA), a Named Area of Interest (NAI), a Targeted Area of Interest (TAI), a Phase Line (PL), or a Helicopter Route. While many applications exist that track enemy locations, monitoring blue movements to avoid fratricide would also be very useful. AMUST-D addresses this problem by using agents to manage and monitor track information on blue forces. When specific events occur, the agents warn the commander of potential danger. There are several scenarios in which agent monitoring can aid in fratricide avoidance. An engagement area is where a commander intends to attack and destroy the enemy. If a blue force unknowingly enters an EA, it may be inadvertently hit by friendly fire. By having an agent monitor each of the EA’s and send an alert when a blue force is discovered to be in such potential danger, the commander has the opportunity to call the blue force away from the EA or call off an attack to avoid fratricide (Figure 4). Figure 6. Blue found near helicopter route. Agents monitor the locations of red forces within control measures. When a red force appears in a control measure such as an EA or NAI, an agent sends an alert (Figure 7). This alert could be considered a decision point that helps the commander choose a course of action. Figure 7. Red found in a named area of interest. Figure 4. Blue found in an engagement area. Phase lines (PL) are used to control and coordinate military operations during a battle. Under normal circumstances the blue unit notifies the commander when it is about to cross a PL [10]. However, sometimes a unit inadvertently crosses the line. To assure that the commander is aware of PL crossings, an agent monitors the line and alerts the commander (Figure 5). It is up to the commander to determine if the blue force crossed too soon or if the next phase of the battle should continue. Figure 5. Blue found crossing a phase line. Agents also monitor helicopter routes to determine if the helicopter will encounter blue forces along the route. If a friendly entity is found to be near the route, an alert is sent so that the commander can notify the affected blue forces (Figure 6). This also helps the helicopter pilot determine whether or not encountered entities are friendly or hostile, preventing friendly fire. The Commander’s Critical Information Requirements (CCIR) help the commander make critical decisions and determine or validate courses of action [10]. The commander can configure the agents to find data that match the CCIR. Monitoring can be for a specific affiliation (blue, red, unknown, etc.) or a combination of affiliations. The commander can also assign custom monitoring behaviors for a specific unit such as when the unit enters a particular control measure. Example Scenario Before a mission begins, a plan is developed that lists the objectives and courses of action needed to successfully complete the mission. Various control measures are created and entered into the Maneuver Control System and shared with the rest of the ABCS systems by storing them in the JCDB. These control measures include the following: a set of engagement areas where the commander intends to attack the enemy; a set of named areas of interests that the commander will need to monitor to determine which engagement area to attack; and a set of phase lines used for control and coordination of the mission. The commander briefs his staff to look for specific information that will help him determine his course of action during the mission. The following scenario demonstrates how agents might be used to improve the commander’s battlespace awareness and prevent fratricide. The control measures and locations of various alerts generated in the scenario are shown in Figure 8. When the mission begins, the ground tactical operations center updates the A2C2S aboard the Blackhawk. The commander’s staff configures the agents to monitor the control For Build 1, the agents were able to connect and share data among DDF, MCA and the JCDB. They were also able to monitor control measures from MCA and generate alerts when a set of tracks were found in an engagement area. During the evaluation, three U.S. Army pilots were given the opportunity to execute the MCA software and provided valuable feedback. The pilot’s feedback included having a configuration panel available to configure various agent parameters such as: which control measures to monitor, which affiliation to monitor for, and which specific entity should be monitored. This will allow the commander to indirectly track his CCIR. Figure 8. An example scenario showing where an agent would generate alerts. measures that relate to the CCIR. The commander boards the helicopter and proceeds to an observation point near the rest of the troops. On the way, the agents are automatically scheduled to monitor the pre-configured control measures. Early in the mission, the first alert appears on the MCA display reporting that a blue force has crossed over a phase line. Normally, the blue force would contact the commander, however, they did not, so the commander sends a message to pull back from the phase line and regroup with the rest of the troops. As the mission continues, an agent finds a hostile track in one of the named areas of interest and sends a second alert to the MCA display. The commander sees the alert and determines into which engagement area the hostile tracks are heading. He gives the order for the attack helicopters to engage without realizing that some of the blue forces are also approaching the engagement area. The MCA route planner determines the best route and sends the route to the attack helicopters. As the helicopters approach the engagement area, a third alert appears on the MCA display. Some of the blue forces have inadvertently crossed into the engagement area. The commander alerts the blue forces to check their position and alter their course away from the engagement area. As the blue forces move away, a fourth alert appears on the MCA display showing that their new course places them near the attack helicopter’s route. The commander sends a warning message to the attack helicopters that blue forces will be encountered along the route. The helicopters approach the engagement area just as the blue forces are safely away and attack the enemy targets. Preliminary Results MCA will be going through a series of evaluations. The first evaluation was held at Lockheed Martin Owego during December 2002. The second evaluation will be held at Fort Rucker in May 2003. Formal flight test will occur during the fall of 2003. For future releases of the agent technology under AMUSTD, ATL is planning to build agents to monitor phase lines and helicopter routes, and allow the agents to be configured by a configuration panel and handle the book keeping needed to interoperate with Link 16. Agents in an Embedded Environment Many of our agent applications have been developed and demonstrated on laptops and desktops that generally have fast processors and large amounts of memory. On A2C2S, the agents will be running using the Blackdown implementation of JavaTM on a 375 MHz PowerPC single board computer running a real time Linux operating system with 128 MB of memory. ABDD shares these resources with DDF, and employs several control paradigms to achieve an efficient yet flexible system. Agent Management We designed each agent to be retaskable, which allows an agent to be reused repeatedly for different jobs. Each agent exposes an operational template where functional components called tasks can be plugged into the agent. The agent can be reused for a different job simply by replacing its task list. This also provides flexibility and extensibility in the system, since the addition of new functionality requires only the creation of new tasks. The system also uses agent pools that provide a constrained resource usage capability to the system. Agent pools cache idle agents until they are needed again. If the agent pools detect that the system is using too much memory or processor time, they will reduce the number of agents in the application. Also, agents are reused instead of being created and deleted, which decreases the cost of repeatedly allocating and deallocating memory. Finally, on system startup, the agent pool creates and stores a small number of agents. This shifts the agent-creation cost to system startup and allows agents to be dispatched more quickly. A scheduler provides the centralized agent-dispatch manager for the system that controls when agents are dispatched and assures quality-of-service for requests. As processing jobs are created, they are submitted to the scheduler, which deter- mines when the job should be assigned to an agent. For jobs that the user initiates, the scheduler immediately assigns the job to an agent. If the scheduler determines that resources are low, it prioritizes the jobs so time-critical jobs are started as quickly as possible and delays certain jobs to avoid spikes in resource usage. Clustering As conventional situational assessment applications must typically be able to handle thousands of tracks in the battlespace, we employ geographical clustering to optimize track searches. The clustering algorithm groups together tracks that are positioned within close proximity to each other. This allows the system to use fast bounding-box checks to quickly determine which tracks are near a search area and reduces the problem to a manageable size. Conclusion The number of applications and amount of data in the battlespace will continue to grow as the armed forces become a digitized force. We have described how ATL’s agent technology can currently be used to manage and monitor the information being generated. We have shown how agents are able to improve the situational awareness of the commander by monitoring and alerting on the information they gather from DDF, MCA and ABCS. This additional awareness gives the commander an advantage on the battlespace and allows him to autonomously monitor the red forces and avoid friendly fire with the troops under his command. This paper also described how we are managing our agent technology in an embedded environment with limited memory and processor constraints. The agent work done under the AMUST-D project continues to build a foundation of the shared situational awareness capabilities that will be needed in the future to support the mobile commander. Acknowledgments This research was partially funded by the Aviation Applied Technology Directorate under Agreement No. DAAH10-012-0008. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon. representing the official policies, either expressed or implied, of the Aviation Applied Technology Directorate or the U.S. Government. Previously published is a detailed discussion of DDF which also mentions the use of agents [2], however, the paper for this year’s conference focuses on the data discovery, monitoring and alerting capabilities of the agents. References [1] Gannon, S., “Integration of US Army Command and Control Systems into a UH-60 Blackhawk,” American Helicopter Society Forum 58th, Avionics and Systems Session, Montreal, Canada, June 2002. [2] Stiles, P., Bodenhorn, C., and Galamback, K., "Mobile Commander's Associate for AMUST-D," American Helicopter Society 59th Annual Forum, Phoenix AZ, May 2003. [3] Hrustich, J., "Commercial and Open Source Software in Rotorcraft Avionics Systems," American Helicopter Society 58th Annual Forum, Montreal, CA, June 2002. [4] Pawlowski, A. and Stoneking, C., “Army Aviation Fusion of Sensor-Pushed and Agent-Pulled Information,” American Helicopter Society 57th Annual Forum, Washington, DC, May 2001. [5] Jameson, S.M. and Stoneking, C., "Army Aviation Situational Awareness Through Intelligent Agent-Based Discovery, Propagation, and Fusion of Information," American Helicopter Society Forum 58th, Avionics and Systems Session, Montreal, Canada, June 2002. [6] Lentini, R., Rao, G., and Thies, J., “EMAA: An Extendable Mobile Agent Architecture,” AAAI Workshop, Software Tools for Developing Agents, July 1998. [7] Whitebread, K. and Stein, H., “Domain-Adaptive Information Systems (DAIS),” Proceedings of the Second International Conference on Autonomous Agents (Agents ’98). [8] McGrath, S., Chacón, D., and Whitebread, K., “Intelligent Mobile Agents in the Military Domain,” Fourth International Conference on Autonomous Agents, June 2000. We would like to thank AATD for their continued support of our agent technology. We would also like to thank the many people at Fort Hood, TX and Fort Rucker, AL for allowing us to use their facilities and supporting our efforts to test connectivity to the ABCS systems and the LFS. [9] Hess, J. and Patteson, S., "Adapting and Expanding Rotorcraft Decision Aids for the Battle Commander," American Helicopter Society National Forum 57, Washington, DC, May 2001. Disclaimers [10] Wade, N. (Ed), The Battle Staff SMARTbook, USA: The Lightning Press, 1999. The views and conclusions contained in this document are those of the authors and should not be interpreted as