Threat Model: Cyber – Electronic Warfare in support of INFOWAR

Slides:



Advertisements
Similar presentations
Air Force Doctrine Document 2-5.1: Electronic Warfare
Advertisements

Air Force Core Functions
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
Sensors and location technologies – the front end of ISR
Defense Daily Open Architecture Summit EMS Panel
Force XXI Battle Command Brigade and Below (FBCB2) Communications System
Introduction to Information Operations Attaché Corps- SEP 09
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Battle Hard! The Red Zone Fight Centurion OPD Battle Hard! AGENDA References Pretest Review Definitions Introduction NTC Trends Success in the Red Zone.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
New Army Terms Table D-1. New Army terms Army positive control Army procedural control civil support1 combat power (Army) command and controlwarfare command.
C4ISR and Information Warfare
Army Doctrine Publication (ADP) 3-37; and Army
Ambush Disrupt Occupy Attack by Fire Penetrate FIX Relief in Place
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Integrating COIN and Full Spectrum Training LtCol M. B. Barry 23 Sep 2010.
Force Packaging. Overview Principles of War Process of Force Packaging Developing Packages.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Battle Drills Break Contact React to Ambush React to Contact
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e 1 GPS Operations Past, Present, Future Colonel John E. Hyten Commander, 50th Space Wing 29 Mar.
UAS Combat Threat Survivability SURVICE Engineering Company
FLTC Perspective Focused Long Term Challenges (FLTCs) are an innovative approach to match user requirements with relevant technology development, while.
Joint Training Challenges of Irregular Warfare/COIN and Full Spectrum Training Requirements Brief for WJTSC LtCol John Merna, J7/9-TJ 23 September.
TYPES OF ORDERS ADMINISTRATIVE ORDER: COVERS NORMAL ADMINISTRATIVE OPERATIONS IN GARRISON OR IN THE FIELD. THEY INCLUDE GENERAL, SPECIFIC, & MEMORANDUM.
C4ISR and Information Warfare Naval Weapons Systems.
23 July 2003 PM-ITTS TSMOTSMO Information Assessment Test Tool (IATT) for IO/IW Briefing by: Darrell L Quarles Program Director U.S. Army Threat Systems.
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
By CPT Robert L. Crabtree
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
Military Intelligence
Office of the Deputy Chief of Staff
FLTLT Matthew Murphy Growler Transition Office – Air Force Headquarters UNCLASSIFIED.
Employment Considerations: Considerations at the Outset of Combat
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Warfighting Functions: Aviation
The Russian Way of War TEFOR G-27
PLACEHOLDER SLIDE ON SIPR!
Passage of Lines. Passage of Lines Purpose To provide guidance and de-conflict Passage of Lines procedures for the 505th RCT Light/Heavy Task Force.
Practical Exercise Resources
Hybrid Threat Offense Practical Exercise
Panel Discussion: C4I Solutions for Combating
Hybrid Threat Offense Practical Exercise
Each unit brings a specific capability to the overall mission.
Cyber defense management
Fires Conceptual Framework Supporting Multi-Domain Battle
Alternate Scenario 5 Armored Brigade Combat Team (ABCT) (Kuba River Defense; O/O Attack to PL Chicago) Each unit brings a specific capability to the overall.
Warfighting Functions: Aviation
Scenario Overview Road to War: Mission: Key Tasks:
Multi-Domain Battle: Achieving Cross-Domain Synergy
Joint Protection of the Sea Base
Electronic Warfare.
Force Packaging.
Alternate Scenario 3 Sustainment Brigade
Each unit brings a specific capability to the overall mission.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Customer Advocate Airborne Electronic Warfare Systems 29 MAR 2011 Tim.
ADEISA – Industry’s contribution to ADF Superiority of the EMOE
DISN Evolution Mr. Charles Osborn
Operations Security (OPSEC)
TYPES OF ORDERS ADMINISTRATIVE ORDER: COVERS NORMAL ADMINISTRATIVE OPERATIONS IN GARRISON OR IN THE FIELD. THEY INCLUDE GENERAL, SPECIFIC, & MEMORANDUM.
The Red Zone Fight Centurion OPD
Intelligence Fusion Analyst Program
DDR&E Advanced Capabilities Overview
S&T Main Focus Areas Linkages to 2018 NDS
Presentation transcript:

Threat Model: Cyber – Electronic Warfare in support of INFOWAR Tactics and Techniques of Threats and Hybrid Threat in Complex Operational Environments Introduction. A leader Threat Model: Cyber – Electronic Warfare in support of INFOWAR APPROVED HYBRID THREAT CTID MODEL TRADOC G2 Intelligence Support Activity

Definitions and Considerations Information Warfare is specifically planned and integrated actions taken to achieve an information advantage at critical points and times (TC 7-100.2, p. 7-1) elements of INFOWAR do not exist in isolation nor are mutually exclusive – effective execution does not require all elements concurrently Electronic Warfare (EW) Information Attack (IA) Computer Warfare Look for the key words in the definition— An assault is an attack that destroys an enemy force through firepower and the physical occupation of and/or destruction of his position. (TC 7-100.2, p. 3-20) Kill zone = the focal point of an ambush-- is a designated area on the battlefield where the OPFOR plans to destroy a key enemy target. (TC 7-100.2) An assault is the basic form of OPFOR tactical action. Decisive assaults are characterized by: Isolation of the objective. Effective tactical security. Effective suppression of the enemy force. Violent fire and maneuver against the enemy. TRADOC G2 Intelligence Support Activity

Definitions and Considerations Electronic Warfare - targeting C2 and RSTA assets and networks, the objective is to exploit, disrupt, deny and degrade the enemy’s use of the electromagnetic spectrum while ensuring its use by the OPFOR (TC 7-100.2, p. 7-4) Includes both nonlethal and lethal means Information Attack - targets decision makers and others users of information, as well as systems reliant on accurate information, by altering or denying key information (TC 7-100.2, p. 7-4) IAs target information itself Computer Warfare – targets C2 and RSTA assets and networks by disrupting, denying or degrading the enemy’s computer networks and information flow (TC 7-100.2, p. 7-4) Focus specifically on computer systems, networks and nodes Look for the key words in the definition— An assault is an attack that destroys an enemy force through firepower and the physical occupation of and/or destruction of his position. (TC 7-100.2, p. 3-20) Kill zone = the focal point of an ambush-- is a designated area on the battlefield where the OPFOR plans to destroy a key enemy target. (TC 7-100.2) An assault is the basic form of OPFOR tactical action. Decisive assaults are characterized by: Isolation of the objective. Effective tactical security. Effective suppression of the enemy force. Violent fire and maneuver against the enemy. TRADOC G2 Intelligence Support Activity

INFOWAR Objectives: Focused and Deliberate The purpose of EW, IA and computer warfare actions are to achieve very specific effects supporting decision maker’s or commander’s objectives Targets and effects may be located within the enemy’s homeland, throughout a region or within the OPFOR’s territory Maximum effect achieved through phasing of actions IA/computer warfare actions may achieve local or strategic effects Critical infrastructure such as power and water Communication, social media and messaging Sustainment, logistics tracking Transportation Banking/finance EW actions Signals reconnaissance Electronic attack Look for the key words in the definition— An assault is an attack that destroys an enemy force through firepower and the physical occupation of and/or destruction of his position. (TC 7-100.2, p. 3-20) Kill zone = the focal point of an ambush-- is a designated area on the battlefield where the OPFOR plans to destroy a key enemy target. (TC 7-100.2) An assault is the basic form of OPFOR tactical action. Decisive assaults are characterized by: Isolation of the objective. Effective tactical security. Effective suppression of the enemy force. Violent fire and maneuver against the enemy. Provide examples ranging from strategic to very local look at 7-100.2 chapter 7 for examples Time phased force and deployment list power SCADA Force deployment/TPFDL jamming (tactical, obstacle….) include GPS, satellite, tactical SIGINT early, preparing for future exploitation/attacks TRADOC G2 Intelligence Support Activity

Functional Organization: INFOWAR Support Typical organization providing EW, IA and computer warfare support: Electronic Warfare. The OPFOR utilizes a set of ground-based and airborne electronic support and electronic attack systems providing intercept/DF and jamming of BLUFOR communications, to include satellite links and PNT (position, navigation and tracking). IA/Computer Warfare. The OPFOR utilizes a threat computer network operations (TCNO) cell to gain access to and exploit tactical information, providing actionable intelligence and supporting OPFOR attacks and defenses against the BLUFOR TUD. In addition to the threat unmanned device’s ES package, the platform also provides imagery and full-motion video (FMV) capabilities which enhance maneuver, indirect fire and EW operations. Leverage DOT&E memo for verbiage TRADOC G2 Intelligence Support Activity

Representative Threat INFOWAR Attack Matrix NOTE: the following are representative threat INFOWAR tasks; additional EW and TCNO actions may be employed to address specific commander’s objectives. Method Target Task Purpose Effect EW - ES BLUFOR 2/1 AD and 9/52 ID VHF/UHF collection on forces deployed vic. El Paso Map BLUFOR network, ID capabilities and intent; fires and support requirements Enhance offense & defense; focus EA; support IA/computer warfare EW – ES BLUFOR 2/1 AD VHF/UHF collection on forces vic. TAA Salerno ID location and intent of BLUFOR conducting WAS, combat ops Support ALA conducting insurgent ops, rogue ANA movement into northern Attica BLUFOR/Attican security ops VHF/UHF collection on BLUFOR and Attican government security forces ID loc. and capabilities of c-insurgent forces threatening ALA, rogue ANA and Ellisian SF Support OPFOR objective of destabilizing Attican government control/influence in northern Attica BLUFOR air ops VHF/UHF collection on air assets ISO BLUFOR vic El Paso Identify current & deploying ISR & OCA capabilities/intent; I&W Enhance survivability, reduce BLUFOR ISR contributions, prep for EA vs. ISR & combat a/c. BLUFOR L, C- and Ku-band satellite links Map platform usage and availability ID links supporting primary users e.g. UAS control & FMV, bulk comms Assess BLUFOR capabilities/intent; prepare tgt ID for EA TRADOC G2 Intelligence Support Activity

Representative Threat INFOWAR Attack Matrix Method Target Task Purpose Effect EW – EA BLUFOR PNT Infiltrate man-portable GPS jammers into northern Attica Reduce/negate accuracy of BLUFOR security force reporting, disrupt supporting enablers (fires) Degrade BLUFOR TACSIT SA; enhance OPFOR SF/insurgent survivability Deploy GPS jammers ISO OPFOR maneuver forces Reduce/negate accuracy of BLUFOR precision fires and ISR, disrupt maneuver Degrade BLUFOR TACSIT SA; enhance OPFOR survivability BLUFOR satellite links Jam L, C- and Ku-band satellite links Disrupt BLUFOR control of UAS platforms and FMV download; disrupt critical intel reach back, TACSAT comms Reduce SA of OPFOR unit dispositions and movement, disrupt MC; improve OPFOR survivability and lethality BLUFOR 2/1 AD Deploy and conduct VHF/UHF/L-band jamming Disrupt BLUFOR WAS operations Increase OPFOR survivability; enhance insurgent and SF ops BLUFOR 9/52 ID Disrupt BLUFOR defensive operations, especially UAS/recce, fires Increase survivability, enhance OPFOR movement south (esp. 4th MID/2AD) TRADOC G2 Intelligence Support Activity

Representative Threat INFOWAR Attack Matrix Method Target Task Purpose Effect IA/computer warfare BLUFOR tactical networks Exploit network vulnerabilities to gain privileged user access Utilize data manipulation to alter network functions such as BFT, AFATDS and network clocks Alter BLUFOR SA; degrade fires lethality; disrupt comms network synch and prevent a coherent scheme of maneuver BLUFOR sustainment databases Data manipulation to alter logistics delivery/requests Disrupt BLUFOR ability to assure delivery of critical Class III, V and IX supplies BLUFOR aviation Exploit network vulnerabilities to insert Trojan viruses Disrupt or prevent reliable use of ground control stations, navigation systems, PNT etc. Ground BLUFOR manned and unmanned platforms at time of OPFOR’s choosing Las Cruces & Anthony civil infrastructure DDoS, disruption attacks on power, water, sewage and communications Increase civil unrest in these and other locations controlled by BLUFOR Turn populations against Attican government, increase international support sympathetic with OPFOR goals Tansportation facilities DDoS, disruption attacks on power, comms, supporting networks Prevent use of airfields, railheads etc. supporting BLUFOR (2/1 AD and 9/52 ID esp.) in country Reduce sustainment for deployed BLUFOR, reduce OPTEMPO, delay/prevent additional force entry Civilian population DDoS attacks on select social networks and media Deny access to pro-Attican and BLUFOR info sources Increase civil unrest in BLUFOR-controlled areas, maintain compliant/supportive population in OPFOR areas. TRADOC G2 Intelligence Support Activity