PLACEHOLDER SLIDE ON SIPR!

Slides:



Advertisements
Similar presentations
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Advertisements

Air Force Core Functions
Physical Attack IW-140 College of Aerospace Doctrine, Research, and Education.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
Overview An emerging challenge A belated response Debating the alternatives – Air-Sea Battle – A distant blockade – Maritime denial Conclusions.
The Risk Management of Tactical Cyber Threats in Australian Army Operations David Ormrod UNSW PhD Candidate Supervisor: Dr Edward Lewis UNSW Co-Supervisor:
Enter Your Organization Enter Name of Technology
Sensors and location technologies – the front end of ISR
Defense Daily Open Architecture Summit EMS Panel
CybAIRVision® International Cyber Warfare & Security Conference, 27 November 2014, Ankara Cécilia Aguero.
Force XXI Battle Command Brigade and Below (FBCB2) Communications System
Introduction to Information Operations Attaché Corps- SEP 09
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
This Briefing is:UNCLASSIFIED Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e 3-Jan-071 Air Force Cyber Operations.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
New Army Terms Table D-1. New Army terms Army positive control Army procedural control civil support1 combat power (Army) command and controlwarfare command.
UNCLASSIFIED//FOR OFFICIAL USE ONLY DISTRIBUTION STATEMENT C: Distribution authorized to Department of Defense (DoD) and U.S. DoD Contractors only. This.
C4ISR and Information Warfare
USMC Precision Strike BGen “Wiley” Post Assistant Deputy Commandant for Aviation.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Force Packaging. Overview Principles of War Process of Force Packaging Developing Packages.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
UAS Combat Threat Survivability SURVICE Engineering Company
FLTC Perspective Focused Long Term Challenges (FLTCs) are an innovative approach to match user requirements with relevant technology development, while.
C4ISR and Information Warfare Naval Weapons Systems.
Branch Orientation Benjamin Brownlee MS-I W&J ROTC.
United States Air Force: Air Doctrine – Provide Global Capability
Leaders Training Program, JRTC TOC OPERATIONS. Leaders Training Program, JRTC CONSIDERATIONS DON’T BE TOO AUSTERE. MUST HAVE SUFFICIENT ROOM AND PEOPLE.
PM UA Networks System Integration 2004 Combat Vehicles Conference
UNCLASSIFIED//FOR OFFICIAL USE ONLY National Reconnaissance Office Overview UNCLASSIFIED//FOR OFFICIAL USE ONLY.
ANGELFIRE… PROVEN PERFORMANCE! Possible Architectures And External Interface Specifications Presented to Program Office 16 SEP 04 (Team 3)
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
By CPT Robert L. Crabtree
UNCLASSIFIED 2/6/2016 7:56:41 PM UNCLASSIFIED Page 1 of 7 Pages Space Policy Issues - Space Warfare Definitions - 15 June, 2010.
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
Information Fusion Command and Control (IFC2) The OTBSAF is generating the simulated ground truth as well as displaying it in the OTBSAF GUI.
China: Five Years and Beyond in Space Space is the “focal point for advanced Science and Technology” Drives economic development and military power Outer.
FLTLT Matthew Murphy Growler Transition Office – Air Force Headquarters UNCLASSIFIED.
Electronic Combat. Objectives Outline the electronic combat mission of ES, EA, and EP. Explain the advantages and disadvantages of ES and EA List methods.
Warfighting Functions: Aviation
The Russian Way of War TEFOR G-27
Threat Model: Cyber – Electronic Warfare in support of INFOWAR
Stopping the Reinvasion of the Baltic States
Panel Discussion: C4I Solutions for Combating
Topological Vulnerability Analysis
Combat Air Operations.
Army S&T Systems Adaptive Red Team Technical Support & Operational Analysis (TSOA) Quad Charts 1.
The MDMP Process MDMP Inputs MDMP Outputs Step 1 MDMP Inputs Step 5
Fires Conceptual Framework Supporting Multi-Domain Battle
Warfighting Functions: Aviation
Installations of the Future
Multi-Domain Battle: Achieving Cross-Domain Synergy
USEUCOM Science & Technology
Electronic Warfare.
Perspectives on Space and Cyber Yadunath Zambre, Ph. D
Force Packaging.
Air Force Cyber Operations Command Mission: Warfighting
Bush/Rumsfeld Defense Priorities/Objectives A Mandate For Change
Asymmetric Warfare Group/Unique d
ADEISA – Industry’s contribution to ADF Superiority of the EMOE
Kazuto Suzuki Hokkaido University
Program Manager Light Armored Vehicles
DDR&E Advanced Capabilities Overview
S&T Main Focus Areas Linkages to 2018 NDS
Presentation transcript:

PLACEHOLDER SLIDE ON SIPR! UNCLASSIFIED//FOR OFFICIAL USE ONLY Future “Disruptive” Threat to Mission Command Find & interdict Command Posts Multi echelon use of UAVs; multi level, saturated airspace… decreased sensor-to-shooter time Space-based, Multispectral sensors…EO, radar Ground based multi intel sensors …targeting electronic signatures Long range fires with area and precision munitions Disrupt Mission Command GPS jamming & spoofing, disruption of PNT, denial of electromagnetic spectrum Space-based jamming and ASAT Communications jamming, electronic deception… DRFM jamming Smart and EW munitions PLACEHOLDER SLIDE ON SIPR! Disrupt the Network Massive data injection Insider threat…exploitation, corruption of data…false data insertion Combining Cyber and EW capabilities UNCLASSIFIED//FOR OFFICIAL USE ONLY

Red Perspective of NIE Network NIE events since 14.2 and CTC rotations have shown some of the same vulnerabilities. Basic-level OPFOR offensive cyber operations (OCO) revealed significant U.S. network vulnerabilities allowing exploitation. Threat representative Electronic Warfare (EW) systems (CICADA Jammer) were effective in disrupting and desynchronizing US Army formations conducting operations. GPS Jamming introduced delays in processing data as well as locational errors, potentially degrading C2. Synchronization of OPFOR activities with EW and OCO in combination with UAS reconnaissance provided a significant advantage for the OPFOR by disrupting US Army situational awareness (SA) while increasing OPFOR SA. Unit OPLANS, OPORDS, operational graphics, spot reports, intel summaries, and commander battle update briefings (BUB) were acquired and passed to the Red Command group. Consequently, after confirming the accuracy of the captured products using various air and ground reconnaissance assets, the OPFOR battalion commander had a near-perfect picture of 1-6 Infantry's defense well before he attacked: