ADEISA – Industry’s contribution to ADF Superiority of the EMOE

Slides:



Advertisements
Similar presentations
Air Force Doctrine Document 2-5.1: Electronic Warfare
Advertisements

EMS Checklist (ISO model)
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
Unified Land Operations
#CPACONGRESS E3: Strengthening integrity in a complex environment Hawari Badri FCPA Assistant Secretary, Department of Immigration and Border Protection.
Fahri BaturOctober 2013 SAP GRC AC ARA Access Risk Analysis Requirements Gathering Workshop.
Defense Daily Open Architecture Summit EMS Panel
Introduction to Information Operations Attaché Corps- SEP 09
DoD CIO Brief to FCC-NTIA Model City Workshop
Precision Humanitarian Missions in Strategic Stability Operations Dave Warner, M.D., Ph.D. MindTel, LLC. FOR OFFICIAL GOVERNMENT USE ONLY.
© Prentice Hall CHAPTER 13 Setting a Direction for Information Resources.
The Australian/New Zealand Standard on Risk Management
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Runway Safety Teams (RSTs) Description and Processes Session 5 Presentation 1.
Acquiring Information Systems and Applications
Global Electromagnetic Spectrum Information System
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Multinational Interoperability Council
Tempest Express 26 Humanitarian Civil-Military Coordination Center for Excellence in Disaster Management and Humanitarian Assistance Jesse Wolfe, DMHA.
Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.
Audit Planning Process
Information & Decision Superiority Case studies in applying AI planning technologies to military & civil applications Dr Roberto Desimone Innovations.
Defense Information Systems Agency A Combat Support Agency E3 Engineering Division 13 December 2011 Defense Information Systems Agency A Combat Support.
Example Incident Mgmt Initiation No recording of Incidents Users can approach different departments Solutions of previous incidents are not available.
Assessing the Military Benefits of NEC Using a Generic Kill-Chain Approach David Nevell QinetiQ Malvern 21 ISMOR September 2004.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
1 Joint Doctrine: The Authoritative Vocabulary For and Explanation of Joint Warfare and Joint Operations October 16, 2015 Representing Reality\Big Data\Big.
Joint Electromagnetic Spectrum Operations (JEMSO)
RICKY MASON COMMUNITIES INSPECTOR THE NATIONAL INTELLIGENCE MODEL L DIVISION.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Castlebridge associates | | Castlebridge changing how people think about information How to Implement the.
This Briefing is Unclassified Space Situation Awareness (SSA) for the Warfighter 25 August 2005 HQ AFSPC/DRC Lt Col Troy Pannebecker.
JFCC Space and Global Strike Lt Col David Adler, USAF Special Assistant to the Commander 19 Oct 2005 UNCLASSIFIED This Briefing is UNCLASSIFIED Brief to.
Network Centric Planning ---- Campaign of Experimentation Program of Research IAMWG Dr. David S. Alberts September 2005.
Business Strategy Introduction to Strategy Session 1 1.
FLTLT Matthew Murphy Growler Transition Office – Air Force Headquarters UNCLASSIFIED.
Assessments PHASED ASSESSMENTS Assessments. Phased Assessments.
January 23,  Balance state’s higher education long range plan and agency operations in the required strategic plan;  Involve agency staff in.
Module: Assess Threat & Risk
IOT – Firefighting Example
An Overview on Risk Management
Building evaluation in the Department of Immigration and Citizenship
Viewing Data-Driven Success Through a Capability Lens
Subject Name: MANGEMENT INFORMATION SYSTEM Subject Code:10IS72
HIRA This is the lesson objective.
Chapter 13: Setting a Direction for Information Resources
Managing the Planning Process
EFFECTIVE COOPERATION: THE BEDROCK OF ANY SECURITY ARCHITECTURE
Religious Inputs/Outputs
The MDMP Process MDMP Inputs MDMP Outputs Step 1 MDMP Inputs Step 5
Fires Conceptual Framework Supporting Multi-Domain Battle
2017 Health care Preparedness and Response Draft Capabilities
Electronic Warfare.
Bush/Rumsfeld Defense Priorities/Objectives A Mandate For Change
Cybersecurity ATD technical
Enhanced alerting and collaborative incident management
Managing the Planning Process
Mr. Mario Beccia – Cyber Defence Project Officer November 2018
SPECTRUM STRATEGY & VISION
Strategic Environmental Assessment (SEA)
HIRA This is the lesson objective.
CHAPTER 14 SETTING A DIRECTION FOR INFORMATION RESOURCES
CHAPTER 14 SETTING A DIRECTION FOR INFORMATION RESOURCES
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Strategic Military Effects/Outcomes
Month Year doc.: IEEE yy/xxxxr0 August 2019
Presentation transcript:

ADEISA – Industry’s contribution to ADF Superiority of the EMOE Name(s) of ADIESA facilitator(s) 5.8

The classification of these slides is: CLASSIFICATION The maximum classification for discussion is: CLASSIFICATION Industry input: INDUSTRY PROPRIETARY

Context for Industry “Joint electromagnetic spectrum operations (JEMSO) are military actions undertaken by two or more Services operating in concert to exploit, attack, protect, and manage the electromagnetic operational environment (EMOE). These actions include all joint force transmissions and receptions of electromagnetic (EM) energy. The electromagnetic spectrum (EMS) is the range of all frequencies of EM radiation. EMS superiority is that degree of dominance in the EMS that permits the conduct of operations at a given time and place without prohibitive interference, while affecting an adversary’s ability to do the same. The EMOE is a complex composite of the EM conditions, circumstances, and influences that affect the employment of capabilities and the decisions of the commander (CDR).”

Context for Industry The aim of The Joint EMS Operations (JEMSO) Planning Course is to provide the ADF with personnel who can plan and manage JEMSO and coordinate such activities with various agencies. The course uses pre-requisite reading of specified references followed by group and syndicate discussions/exercises of JEMSO planning topics and syndicate presentations of results of these discussions/exercises. Information will also be imparted by visiting subject matter experts from the Australian Defence Force, other departments and agencies of the Australian Government, and Coalition Partner Nations practitioners involved in JEMSO operations.

Session Learning Objectives Discuss Industry Capability to enable ADF JEMSO: Technologies that minimise EMS-dependent systems and network vulnerabilities, and actively prevent adversary systems from exploiting those vulnerabilities. Support operations in the EMOE and provide solutions for: Spectrum/Signature Management, Enhance Situational Understanding (SA + context, insight and analysis) Visualisation and Integration Tools and Technology Non Kinetic Effects

Scope Industry Directions Use of technology to predict effects of friendly-force, neutral actor, and limit adversary EMS manoeuvre/impacts on ADF operations in the EMOE through: Modelling, Simulation, Visualisation and Analysis/Data Synthesis tools. Non Kinetic Effects Coordinate Organic EMS Use Requests Coordinate Non-organic EMS Use Requests Determine New and Experimental EMS Dependent Systems' Spectrum Requirements Determine Deployed EMS Dependent Systems' Spectrum Requirements Determine Service Components's Spectrum Requirements Determine Network Operations Spectrum Requirements Determine MISO Spectrum Requirements Determine Information Operations Spectrum Requirements Determine Defence Strategic Networks' Spectrum Requirements Determine Friendly Nations Spectrum Requirements Determine Targeting and Fires Spectrum Requirements Determine Cybersecurity Spectrum Requirements Determine Host Nation Spectrum Requirements Determine EA and Other Joint Force Spectrum Requirements Determine Mission Critical PNT Spectrum Requirements Determine EMS Deception Frequency Usage Determine Authorised Satellite Access Requests Gather Intelligence Community Spectrum Information Determine Host Nation or Spectrum Authority Restrictions of Use Assess Density and Variety of Spectrum Users Determine Frequencies Authorised by JFC Collate Component EMSO Plans Coordinate CMO Frequencies Prioritise EMSO Requirements Execute Requirement Change Management Administer Spectrum Request Management System Coordinate Collaboration Systems Administer Spectrum Assignment Management System Administer Electronic Documents Records Management System Request Resource Allocations From Authority Determine Spectrum Allocation for Offensive Operations Analyse Friendly JEMSO Situation Analyse Host Partner and Neutral Nations Determine the effects required to achieve the Commander’s objectives. Conduct Feasibility and Compliance Analysis Understand constraints imposed by the physical environment. Identify EMS-related constraints, limitations, vulnerabilities, and opportunities. Identify methods to impact adversary operations by exploiting and attacking adversary EMS dependencies and vulnerabilities. Coordinate Organic EMS Use Requests Determine Network Opetations Spectrum Requirements Determine JEMSO Objectives and Effects (desired and undesired) Prioritise, coordinate, integrate, synchronize and authorise operations in the EMOE. Identify the types and quantities of EMS capabilities and systems (e.g., sensors, communications systems, EA systems) required to execute the plan. Identify and mitigate the risk to joint force operations based on the state of the EMS, friendly-force use of the EMS, and the adversary’s ability to contest friendly-force use of the EMS. Determine JEMSO Tasks and Priorities Establish Formal Coordination Channels with Host Nations/Coalition partners. Discuss coordination of cross-component EMS capabilities and EMS-use. Acquire and Manage EMS ‘allotments’ needed to support operations. State JEMSO Purpose in Mission Context

Content slides

Learning Objectives Recap Discuss Industry Capability to enable ADF JEMSO: Technologies that minimise EMS-dependent systems and network vulnerabilities, and actively prevent adversary systems from exploiting those vulnerabilities. Support operations in the EMOE and provide solutions for: Spectrum/Signature Management, Enhance Situational Understanding (SA + context, insight and analysis) Visualisation and Integration Tools and Technology Non Kinetic Effects

The classification of these slides is: CLASSIFICATION The maximum classification for discussion is: CLASSIFICATION Industry input: INDUSTRY PROPRIETARY

Questions?