The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.

Slides:



Advertisements
Similar presentations
Cyber Defence Data Exchange and Collaboration Infrastructure (CDXI)
Advertisements

AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Air Force Core Functions
How to commence the IT Modernization Process?
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
Succession and talent management
© 2010 Deloitte & Touche LLP The Cyber-Savvy Organization: 10 Steps to a New Cyber Mission Discipline May 2010.
ARSOF WARFIGHTING CHALLENGES
Sensors and location technologies – the front end of ISR
Introduction to Information Operations Attaché Corps- SEP 09
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
The U.S. Coast Guard’s Role in Cybersecurity
This Briefing is:UNCLASSIFIED Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e 3-Jan-071 Air Force Cyber Operations.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Cyber Security: Past and Future John M. Gilligan CERT’s 20 th Anniversary Technical Symposium Pittsburgh, PA March 10, 2009.
South Carolina Cyber.
Presented to ISMORS September 2009 Dr. David S. Alberts Director, Research OASD/NII – DoD CIO Redefining the “M” in MOR st Century OR Challenges.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
CYBER AS A NEW WAR DOMAIN Cengiz ÖZTEKE Colonel Commander, TAF Cyber Defence Command.
Chief Information Officer Group
Copyright ©2010 Pearson Education, Inc. publishing as Prentice Hall 1-1 Chapter 1 Meeting Present and Emerging Strategic Human Resource Challenges.
Mink Spaans What are the problems that need to be solved What is hard.
Year 12 Business Studies Operations REVIEW.
The Knowledge Workforce and the Challenge for HR Dr Leanne Whicker Senior Consultant Knowledge Management BDO Kendalls Ph: (07)
2 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 Chatham House Rule “Participants are free.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Deliberative Working Document - Predecisional FOUO Supporting the Secretary’s Top Priorities Eric Coulter, Deputy Director OSD Program Analysis and Evaluation.
Force Packaging. Overview Principles of War Process of Force Packaging Developing Packages.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
FLTC Perspective Focused Long Term Challenges (FLTCs) are an innovative approach to match user requirements with relevant technology development, while.
Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.
Air Force Strategy to Resources
WELCOME CyberSecurity and Global Affairs Workshop Enhancing Situational Awareness Through Cyber Intelligence Henry Horton, CISM Partner, CyberSecurity.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 17 - Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 213.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
BAE Systems Small Business Program
CAPT Brian Hinkley Director, Fleet EW Center 15 October 2009
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Navy Information Operations
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Joint Forces Command Capability. DSF DG JFD DefAc CDICDIO Future Joint Operations Optimising Special Forces Developing a Transformational Proposition.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
UNCLASSIFIED Australia’s Perspective on Theatre Issues Pacific Operational S&T Conference 2013 Dr Torgny Josefsson Minister-Counsellor Defence Science.
Protecting Against Cyber Challenges Pacific Operational Science & Technology Conference 15 March 2011 Rob Wolborsky Chief Technology Officer Space and.
FLTLT Matthew Murphy Growler Transition Office – Air Force Headquarters UNCLASSIFIED.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Competing with Information Technology. Objectives  Identify basic competitive strategies and explain how IT may be used to gain competitive advantage.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
Chapter 1 Market-Oriented Perspectives Underlie Successful Corporate, Business, and Marketing Strategies.
“Existing world order is being redefined.” Henry Kissinger Jan 2015
PLACEHOLDER SLIDE ON SIPR!
Panel Discussion: C4I Solutions for Combating
COSC 316: Host Computer Security
Air Force Cyber Operations Command Mission: Warfighting
Bush/Rumsfeld Defense Priorities/Objectives A Mandate For Change
Academic Alliance Initiative
DDR&E Advanced Capabilities Overview
S&T Main Focus Areas Linkages to 2018 NDS
Presentation transcript:

The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Introductory Comments Cyberspace is Critical and introduces new Vulnerabilities Cyberspace is Critical and introduces new Vulnerabilities Militaries have a Role Militaries have a Role They must deal with this new Operating Medium They must deal with this new Operating Medium Information Operations are Intrinsic Information Operations are Intrinsic Counter-Cyberspace Operations will be crucial Counter-Cyberspace Operations will be crucial

Importance of Cyber The Importance of Cyberspace The Importance of Cyberspace The Cyber Threat The Cyber Threat Cyber warfare is asymmetric Cyber warfare is asymmetric The offence has the advantage The offence has the advantage A nation needs an attack capability A nation needs an attack capability Threats are not limited to the military Threats are not limited to the military

Defining Cyberspace Cyberspace is: A global domain within the information environment whose distinctive and unique character is framed by the use of electronics and the electromagnetic spectrum to create, store, modify, exchange and exploit information via interdependent and interconnected networks using information communication technologies.

Cyberspace Domain Cyberspace Networked Infrastructure Electromagnetic Spectrum Electronic Systems

A Challenge for the Military Warfighting Warfighting Add the domain of cyber Add the domain of cyber Exploit cyber for defence of the nation Exploit cyber for defence of the nation Help with critical infrastructures Help with critical infrastructures

Using Cyberspace To Integrate and Synchronise Operations To Integrate and Synchronise Operations To Attack and Defend To Attack and Defend To Command and Control To Command and Control

Key Types of Operations Cyber Defence Cyber Defence Cyber Offence Cyber Offence Situational Awareness Situational Awareness

A New Operating Medium Cyber offers a new Environment for the Militaries of all Nations Cyber offers a new Environment for the Militaries of all Nations This has Implications for New Vulnerabilities and New Targets This has Implications for New Vulnerabilities and New Targets Cyber is a Pre-requisite for All Operations Cyber is a Pre-requisite for All Operations An Adversary Focus is Called for An Adversary Focus is Called for

Counter Cyberspace Operations conducted to attain and maintain a desired degree of cyberspace control by destroying, degrading, denying, deceiving, disrupting, or exploiting the enemy’s cyberspace capability Operations conducted to attain and maintain a desired degree of cyberspace control by destroying, degrading, denying, deceiving, disrupting, or exploiting the enemy’s cyberspace capability

Information Operations and Cyberspace Information Operations Information Operations Counter-Information Counter-Information Offensive Offensive Defensive Defensive ISR ISR Stealth Stealth Command and Control Command and Control

Information Operations and Cyberspace Information Operations Information Operations Counter-Information Counter-Information Offensive Offensive Defensive Defensive ISR ISR Stealth Stealth Command and Control Command and Control

Information Operations and Cyberspace Information Operations Information Operations Counter-Information Counter-Information Offensive Offensive Defensive Defensive ISR ISR Stealth Stealth Command and Control Command and Control

China’s INEW Adopted in 2002 Adopted in 2002 Aim is to jam, deceive and suppress Aim is to jam, deceive and suppress And to conduct CNA And to conduct CNA Also involves striking sensors and networks Also involves striking sensors and networks Next step is to leverage non-electronics Next step is to leverage non-electronics

Counter-Cyberspace Cyber Control Cyber Control Counter-Cyberspace Counter-Cyberspace Cyber Operations Cyber Operations Non-Cyber Operations Non-Cyber Operations Gaining the Advantage Gaining the Advantage

Counter-Cyberspace Cyber Control Cyber Control Counter-Cyberspace Counter-Cyberspace Cyber Operations Cyber Operations Non-Cyber Operations Non-Cyber Operations Gaining the Advantage Gaining the Advantage

Conclusion Cyberspace Activities are Necessary Cyberspace Activities are Necessary Greater Expertise is Needed Greater Expertise is Needed So is the Need for a More Comprehensive Approach, Tighter Command, and Improved Partnerships So is the Need for a More Comprehensive Approach, Tighter Command, and Improved Partnerships An Edge is Needed An Edge is Needed Cyber Must be Secure for Military Operations Cyber Must be Secure for Military Operations

Electronic Warfare – Defence Must Lead Defence needs to lead renewal of EW. Defence needs to lead renewal of EW. We cannot continue to drift from project-to-project and day-to-day. We cannot continue to drift from project-to-project and day-to-day. Our EW capability must be competitive, reliable, effective and sustainable. Our EW capability must be competitive, reliable, effective and sustainable.

Electronic Warfare – Must Decide EW Value Defence must decide on the value it places on an effective EW capability for the future, which requires: Defence must decide on the value it places on an effective EW capability for the future, which requires: agreement on the Defence EW requirement; agreement on the Defence EW requirement; better communication and greater engagement; and better communication and greater engagement; and an organising principle that directs future activity. an organising principle that directs future activity.

Electronic Warfare – Too Transactional Current relationship is too transactional. Current relationship is too transactional. Technology is volatile and redesigns the EW environment well ahead of Defence’s response. Technology is volatile and redesigns the EW environment well ahead of Defence’s response.

Electronic Warfare – Relationship-Based Need relationship-based approach: Need relationship-based approach: Defence (requirements and leadership) Defence (requirements and leadership) Industry (capacity and capability). Industry (capacity and capability). Need Defence-led partnership, transparency, integrating strategy, and focused capability building. Need Defence-led partnership, transparency, integrating strategy, and focused capability building.

Electronic Warfare – Higher-Order Skills Without this change we become locked into lower value-add and skill areas. Without this change we become locked into lower value-add and skill areas. But trends mean we need to be more agile and better organised. But trends mean we need to be more agile and better organised. We need the higher-order skills. We need the higher-order skills.

Electronic Warfare Defence must lead. Defence must lead. Defence must decide on the value it places on EW. Defence must decide on the value it places on EW. Current relationship is too transactional. Current relationship is too transactional. Need relationship-based approach. Need relationship-based approach. Need the higher-order skills. Need the higher-order skills.