Network Centric Warfare, Cyber Warfare, & KSCO Nort Fowler AFRL/IF 26 Electronic parkway, Rome NY 13441 Tel: (315) 330-4512.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
JSIMS 28-Jan-99 1 JOINT SIMULATION SYSTEM Modeling Command and Control (C2) with Collaborative Planning Agents Randall Hill and Jonathan Gratch University.
ERS Overview 5/15/12 | Page-1 Distribution Statement A – Cleared for public release by OSR, SR Case #s 12-S-0258, 0817, 1003, and 1854 apply. Affordable,
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Defense Daily Open Architecture Summit EMS Panel
Introduction to Information Operations Attaché Corps- SEP 09
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
The Principles of War.
Defense Transformation: Concepts and Affordability Jack Treddenick George C. Marshall Center DRESMARA 16 October 2006.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
The U.S. Coast Guard’s Role in Cybersecurity
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
The American Military Experience The Principles of War Wayne E. Sirmon, M.A.Ed., M.A. Military Science & History Departments University of South Alabama.
Structural issues in Network Enabled Defence Matie du Toit (SISPA) Hugo Lotriet (University of Pretoria)
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
1 Air and Space Power Defined. 2 Overview  Define Air and Space Power  Competencies  Functions of Air and Space Power  Air and Space Doctrine  Principles.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
C4ISR and Information Warfare
NATURE OF WAR Major Carlos Rascon.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Navy International Program Office
Aerospace Power Defined. 2 Overview  Define Aerospace Power Competencies Functions Doctrine  Discuss the Principles of War & Tenets of Aerospace Power.
Air and Space Power Defined. Overview Define Air and Space PowerDefine Air and Space Power CompetenciesCompetencies FunctionsFunctions DoctrineDoctrine.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
R 1 INFORMATION SUPERIORITY WORKSHOP II Focus on Metrics Working Group 4 Focus on Synchronization Introductory Material D. Signori D. Anhalt March 28,
Air Force ISR Reach Back Distributed Common Ground Systems
16 October 2007 Focus and Convergence Challenges for Complexity Science List of Candidate Topics Focus and Convergence Challenges for Complexity Sciences.
Force Packaging. Overview Principles of War Process of Force Packaging Developing Packages.
Battle Drills Break Contact React to Ambush React to Contact
Ventures, Inc. 1 Effects-based Coalition Operations Maris “Buster” McCrabb KSCO Symposium 23 April 2002.
TSP VG 1 The Principles of War “The nine principles of war provide general guidance for the conduct of war....They are the enduring bedrock.
FLTC Perspective Focused Long Term Challenges (FLTCs) are an innovative approach to match user requirements with relevant technology development, while.
Parallel and Distributed Simulation Introduction and Motivation.
Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.
Training for a Network Enabled Capability
Principles of War and Tenets of Air Power
Network security Product Group 2 McAfee Network Security Platform.
TSP VG 1 Apply the Principles of War During Mission Planning Task Title.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
By CPT Robert L. Crabtree
1 Power to the Edge Agility Focus and Convergence Adapting C2 to the 21 st Century presented to the Focus, Agility and Convergence Team Inaugural Meeting.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
Execution and Implementation
 The benefits of interior lines could be gained either by central position or superior lateral communications.
CHARACTERISTICS OF THE OFFENSE Surprise Concentration Tempo Audacity FM 3-0 pg 7-4.
1. Objective 2. Offensive 3. Mass 4. Economy of Force 5. Maneuver 6. Unity of Command 7. Security 8. Surprise 9. Simplicity.
Employment Considerations: Considerations at the Outset of Combat
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
Proactive Incident Response
“Existing world order is being redefined.” Henry Kissinger Jan 2015
Software Assurance Security Issues
CIO G-6 Signal Conference
Fires Conceptual Framework Supporting Multi-Domain Battle
Multi-Domain Battle: Achieving Cross-Domain Synergy
Joint Protection of the Sea Base
NDIA Targets, UAVs and Range Operations
Force Packaging.
Chief, ARSTAF Cyberspace Task Force
Bush/Rumsfeld Defense Priorities/Objectives A Mandate For Change
DISN Evolution Mr. Charles Osborn
INFORMATIONAL EXCHANGE A National Perspective
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Presentation transcript:

Network Centric Warfare, Cyber Warfare, & KSCO Nort Fowler AFRL/IF 26 Electronic parkway, Rome NY Tel: (315)

2 Network Centric Enterprise Infostructure Sensor Netting Data Fusion Information Management Vastly Improved Awareness Shared Awareness Virtual Collaboration Virtual Organizations Substitution of Info for People and Material Self-Synchronization Increased Tempo Increased Responsiveness Lower Risks Lower Costs Higher Profits From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC, CCRP Press, The Entry Fee The Bottom Line (Measurable) Enabler Process for generating awareness Enabler Process for exploiting awareness Results

3 Military as a Network Centric Enterprise Infostructure Sensor Netting Data Fusion Information Management Vastly Improved Awareness Shared Battlespace Awareness Virtual Collaboration Virtual Organizations Substitution of Info for People and Material Self-Synchronization Forces Increased Operations Tempo Increased Responsiveness Lower Risks Lower Costs Increased Combat Effectiveness From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC, CCRP Press, Execution (Measurable) Battlespace Awareness & Knowledge

4 Network Organizational Models Standard HierarchyChain NetworkHub & SpokeAll-Channel From Friel, Hierarchies and Networks, Government Executive, April, 2002  Nodes: The actors, or points on a network. A node can form connections with any and all other nodes on the network  Centrality: The degree to which a node connects other nodes  Boundary spanners: Nodes that have connections between groups  Self-synchronization: The ability of low-level groups to coordinate and act without going through a central authority  Swarming: The act of attacking a target from many different directions, using many different means, often making a force appear larger than it is

5 Key Observations The World has become a network of networks, filled with actors who behave in increasingly interconnected ways and with wide-reaching and rapid consequences One major component of a network centric enterprise is speed…. The payoff is in the initial very high rate of change A Northern Alliance commander suggested bombing Taliban positions. Nineteen minutes later the positions were struck The critical functions of a network centric enterprise are NOT tied to any one platform; multiple new pathways to delivering capabilities, shifting in time The swarming technique requires a key feature of networks -- adaptability Swarming behavior visible in the war on terrorism

6 One Vision of Future Cyber Warfare Two competing all-channel network “organizations” dueling in Cyberspace. Each of these “organizations” might have many multiple ways they can deliver fatal blows No longer "platform centric", their lethality is now multi-threaded Multiple pathways imply that no single asset is on the critical path The number of network pathways is growing exponentially. Cyberwar might involve identifying and managing the network means of delivery in such a way that the adversary never has a lethal combination of delivery mechanisms for massed effects. Once the adversary achieves just one such combination, the swarming strike will come at the speed of electrons. A large scale, fast paced, distributed, deadly game of Cyber chess with missing or unknown pieces (capabilities, vulnerabilities).

7 Active Defense in Cyberspace Future Cyberwars will be fought to defend / destroy, not just the individual assets of the computer network, but the future combat capabilities achieved through a networked force

8 Characteristics: Aerospace Vehicle: UCAV Flight Medium: Air & Space Weapons: Missiles & Bombs Desired “Effect”: Destroy Target Control: Flight Path LPI: Stealth (Physical) LPD:Terrain Masking Homebase:Predetermined Airfield Logistics:Heavy, Continual Cyber Warfare Model vs. Classical Warfare Model Kinetic WarfareCyber Warfare Characteristics: Cyberspace Vehicle: Info-Craft Flight Medium: Cyberspace Weapons: Virus, Worm, Soft Bombs, etc Desired “Effect”: Destroy, Degrade, Co-opt Control: Network Links LPI: Stealth (Software) LPD:Network Masking Homebase:Any Cyberspace Portal Logistics:Light, Infrequent (software) Net Result or “Effect” Can be Exactly the Same – Impede the Enemy

9 Principles of War Remain Objective –Focus effort to achieve objective Economy of Force –Minimize use of capacity in pursuit of non-objective goals Security –Protecting & maintaining operational LOCs Offensive –Seizing & maintaining the offensive in order to dictate the terms of combat Maneuver –Constrain enemy COA through environmental & other aspects Surprise –The ability to strike the enemy at a time, place or manner for which he is not prepared Mass –Concentrating military capabilities at the decisive time & space Unity of Command –The ability to build and maintain a shared understanding of the commander’s intent Simplicity –Need to keep plans, guidance & orders clear and uncomplicated Joint Allied & Coalition

10 Some Possible Future Cyber Weapons Cyber weapons attack and control our adversary’s Information and C 3 I capabilities through intelligent use of information and controlled effects generated in Cyberspace. Stealthy Agents Network Blocking Mines Traffic Redirection (active & passive) Network Re-mapping Camouflaged Implants Sleeper Agents Adversary Finger Printing & Tracking Cyber Identity Theft Obfuscation (speed/mobility/deception) Tools Tribal Operators Remote Cyber Forensics

11 KSCO Opportunities