Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.

Slides:



Advertisements
Similar presentations
Air Force Doctrine Document 2-5.1: Electronic Warfare
Advertisements

Exploring Corporate Strategy 7th Edition
Air Force Core Functions
Physical Attack IW-140 College of Aerospace Doctrine, Research, and Education.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
Sensors and location technologies – the front end of ISR
Defense Daily Open Architecture Summit EMS Panel
Introduction to Information Operations Attaché Corps- SEP 09
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Information Warfare Theory of Information Warfare
Strategic Alignment Model Source: Henderson and Venkataraman
C4ISR and Information Warfare
Campaign Planning Process Step 3B – System Center of Gravity Analysis
CSCE 727 Strategic Information Warfare. National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine.
Copyright 2002 Prentice-Hall, Inc. Lecture 5 Identifying and Selecting Systems Development Projects 5.1 COSC4406: Software Engineering.
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
March 8, 2006  Yvo Desmedt Robust Operations Research II: Production Networks by Yvo Desmedt University College London, UK.
Chapter 11: Strategic Leadership Chapter 8 Production and operations management.
Copyright © 2004 by South-Western, a division of Thomson Learning, Inc. All rights reserved. Developed by Cool Pictures and MultiMedia Presentations.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Simulation of Modern Warfare Approaches in the Joint Operational Command And Staff Training System (JOCASTS) S.G. Lucek, NSC August 2005 ISMOR22.
16 October 2007 Focus and Convergence Challenges for Complexity Science List of Candidate Topics Focus and Convergence Challenges for Complexity Sciences.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Warfare Playgrounds to Battlegrounds.
Iraq & Air Power The Commentator’s View Sir Timothy Garden Centre for Defence Studies King’s College London.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
FLTC Perspective Focused Long Term Challenges (FLTCs) are an innovative approach to match user requirements with relevant technology development, while.
Joint Training Challenges of Irregular Warfare/COIN and Full Spectrum Training Requirements Brief for WJTSC LtCol John Merna, J7/9-TJ 23 September.
SOCIO-TECHNICAL SYSTEMS APPROACH TO PEACE SUPPORT OPERATIONS Mapule Modise & Louise Leenen.
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
C4ISR and Information Warfare Naval Weapons Systems.
Slide 1. 1 Exploring Corporate Strategy, Seventh Edition, © Pearson Education Ltd 2005 Exploring Corporate Strategy 7 th Edition Part I Introduction.
United States Air Force: Air Doctrine – Provide Global Capability
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
C3 Information Systems, Organizations, and Strategy.
Network-Enabled Platforms – Tools to Maximize Operational Performance.
Dynamic Capabilities and Strategic Management
23 July 2003 PM-ITTS TSMOTSMO Information Assessment Test Tool (IATT) for IO/IW Briefing by: Darrell L Quarles Program Director U.S. Army Threat Systems.
ICT, WARFARE AND PEACE; FOOD FOR THOUGHT Brian Naudé.
Information Warfare Playgrounds to Battlegrounds.
C3 Information Systems, Organizations, and Strategy.
1 Joint Doctrine: The Authoritative Vocabulary For and Explanation of Joint Warfare and Joint Operations October 16, 2015 Representing Reality\Big Data\Big.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
1 C H A P T E R © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in.
Chapter 14 - Analyzing a Case and Writing a Case Report 1 Understanding the Case Method of Learning What is the case method?  Applies the ancient Socratic.
Office of the Deputy Chief of Staff
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Civil Military Operations and the Fundamentals of Joint Operations.
Employment Considerations: Considerations at the Outset of Combat
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Panel Discussion: C4I Solutions for Combating
Fires Conceptual Framework Supporting Multi-Domain Battle
Bush/Rumsfeld Defense Priorities/Objectives A Mandate For Change
ADEISA – Industry’s contribution to ADF Superiority of the EMOE
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
S&T Main Focus Areas Linkages to 2018 NDS
Research Focus August 2018 Classified by: Curt Beck Derived from:
Presentation transcript:

Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS

© CSIR Scope Information management – You can only manage what you have control over. IM as tool for JIW. What do we cant to achieve – Joint IW, info integration Problem statement Form the definitions Analytic process – ontological analysis Conclusion – IW structure for Joint IW.

© CSIR Problem statement What is the core of IW based on the underlying information model This leads to a type of definition for IW that will enable better information integration and joint IW capability development.

© CSIR IW – Some definitions Information warfare is actions taken to achieve information superiority in support of national military strategy by affecting adversary information and information systems while leveraging and protecting our information and information systems. Defense Information Systems Agency (DISA) How about PsyOps? National mil strat vs info systems? Level disparity?

© CSIR Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance that one’s own information is valid, spreading of propaganda or disinformation to demoralize the enemy and the public, undermining the quality of opposing force information and denial of information collection opportunities to opposing forces. Wikipedia All info, then sudden propaganda stuff…

© CSIR Libicki Command and Control Warfare – targeting the command systems and their communications links; Intelligence Based Warfare – the use of precision munitions enabled by sensor technology and communications that are linked for near-real time targeting information; Psychological warfare – changing the “hearts and minds” of by using media campaigns (television, radio, leaflets, and other methods); Network Warfare – exploitation of computer networks (often called hacker warfare, computer network operations, etc.); Economic Information Warfare – the use of computer technology to disrupt the electronic flow of economic transactions; and Cyberwarfare – closely related to Hacker warfare but more focused on future IW technology. Electronic Warfare - ?

© CSIR Scoping Problems What is defined as Information? This leads to the universality problem (the commander, her computer, network, infrastructure, financial institution, economic system, ideological views, … what is actually outside IW?) Synaptic Network – Bandwidth controlled by dopamine, network speed controlled by myelin sheath … also within the IW framework PsyOps – What is the Information involved? Talk of Jointness – main aim of current thinking and analysis

© CSIR Medusa.. In or Out? MEDUSA (Mob Excess Deterrent Using Silent Audio) NewScientist (2008/07) - Microwave ray gun controls crowds with noise exploits the microwave audio effect, in which short microwave pulses rapidly heat tissue, causing a shockwave inside the skull that can be detected by the ears. A series of pulses can be transmitted to produce recognisable sounds.

© CSIR Problem statement What is the core of IW based on the underlying information model This leads to a type of definition for IW that will enable better information integration and joint IW capability development.

© CSIR Analytic Process

© CSIR What is an Ontology? Individuals: instances, objects Classes: Sets, collections, concepts, types of objects Attributes: properties, features, object parameterisation Relations: objects and class relationships Function terms: complex structures form from relationships Restrictions: limitations on validity of objective world Rules: statements in antecedent-consequent form Axioms: assertions – overall theory Events: changes in relationships or attributes

© CSIR Analytic Process Ontological Analysis Concept Clustering Interface classes Definitions of IW (conclusions)

© CSIR Conclusions …

© CSIR Conclusions

© CSIR Network Warfare – focusing on methods for attacking the computer system of an adversary using hacking capabilities; and defending such computer systems against similar attack.

© CSIR Command and Control Warfare – focus on the attack of adversary command systems (including database and logistic systems, critical info infrastructure) via the use of network warfare, electromagnetic warfare or physical attack (airborne, missile, special forces) and the protection of own command systems. It also includes the improvements in decision cycles within the C2W framework.

© CSIR Electromagnetic Warfare – focus on methods for attacking the electromagnetic communications mechanisms used for information transfer by using traditionally electronic warfare techniques; and the prevention of such attacks against own electromagnetic communications. Not the entire EW

© CSIR Intelligence Based Warfare – platform and systems optimization through improvements in sensor integration, and sensor-to-shooter loops. Closed system optimization Multi-sensor information integration Decision support – Doctrine development Attack of closed systems – disruption, affecting, etc.

© CSIR Psychological operations – this focus on improving the relationship with neutrals, informing the enemy of facts about the current situation and supporting the longer term strategic campaign objectives.

© CSIR Jointness – Joint information management Only joint if information is somehow overlapping Only directly possible with these three areas Others may still use info, etc but no jointness.

© CSIR End