C4ISR and Information Warfare

Slides:



Advertisements
Similar presentations
Air Force Doctrine Document 2-5.1: Electronic Warfare
Advertisements

Air Force Core Functions
Physical Attack IW-140 College of Aerospace Doctrine, Research, and Education.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
Unified Land Operations
Sensors and location technologies – the front end of ISR
Defense Daily Open Architecture Summit EMS Panel
Force XXI Battle Command Brigade and Below (FBCB2) Communications System
Introduction to Information Operations Attaché Corps- SEP 09
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
International CyberSecurity Collaboration: The Technical Cooperation Program Approved for public release; distribution is unlimited. 09 March 2010 Joshua.
DEFENSIVE POSITIONS.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Brian Connett, LCDR, USN US NAVAL ACADEMY
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Combat Air Operations.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Intelligence, Surveillance, and Reconnaissance
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
The Department of the Navy
Navy International Program Office
IDC Program INFORMATION DOMINANCE CORPS.  BACKGROUND  PURPOSE  STATEGY  MISSION STATEMENT  GOALS  IDC CAREERS  IDC PROFESSIONAL PROFILE  NAVY.
Naval Organization Chapter 6 BMR
Naval Weapons Systems Introduction to Naval Weapons.
Campaign Planning Process Step 3B – System Center of Gravity Analysis
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
United States Department of Defense
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Force Packaging. Overview Principles of War Process of Force Packaging Developing Packages.
MILITARY SIMULATIONS Note: inclusion of particular simulation models in this discussion is based solely on the availability of information on the internet.
Air and Space Functions >. If you are an AIRMAN then you believe that airpower, if used in certain ways, will achieve victory more quickly than if used.
Afloat EW and IW Systems Topic 14 Afloat EW/IW Systems
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
FLTC Perspective Focused Long Term Challenges (FLTCs) are an innovative approach to match user requirements with relevant technology development, while.
C4ISR and Information Warfare Naval Weapons Systems.
Branch Orientation Benjamin Brownlee MS-I W&J ROTC.
United States Air Force: Air Doctrine – Provide Global Capability
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
UNCLASSIFIED//FOR OFFICIAL USE ONLY National Reconnaissance Office Overview UNCLASSIFIED//FOR OFFICIAL USE ONLY.
Enabling Learning Objective B (ELO B)
Reconnaissance and Surveillance Leader Course OPFOR TTP.
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
Warfare Communities of the Fleet and Marine Forces
By CPT Robert L. Crabtree
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
UNCLASSIFIED 2/6/2016 7:56:41 PM UNCLASSIFIED Page 1 of 7 Pages Space Policy Issues - Space Warfare Definitions - 15 June, 2010.
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
USJFCOM 27 Jul EXECUTIVE OVERVIEW Col David Brown, USAF JFIIT Commander UNCLASSIFIED Joint Fires Integration and Interoperability Team (JFIIT)
TSP 310-C , Phase II, OCS TSP 310-C , Phase II, OCS Implement OPSEC.
Protecting Against Cyber Challenges Pacific Operational Science & Technology Conference 15 March 2011 Rob Wolborsky Chief Technology Officer Space and.
This Briefing is Unclassified Space Situation Awareness (SSA) for the Warfighter 25 August 2005 HQ AFSPC/DRC Lt Col Troy Pannebecker.
Employment Considerations: Considerations at the Outset of Combat
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
WARFARE COMMUNITIES OF THE FLEET AND MARINE FORCES.
Air Force Operations.
THE MANY ASPECTS OF C4I INTEROPERABILITY
Air Force Operations.
Joint Protection of the Sea Base
NDIA Targets, UAVs and Range Operations
Electronic Warfare.
Force Packaging.
Bush/Rumsfeld Defense Priorities/Objectives A Mandate For Change
C4ISR and Information Warfare
Operations Security (OPSEC)
Presentation transcript:

C4ISR and Information Warfare Naval Weapons Systems

Putting It All Together - C4ISR Command Computers C4ISR Surveillance Reconnaissance C4I is the term used to describe the information and decision support systems to assist commanders at all levels to plan, direct and control their activities. C4I is more than a term, it is a philosophy of how navy systems are processes are designed and are interrelated. C4I incorporates the processes of: 1. Command: The exercise of authority based upon certain knowledge to attain and objective. 2. Control: The process of verifying and correcting activity such that the objective or goal of command is accomplished. 3. Communications: The ability to exercise the necessary liaison to exercise effective command between tactical or strategic units to command. 4. Computers: The Computer systems and compatibility of computer systems. Also includes data processing. 5. Intelligence: Includes collection as well as analysis and distribution of information. Control Intelligence Communications

Why We Need C4ISR Faster response times required. Joint Operations require high levels of coordination. More sophisticated weapons require more information. C4ISR is necessary because: 1. Operations in a littoral environment require faster response times. 2. Joint operations require higher level of coordination and communications between forces 3. Today’s sophisticated weapons systems require higher situational awareness and more information to the operator/shooter as well as the commander.

Functions of C4I Creates a common tactical picture. Ensures all information is available to operators & commanders. Ensures connectivity and information exchange. Directly links the sensor to the shooter. Supports and uses information warfare (IW). C4I has four major functions: 1. C4I will create a common tactical picture and ensures that all information is available to the operators and the tactical commanders. Ensure it is the same information. 2. Ensures connectivity and information exchange. a. Global Information Exchange System (GLOBIX) b. Tactical Data Information Exchange System (TACIXS) c. Battle Group Information Exchange System (BGIXS) d. Officer in Tactical Command Information Exchange System (OTCIXS) 3. Sends the information directly from the sensors to the shooter. (not screened by another group). All information is directly available to system operators. Type of information required. a. Surveillance and reconnaissance information b. Acquisition and localization information c. Combat identification, targeting engagement and guidance information. d. Battle damage assessment. 4. Supports and uses information Warfare (IW) a. IW is used to avoid hostilities or gain information advantage before weapons are deployed or plans are executed. b. IW can be used at the operational and tactical levels to disrupt an enemy’s decision process.

C4ISR Supports At All Levels Watchstanders Composite Warfare Commander Commander of the JTF The Shore Commanders

Command and Control Warfare Objectives: 1. Defeat the enemy by destroying its C2W systems. 2. Separate the enemy’s command structure from its forces. 3. Protect one’s own C2W forces. 4. Connect commanders and forces. 1. Command and Control Warfare (C2W) is a major warfare area in today’s world. 2. Command and Control is the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission. 3. C2W involves the action taken to deny information to, influence, degrade, or destroy adversary command and control capabilities, while protecting friendly command and control capabilities against such actions. 4. Based on the philosophy that preventing the enemy’s use of its forces is better than defeating that force. Show slide: C2W objectives: Cover graphic.

Tools to Achieve C2W Objectives Operational Security Military Deception Psychological Operations Electronic Warfare Physical Destruction There are five tools used in C2W to meet the objectives. 1. Operations Security. - Prevents information on one’s own operations from being discovered by an enemy’s command and control system. - Example include not publishing ship departure dates and times. POD 2. Military deception. - Gives enemy commanders information that mislead them about one’s own operations. 3. Psychological Operations - Delivers information to the emery forces in ways that make it difficult for enemy leader to influence or control their forces or population. - In Desert storm, leaflets were dropped on Bagdad and over troops. 4. Electronic Warfare - Both offensive and defensive as previously discussed. - Examples include jamming and message interception. 5. Physical Destruction - Attacks on enemy command and control assets - Example in Desert Storm, radar and Command and Control sites were hit first by Tomahawks before air warfare forces sent in.

C2W Decision Making Cycle Observe Act Orient 1. C2W decision making process is based on OODA Loop. 2. This type of loop is common in approaching a problem or reacting to a situation. 3. Steps in the loop are. a. Observe. See what is happening or what the enemy is doing. b. Orient. Understand the perspective of the observance and present scenario. c. Decide. Decide on the action you will take. d. Act. Act on your decision e. Now observe the effects of your action and how the enemy reacts. (The cycle starts over.) OODA requires intelligence at all stages. 5. You win the C2W game by slowing down the enemy’s OODA cycle while speeding up your own OODA cycle. 6. As you can imagine, satellite systems play a major role in C2W a. Satellite communication systems b. Satellite-based intelligence and information gathering systems Decide (OODA loop)

“There are 3 kinds of people: those who can count & those who can't” Intelligence “There are 3 kinds of people: those who can count & those who can't”

Intelligence Product of collecting, exploiting, processing, integrating, analyzing and interpreting information. Types: 1. Strategic Intelligence 2. Operational Intelligence 3. Tactical Intelligence Go over the definition of Intelligence Types of Intelligence: (from Naval Intelligence, p. 6.) 1. Strategic Intelligence - For plans and policies at the national and international level. 2. Operational Intelligence - For plans and operations within a region or theater, for employment of forces. 3. Tactical Intelligence - For tactical operation at the component or unit level, for immediate action.

Function of Intelligence Prepare the Battle space Define environment or physical characteristics. Evaluate the threat and determine threat’s course of action. Provide Early Warning Evaluate the situation (current actions & changes) Go over graphic.

Function of Intelligence cont. Identify and Target the Enemy’s Vulnerabilities Assess Battle Damage (own and enemy’s) Manage Intelligence Information Prevent Enemy’s Intelligence Efforts (Offensive & Defensive) Go over graphic.

Information Warfare (IW) IW is action taken to preserve the integrity of own information systems from exploitation, disruption, and destruction while achieving an information advantage over the enemy. Intelligence uses information warfare (IW). Go over the definition of Information warfare.

IW Tools Surveillance Systems Communications Systems Tactical Network Satellites EW and SIGINT HUMINT Communications Systems Tactical Network Computers Database management Go over graphic of IW Tools. Lead-in: We have discussed Command and Control (C2, including C2W) and Intelligence (including Information Warfare). Two areas of C4I that remain are Communications and Computers. Talk about INFOCON

Offensive - Opportunities Degrade or exploit enemy’s collection or use of information “Antihead” – traditional means of removing commander or command center “Antineck” – nontraditional method of cutting enemy’s communications

Defensive - Vulnerabilities Protection of our ability to conduct information operations Physical security Encryption Antivirus Secure data transmissions

Navy Tactical Data System (NTDS) Interceptor Interceptor Early Warning Aircraft Link 4A Link 4A Link 11 1. The most important communications system during combat situation is a real-time, common track picture available to all units. 2. The system used to link together all navy ships, aircraft and shore command installations data and information can be shared is called NTDS. 3. Significant Links in NTDS are a. Link 11/TADIL (Tactical Digital Information Exchange Link A) - two way, real-time encrypted data between aircraft-ships, ship-ship, - HF-UHF freq range b. Link 16/TADIL J/JTIDS (Joint Tactical Data Link System) - To replace Link 11 - Extends composite warfare commander’s tactical picture to include joint and allied information. - More secure, jam-resistant, and has higher data rate c. Link 4A/ TADIL C - Link used to exchange information with fighter aircraft. - Allows console operators to direct aircraft remotely (E-2 can actually fly F-14 remotely. d. Link 14 used at temporary means to get information to Non-NTDS ship. Link 11 NTDS Ship Link 14 Non-NTDS Ship NTDS Ship

Advanced Combat Direction System Follow on to NTDS Incorporates various communication circuits into one unified system The next generation tactical data system is the Advanced Combat Direction System (ACDS) a. Combines tactical data from links 4A, 11 and 16 with onboard and off-board weapon and sensor data b. Produces a coherent, operator-tailored tactical display c. Only on a few ships at this time.

Communications Security Protection resulting from all measures designed to deny unauthorized persons information and the possession of telecommunications data. Called CMS. Elements: 1. How we keep the enemy from using our own communications and data to improve their Information Warfare is called Communications Security or COMSEC. 2. Go over definition of COMSEC. 3. Elements of our COMSEC Program are a. Crypto Security: Use of codes and data encryption - Not only codes but actions to ensure the proper use and maintenance of encryption devices and systems. b. Transmission Security. measure to protect transmission from interception and exploitation. c. Emission Security- measures to deny unauthorized individuals information that can be derived by intercepting and analyzing emissions from telecommunications systems. d. Physical Security - measures to safeguard communications equipment, material and documents Crypto Security Transmission Security Emission Security Physical Security

Computers Information Management – ensures quality of information Sort, process, organize, correlate, and disseminate information Real time

Computer Requirements Blend critical tactical, operational, and administrative data Deliver rapid information to operational commanders Multimedia format (to suit) Standardized equipment Standardized hardware (upgrade/additions) The final area of C4I is Computers. Without computers the other areas would not happen because of the volume of data that must be rapidly processed. Computers are required to sort, process, organize correlate and disseminate information. All of this must be done rapidly to maintain the real-time element.

Inherent Problems With Automated Systems 1. Evaluation 2. Orientation 3. Cost 4. Decision Making 5. Discipline 6. Survivability There are inherent problems with relying on Automated Systems 1. Evaluation: there is a tendency to rely on computer analysis without analyzing the whole picture. This can lead to problems such as firing on own forces. There is always necessary for subjective evaluation of information. 2. Orientation: Emphasis in system design should favor the commander rather than the technical. Remember people use the data. Make it easier for them not the machine designers. 3. Cost: Hardware and soft ware are expensive. 4. Decision making: Too much data can cause an information overload and result in indecision. Avoid information overload. 5. Discipline: With the amount of information available, high level commander can be more involved with on-scene level of warfare. This makes it more difficult for the on-scene commander to understand their roles. Distracts high level commanders from doing their job. 6. Survivability: Comms and data flow must be reliable. Without communications the system breaks down and coordination is difficult. Problem is comms are jammed or destroyed.

Space and EW Space Dominance Opportunities Integral to strategic and tactical command and control architecture How is C4I delivered? Opportunities Communication UHF Satellite – nav, surveillance, ID, track SHF/EHF Satellite – scintillation Sensing/Surveillance Missile attack warning (IR sensors)

Mission Planning Meteorological data Preview lay of the land Terrain Ocean depth Shoreline characteristics Vehicle/aircraft/ship locations

Questions?