C4ISR and Information Warfare Naval Weapons Systems.

Slides:



Advertisements
Similar presentations
Air Force Doctrine Document 2-5.1: Electronic Warfare
Advertisements

UJTL Ontology Effort TMCM Nelson And Marti Hall. Overview Vision for the UJTL and METLs Scenario Mapping Findings Proposed POA&M outline.
Air Force Core Functions
Physical Attack IW-140 College of Aerospace Doctrine, Research, and Education.
“Working together to achieve service excellence” RADCOMMS 11 Conference May 2011 Commodore Roger Boyce Director General ICT Policy and Plans Defence.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
Airpower: the Industry Vision
Unified Land Operations
Sensors and location technologies – the front end of ISR
Defense Daily Open Architecture Summit EMS Panel
Force XXI Battle Command Brigade and Below (FBCB2) Communications System
Introduction to Information Operations Attaché Corps- SEP 09
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Chapter 1 Section II Fundamentals of Information Systems
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
JUNIOR SAILOR ADVANCEMENT WORKSHOP (JSAW) CTO1(SW) Germean Porter NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
Combat Air Operations.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
Chief Information Officer Group
New Army Terms Table D-1. New Army terms Army positive control Army procedural control civil support1 combat power (Army) command and controlwarfare command.
Defence spectrum use Changing technologies and applications CAPT Paul Scott, RAN Chief Information Officer Group Department of Defence.
C4ISR and Information Warfare
The Department of the Navy
IDC Program INFORMATION DOMINANCE CORPS.  BACKGROUND  PURPOSE  STATEGY  MISSION STATEMENT  GOALS  IDC CAREERS  IDC PROFESSIONAL PROFILE  NAVY.
Naval Organization Chapter 6 BMR
Network-Centric Battlefield Operations
C4ISR via OA Mike Danjczek November, 2014 Copyright GTS 2014.
R&D ACTIVITIES AT ELECTRON PROGRESS AD SOFIA, 29 JUNE, 2007.
Naval Weapons Systems Introduction to Naval Weapons.
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Communication systems Dr. Bahawodin Baha School of Engineering University of Brighton, UK July 2007.
United States Department of Defense
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Force Packaging. Overview Principles of War Process of Force Packaging Developing Packages.
Afloat EW and IW Systems Topic 14 Afloat EW/IW Systems
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Branch Orientation Benjamin Brownlee MS-I W&J ROTC.
1. 2 USAF CONOPS & AIR AND SPACE POWER REVIEW Chap 23 & 24.
A Need for Visualization by Col(Ret’d) Randy Alward, CA.
Secure Communications Panel Ted Clowes Cubic Defense Applications Ted Clowes Cubic Defense Applications.
UNCLASSIFIED//FOR OFFICIAL USE ONLY National Reconnaissance Office Overview UNCLASSIFIED//FOR OFFICIAL USE ONLY.
ANGELFIRE… PROVEN PERFORMANCE! Possible Architectures And External Interface Specifications Presented to Program Office 16 SEP 04 (Team 3)
Enabling Learning Objective B (ELO B)
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
Warfare Communities of the Fleet and Marine Forces
By CPT Robert L. Crabtree
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
UNCLASSIFIED 2/6/2016 7:56:41 PM UNCLASSIFIED Page 1 of 7 Pages Space Policy Issues - Space Warfare Definitions - 15 June, 2010.
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
123rd Air Control Squadron Mobile network
TSP 310-C , Phase II, OCS TSP 310-C , Phase II, OCS Implement OPSEC.
1. Objective 2. Offensive 3. Mass 4. Economy of Force 5. Maneuver 6. Unity of Command 7. Security 8. Surprise 9. Simplicity.
Civil Military Operations and the Fundamentals of Joint Operations.
As of Sep 121 “The ultimate determinant in war is a man on the scene with a gun. This man is the final power in war. He is control, he determines.
Employment Considerations: Considerations at the Outset of Combat
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
IOT – Firefighting Example
THE MANY ASPECTS OF C4I INTEROPERABILITY
Joint Protection of the Sea Base
The example below illustrates Action Assertions stated in a form of Structured English (pseudo-code). These rules are operational rules because they reflect.
Force Packaging.
C4ISR and Information Warfare
Operations Security (OPSEC)
Presentation transcript:

C4ISR and Information Warfare Naval Weapons Systems

Putting It All Together - C 4 ISR Command Control Communications Computers Intelligence C 4 ISR Surveillance Reconnaissance

INTELLIGENCE!!!

Why We Need C 4 ISR Faster response times required. Joint Operations require high levels of coordination. More sophisticated weapons require more information.

Functions of C 4 I Creates a common tactical picture. Ensures all information is available to operators & commanders.Creates a common tactical picture. Ensures all information is available to operators & commanders. Ensures connectivity and information exchange.Ensures connectivity and information exchange. Sends information directly from sensor to shooter.Sends information directly from sensor to shooter. Supports and uses information warfare (IW).Supports and uses information warfare (IW).

C 4 ISR Supports At All Levels WatchstandersWatchstanders Composite Warfare CommanderComposite Warfare Commander Commander of the JTFCommander of the JTF The Shore CommandersThe Shore Commanders NCANCA

Command and Control Warfare Objectives: 1. Defeat the enemy by destroying its C2W systems. 2. Separate the enemy’s command structure from its forces. 3. Protect one’s own C2W forces. 4. Connect commanders and forces.

Tools to Achieve C2W Objectives Operational Security Operational Security Military Deception Military Deception Psychological Operations Psychological Operations Electronic Warfare Electronic Warfare Physical Destruction Physical Destruction

C2W Decision Making Cycle Observe Orient Decide Act (OODA loop)

Intelligence “No such thing as Military Intelligence”

Intelligence Product of collecting, exploiting, processing, integrating, analyzing and interpreting information. Types: 1. Strategic Intelligence 2. Operational Intelligence 3. Tactical Intelligence

Function of Intelligence Prepare the Battle spacePrepare the Battle space –Define environment or physical characteristics. –Evaluate the threat and the threat’s course of action. Provide Early WarningProvide Early Warning Evaluate the situation (current actions & changes)Evaluate the situation (current actions & changes)

Function of Intelligence cont. Identify and Target the Enemy’s VulnerabilitiesIdentify and Target the Enemy’s Vulnerabilities Assess Battle Damage (own and enemy’s)Assess Battle Damage (own and enemy’s) Manage Intelligence InformationManage Intelligence Information Prevent Enemy’s Intelligence Efforts (Offensive & Defensive)Prevent Enemy’s Intelligence Efforts (Offensive & Defensive)

Information Warfare (IW) IW is action taken to preserve the integrity of own information systems from exploitation, disruption, and destruction while achieving an information advantage over the enemy.

IW Tools Surveillance SystemsSurveillance Systems –Satellites –Electronic Warfare and Signal Intelligence –Human Intelligence Communications SystemsCommunications Systems Tactical NetworkTactical Network –Computers –Database management

Questions

Radio frequency use LF (Low Freq)LF (Low Freq) HF (High Freq)HF (High Freq) VHF (Very High Freq)VHF (Very High Freq) UHF (Ultra High Freq)UHF (Ultra High Freq)

Real-Time COMMSReal-Time COMMS Multiple uses of Information:Multiple uses of Information: –VOICE –VIDEO –DATA –SENSOR Simultaneously transmittedSimultaneously transmitted SHF / EHFSHF / EHF Bandwidth

Navy Tactical Data System (NTDS) Link 11 Link 14 Link 4A Early Warning Aircraft Interceptor NTDS Ship Non-NTDS Ship Link 11 Link 4A

Advanced Combat Direction System Follow on to NTDSFollow on to NTDS Incorporates various communication circuits into one unified systemIncorporates various communication circuits into one unified system

Communications Security Protection resulting from all measures designed to deny unauthorized persons information and the possession of telecommunications data. Called CMS. Crypto Security Transmission Security Emission Security Physical Security Elements:

Computer Requirements Sort, process, organize, correlate, and disseminate information in near real-time. Sort, process, organize, correlate, and disseminate information in near real-time. Blend critical tactical, operational and administrative data to meet tactical objectives. Blend critical tactical, operational and administrative data to meet tactical objectives. Present information in a multi-media format to best suit the operator or equipment Present information in a multi-media format to best suit the operator or equipment – I.E. – The Captain / Admiral

Computer Requirements Have standardized equipment to reduce training and increase proficiency Have standardized equipment to reduce training and increase proficiency Have standardized hardware and software design to allow upgrade and additions to equipment. Have standardized hardware and software design to allow upgrade and additions to equipment. MICROSOFT!!

Inherent Problems With Automated Systems 1. Evaluation 2. Orientation 3. Cost 4. Decision Making 5. Discipline 6. Survivability

Questions?