Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.

Similar presentations


Presentation on theme: "The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012."— Presentation transcript:

1 The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

2 Introductory Comments Cyberspace is Critical and introduces new Vulnerabilities Cyberspace is Critical and introduces new Vulnerabilities Militaries have a Role Militaries have a Role They must deal with this new Operating Medium They must deal with this new Operating Medium Information Operations are Intrinsic Information Operations are Intrinsic Counter-Cyberspace Operations will be crucial Counter-Cyberspace Operations will be crucial

3 Importance of Cyber The Importance of Cyberspace The Importance of Cyberspace The Cyber Threat The Cyber Threat Cyber warfare is asymmetric Cyber warfare is asymmetric The offence has the advantage The offence has the advantage A nation needs an attack capability A nation needs an attack capability Threats are not limited to the military Threats are not limited to the military

4 Defining Cyberspace Cyberspace is: A global domain within the information environment whose distinctive and unique character is framed by the use of electronics and the electromagnetic spectrum to create, store, modify, exchange and exploit information via interdependent and interconnected networks using information communication technologies.

5 Cyberspace Domain Cyberspace Networked Infrastructure Electromagnetic Spectrum Electronic Systems

6 A Challenge for the Military Warfighting Warfighting Add the domain of cyber Add the domain of cyber Exploit cyber for defence of the nation Exploit cyber for defence of the nation Help with critical infrastructures Help with critical infrastructures

7 Using Cyberspace To Integrate and Synchronise Operations To Integrate and Synchronise Operations To Attack and Defend To Attack and Defend To Command and Control To Command and Control

8 Key Types of Operations Cyber Defence Cyber Defence Cyber Offence Cyber Offence Situational Awareness Situational Awareness

9 A New Operating Medium Cyber offers a new Environment for the Militaries of all Nations Cyber offers a new Environment for the Militaries of all Nations This has Implications for New Vulnerabilities and New Targets This has Implications for New Vulnerabilities and New Targets Cyber is a Pre-requisite for All Operations Cyber is a Pre-requisite for All Operations An Adversary Focus is Called for An Adversary Focus is Called for

10 Counter Cyberspace Operations conducted to attain and maintain a desired degree of cyberspace control by destroying, degrading, denying, deceiving, disrupting, or exploiting the enemy’s cyberspace capability Operations conducted to attain and maintain a desired degree of cyberspace control by destroying, degrading, denying, deceiving, disrupting, or exploiting the enemy’s cyberspace capability

11 Information Operations and Cyberspace Information Operations Information Operations Counter-Information Counter-Information Offensive Offensive Defensive Defensive ISR ISR Stealth Stealth Command and Control Command and Control

12 Information Operations and Cyberspace Information Operations Information Operations Counter-Information Counter-Information Offensive Offensive Defensive Defensive ISR ISR Stealth Stealth Command and Control Command and Control

13 Information Operations and Cyberspace Information Operations Information Operations Counter-Information Counter-Information Offensive Offensive Defensive Defensive ISR ISR Stealth Stealth Command and Control Command and Control

14 China’s INEW Adopted in 2002 Adopted in 2002 Aim is to jam, deceive and suppress Aim is to jam, deceive and suppress And to conduct CNA And to conduct CNA Also involves striking sensors and networks Also involves striking sensors and networks Next step is to leverage non-electronics Next step is to leverage non-electronics

15 Counter-Cyberspace Cyber Control Cyber Control Counter-Cyberspace Counter-Cyberspace Cyber Operations Cyber Operations Non-Cyber Operations Non-Cyber Operations Gaining the Advantage Gaining the Advantage

16 Counter-Cyberspace Cyber Control Cyber Control Counter-Cyberspace Counter-Cyberspace Cyber Operations Cyber Operations Non-Cyber Operations Non-Cyber Operations Gaining the Advantage Gaining the Advantage

17 Conclusion Cyberspace Activities are Necessary Cyberspace Activities are Necessary Greater Expertise is Needed Greater Expertise is Needed So is the Need for a More Comprehensive Approach, Tighter Command, and Improved Partnerships So is the Need for a More Comprehensive Approach, Tighter Command, and Improved Partnerships An Edge is Needed An Edge is Needed Cyber Must be Secure for Military Operations Cyber Must be Secure for Military Operations

18 Electronic Warfare – Defence Must Lead Defence needs to lead renewal of EW. Defence needs to lead renewal of EW. We cannot continue to drift from project-to-project and day-to-day. We cannot continue to drift from project-to-project and day-to-day. Our EW capability must be competitive, reliable, effective and sustainable. Our EW capability must be competitive, reliable, effective and sustainable.

19 Electronic Warfare – Must Decide EW Value Defence must decide on the value it places on an effective EW capability for the future, which requires: Defence must decide on the value it places on an effective EW capability for the future, which requires: agreement on the Defence EW requirement; agreement on the Defence EW requirement; better communication and greater engagement; and better communication and greater engagement; and an organising principle that directs future activity. an organising principle that directs future activity.

20 Electronic Warfare – Too Transactional Current relationship is too transactional. Current relationship is too transactional. Technology is volatile and redesigns the EW environment well ahead of Defence’s response. Technology is volatile and redesigns the EW environment well ahead of Defence’s response.

21 Electronic Warfare – Relationship-Based Need relationship-based approach: Need relationship-based approach: Defence (requirements and leadership) Defence (requirements and leadership) Industry (capacity and capability). Industry (capacity and capability). Need Defence-led partnership, transparency, integrating strategy, and focused capability building. Need Defence-led partnership, transparency, integrating strategy, and focused capability building.

22 Electronic Warfare – Higher-Order Skills Without this change we become locked into lower value-add and skill areas. Without this change we become locked into lower value-add and skill areas. But trends mean we need to be more agile and better organised. But trends mean we need to be more agile and better organised. We need the higher-order skills. We need the higher-order skills.

23 Electronic Warfare Defence must lead. Defence must lead. Defence must decide on the value it places on EW. Defence must decide on the value it places on EW. Current relationship is too transactional. Current relationship is too transactional. Need relationship-based approach. Need relationship-based approach. Need the higher-order skills. Need the higher-order skills.


Download ppt "The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012."

Similar presentations


Ads by Google