Presentation is loading. Please wait.

Presentation is loading. Please wait.

C4ISR and Information Warfare

Similar presentations


Presentation on theme: "C4ISR and Information Warfare"— Presentation transcript:

1 C4ISR and Information Warfare
Naval Weapons Systems

2 Putting It All Together - C4ISR
Command Computers C4ISR Surveillance Reconnaissance C4I is the term used to describe the information and decision support systems to assist commanders at all levels to plan, direct and control their activities. C4I is more than a term, it is a philosophy of how navy systems are processes are designed and are interrelated. C4I incorporates the processes of: 1. Command: The exercise of authority based upon certain knowledge to attain and objective. 2. Control: The process of verifying and correcting activity such that the objective or goal of command is accomplished. 3. Communications: The ability to exercise the necessary liaison to exercise effective command between tactical or strategic units to command. 4. Computers: The Computer systems and compatibility of computer systems. Also includes data processing. 5. Intelligence: Includes collection as well as analysis and distribution of information. Control Intelligence Communications

3 Why We Need C4ISR Faster response times required.
Joint Operations require high levels of coordination. More sophisticated weapons require more information. C4ISR is necessary because: 1. Operations in a littoral environment require faster response times. 2. Joint operations require higher level of coordination and communications between forces 3. Today’s sophisticated weapons systems require higher situational awareness and more information to the operator/shooter as well as the commander.

4 Functions of C4I Creates a common tactical picture. Ensures all information is available to operators & commanders. Ensures connectivity and information exchange. Directly links the sensor to the shooter. Supports and uses information warfare (IW). C4I has four major functions: 1. C4I will create a common tactical picture and ensures that all information is available to the operators and the tactical commanders. Ensure it is the same information. 2. Ensures connectivity and information exchange. a. Global Information Exchange System (GLOBIX) b. Tactical Data Information Exchange System (TACIXS) c. Battle Group Information Exchange System (BGIXS) d. Officer in Tactical Command Information Exchange System (OTCIXS) 3. Sends the information directly from the sensors to the shooter. (not screened by another group). All information is directly available to system operators. Type of information required. a. Surveillance and reconnaissance information b. Acquisition and localization information c. Combat identification, targeting engagement and guidance information. d. Battle damage assessment. 4. Supports and uses information Warfare (IW) a. IW is used to avoid hostilities or gain information advantage before weapons are deployed or plans are executed. b. IW can be used at the operational and tactical levels to disrupt an enemy’s decision process.

5 C4ISR Supports At All Levels
Watchstanders Composite Warfare Commander Commander of the JTF The Shore Commanders

6 Command and Control Warfare
Objectives: 1. Defeat the enemy by destroying its C2W systems. 2. Separate the enemy’s command structure from its forces. 3. Protect one’s own C2W forces. 4. Connect commanders and forces. 1. Command and Control Warfare (C2W) is a major warfare area in today’s world. 2. Command and Control is the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission. 3. C2W involves the action taken to deny information to, influence, degrade, or destroy adversary command and control capabilities, while protecting friendly command and control capabilities against such actions. 4. Based on the philosophy that preventing the enemy’s use of its forces is better than defeating that force. Show slide: C2W objectives: Cover graphic.

7 Tools to Achieve C2W Objectives
Operational Security Military Deception Psychological Operations Electronic Warfare Physical Destruction There are five tools used in C2W to meet the objectives. 1. Operations Security. - Prevents information on one’s own operations from being discovered by an enemy’s command and control system. - Example include not publishing ship departure dates and times. POD 2. Military deception. - Gives enemy commanders information that mislead them about one’s own operations. 3. Psychological Operations - Delivers information to the emery forces in ways that make it difficult for enemy leader to influence or control their forces or population. - In Desert storm, leaflets were dropped on Bagdad and over troops. 4. Electronic Warfare - Both offensive and defensive as previously discussed. - Examples include jamming and message interception. 5. Physical Destruction - Attacks on enemy command and control assets - Example in Desert Storm, radar and Command and Control sites were hit first by Tomahawks before air warfare forces sent in.

8 C2W Decision Making Cycle
Observe Act Orient 1. C2W decision making process is based on OODA Loop. 2. This type of loop is common in approaching a problem or reacting to a situation. 3. Steps in the loop are. a. Observe. See what is happening or what the enemy is doing. b. Orient. Understand the perspective of the observance and present scenario. c. Decide. Decide on the action you will take. d. Act. Act on your decision e. Now observe the effects of your action and how the enemy reacts. (The cycle starts over.) OODA requires intelligence at all stages. 5. You win the C2W game by slowing down the enemy’s OODA cycle while speeding up your own OODA cycle. 6. As you can imagine, satellite systems play a major role in C2W a. Satellite communication systems b. Satellite-based intelligence and information gathering systems Decide (OODA loop)

9 “There are 3 kinds of people: those who can count & those who can't”
Intelligence “There are 3 kinds of people: those who can count & those who can't”

10 Intelligence Product of collecting, exploiting, processing,
integrating, analyzing and interpreting information. Types: 1. Strategic Intelligence 2. Operational Intelligence 3. Tactical Intelligence Go over the definition of Intelligence Types of Intelligence: (from Naval Intelligence, p. 6.) 1. Strategic Intelligence - For plans and policies at the national and international level. 2. Operational Intelligence - For plans and operations within a region or theater, for employment of forces. 3. Tactical Intelligence - For tactical operation at the component or unit level, for immediate action.

11 Function of Intelligence
Prepare the Battle space Define environment or physical characteristics. Evaluate the threat and determine threat’s course of action. Provide Early Warning Evaluate the situation (current actions & changes) Go over graphic.

12 Function of Intelligence cont.
Identify and Target the Enemy’s Vulnerabilities Assess Battle Damage (own and enemy’s) Manage Intelligence Information Prevent Enemy’s Intelligence Efforts (Offensive & Defensive) Go over graphic.

13 Information Warfare (IW)
IW is action taken to preserve the integrity of own information systems from exploitation, disruption, and destruction while achieving an information advantage over the enemy. Intelligence uses information warfare (IW). Go over the definition of Information warfare.

14 IW Tools Surveillance Systems Communications Systems Tactical Network
Satellites EW and SIGINT HUMINT Communications Systems Tactical Network Computers Database management Go over graphic of IW Tools. Lead-in: We have discussed Command and Control (C2, including C2W) and Intelligence (including Information Warfare). Two areas of C4I that remain are Communications and Computers. Talk about INFOCON

15 Offensive - Opportunities
Degrade or exploit enemy’s collection or use of information “Antihead” – traditional means of removing commander or command center “Antineck” – nontraditional method of cutting enemy’s communications

16 Defensive - Vulnerabilities
Protection of our ability to conduct information operations Physical security Encryption Antivirus Secure data transmissions

17 Navy Tactical Data System (NTDS)
Interceptor Interceptor Early Warning Aircraft Link 4A Link 4A Link 11 1. The most important communications system during combat situation is a real-time, common track picture available to all units. 2. The system used to link together all navy ships, aircraft and shore command installations data and information can be shared is called NTDS. 3. Significant Links in NTDS are a. Link 11/TADIL (Tactical Digital Information Exchange Link A) - two way, real-time encrypted data between aircraft-ships, ship-ship, - HF-UHF freq range b. Link 16/TADIL J/JTIDS (Joint Tactical Data Link System) - To replace Link 11 - Extends composite warfare commander’s tactical picture to include joint and allied information. - More secure, jam-resistant, and has higher data rate c. Link 4A/ TADIL C - Link used to exchange information with fighter aircraft. - Allows console operators to direct aircraft remotely (E-2 can actually fly F-14 remotely. d. Link 14 used at temporary means to get information to Non-NTDS ship. Link 11 NTDS Ship Link 14 Non-NTDS Ship NTDS Ship

18 Advanced Combat Direction System
Follow on to NTDS Incorporates various communication circuits into one unified system The next generation tactical data system is the Advanced Combat Direction System (ACDS) a. Combines tactical data from links 4A, 11 and 16 with onboard and off-board weapon and sensor data b. Produces a coherent, operator-tailored tactical display c. Only on a few ships at this time.

19 Communications Security
Protection resulting from all measures designed to deny unauthorized persons information and the possession of telecommunications data. Called CMS. Elements: 1. How we keep the enemy from using our own communications and data to improve their Information Warfare is called Communications Security or COMSEC. 2. Go over definition of COMSEC. 3. Elements of our COMSEC Program are a. Crypto Security: Use of codes and data encryption - Not only codes but actions to ensure the proper use and maintenance of encryption devices and systems. b. Transmission Security. measure to protect transmission from interception and exploitation. c. Emission Security- measures to deny unauthorized individuals information that can be derived by intercepting and analyzing emissions from telecommunications systems. d. Physical Security - measures to safeguard communications equipment, material and documents Crypto Security Transmission Security Emission Security Physical Security

20 Computers Information Management – ensures quality of information
Sort, process, organize, correlate, and disseminate information Real time

21 Computer Requirements
Blend critical tactical, operational, and administrative data Deliver rapid information to operational commanders Multimedia format (to suit) Standardized equipment Standardized hardware (upgrade/additions) The final area of C4I is Computers. Without computers the other areas would not happen because of the volume of data that must be rapidly processed. Computers are required to sort, process, organize correlate and disseminate information. All of this must be done rapidly to maintain the real-time element.

22 Inherent Problems With Automated Systems
1. Evaluation 2. Orientation 3. Cost 4. Decision Making 5. Discipline 6. Survivability There are inherent problems with relying on Automated Systems 1. Evaluation: there is a tendency to rely on computer analysis without analyzing the whole picture. This can lead to problems such as firing on own forces. There is always necessary for subjective evaluation of information. 2. Orientation: Emphasis in system design should favor the commander rather than the technical. Remember people use the data. Make it easier for them not the machine designers. 3. Cost: Hardware and soft ware are expensive. 4. Decision making: Too much data can cause an information overload and result in indecision. Avoid information overload. 5. Discipline: With the amount of information available, high level commander can be more involved with on-scene level of warfare. This makes it more difficult for the on-scene commander to understand their roles. Distracts high level commanders from doing their job. 6. Survivability: Comms and data flow must be reliable. Without communications the system breaks down and coordination is difficult. Problem is comms are jammed or destroyed.

23 Space and EW Space Dominance Opportunities
Integral to strategic and tactical command and control architecture How is C4I delivered? Opportunities Communication UHF Satellite – nav, surveillance, ID, track SHF/EHF Satellite – scintillation Sensing/Surveillance Missile attack warning (IR sensors)

24 Mission Planning Meteorological data Preview lay of the land Terrain
Ocean depth Shoreline characteristics Vehicle/aircraft/ship locations

25 Questions?

26


Download ppt "C4ISR and Information Warfare"

Similar presentations


Ads by Google