Presentation is loading. Please wait.

Presentation is loading. Please wait.

C4ISR and Information Warfare Naval Weapons Systems.

Similar presentations


Presentation on theme: "C4ISR and Information Warfare Naval Weapons Systems."— Presentation transcript:

1 C4ISR and Information Warfare Naval Weapons Systems

2 Putting It All Together - C 4 ISR Command Control Communications Computers Intelligence C 4 ISR Surveillance Reconnaissance

3 INTELLIGENCE!!!

4 Why We Need C 4 ISR Faster response times required. Joint Operations require high levels of coordination. More sophisticated weapons require more information.

5 Functions of C 4 I Creates a common tactical picture. Ensures all information is available to operators & commanders.Creates a common tactical picture. Ensures all information is available to operators & commanders. Ensures connectivity and information exchange.Ensures connectivity and information exchange. Sends information directly from sensor to shooter.Sends information directly from sensor to shooter. Supports and uses information warfare (IW).Supports and uses information warfare (IW).

6 C 4 ISR Supports At All Levels WatchstandersWatchstanders Composite Warfare CommanderComposite Warfare Commander Commander of the JTFCommander of the JTF The Shore CommandersThe Shore Commanders NCANCA

7 Command and Control Warfare Objectives: 1. Defeat the enemy by destroying its C2W systems. 2. Separate the enemy’s command structure from its forces. 3. Protect one’s own C2W forces. 4. Connect commanders and forces.

8 Tools to Achieve C2W Objectives Operational Security Operational Security Military Deception Military Deception Psychological Operations Psychological Operations Electronic Warfare Electronic Warfare Physical Destruction Physical Destruction

9 C2W Decision Making Cycle Observe Orient Decide Act (OODA loop)

10 Intelligence “No such thing as Military Intelligence”

11 Intelligence Product of collecting, exploiting, processing, integrating, analyzing and interpreting information. Types: 1. Strategic Intelligence 2. Operational Intelligence 3. Tactical Intelligence

12 Function of Intelligence Prepare the Battle spacePrepare the Battle space –Define environment or physical characteristics. –Evaluate the threat and the threat’s course of action. Provide Early WarningProvide Early Warning Evaluate the situation (current actions & changes)Evaluate the situation (current actions & changes)

13 Function of Intelligence cont. Identify and Target the Enemy’s VulnerabilitiesIdentify and Target the Enemy’s Vulnerabilities Assess Battle Damage (own and enemy’s)Assess Battle Damage (own and enemy’s) Manage Intelligence InformationManage Intelligence Information Prevent Enemy’s Intelligence Efforts (Offensive & Defensive)Prevent Enemy’s Intelligence Efforts (Offensive & Defensive)

14 Information Warfare (IW) IW is action taken to preserve the integrity of own information systems from exploitation, disruption, and destruction while achieving an information advantage over the enemy.

15 IW Tools Surveillance SystemsSurveillance Systems –Satellites –Electronic Warfare and Signal Intelligence –Human Intelligence Communications SystemsCommunications Systems Tactical NetworkTactical Network –Computers –Database management

16 Questions

17 Radio frequency use LF (Low Freq)LF (Low Freq) HF (High Freq)HF (High Freq) VHF (Very High Freq)VHF (Very High Freq) UHF (Ultra High Freq)UHF (Ultra High Freq)

18 Real-Time COMMSReal-Time COMMS Multiple uses of Information:Multiple uses of Information: –VOICE –VIDEO –DATA –SENSOR Simultaneously transmittedSimultaneously transmitted SHF / EHFSHF / EHF Bandwidth

19 Navy Tactical Data System (NTDS) Link 11 Link 14 Link 4A Early Warning Aircraft Interceptor NTDS Ship Non-NTDS Ship Link 11 Link 4A

20 Advanced Combat Direction System Follow on to NTDSFollow on to NTDS Incorporates various communication circuits into one unified systemIncorporates various communication circuits into one unified system

21 Communications Security Protection resulting from all measures designed to deny unauthorized persons information and the possession of telecommunications data. Called CMS. Crypto Security Transmission Security Emission Security Physical Security Elements:

22 Computer Requirements Sort, process, organize, correlate, and disseminate information in near real-time. Sort, process, organize, correlate, and disseminate information in near real-time. Blend critical tactical, operational and administrative data to meet tactical objectives. Blend critical tactical, operational and administrative data to meet tactical objectives. Present information in a multi-media format to best suit the operator or equipment Present information in a multi-media format to best suit the operator or equipment – I.E. – The Captain / Admiral

23 Computer Requirements Have standardized equipment to reduce training and increase proficiency Have standardized equipment to reduce training and increase proficiency Have standardized hardware and software design to allow upgrade and additions to equipment. Have standardized hardware and software design to allow upgrade and additions to equipment. MICROSOFT!!

24 Inherent Problems With Automated Systems 1. Evaluation 2. Orientation 3. Cost 4. Decision Making 5. Discipline 6. Survivability

25 Questions?


Download ppt "C4ISR and Information Warfare Naval Weapons Systems."

Similar presentations


Ads by Google