Date post: | 03-Jan-2016 |
Category: |
Documents |
Upload: | eagan-holden |
View: | 94 times |
Download: | 8 times |
Network Centric Warfare,
Cyber Warfare,
&
KSCO
Nort FowlerAFRL/IF
26 Electronic parkway, Rome NY 13441Email: [email protected]
Tel: (315) 330-4512
2
Network Centric Enterprise
Infostructure
Sensor NettingData Fusion
Information Management
Vastly Improved AwarenessShared Awareness
Virtual CollaborationVirtual Organizations
Substitution of Info forPeople and MaterialSelf-Synchronization
Increased TempoIncreased Responsiveness
Lower RisksLower Costs
Higher Profits
From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC, CCRP Press, 1999 www.dodccrp.org/publicat.htm
The Entry Fee
The Bottom Line(Measurable)
Enabler
Process forgeneratingawareness
Enabler
Process forexploiting
awareness
Results
3
Military as a Network Centric Enterprise
Infostructure
Sensor NettingData Fusion
Information Management
Vastly Improved AwarenessShared Battlespace Awareness
Virtual CollaborationVirtual Organizations
Substitution of Info forPeople and Material
Self-Synchronization Forces
Increased Operations TempoIncreased Responsiveness
Lower RisksLower Costs
Increased Combat Effectiveness
From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC, CCRP Press, 1999 www.dodccrp.org/publicat.htm
Execution(Measurable)
Battlespace Awareness&
Knowledge
4
Network Organizational Models
Standard Hierarchy Chain Network Hub & Spoke All-Channel
From Friel, Hierarchies and Networks , Government Executive, April, 2002
Nodes: The actors, or points on a network. A node can form connections with any and all other nodes on the network
Centrality: The degree to which a node connects other nodes
Boundary spanners: Nodes that have connections between groups
Self-synchronization: The ability of low-level groups to coordinate and act without going through a central authority
Swarming: The act of attacking a target from many different directions, using many different means, often making a force appear larger than it is
5
Key Observations
The World has become a network of networks, filled with actors who behave in increasingly interconnected ways and with wide-reaching and rapid consequences
One major component of a network centric enterprise is speed…. The payoff is in the initial very high rate of change
A Northern Alliance commander suggested bombing Taliban positions. Nineteen minutes later the positions were struck
The critical functions of a network centric enterprise are NOT tied to any one platform; multiple new pathways to delivering capabilities, shifting in time
The swarming technique requires a key feature of networks -- adaptability
Swarming behavior visible in the war on terrorism
6
One Vision of Future Cyber Warfare
• Two competing all-channel network “organizations” dueling in Cyberspace.
• Each of these “organizations” might have many multiple ways they can deliver fatal blows
• No longer "platform centric", their lethality is now multi-threaded
• Multiple pathways imply that no single asset is on the critical path
• The number of network pathways is growing exponentially.
• Cyberwar might involve identifying and managing the network means of delivery in such a way that the adversary never has a lethal combination of delivery mechanisms for massed effects.
• Once the adversary achieves just one such combination, the swarming strike will come at the speed of electrons.
• A large scale, fast paced, distributed, deadly game of Cyber chess with missing or unknown pieces (capabilities, vulnerabilities).
7
Active Defense in CyberspaceFuture Cyberwars will be fought to defend / destroy,
not just the individual assets of the computer network,but the future combat capabilities achieved through a networked force
8
Characteristics:Aerospace Vehicle: UCAVFlight Medium: Air & SpaceWeapons: Missiles & BombsDesired “Effect”: Destroy TargetControl: Flight PathLPI: Stealth (Physical)LPD: Terrain MaskingHomebase: Predetermined AirfieldLogistics: Heavy, Continual
Cyber Warfare Model vs. Cyber Warfare Model vs. Classical Warfare ModelClassical Warfare Model
Kinetic Warfare Cyber Warfare
Characteristics:Cyberspace Vehicle: Info-CraftFlight Medium: CyberspaceWeapons: Virus, Worm, Soft Bombs, etcDesired “Effect”: Destroy, Degrade, Co-optControl: Network LinksLPI: Stealth (Software)LPD: Network MaskingHomebase: Any Cyberspace PortalLogistics: Light, Infrequent (software)
Net Result or “Effect” Can be Exactly the Same – Impede the EnemyNet Result or “Effect” Can be Exactly the Same – Impede the Enemy
9
Principles of War Remain Objective
– Focus effort to achieve objective Economy of Force
– Minimize use of capacity in pursuit of non-objective goals
Security– Protecting & maintaining
operational LOCs Offensive
– Seizing & maintaining the offensive in order to dictate the terms of combat
Maneuver– Constrain enemy COA through
environmental & other aspects
Surprise– The ability to strike the enemy at a
time, place or manner for which he is not prepared
Mass– Concentrating military capabilities at
the decisive time & space Unity of Command
– The ability to build and maintain a shared understanding of the commander’s intent
Simplicity– Need to keep plans, guidance &
orders clear and uncomplicated
JointAllied
&Coalition
10
Some Possible Future Cyber Weapons
Cyber weapons attack and control our adversary’s Information and C3I capabilities through intelligent use of information and controlled effects generated in Cyberspace.
Stealthy AgentsNetwork Blocking MinesTraffic Redirection (active & passive) Network Re-mappingCamouflaged ImplantsSleeper AgentsAdversary Finger Printing & TrackingCyber Identity TheftObfuscation (speed/mobility/deception) ToolsTribal OperatorsRemote Cyber Forensics
11
KSCO Opportunities