+ All Categories
Home > Documents > Network Centric Warfare, Cyber Warfare, & KSCO

Network Centric Warfare, Cyber Warfare, & KSCO

Date post: 03-Jan-2016
Category:
Upload: eagan-holden
View: 94 times
Download: 8 times
Share this document with a friend
Description:
Network Centric Warfare, Cyber Warfare, & KSCO. Nort Fowler AFRL/IF 26 Electronic parkway, Rome NY 13441 Email: [email protected] Tel: (315) 330-4512. Network Centric Enterprise. Infostructure. Sensor Netting Data Fusion Information Management. Vastly Improved Awareness - PowerPoint PPT Presentation
11
Network Centric Warfare, Cyber Warfare, & KSCO Nort Fowler AFRL/IF 26 Electronic parkway, Rome NY 13441 Email: [email protected] Tel: (315) 330-4512
Transcript
Page 1: Network Centric Warfare, Cyber Warfare, & KSCO

Network Centric Warfare,

Cyber Warfare,

&

KSCO

Nort FowlerAFRL/IF

26 Electronic parkway, Rome NY 13441Email: [email protected]

Tel: (315) 330-4512

Page 2: Network Centric Warfare, Cyber Warfare, & KSCO

2

Network Centric Enterprise

Infostructure

Sensor NettingData Fusion

Information Management

Vastly Improved AwarenessShared Awareness

Virtual CollaborationVirtual Organizations

Substitution of Info forPeople and MaterialSelf-Synchronization

Increased TempoIncreased Responsiveness

Lower RisksLower Costs

Higher Profits

From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC, CCRP Press, 1999 www.dodccrp.org/publicat.htm

The Entry Fee

The Bottom Line(Measurable)

Enabler

Process forgeneratingawareness

Enabler

Process forexploiting

awareness

Results

Page 3: Network Centric Warfare, Cyber Warfare, & KSCO

3

Military as a Network Centric Enterprise

Infostructure

Sensor NettingData Fusion

Information Management

Vastly Improved AwarenessShared Battlespace Awareness

Virtual CollaborationVirtual Organizations

Substitution of Info forPeople and Material

Self-Synchronization Forces

Increased Operations TempoIncreased Responsiveness

Lower RisksLower Costs

Increased Combat Effectiveness

From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC, CCRP Press, 1999 www.dodccrp.org/publicat.htm

Execution(Measurable)

Battlespace Awareness&

Knowledge

Page 4: Network Centric Warfare, Cyber Warfare, & KSCO

4

Network Organizational Models

Standard Hierarchy Chain Network Hub & Spoke All-Channel

From Friel, Hierarchies and Networks , Government Executive, April, 2002

Nodes: The actors, or points on a network. A node can form connections with any and all other nodes on the network

Centrality: The degree to which a node connects other nodes

Boundary spanners: Nodes that have connections between groups

Self-synchronization: The ability of low-level groups to coordinate and act without going through a central authority

Swarming: The act of attacking a target from many different directions, using many different means, often making a force appear larger than it is

Page 5: Network Centric Warfare, Cyber Warfare, & KSCO

5

Key Observations

The World has become a network of networks, filled with actors who behave in increasingly interconnected ways and with wide-reaching and rapid consequences

One major component of a network centric enterprise is speed…. The payoff is in the initial very high rate of change

A Northern Alliance commander suggested bombing Taliban positions. Nineteen minutes later the positions were struck

The critical functions of a network centric enterprise are NOT tied to any one platform; multiple new pathways to delivering capabilities, shifting in time

The swarming technique requires a key feature of networks -- adaptability

Swarming behavior visible in the war on terrorism

Page 6: Network Centric Warfare, Cyber Warfare, & KSCO

6

One Vision of Future Cyber Warfare

• Two competing all-channel network “organizations” dueling in Cyberspace.

• Each of these “organizations” might have many multiple ways they can deliver fatal blows

• No longer "platform centric", their lethality is now multi-threaded

• Multiple pathways imply that no single asset is on the critical path

• The number of network pathways is growing exponentially.

• Cyberwar might involve identifying and managing the network means of delivery in such a way that the adversary never has a lethal combination of delivery mechanisms for massed effects.

• Once the adversary achieves just one such combination, the swarming strike will come at the speed of electrons.

• A large scale, fast paced, distributed, deadly game of Cyber chess with missing or unknown pieces (capabilities, vulnerabilities).

Page 7: Network Centric Warfare, Cyber Warfare, & KSCO

7

Active Defense in CyberspaceFuture Cyberwars will be fought to defend / destroy,

not just the individual assets of the computer network,but the future combat capabilities achieved through a networked force

Page 8: Network Centric Warfare, Cyber Warfare, & KSCO

8

Characteristics:Aerospace Vehicle: UCAVFlight Medium: Air & SpaceWeapons: Missiles & BombsDesired “Effect”: Destroy TargetControl: Flight PathLPI: Stealth (Physical)LPD: Terrain MaskingHomebase: Predetermined AirfieldLogistics: Heavy, Continual

Cyber Warfare Model vs. Cyber Warfare Model vs. Classical Warfare ModelClassical Warfare Model

Kinetic Warfare Cyber Warfare

Characteristics:Cyberspace Vehicle: Info-CraftFlight Medium: CyberspaceWeapons: Virus, Worm, Soft Bombs, etcDesired “Effect”: Destroy, Degrade, Co-optControl: Network LinksLPI: Stealth (Software)LPD: Network MaskingHomebase: Any Cyberspace PortalLogistics: Light, Infrequent (software)

Net Result or “Effect” Can be Exactly the Same – Impede the EnemyNet Result or “Effect” Can be Exactly the Same – Impede the Enemy

Page 9: Network Centric Warfare, Cyber Warfare, & KSCO

9

Principles of War Remain Objective

– Focus effort to achieve objective Economy of Force

– Minimize use of capacity in pursuit of non-objective goals

Security– Protecting & maintaining

operational LOCs Offensive

– Seizing & maintaining the offensive in order to dictate the terms of combat

Maneuver– Constrain enemy COA through

environmental & other aspects

Surprise– The ability to strike the enemy at a

time, place or manner for which he is not prepared

Mass– Concentrating military capabilities at

the decisive time & space Unity of Command

– The ability to build and maintain a shared understanding of the commander’s intent

Simplicity– Need to keep plans, guidance &

orders clear and uncomplicated

JointAllied

&Coalition

Page 10: Network Centric Warfare, Cyber Warfare, & KSCO

10

Some Possible Future Cyber Weapons

Cyber weapons attack and control our adversary’s Information and C3I capabilities through intelligent use of information and controlled effects generated in Cyberspace.

Stealthy AgentsNetwork Blocking MinesTraffic Redirection (active & passive) Network Re-mappingCamouflaged ImplantsSleeper AgentsAdversary Finger Printing & TrackingCyber Identity TheftObfuscation (speed/mobility/deception) ToolsTribal OperatorsRemote Cyber Forensics

Page 11: Network Centric Warfare, Cyber Warfare, & KSCO

11

KSCO Opportunities


Recommended