C4I and Information Warfare
Download
Report
Transcript C4I and Information Warfare
C4ISR and Information
Warfare
Naval Weapons Systems
Putting It All Together - C4ISR
Command
Surveillance
Computers
C4ISR
Control
Reconnaissance
Intelligence
Communications
Why We Need
Faster response times
required.
Joint Operations require high
levels of coordination.
More sophisticated weapons
require more information.
4
C ISR
Functions of C4I
Creates a common tactical
picture. Ensures all information is
available to operators &
commanders.
Ensures connectivity and
information exchange.
Directly links the sensor to the
shooter.
Supports and uses information
warfare (IW).
C4ISR Supports At All Levels
Watchstanders
Composite Warfare Commander
Commander of the JTF
The Shore Commanders
Command and Control Warfare
Objectives:
1. Defeat the enemy by destroying its C2W
systems.
2. Separate the enemy’s command structure
from its forces.
3. Protect one’s own C2W forces.
4. Connect commanders and forces.
Tools to Achieve C2W
Objectives
Operational Security
Military Deception
Psychological
Operations
Electronic Warfare
Physical Destruction
C2W Decision Making Cycle
Observe
Orient
Act
Decide
(OODA loop)
Intelligence
“There are 3 kinds of people: those
who can count & those who can't”
Intelligence
Product of collecting, exploiting, processing,
integrating, analyzing and interpreting
information.
Types:
1. Strategic Intelligence
2. Operational Intelligence
3. Tactical Intelligence
Function of Intelligence
Prepare the Battle space
• Define environment or physical
characteristics.
• Evaluate the threat and determine
threat’s course of action.
Provide Early Warning
Evaluate the situation (current
actions & changes)
Function of Intelligence cont.
Identify and Target the Enemy’s
Vulnerabilities
Assess Battle Damage (own and
enemy’s)
Manage Intelligence Information
Prevent Enemy’s Intelligence
Efforts (Offensive & Defensive)
Information Warfare (IW)
IW is action taken to preserve the integrity
of own information systems from
exploitation, disruption, and destruction
while achieving an information advantage
over the enemy.
IW Tools
Surveillance Systems
• Satellites
• EW and SIGINT
• HUMINT
Communications Systems
Tactical Network
• Computers
• Database management
Offensive - Opportunities
Degrade or exploit enemy’s collection
or use of information
• “Antihead” – traditional means of
removing commander or command
center
• “Antineck” – nontraditional method of
cutting enemy’s communications
Defensive - Vulnerabilities
Protection of our ability to conduct
information operations
• Physical security
• Encryption
• Antivirus
• Secure data transmissions
Navy Tactical Data System
(NTDS)
Interceptor
Interceptor
Early Warning
Aircraft
Link 4A
NTDS Ship
Non-NTDS Ship
NTDS Ship
Advanced Combat Direction
System
Follow on to NTDS
Incorporates various
communication circuits into one
unified system
Communications Security
Protection resulting from all measures designed
to deny unauthorized persons information and
the possession of telecommunications data.
Called CMS.
Elements:
Crypto Security
Transmission Security
Emission Security
Physical Security
Computers
Information Management – ensures
quality of information
• Sort, process, organize, correlate, and
disseminate information
Real time
Computer Requirements
Blend critical tactical, operational,
and administrative data
Deliver rapid information to
operational commanders
Multimedia format (to suit)
Standardized equipment
Standardized hardware
(upgrade/additions)
Space and EW
Space Dominance
• Integral to strategic and tactical
command and control architecture
• How is C4I delivered?
Opportunities
• Communication
UHF Satellite – nav, surveillance, ID, track
SHF/EHF Satellite – scintillation
• Sensing/Surveillance
Missile attack warning (IR sensors)
Mission Planning
Meteorological data
Preview lay of the land
•
•
•
•
Terrain
Ocean depth
Shoreline characteristics
Vehicle/aircraft/ship locations
Questions?