C4I and Information Warfare

Download Report

Transcript C4I and Information Warfare

C4ISR and Information
Warfare
Naval Weapons Systems
Putting It All Together - C4ISR
Command
Surveillance
Computers
C4ISR
Control
Reconnaissance
Intelligence
Communications
Why We Need
Faster response times
required.
Joint Operations require high
levels of coordination.
More sophisticated weapons
require more information.
4
C ISR
Functions of C4I




Creates a common tactical
picture. Ensures all information is
available to operators &
commanders.
Ensures connectivity and
information exchange.
Directly links the sensor to the
shooter.
Supports and uses information
warfare (IW).
C4ISR Supports At All Levels




Watchstanders
Composite Warfare Commander
Commander of the JTF
The Shore Commanders
Command and Control Warfare
Objectives:
1. Defeat the enemy by destroying its C2W
systems.
2. Separate the enemy’s command structure
from its forces.
3. Protect one’s own C2W forces.
4. Connect commanders and forces.
Tools to Achieve C2W
Objectives





Operational Security
Military Deception
Psychological
Operations
Electronic Warfare
Physical Destruction
C2W Decision Making Cycle
Observe
Orient
Act
Decide
(OODA loop)
Intelligence
“There are 3 kinds of people: those
who can count & those who can't”
Intelligence
Product of collecting, exploiting, processing,
integrating, analyzing and interpreting
information.
Types:
1. Strategic Intelligence
2. Operational Intelligence
3. Tactical Intelligence
Function of Intelligence

Prepare the Battle space
• Define environment or physical
characteristics.
• Evaluate the threat and determine
threat’s course of action.


Provide Early Warning
Evaluate the situation (current
actions & changes)
Function of Intelligence cont.




Identify and Target the Enemy’s
Vulnerabilities
Assess Battle Damage (own and
enemy’s)
Manage Intelligence Information
Prevent Enemy’s Intelligence
Efforts (Offensive & Defensive)
Information Warfare (IW)
IW is action taken to preserve the integrity
of own information systems from
exploitation, disruption, and destruction
while achieving an information advantage
over the enemy.
IW Tools

Surveillance Systems
• Satellites
• EW and SIGINT
• HUMINT


Communications Systems
Tactical Network
• Computers
• Database management
Offensive - Opportunities

Degrade or exploit enemy’s collection
or use of information
• “Antihead” – traditional means of
removing commander or command
center
• “Antineck” – nontraditional method of
cutting enemy’s communications
Defensive - Vulnerabilities

Protection of our ability to conduct
information operations
• Physical security
• Encryption
• Antivirus
• Secure data transmissions
Navy Tactical Data System
(NTDS)
Interceptor
Interceptor
Early Warning
Aircraft
Link 4A
NTDS Ship
Non-NTDS Ship
NTDS Ship
Advanced Combat Direction
System


Follow on to NTDS
Incorporates various
communication circuits into one
unified system
Communications Security
Protection resulting from all measures designed
to deny unauthorized persons information and
the possession of telecommunications data.
Called CMS.
Elements:
Crypto Security
Transmission Security
Emission Security
Physical Security
Computers

Information Management – ensures
quality of information
• Sort, process, organize, correlate, and
disseminate information

Real time
Computer Requirements





Blend critical tactical, operational,
and administrative data
Deliver rapid information to
operational commanders
Multimedia format (to suit)
Standardized equipment
Standardized hardware
(upgrade/additions)
Space and EW

Space Dominance
• Integral to strategic and tactical
command and control architecture
• How is C4I delivered?

Opportunities
• Communication


UHF Satellite – nav, surveillance, ID, track
SHF/EHF Satellite – scintillation
• Sensing/Surveillance

Missile attack warning (IR sensors)
Mission Planning


Meteorological data
Preview lay of the land
•
•
•
•
Terrain
Ocean depth
Shoreline characteristics
Vehicle/aircraft/ship locations
Questions?