fowler-ksco-2002. ppt - AIAI University of Edinburgh

Download Report

Transcript fowler-ksco-2002. ppt - AIAI University of Edinburgh

Network Centric Warfare,
Cyber Warfare,
&
KSCO
Nort Fowler
AFRL/IF
26 Electronic parkway, Rome NY 13441
Email: [email protected]
Tel: (315) 330-4512
Network Centric Enterprise
Enabler
Process for
generating
awareness
Enabler
Process for
exploiting
awareness
Results
Infostructure
The Entry Fee
Sensor Netting
Data Fusion
Information Management
Vastly Improved Awareness
Shared Awareness
Virtual Collaboration
Virtual Organizations
Substitution of Info for
People and Material
Self-Synchronization
Increased Tempo
Increased Responsiveness
Lower Risks
Lower Costs
Higher Profits
The Bottom Line
(Measurable)
From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC,
CCRP Press, 1999
www.dodccrp.org/publicat.htm
2
Military as a Network Centric Enterprise
Infostructure
Sensor Netting
Data Fusion
Information Management
Vastly Improved Awareness
Shared Battlespace Awareness
Battlespace Awareness
&
Knowledge
Virtual Collaboration
Virtual Organizations
Substitution of Info for
People and Material
Self-Synchronization Forces
Increased Operations Tempo
Increased Responsiveness
Lower Risks
Lower Costs
Increased Combat Effectiveness
Execution
(Measurable)
From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC,
CCRP Press, 1999
www.dodccrp.org/publicat.htm
3
Network Organizational Models
Standard Hierarchy
Chain Network
Hub & Spoke
All-Channel
 Nodes: The actors, or points on a network. A node can form connections
with any and all other nodes on the network
 Centrality: The degree to which a node connects other nodes
 Boundary spanners: Nodes that have connections between groups
 Self-synchronization: The ability of low-level groups to coordinate and act
without going through a central authority
 Swarming: The act of attacking a target from many different directions,
using many different means, often making a force appear larger than it is
From Friel, Hierarchies and Networks , Government Executive, April, 2002
4
Key Observations

The World has become a network of networks, filled
with actors who behave in increasingly interconnected
ways and with wide-reaching and rapid consequences

One major component of a network centric enterprise
is speed…. The payoff is in the initial very high rate of
change

A Northern Alliance commander suggested bombing
Taliban positions. Nineteen minutes later the
positions were struck

The critical functions of a network centric enterprise
are NOT tied to any one platform; multiple new
pathways to delivering capabilities, shifting in time

The swarming technique requires a key feature of
networks -- adaptability

Swarming behavior visible in the war on terrorism
5
One Vision of Future Cyber Warfare
• Two competing all-channel network “organizations” dueling in
Cyberspace.
• Each of these “organizations” might have many multiple ways
they can deliver fatal blows
•
No longer "platform centric", their lethality is now multi-threaded
• Multiple pathways imply that no single asset is on the critical path
• The number of network pathways is growing exponentially.
• Cyberwar might involve identifying and managing the network
means of delivery in such a way that the adversary never has a
lethal combination of delivery mechanisms for massed effects.
• Once the adversary achieves just one such combination, the swarming strike
will come at the speed of electrons.
• A large scale, fast paced, distributed, deadly game of Cyber chess
with missing or unknown pieces (capabilities, vulnerabilities).
6
Active Defense in Cyberspace
Future Cyberwars will be fought to defend / destroy,
not just the individual assets of the computer network,
but the future combat capabilities achieved through a networked force
7
Cyber Warfare Model vs.
Classical Warfare Model
Kinetic Warfare
Characteristics:
Aerospace Vehicle:
Flight Medium:
Weapons:
Desired “Effect”:
Control:
LPI:
LPD:
Homebase:
Logistics:
UCAV
Air & Space
Missiles & Bombs
Destroy Target
Flight Path
Stealth (Physical)
Terrain Masking
Predetermined Airfield
Heavy, Continual
Cyber Warfare
Characteristics:
Cyberspace Vehicle:
Flight Medium:
Weapons:
Desired “Effect”:
Control:
LPI:
LPD:
Homebase:
Logistics:
Info-Craft
Cyberspace
Virus, Worm, Soft Bombs, etc
Destroy, Degrade, Co-opt
Network Links
Stealth (Software)
Network Masking
Any Cyberspace Portal
Light, Infrequent (software)
Net Result or “Effect” Can be Exactly the Same – Impede the Enemy
8
Principles of War Remain

Objective

– Focus effort to achieve objective


Seizing & maintaining the offensive in
order to dictate the terms of combat
Maneuver
– Constrain enemy COA through
environmental & other aspects
Joint
Mass
– Concentrating military capabilities at
the decisive time & space

Unity of Command
– The ability to build and maintain a
shared understanding of the
commander’s intent
Offensive
–


Security
– Protecting & maintaining
operational LOCs

– The ability to strike the enemy at a
time, place or manner for which he
is not prepared
Economy of Force
– Minimize use of capacity in pursuit
of non-objective goals
Surprise

Simplicity
– Need to keep plans, guidance &
orders clear and uncomplicated
Allied
&
Coalition
9
Some Possible Future Cyber Weapons
Cyber weapons attack and control our adversary’s Information
and C3I capabilities through intelligent use of information and
controlled effects generated in Cyberspace.
Stealthy Agents
Network Blocking Mines
Traffic Redirection (active & passive)
Network Re-mapping
Camouflaged Implants
Sleeper Agents
Adversary Finger Printing & Tracking
Cyber Identity Theft
Obfuscation (speed/mobility/deception) Tools
Tribal Operators
Remote Cyber Forensics
10
KSCO Opportunities
11