1 / 23

The Military Challenge of Cyber

The Military Challenge of Cyber. AOC Talk on Cyber, EW and IO. Dr Gary Waters, 17 April 2012. Introductory Comments. Cyberspace is Critical and introduces new Vulnerabilities Militaries have a Role They must deal with this new Operating Medium Information Operations are Intrinsic

jaser
Download Presentation

The Military Challenge of Cyber

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

  2. Introductory Comments • Cyberspace is Critical and introduces new Vulnerabilities • Militaries have a Role • They must deal with this new Operating Medium • Information Operations are Intrinsic • Counter-Cyberspace Operations will be crucial

  3. Importance of Cyber • The Importance of Cyberspace • The Cyber Threat • Cyber warfare is asymmetric • The offence has the advantage • A nation needs an attack capability • Threats are not limited to the military

  4. Defining Cyberspace Cyberspace is: A global domain within the information environment whose distinctive and unique character is framed by the use of electronics and the electromagnetic spectrum to create, store, modify, exchange and exploit information via interdependent and interconnected networks using information communication technologies.

  5. Cyberspace Domain Electromagnetic Spectrum Electronic Systems Cyberspace Networked Infrastructure

  6. A Challenge for the Military • Warfighting • Add the domain of cyber • Exploit cyber for defence of the nation • Help with critical infrastructures

  7. Using Cyberspace • To Integrate and Synchronise Operations • To Attack and Defend • To Command and Control

  8. Key Types of Operations • Cyber Defence • Cyber Offence • Situational Awareness

  9. A New Operating Medium • Cyber offers a new Environment for the Militaries of all Nations • This has Implications for New Vulnerabilities and New Targets • Cyber is a Pre-requisite for All Operations • An Adversary Focus is Called for

  10. Counter Cyberspace • Operations conducted to attain and maintain a desired degree of cyberspace control by destroying, degrading, denying, deceiving, disrupting, or exploiting the enemy’s cyberspace capability

  11. Information Operations and Cyberspace • Information Operations • Counter-Information • Offensive • Defensive • ISR • Stealth • Command and Control

  12. Information Operations and Cyberspace • Information Operations • Counter-Information • Offensive • Defensive • ISR • Stealth • Command and Control

  13. Information Operations and Cyberspace • Information Operations • Counter-Information • Offensive • Defensive • ISR • Stealth • Command and Control

  14. China’s INEW • Adopted in 2002 • Aim is to jam, deceive and suppress • And to conduct CNA • Also involves striking sensors and networks • Next step is to leverage non-electronics

  15. Counter-Cyberspace • Cyber Control • Counter-Cyberspace • Cyber Operations • Non-Cyber Operations • Gaining the Advantage

  16. Counter-Cyberspace • Cyber Control • Counter-Cyberspace • Cyber Operations • Non-Cyber Operations • Gaining the Advantage

  17. Conclusion • Cyberspace Activities are Necessary • Greater Expertise is Needed • So is the Need for a More Comprehensive Approach, Tighter Command, and Improved Partnerships • An Edge is Needed • Cyber Must be Secure for Military Operations

  18. Electronic Warfare –Defence Must Lead • Defence needs to lead renewal of EW. • We cannot continue to drift from project-to-project and day-to-day. • Our EW capability must be competitive, reliable, effective and sustainable.

  19. Electronic Warfare –Must Decide EW Value • Defence must decide on the value it places on an effective EW capability for the future, which requires: • agreement on the Defence EW requirement; • better communication and greater engagement; and • an organising principle that directs future activity.

  20. Electronic Warfare –Too Transactional • Current relationship is too transactional. • Technology is volatile and redesigns the EW environment well ahead of Defence’s response.

  21. Electronic Warfare –Relationship-Based • Need relationship-based approach: • Defence (requirements and leadership) • Industry (capacity and capability). • Need Defence-led partnership, transparency, integrating strategy, and focused capability building.

  22. Electronic Warfare –Higher-Order Skills • Without this change we become locked into lower value-add and skill areas. • But trends mean we need to be more agile and better organised. • We need the higher-order skills.

  23. Electronic Warfare • Defence must lead. • Defence must decide on the value it places on EW. • Current relationship is too transactional. • Need relationship-based approach. • Need the higher-order skills.

More Related