1 / 36

Information Warfare

Information Warfare. Full Spectrum Information Operations. http://www.globetranz.com/iw.html. “War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting. This seminar is based upon the paper: “Full Spectrum Information Operations”.

Download Presentation

Information Warfare

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Warfare Full Spectrum Information Operations http://www.globetranz.com/iw.html

  2. “War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting. This seminar is based upon the paper: “Full Spectrum Information Operations” http://www.globetranz.com/iw.html

  3. Nelsonah@globetranz.com

  4. “… Gain leverage through a decisive advantage, … fight asymmetrically, … surprise the enemy, … shock the enemy …” FMFM 1-3, TACTICS.

  5. “…the object of war is to impose our will on our enemy. The means to that end is the organized application or threat of violence by military force.” FMFM 1, Warfighting.

  6. “Drastic changes in the nature of war are the result of developments that dramatically upset the equilibrium of war…” FMFM 1, Warfighting.

  7. “…You achieve a decision by the focus of effort. The focus of effort is the Commander’s bid to achieve a decision; he works to ensure all his forces and assets support it…” FMFM 1, Warfighting.

  8. “… Gain leverage through a decisive advantage, … fight asymmetrically, … surprise the enemy, … shock the enemy …” FMFM 1-3, TACTICS.

  9. “Drastic changes in the nature of war are the result of developments that dramatically upset the equilibrium of war… ” FMFM 1, Warfighting.

  10. “We must stay abreast of this process of change, for the belligerent who first exploits a development in the art and science of war gains a significant, if not decisive, advantage.” FMFM 1, Warfighting.

  11. “Conversely, if we are ignorant of the changing face of war, we will find ourselves unequal to its challenges.” FMFM 1, Warfighting.

  12. “War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting.

  13. “War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting.

  14. “War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting. • The Violence need not be physical. • Physical, cybernetic, and moral levels. • This is a departure from a pure Clausewitzian view. • Information Age Warfare requires leaders, sensors, processors, transmitters, information and shooters. • IW Targets leaders, sensors, processors, transmitters,information and shooters.

  15. “War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting.

  16. “Positions are seldom lost because they have been destroyed, but almost invariably because the leader has decided in his own mind that the position cannot be held.” FMFM 1, Warfighting.

  17. “Attack the enemy’s reflexive image; defend the higher rank of reflection; break his will to resist; protect your own. Force your will upon his.” The Art of Information War.

  18. “Attack the enemy’s reflexive image; defend the higher rank of reflection; break his will to resist; protect your own. Force your will upon his.” The Art of Information War.

  19. “Attack the enemy’s reflexive image; defend the higher rank of reflection; break his will to resist; protect your own. Force your will upon his.” The Art of Information War.

  20. “Generally in Information War the ideal policy is to take a state intact. To use even on round of advanced conventional munition is inferior to this” The Art of Information War.

  21. “Thus, the object of war is to impose our will on our enemy. The means to that end is the organized application or threat of violence by military force.” FMFM 1, Warfighting. UnClassified

  22. Global Information GridExisting IA Centers CONUS Infrastructure & Reachback NIPC DoD CERT NSA GII JTF-CND Joint Staff IA Centers of Excellence Theater Infrastructure & Reachback GNOSC IA Reserve Units Intel Centers Service CERTs RCERT Camps, Posts, Stations CINC Service IWCs RNOSC Deployed Warfighters Log & Support Depots CONUS Internet & Public ATM Infrastructure Gateway Routers & Switches Intermediate Support Bases Camps, Posts, Stations Service Components TCCC JCCC Key: OCONUS Internet & Public ATM Infrastructure XXXX = Centers for the monitoring & protection of Joint and Services’ Capabilities on the Global Information Grid (GIG) Note: Bastion Defense (e.g., firewalls) at all sites

  23. Command And Control Warfare Pillars • OPSEC • Deception • Psyops • Electronic Warfare • Destruction • Information Superiority

  24. National Need • There have been several embarrassingly simple attacks that have resulted in significant damage that show that the current approaches are not adequate. • There is reason to believe that both criminal elements and our national adversaries view this area as a highly cost-effective way of confronting the U.S. without coming into direct contact with U.S. legal, political, and military power. • The role of Information Technology (IT) in supporting key economic, political and military operations becomes continually more critical, which simultaneously creates a new ‘battle’ space . . • that in many ways is different than traditional battle spaces. • Consequently, it is urgent to explore organizational adjustments and structures, policies, concepts of operations, and technologies to address this new form of national competion.

  25. Long Term National Objectives • Develop technologies policies and procedures for the Secret Service, FBI, Department of Commerce, SPACECOM, the JTF-CND, and NSA to create the ability to ‘flag’ and protect United States Owned Global E-commerce. • Create Predictive, not reactive, security intrusion and detection mechanism to avert criminal misappropriation, cyber terrorism and foreign adversary attacks, in such a way as to preserve and protect constitutionally guaranteed freedoms. • Create the first Virtual Organization for a Commerce Attack Response Team ( CART ) • Create tools and methodologies to determine origination, transit path, and destination of critical electronic commerce transactions, TranSource (transactional sourcing)

  26. The Requirement • Understand the Cyber Battlespace • At once . . . instantaneous and time extended . . . local and global • Develop Cyber Defensive Tools and the Culture to match • Provide a carefully-limited, “autonomic response” as close to the sources of the action as possible • Detect anomalies in the critical data and functions that we wish to assure, and respond • cueing/cross-cueing, attacker ID, path tracing, target illumination & correlation, honey pot diversion, attack rate limiting or blocking within the protected enclave • Develop a CONOPS to bring decision makers into the detection, localization & containment process faster • Technical Revolutions - Technology, Concepts, Organizations.

  27. Operational & System Model IA Response Augmentation to develop and validate response strategies Critical Functions instrumented for anomaly detection • Operational Model • Clusters of responders constituted dynami-cally in response to critical missions, events • Rapid, informal communication to augment traditional hierarchical reporting. Damage can occur in seconds to minutes • Cyber-warrior must be a technical expert on cyber tactics and cyber-operations in this new battlespace • System Model • Virtual shared dataspaces constituted dynamically to share intrusion data, assessment, trace info, system status • Distributed smart agents for detection, analysis, agent-to-agent notification, reaction … enabled for “first response” to multiple, simultaneous attacks • Remote sensors to include present sensor systems, plus anomaly-based sensors and capability to act as response agents Rapid response Anomaly detection Autonomic Response Immediate response critical systems critical information critical networks

  28. “War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting. This seminar is based upon the paper: “Full Spectrum Information Operations” http://www.globetranz.com/iw.html

More Related