information warfare
DESCRIPTION
Information Warfare. Full Spectrum Information Operations. http://www.globetranz.com/iw.html. “War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting. This seminar is based upon the paper: “Full Spectrum Information Operations”. - PowerPoint PPT PresentationTRANSCRIPT
Information Warfare
Full Spectrum Information OperationsFull Spectrum Information Operations
http://www.globetranz.com/iw.htmlhttp://www.globetranz.com/iw.html
2
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
http://www.globetranz.com/iw.html
“War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting.
This seminar is based upon the paper:
“Full Spectrum Information Operations”
3
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
[email protected]@globetranz.com
4
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“… Gain leverage through a decisive advantage, … fight asymmetrically, … surprise the enemy, … shock the enemy
…” FMFM 1-3, TACTICS.
5
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“…the object of war is to impose our will on our enemy. The means to that end is the organized application or threat of violence by military force.” FMFM 1,
Warfighting.
6
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“Drastic changes in the nature of war are the result of developments that dramatically upset the equilibrium of war…” FMFM 1, Warfighting.
7
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“…You achieve a decision by the focus of effort. The focus of effort is the Commander’s bid to achieve a decision; he works to ensure all his forces and
assets support it…” FMFM 1, Warfighting.
8
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“… Gain leverage through a decisive advantage, … fight asymmetrically, … surprise the enemy, … shock the enemy
…” FMFM 1-3, TACTICS.
9
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“Drastic changes in the nature of war are the result of developments that dramatically upset the equilibrium of war… ” FMFM 1, Warfighting.
10
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“We must stay abreast of this process of change, for the belligerent who first exploits a development in the art and science of war gains a significant, if not
decisive, advantage.” FMFM 1, Warfighting.
11
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“Conversely, if we are ignorant of the changing face of war, we will find ourselves unequal to its challenges.” FMFM 1, Warfighting.
12
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting.
13
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting.
14
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting.
• The Violence need not be physical. – Physical, cybernetic, and moral levels.– This is a departure from a pure Clausewitzian
view.– Information Age Warfare requires leaders,
sensors, processors, transmitters, information and shooters.
– IW Targets leaders, sensors, processors, transmitters,information and shooters.
15
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting.
16
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“Positions are seldom lost because they have been destroyed, but almost invariably because the leader has decided in his own mind that the position
cannot be held.” FMFM 1, Warfighting.
17
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
18
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“Attack the enemy’s reflexive image; defend the higher rank of reflection; break his will to resist; protect your own.
Force your will upon his.” The Art of Information War.
19
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“Attack the enemy’s reflexive image; defend the higher rank of reflection; break his will to resist; protect your own.
Force your will upon his.” The Art of Information War.
20
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“Attack the enemy’s reflexive image; defend the higher rank of reflection; break his will to resist; protect your own.
Force your will upon his.” The Art of Information War.
21
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
“Generally in Information War the ideal policy is to take a state intact. To use even on round of advanced conventional
munition is inferior to this” The Art of Information War.
22
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
23
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
24
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
25
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified
“Thus, the object of war is to impose our will on our enemy. The means to that end is the organized application or threat
of violence by military force.” FMFM 1, Warfighting.
26
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
Gateway Gateway Routers Routers
& Switches & Switches
Global Information GridExisting IA Centers
DeployedDeployedWarfightersWarfighters
TheaterTheaterInfrastructureInfrastructure& Reachback& Reachback
CONUSCONUSInfrastructureInfrastructure& Reachback& ReachbackGIIGIIGIIGII
DoD CERTDoD CERT
Service CERTsService CERTs
JCCCJCCC
TCCCTCCC
RNOSCRNOSC
GNOSCGNOSCIA CentersIA Centers
of Excellenceof Excellence
NIPCNIPC
JTF-CNDJTF-CND
RCERTRCERT
IA ReserveIA ReserveUnitsUnits
NSANSA
Service IWCsService IWCs
CINCCINC
Joint StaffJoint Staff
Camps, Posts,Camps, Posts,StationsStations
Log & SupportLog & SupportDepotsDepots
IntermediateIntermediateSupport BasesSupport Bases
Camps, Posts,Camps, Posts,StationsStations
ServiceServiceComponentsComponents
IntelIntelCentersCenters
XXXXXXXX
Key:Key:
= Centers for the monitoring & protection= Centers for the monitoring & protection of Joint and Services’ Capabilities on theof Joint and Services’ Capabilities on the Global Information Grid (GIG)Global Information Grid (GIG) Note: Bastion Defense (e.g., firewalls) at Note: Bastion Defense (e.g., firewalls) at allall sites sites
CONUS CONUS Internet & Public Internet & Public
ATM InfrastructureATM Infrastructure
OCONUS Internet & PublicOCONUS Internet & PublicATM InfrastructureATM Infrastructure
27
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
28
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
Command And Control Warfare Pillars
• OPSEC
• Deception
• Psyops
• Electronic Warfare
• Destruction
• Information Superiority
29
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
30
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
31
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
32
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
National Need
• There have been several embarrassingly simple attacks that have resulted in significant damage that show that the current approaches are not adequate.
• There is reason to believe that both criminal elements and our national adversaries view this area as a highly cost-effective way of confronting the U.S. without coming into direct contact with U.S. legal, political, and military power.
• The role of Information Technology (IT) in supporting key economic, political and military operations becomes continually more critical, which simultaneously creates a new ‘battle’ space . .
that in many ways is different than traditional battle spaces.
• Consequently, it is urgent to explore organizational adjustments and structures, policies, concepts of operations, and technologies to address this new form of national competion.
33
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
Long Term National Objectives
• Develop technologies policies and procedures for the Secret Service, FBI, Department of Commerce, SPACECOM, the JTF-CND, and NSA to create the ability to ‘flag’ and protect United States Owned Global E-commerce.
• Create Predictive, not reactive, security intrusion and detection mechanism to avert criminal misappropriation, cyber terrorism and foreign adversary attacks, in such a way as to preserve and protect constitutionally guaranteed freedoms.
• Create the first Virtual Organization for a Commerce Attack Response Team ( CART )
• Create tools and methodologies to determine origination, transit path, and destination of critical electronic commerce transactions, TranSource (transactional sourcing)
34
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
The Requirement
• Understand the Cyber Battlespace– At once . . . instantaneous and time extended
. . . local and global• Develop Cyber Defensive Tools and the Culture to match
– Provide a carefully-limited, “autonomic response” as close to the sources of the action as possible
– Detect anomalies in the critical data and functions that we wish to assure, and respond
• cueing/cross-cueing, attacker ID, path tracing, target illumination & correlation, honey pot diversion, attack rate limiting or blocking within the protected enclave
– Develop a CONOPS to bring decision makers into the detection, localization & containment process faster
Technical Revolutions - Technology, Concepts, Organizations.
35
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
Operational & System Model
• Operational Model– Clusters of responders constituted dynami-
cally in response to critical missions, events– Rapid, informal communication to augment
traditional hierarchical reporting. Damage can occur in seconds to minutes
– Cyber-warrior must be a technical expert on cyber tactics and cyber-operations in this new battlespace
• System Model– Virtual shared dataspaces constituted
dynamically to share intrusion data, assessment, trace info, system status
– Distributed smart agents for detection, analysis, agent-to-agent notification, reaction … enabled for “first response” to multiple, simultaneous attacks
– Remote sensors to include present sensor systems, plus anomaly-based sensors and capability to act as response agents
criticalcriticalsystemssystemscriticalcritical
informationinformation criticalcriticalnetworksnetworks
CriticalFunctions
instrumentedfor anomaly
detection
Anomalydetection
AutonomicResponse
IA ResponseAugmentationto develop and
validate responsestrategies
Rapid responseRapid response
Immediate responseImmediate response
36
UnClassifiedUnClassified UnClassifiedUnClassified
UnClassifiedUnClassified UnClassifiedUnClassified
http://www.globetranz.com/iw.html
“War is an act of violence based upon irreconcilable disagreement” FMFM 1, Warfighting.
This seminar is based upon the paper:
“Full Spectrum Information Operations”