The Military The Military Challenge of Cyber Challenge of Cyber AOC Talk on Cyber, EW and AOC Talk on Cyber, EW and IO IO Dr Gary Waters, 17 April 2012
The Military Challenge of The Military Challenge of Cyber Cyber
AOC Talk on Cyber, EW and IOAOC Talk on Cyber, EW and IO
Dr Gary Waters, 17 April 2012
Introductory CommentsIntroductory Comments
Cyberspace is Critical and introduces new Cyberspace is Critical and introduces new VulnerabilitiesVulnerabilities
Militaries have a RoleMilitaries have a RoleThey must deal with this new Operating They must deal with this new Operating
MediumMedium Information Operations are IntrinsicInformation Operations are IntrinsicCounter-Cyberspace Operations will be Counter-Cyberspace Operations will be
crucial crucial
Importance of CyberImportance of Cyber
The Importance of CyberspaceThe Importance of CyberspaceThe Cyber ThreatThe Cyber Threat
Cyber warfare is asymmetricCyber warfare is asymmetricThe offence has the advantageThe offence has the advantageA nation needs an attack capabilityA nation needs an attack capabilityThreats are not limited to the militaryThreats are not limited to the military
Defining CyberspaceDefining Cyberspace
Cyberspace is:
A global domain within the information environment whose distinctive and unique character is framed by the use of electronics and the electromagnetic spectrum to create, store, modify, exchange and exploit information via interdependent and interconnected networks using information communication technologies.
Cyberspace DomainCyberspace Domain
Cyberspace
Networked Infrastructure
Electromagnetic Spectrum
ElectronicSystems
A Challenge for the MilitaryA Challenge for the Military
WarfightingWarfightingAdd the domain of cyberAdd the domain of cyberExploit cyber for defence of the nationExploit cyber for defence of the nationHelp with critical infrastructuresHelp with critical infrastructures
Using CyberspaceUsing Cyberspace
To Integrate and Synchronise OperationsTo Integrate and Synchronise OperationsTo Attack and DefendTo Attack and DefendTo Command and ControlTo Command and Control
Key Types of OperationsKey Types of Operations
Cyber DefenceCyber DefenceCyber OffenceCyber OffenceSituational AwarenessSituational Awareness
A New Operating MediumA New Operating Medium
Cyber offers a new Environment for the Cyber offers a new Environment for the Militaries of all NationsMilitaries of all Nations
This has Implications for New This has Implications for New Vulnerabilities and New TargetsVulnerabilities and New Targets
Cyber is a Pre-requisite for All OperationsCyber is a Pre-requisite for All OperationsAn Adversary Focus is Called forAn Adversary Focus is Called for
Counter CyberspaceCounter Cyberspace
Operations conducted to attain and Operations conducted to attain and maintain a desired degree of cyberspace maintain a desired degree of cyberspace control by destroying, degrading, denying, control by destroying, degrading, denying, deceiving, disrupting, or exploiting the deceiving, disrupting, or exploiting the enemy’s cyberspace capabilityenemy’s cyberspace capability
Information Operations and Information Operations and CyberspaceCyberspace
Information OperationsInformation OperationsCounter-InformationCounter-Information
OffensiveOffensiveDefensive Defensive
ISRISRStealthStealthCommand and ControlCommand and Control
Information Operations and Information Operations and CyberspaceCyberspace
Information OperationsInformation OperationsCounter-InformationCounter-Information
OffensiveOffensiveDefensive Defensive
ISRISRStealthStealthCommand and ControlCommand and Control
Information Operations and Information Operations and CyberspaceCyberspace
Information OperationsInformation OperationsCounter-InformationCounter-Information
OffensiveOffensiveDefensive Defensive
ISRISRStealthStealthCommand and ControlCommand and Control
China’s INEWChina’s INEW
Adopted in 2002Adopted in 2002Aim is to jam, deceive and suppressAim is to jam, deceive and suppressAnd to conduct CNAAnd to conduct CNAAlso involves striking sensors and Also involves striking sensors and
networksnetworksNext step is to leverage non-electronicsNext step is to leverage non-electronics
Counter-CyberspaceCounter-Cyberspace
Cyber ControlCyber ControlCounter-CyberspaceCounter-Cyberspace
Cyber OperationsCyber OperationsNon-Cyber OperationsNon-Cyber Operations
Gaining the AdvantageGaining the Advantage
Counter-CyberspaceCounter-Cyberspace
Cyber ControlCyber ControlCounter-CyberspaceCounter-Cyberspace
Cyber OperationsCyber OperationsNon-Cyber OperationsNon-Cyber Operations
Gaining the AdvantageGaining the Advantage
ConclusionConclusion
Cyberspace Activities are NecessaryCyberspace Activities are Necessary Greater Expertise is NeededGreater Expertise is Needed So is the Need for a More Comprehensive Approach, So is the Need for a More Comprehensive Approach,
Tighter Command, and Improved PartnershipsTighter Command, and Improved Partnerships An Edge is NeededAn Edge is Needed Cyber Must be Secure for Military OperationsCyber Must be Secure for Military Operations
Electronic Warfare –Electronic Warfare –Defence Must LeadDefence Must Lead
Defence needs to lead renewal of Defence needs to lead renewal of EW.EW.
We cannot continue to drift from We cannot continue to drift from project-to-project and day-to-day. project-to-project and day-to-day.
Our EW capability must be Our EW capability must be competitive, reliable, effective and competitive, reliable, effective and sustainable.sustainable.
Electronic Warfare –Electronic Warfare –Must Decide EW ValueMust Decide EW Value
Defence must decide on the value it Defence must decide on the value it places on an effective EW capability for places on an effective EW capability for the future, which requires:the future, which requires:agreement on the Defence EW requirement; agreement on the Defence EW requirement; better communication and greater better communication and greater
engagement; and engagement; and an organising principle that directs future an organising principle that directs future
activity.activity.
Electronic Warfare –Electronic Warfare –Too TransactionalToo Transactional
Current relationship is too Current relationship is too transactional. transactional.
Technology is volatile and redesigns Technology is volatile and redesigns the EW environment well ahead of the EW environment well ahead of Defence’s response.Defence’s response.
Electronic Warfare –Electronic Warfare –Relationship-BasedRelationship-Based
Need relationship-based approach: Need relationship-based approach: Defence (requirements and leadership) Defence (requirements and leadership) Industry (capacity and capability). Industry (capacity and capability).
Need Defence-led partnership, Need Defence-led partnership, transparency, integrating strategy, transparency, integrating strategy, and focused capability building.and focused capability building.
Electronic Warfare –Electronic Warfare –Higher-Order SkillsHigher-Order Skills
Without this change we become Without this change we become locked into lower value-add and skill locked into lower value-add and skill areas.areas.
But trends mean we need to be more But trends mean we need to be more agile and better organised.agile and better organised.
We need the higher-order skills. We need the higher-order skills.
Electronic Warfare Electronic Warfare
Defence must lead.Defence must lead.Defence must decide on the value it Defence must decide on the value it
places on EW. places on EW. Current relationship is too transactional.Current relationship is too transactional.Need relationship-based approach.Need relationship-based approach.Need the higher-order skills.Need the higher-order skills.