the military challenge of cyber aoc talk on cyber, ew and io dr gary waters, 17 april 2012

23
The Military The Military Challenge of Cyber Challenge of Cyber AOC Talk on Cyber, EW and AOC Talk on Cyber, EW and IO IO Dr Gary Waters, 17 April 2012

Upload: esther-litle

Post on 31-Mar-2015

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

The Military Challenge of The Military Challenge of Cyber Cyber

AOC Talk on Cyber, EW and IOAOC Talk on Cyber, EW and IO

Dr Gary Waters, 17 April 2012

Page 2: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Introductory CommentsIntroductory Comments

Cyberspace is Critical and introduces new Cyberspace is Critical and introduces new VulnerabilitiesVulnerabilities

Militaries have a RoleMilitaries have a RoleThey must deal with this new Operating They must deal with this new Operating

MediumMedium Information Operations are IntrinsicInformation Operations are IntrinsicCounter-Cyberspace Operations will be Counter-Cyberspace Operations will be

crucial crucial

Page 3: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Importance of CyberImportance of Cyber

The Importance of CyberspaceThe Importance of CyberspaceThe Cyber ThreatThe Cyber Threat

Cyber warfare is asymmetricCyber warfare is asymmetricThe offence has the advantageThe offence has the advantageA nation needs an attack capabilityA nation needs an attack capabilityThreats are not limited to the militaryThreats are not limited to the military

Page 4: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Defining CyberspaceDefining Cyberspace

Cyberspace is:

A global domain within the information environment whose distinctive and unique character is framed by the use of electronics and the electromagnetic spectrum to create, store, modify, exchange and exploit information via interdependent and interconnected networks using information communication technologies.

Page 5: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Cyberspace DomainCyberspace Domain

Cyberspace

Networked Infrastructure

Electromagnetic Spectrum

ElectronicSystems

Page 6: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

A Challenge for the MilitaryA Challenge for the Military

WarfightingWarfightingAdd the domain of cyberAdd the domain of cyberExploit cyber for defence of the nationExploit cyber for defence of the nationHelp with critical infrastructuresHelp with critical infrastructures

Page 7: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Using CyberspaceUsing Cyberspace

To Integrate and Synchronise OperationsTo Integrate and Synchronise OperationsTo Attack and DefendTo Attack and DefendTo Command and ControlTo Command and Control

Page 8: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Key Types of OperationsKey Types of Operations

Cyber DefenceCyber DefenceCyber OffenceCyber OffenceSituational AwarenessSituational Awareness

Page 9: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

A New Operating MediumA New Operating Medium

Cyber offers a new Environment for the Cyber offers a new Environment for the Militaries of all NationsMilitaries of all Nations

This has Implications for New This has Implications for New Vulnerabilities and New TargetsVulnerabilities and New Targets

Cyber is a Pre-requisite for All OperationsCyber is a Pre-requisite for All OperationsAn Adversary Focus is Called forAn Adversary Focus is Called for

Page 10: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Counter CyberspaceCounter Cyberspace

Operations conducted to attain and Operations conducted to attain and maintain a desired degree of cyberspace maintain a desired degree of cyberspace control by destroying, degrading, denying, control by destroying, degrading, denying, deceiving, disrupting, or exploiting the deceiving, disrupting, or exploiting the enemy’s cyberspace capabilityenemy’s cyberspace capability

Page 11: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Information Operations and Information Operations and CyberspaceCyberspace

Information OperationsInformation OperationsCounter-InformationCounter-Information

OffensiveOffensiveDefensive Defensive

ISRISRStealthStealthCommand and ControlCommand and Control

Page 12: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Information Operations and Information Operations and CyberspaceCyberspace

Information OperationsInformation OperationsCounter-InformationCounter-Information

OffensiveOffensiveDefensive Defensive

ISRISRStealthStealthCommand and ControlCommand and Control

Page 13: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Information Operations and Information Operations and CyberspaceCyberspace

Information OperationsInformation OperationsCounter-InformationCounter-Information

OffensiveOffensiveDefensive Defensive

ISRISRStealthStealthCommand and ControlCommand and Control

Page 14: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

China’s INEWChina’s INEW

Adopted in 2002Adopted in 2002Aim is to jam, deceive and suppressAim is to jam, deceive and suppressAnd to conduct CNAAnd to conduct CNAAlso involves striking sensors and Also involves striking sensors and

networksnetworksNext step is to leverage non-electronicsNext step is to leverage non-electronics

Page 15: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Counter-CyberspaceCounter-Cyberspace

Cyber ControlCyber ControlCounter-CyberspaceCounter-Cyberspace

Cyber OperationsCyber OperationsNon-Cyber OperationsNon-Cyber Operations

Gaining the AdvantageGaining the Advantage

Page 16: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Counter-CyberspaceCounter-Cyberspace

Cyber ControlCyber ControlCounter-CyberspaceCounter-Cyberspace

Cyber OperationsCyber OperationsNon-Cyber OperationsNon-Cyber Operations

Gaining the AdvantageGaining the Advantage

Page 17: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

ConclusionConclusion

Cyberspace Activities are NecessaryCyberspace Activities are Necessary Greater Expertise is NeededGreater Expertise is Needed So is the Need for a More Comprehensive Approach, So is the Need for a More Comprehensive Approach,

Tighter Command, and Improved PartnershipsTighter Command, and Improved Partnerships An Edge is NeededAn Edge is Needed Cyber Must be Secure for Military OperationsCyber Must be Secure for Military Operations

Page 18: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Electronic Warfare –Electronic Warfare –Defence Must LeadDefence Must Lead

Defence needs to lead renewal of Defence needs to lead renewal of EW.EW.

We cannot continue to drift from We cannot continue to drift from project-to-project and day-to-day. project-to-project and day-to-day.

Our EW capability must be Our EW capability must be competitive, reliable, effective and competitive, reliable, effective and sustainable.sustainable.

Page 19: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Electronic Warfare –Electronic Warfare –Must Decide EW ValueMust Decide EW Value

Defence must decide on the value it Defence must decide on the value it places on an effective EW capability for places on an effective EW capability for the future, which requires:the future, which requires:agreement on the Defence EW requirement; agreement on the Defence EW requirement; better communication and greater better communication and greater

engagement; and engagement; and an organising principle that directs future an organising principle that directs future

activity.activity.

Page 20: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Electronic Warfare –Electronic Warfare –Too TransactionalToo Transactional

Current relationship is too Current relationship is too transactional. transactional.

Technology is volatile and redesigns Technology is volatile and redesigns the EW environment well ahead of the EW environment well ahead of Defence’s response.Defence’s response.

Page 21: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Electronic Warfare –Electronic Warfare –Relationship-BasedRelationship-Based

Need relationship-based approach: Need relationship-based approach: Defence (requirements and leadership) Defence (requirements and leadership) Industry (capacity and capability). Industry (capacity and capability).

Need Defence-led partnership, Need Defence-led partnership, transparency, integrating strategy, transparency, integrating strategy, and focused capability building.and focused capability building.

Page 22: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Electronic Warfare –Electronic Warfare –Higher-Order SkillsHigher-Order Skills

Without this change we become Without this change we become locked into lower value-add and skill locked into lower value-add and skill areas.areas.

But trends mean we need to be more But trends mean we need to be more agile and better organised.agile and better organised.

We need the higher-order skills. We need the higher-order skills.

Page 23: The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012

Electronic Warfare Electronic Warfare

Defence must lead.Defence must lead.Defence must decide on the value it Defence must decide on the value it

places on EW. places on EW. Current relationship is too transactional.Current relationship is too transactional.Need relationship-based approach.Need relationship-based approach.Need the higher-order skills.Need the higher-order skills.