1 / 23

C4ISR and Information Warfare

C4ISR and Information Warfare. Naval Weapons Systems. Putting It All Together - C 4 ISR. Command. Computers. C 4 ISR. Surveillance. Reconnaissance. Control. Intelligence. Communications. Why We Need C 4 ISR. Faster response times required.

Download Presentation

C4ISR and Information Warfare

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. C4ISR and Information Warfare Naval Weapons Systems

  2. Putting It All Together - C4ISR Command Computers C4ISR Surveillance Reconnaissance Control Intelligence Communications

  3. Why We Need C4ISR Faster response times required. Joint Operations require high levels of coordination. More sophisticated weapons require more information.

  4. Functions of C4I • Creates a common tactical picture. Ensures all information is available to operators & commanders. • Ensures connectivity and information exchange. • Sends information directly from sensor to shooter. • Supports and uses information warfare (IW).

  5. C4ISR Supports At All Levels • Watchstanders • Composite Warfare Commander • Commander of the JTF • The Shore Commanders • NCA

  6. Command and Control Warfare Objectives: 1. Defeat the enemy by destroying its C2W systems. 2. Separate the enemy’s command structure from its forces. 3. Protect one’s own C2W forces. 4. Connect commanders and forces.

  7. Tools to Achieve C2W Objectives • Operational Security • Military Deception • Psychological Operations • Electronic Warfare • Physical Destruction

  8. C2W Decision Making Cycle Observe Orient Act Decide (OODA loop)

  9. Intelligence “No such thing as Military Intelligence”

  10. Intelligence Product of collecting, exploiting, processing, integrating, analyzing and interpreting information. Types: 1. Strategic Intelligence 2. Operational Intelligence 3. Tactical Intelligence

  11. Function of Intelligence • Prepare the Battle space • Define environment or physical characteristics. • Evaluate the threat and the threat’s course of action. • Provide Early Warning • Evaluate the situation (current actions & changes)

  12. Function of Intelligence cont. • Identify and Target the Enemy’s Vulnerabilities • Assess Battle Damage (own and enemy’s) • Manage Intelligence Information • Prevent Enemy’s Intelligence Efforts (Offensive & Defensive)

  13. Information Warfare (IW) IW is action taken to preserve the integrity of own information systems from exploitation, disruption, and destruction while achieving an information advantage over the enemy.

  14. IW Tools • Surveillance Systems • Satellites • Electronic Warfare and Signal Intelligence • Human Intelligence • Communications Systems • Tactical Network • Computers • Database management

  15. Radio frequency use • LF (Low Freq) • HF (High Freq) • VHF (Very High Freq) • UHF (Ultra High Freq)

  16. Bandwidth • Real-Time COMMS • Multiple uses of Information: • VOICE • VIDEO • DATA • SENSOR • Simultaneously transmitted • SHF / EHF

  17. Navy Tactical Data System (NTDS) Interceptor Interceptor Early Warning Aircraft Link 4A Link 4A Link 11 Link 11 Link 14 NTDS Ship Non-NTDS Ship NTDS Ship

  18. Advanced Combat Direction System • Follow on to NTDS • Incorporates various communication circuits into one unified system

  19. Communications Security Protection resulting from all measures designed to deny unauthorized persons information and the possession of telecommunications data. Called CMS. Elements: Crypto Security Transmission Security Emission Security Physical Security

  20. Computer Requirements • Sort, process, organize, correlate, and disseminate information in near real-time. • Blend critical tactical, operational and administrative data to meet tactical objectives. • Present information in a multi-media format to best suit the operator or equipment • I.E. – The Captain / Admiral

  21. Computer Requirements • Have standardized equipment to reduce training and increase proficiency • Have standardized hardware and software design to allow upgrade and additions to equipment. MICROSOFT!!

  22. Inherent Problems With Automated Systems 1. Evaluation 2. Orientation 3. Cost 4. Decision Making 5. Discipline 6. Survivability

  23. Questions?

More Related