1 / 24

C4ISR and Information Warfare

C4ISR and Information Warfare. Naval Weapons Systems. Putting It All Together - C 4 I SR. Command. Computers. C 4 ISR. Surveillance. Reconnaissance. Control. Intelligence. Communications. Why We Need C 4 ISR. Faster response times required.

kai-rosario
Download Presentation

C4ISR and Information Warfare

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. C4ISR and Information Warfare Naval Weapons Systems

  2. Putting It All Together - C4ISR Command Computers C4ISR Surveillance Reconnaissance Control Intelligence Communications

  3. Why We Need C4ISR Faster response times required. Joint Operations require high levels of coordination. More sophisticated weapons require more information.

  4. Functions of C4I • Creates a common tactical picture. Ensures all information is available to operators & commanders. • Ensures connectivity and information exchange. • Directly links the sensor to the shooter. • Supports and uses information warfare (IW).

  5. C4ISR Supports At All Levels • Watchstanders • Composite Warfare Commander • Commander of the JTF • The Shore Commanders

  6. Command and Control Warfare Objectives: 1. Defeat the enemy by destroying its C2W systems. 2. Separate the enemy’s command structure from its forces. 3. Protect one’s own C2W forces. 4. Connect commanders and forces.

  7. Tools to Achieve C2W Objectives • Operational Security • Military Deception • Psychological Operations • Electronic Warfare • Physical Destruction

  8. C2W Decision Making Cycle Observe Orient Act Decide (OODA loop)

  9. Intelligence “There are 3 kinds of people: those who can count & those who can't”

  10. Intelligence Product of collecting, exploiting, processing, integrating, analyzing and interpreting information. Types: 1. Strategic Intelligence 2. Operational Intelligence 3. Tactical Intelligence

  11. Function of Intelligence • Prepare the Battle space • Define environment or physical characteristics. • Evaluate the threat and determine threat’s course of action. • Provide Early Warning • Evaluate the situation (current actions & changes)

  12. Function of Intelligence cont. • Identify and Target the Enemy’s Vulnerabilities • Assess Battle Damage (own and enemy’s) • Manage Intelligence Information • Prevent Enemy’s Intelligence Efforts (Offensive & Defensive)

  13. Information Warfare (IW) IW is action taken to preserve the integrity of own information systems from exploitation, disruption, and destruction while achieving an information advantage over the enemy.

  14. IW Tools • Surveillance Systems • Satellites • EW and SIGINT • HUMINT • Communications Systems • Tactical Network • Computers • Database management

  15. Offensive - Opportunities • Degrade or exploit enemy’s collection or use of information • “Antihead” – traditional means of removing commander or command center • “Antineck” – nontraditional method of cutting enemy’s communications

  16. Defensive - Vulnerabilities • Protection of our ability to conduct information operations • Physical security • Encryption • Antivirus • Secure data transmissions

  17. Navy Tactical Data System (NTDS) Interceptor Interceptor Early Warning Aircraft Link 4A Link 4A Link 11 Link 11 Link 14 NTDS Ship Non-NTDS Ship NTDS Ship

  18. Advanced Combat Direction System • Follow on to NTDS • Incorporates various communication circuits into one unified system

  19. Communications Security Protection resulting from all measures designed to deny unauthorized persons information and the possession of telecommunications data. Called CMS. Elements: Crypto Security Transmission Security Emission Security Physical Security

  20. Computers • Information Management – ensures quality of information • Sort, process, organize, correlate, and disseminate information • Real time

  21. Computer Requirements • Blend critical tactical, operational, and administrative data • Deliver rapid information to operational commanders • Multimedia format (to suit) • Standardized equipment • Standardized hardware (upgrade/additions)

  22. Space and EW • Space Dominance • Integral to strategic and tactical command and control architecture • How is C4I delivered? • Opportunities • Communication • UHF Satellite – nav, surveillance, ID, track • SHF/EHF Satellite – scintillation • Sensing/Surveillance • Missile attack warning (IR sensors)

  23. Mission Planning • Meteorological data • Preview lay of the land • Terrain • Ocean depth • Shoreline characteristics • Vehicle/aircraft/ship locations

  24. Questions?

More Related