
5cb585388dbd2d74e598b223af08a5a1.ppt
- Количество слайдов: 24
C 4 ISR and Information Warfare Naval Weapons Systems
Putting It All Together - C 4 ISR Command Surveillance Computers C 4 ISR Control Reconnaissance Intelligence Communications
Why We Need Faster response times required. Joint Operations require high levels of coordination. More sophisticated weapons require more information. 4 ISR C
Functions of C 4 I n n Creates a common tactical picture. Ensures all information is available to operators & commanders. Ensures connectivity and information exchange. Directly links the sensor to the shooter. Supports and uses information warfare (IW).
C 4 ISR Supports At All Levels Watchstanders n Composite Warfare Commander n Commander of the JTF n The Shore Commanders n
Command Control Warfare Objectives: 1. Defeat the enemy by destroying its C 2 W systems. 2. Separate the enemy’s command structure from its forces. 3. Protect one’s own C 2 W forces. 4. Connect commanders and forces.
Tools to Achieve C 2 W Objectives n n n Operational Security Military Deception Psychological Operations Electronic Warfare Physical Destruction
C 2 W Decision Making Cycle Observe Orient Act Decide (OODA loop)
Intelligence “There are 3 kinds of people: those who can count & those who can't”
Intelligence Product of collecting, exploiting, processing, integrating, analyzing and interpreting information. Types: 1. Strategic Intelligence 2. Operational Intelligence 3. Tactical Intelligence
Function of Intelligence n Prepare the Battle space • Define environment or physical characteristics. • Evaluate threat and determine threat’s course of action. n n Provide Early Warning Evaluate the situation (current actions & changes)
Function of Intelligence cont. n n Identify and Target the Enemy’s Vulnerabilities Assess Battle Damage (own and enemy’s) Manage Intelligence Information Prevent Enemy’s Intelligence Efforts (Offensive & Defensive)
Information Warfare (IW) IW is action taken to preserve the integrity of own information systems from exploitation, disruption, and destruction while achieving an information advantage over the enemy.
IW Tools n Surveillance Systems • Satellites • EW and SIGINT • HUMINT n n Communications Systems Tactical Network • Computers • Database management
Offensive - Opportunities n Degrade or exploit enemy’s collection or use of information • “Antihead” – traditional means of removing commander or command center • “Antineck” – nontraditional method of cutting enemy’s communications
Defensive - Vulnerabilities n Protection of our ability to conduct information operations • Physical security • Encryption • Antivirus • Secure data transmissions
Navy Tactical Data System (NTDS) Interceptor Early Warning Aircraft Link 4 A Link 11 NTDS Ship Link 14 11 NTDS Ship Non-NTDS Ship
Advanced Combat Direction System Follow on to NTDS n Incorporates various communication circuits into one unified system n
Communications Security Protection resulting from all measures designed to deny unauthorized persons information and the possession of telecommunications data. Called CMS. Elements: Crypto Security Transmission Security Emission Security Physical Security
Computers n Information Management – ensures quality of information • Sort, process, organize, correlate, and disseminate information n Real time
Computer Requirements n n n Blend critical tactical, operational, and administrative data Deliver rapid information to operational commanders Multimedia format (to suit) Standardized equipment Standardized hardware (upgrade/additions)
Space and EW n Space Dominance • Integral to strategic and tactical command control architecture • How is C 4 I delivered? n Opportunities • Communication UHF Satellite – nav, surveillance, ID, track n SHF/EHF Satellite – scintillation n • Sensing/Surveillance n Missile attack warning (IR sensors)
Mission Planning n n Meteorological data Preview lay of the land • • Terrain Ocean depth Shoreline characteristics Vehicle/aircraft/ship locations
Questions?