SlideShare a Scribd company logo
CEMA and Information Manoeuvre in the A2/AD
Battlespace
6th June 2018
Sam Qaisar
Capability Engineer (TVACD/RF Cyber)
2
© 2018 Leonardo MW Ltd – All rights reserved
Information Warfare
• Adversarial pursuit of a competitive information advantage
• Typically seeks to degrade, remove, or control an adversary’s situational awareness
CommsC2 Nodes
Sensors Doctrine
Key
Personnel
Information
Processing
3
© 2018 Leonardo MW Ltd – All rights reserved
Information Manoeuvre (1)
• Need to find a way to integrate Information Warfare into existing warfighting doctrine
• In particular, we must link Information Warfare to the physical domain
• The current model focusses on kinetic effects and manoeuvre in the physical domain
• This not sufficient for future operating environments
Fire
Offensive
Support
Physical
Manoeuvre
4
© 2018 Leonardo MW Ltd – All rights reserved
Information Manoeuvre (2)
• As a result, Information Manoeuvre is currently very poorly integrated into many armed forces
• There are two main approaches:
Intelligence
• Identify enemy dispositions and intent
• Predict and manipulate future behaviour
Plans
• Generate decision points
• Use of deception plans
Execution
• Information and sensor feeds back to intelligence
function to help refine future plans
Planning Focussed or “J25” Approach
Intelligence
•Identify weaknesses in enemy doctrine
and processes
Targeting
•Exploit weaknesses to identify and
target positions of enemy units
Execution
•Destruction of enemy using fires
•Create maximum confusion to degrade
enemy response
Targeting Focussed or “J23” Approach
5
© 2018 Leonardo MW Ltd – All rights reserved
Information Manoeuvre (3)
• Neither implementations is sufficient
• “Planning focussed” – too rigid and slow, unable to seize the initiative
• “Targeting focussed” – unable to turn tactical success into strategic victory
• Both implementations suffer from being “enemy focussed” and reliant on kinetic effects
• A better approach is to apply the principles of manoeuvre warfare and develop an “effects
focussed” method that can operate at all levels in the information domain
• Delay decision making
• Degrade situational awareness
• Deny sensor feeds
6
© 2018 Leonardo MW Ltd – All rights reserved
Cyber Electromagnetic Activity (CEMA)
• These effects can be achieved through the use of electronic warfare and cyber techniques
• The integration of these techniques is referred to as Cyber Electromagnetic Activity (CEMA)
• CEMA can be used to attack almost any piece of equipment with a sensor or communications link
• Allows military units to manoeuvre through the information domain in a similar manner to the
physical domain
• Particularly useful in environments with highly networked threat systems and sensors
• CEMA is not an “all in one” solution to information manoeuvre, but offers very good capability that
maps well to existing tactics and doctrine
7
© 2018 Leonardo MW Ltd – All rights reserved
Anti-Access/Area-Denial (A2AD) Environments
• Many nations are developing Anti-Access/Area-Denial capabilities. China is a good example
• Dense threat environment of air defence assets, cruise missiles, warships, aircraft, and satellites
• Threat environment is dense and unpredictable, unable to plan for every eventuality or destroy
every enemy asset
• Extensive use of networking and sensors allows A2AD environment to react quickly
• Use CEMA to attack the network rather than the individual nodes
Image taken from IISS
8
© 2018 Leonardo MW Ltd – All rights reserved
Implementing a CEMA Capability
• Counter-A2AD warfighting is expeditionary
• Low combat mass
• Long supply lines
• Limited ISTAR
• Advantageous to have maximum capability per platform, and mutually reinforcing capabilities
• Ideally, CEMA capability should be:
• Distributed
• Networked
• Re-taskable
• Planned for at the highest level, and enabled at the lowest level
• The use of CEMA in A2AD therefore allows for increased:
• Operational effect from each platform
• Survivability of platforms and formations
• Tempo and mission coverage
9
© 2018 Leonardo MW Ltd – All rights reserved
Using CEMA in A2AD Environments
• Attack strategic ISTAR collection capabilities (satellites, comms, open source, sensors)
• Enemy will struggle to deploy appropriate troops or conduct strategic fires
• Electronic deception to create fake troop positions or spoof equipment signatures
• Difficult to identify real targets and their associated equipment
• Deploy offensive CEMA payloads against enemy comms networks
• Slower decision making, degrade sensor fusion between networked equipment
• Self protection CEMA capabilities to enhance platform survivability
• Unable to reliably detect or engage targets
• Attack of key equipment and network nodes using CEMA and kinetic effects (network based targeting) in order to
degrade situational awareness
• Disproportionate degradation of A2AD network and loss of freedom of manoeuvre
• Kinetic strikes against military targets
• Manipulation of sensors, comms, and open source to prevent accurate enemy damage assessment
• Over/under commitment of forces in response to attack
STRATEGIC
TACTICAL
Enduring
tasks
On
demand/
Mission
specific
tasks
10
© 2018 Leonardo MW Ltd – All rights reserved
Leonardo Strategy
• Leonardo is investing in new technologies and tools to achieve information manoeuvre
• Electronic Warfare line of business is now following a “Suppression of Enemy Air Defence”
(SEAD) strategy
• Novel electronic warfare equipment and technology
• Mission planning tools
• Enterprise level support such as mission data management
• All Leonardo divisions across Land, Air, and Maritime are working together to achieve mutually
supporting capabilities
• Underpinned by CEMA expertise from Security and Information Systems division
• A single supplier for the entirety of information manoeuvre
THANK YOU FOR YOUR ATTENTION

More Related Content

What's hot

smart antennas ppt
smart antennas pptsmart antennas ppt
smart antennas pptsanthu652
 
MicroStrip Antenna
MicroStrip AntennaMicroStrip Antenna
MicroStrip AntennaTarek Nader
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksAmeer Sameer
 
Slotted waveguide antenna
Slotted waveguide antennaSlotted waveguide antenna
Slotted waveguide antennaAnil Pandey
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Accessanushkashastri
 
Antenna arrays
Antenna arraysAntenna arrays
Antenna arraysAJAL A J
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite CommunicationZunAib Ali
 
Dual Band Microstrip Antenna
Dual Band Microstrip AntennaDual Band Microstrip Antenna
Dual Band Microstrip AntennaAnas Kadri
 
ppt on Smart antennas
ppt on Smart antennasppt on Smart antennas
ppt on Smart antennasRitesh Kumar
 
Jammers&anti jammers
Jammers&anti jammersJammers&anti jammers
Jammers&anti jammersRitwik MG
 
Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communicationDr.Umadevi V
 
Antennas wave and propagation
 Antennas wave and propagation Antennas wave and propagation
Antennas wave and propagationIsha Negi
 
Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)Omkar Rane
 

What's hot (20)

smart antennas ppt
smart antennas pptsmart antennas ppt
smart antennas ppt
 
MicroStrip Antenna
MicroStrip AntennaMicroStrip Antenna
MicroStrip Antenna
 
Satellite antennas
Satellite antennasSatellite antennas
Satellite antennas
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
Slotted waveguide antenna
Slotted waveguide antennaSlotted waveguide antenna
Slotted waveguide antenna
 
Mm wave
Mm waveMm wave
Mm wave
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
Antenna arrays
Antenna arraysAntenna arrays
Antenna arrays
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite Communication
 
Massive mimo
Massive mimoMassive mimo
Massive mimo
 
Dual Band Microstrip Antenna
Dual Band Microstrip AntennaDual Band Microstrip Antenna
Dual Band Microstrip Antenna
 
TDMA
TDMATDMA
TDMA
 
Beamforming antennas (1)
Beamforming antennas (1)Beamforming antennas (1)
Beamforming antennas (1)
 
ppt on Smart antennas
ppt on Smart antennasppt on Smart antennas
ppt on Smart antennas
 
Satellite link design
Satellite link designSatellite link design
Satellite link design
 
Jammers&anti jammers
Jammers&anti jammersJammers&anti jammers
Jammers&anti jammers
 
Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communication
 
Antennas wave and propagation
 Antennas wave and propagation Antennas wave and propagation
Antennas wave and propagation
 
Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)
 

Similar to CEMA and Information Manoeuvre in the A2/AD Battlespace

Future SEAD Developments: Delivering Air Superiority in Contested Environments
Future SEAD Developments: Delivering Air Superiority in Contested EnvironmentsFuture SEAD Developments: Delivering Air Superiority in Contested Environments
Future SEAD Developments: Delivering Air Superiority in Contested EnvironmentsLeonardo
 
Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18David Sweigert
 
Rotary Wing Platforms: Delivering Information Advantage to the Joint Force
Rotary Wing Platforms: Delivering Information Advantage to the Joint ForceRotary Wing Platforms: Delivering Information Advantage to the Joint Force
Rotary Wing Platforms: Delivering Information Advantage to the Joint ForceLeonardo
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsSolarWinds
 
Defending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRICDefending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRICOMNETRIC
 
Mavenir: Small Cells Security - Overcoming Deployment Challenges
Mavenir: Small Cells Security  - Overcoming Deployment ChallengesMavenir: Small Cells Security  - Overcoming Deployment Challenges
Mavenir: Small Cells Security - Overcoming Deployment ChallengesSmall Cell Forum
 
Falcon Shield: Countering the drone threat
Falcon Shield: Countering the drone threatFalcon Shield: Countering the drone threat
Falcon Shield: Countering the drone threatLeonardo
 
Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Heather-Fiona Egan
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...David Sidhu
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MECSabidur Rahman
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Deepak Shankar
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustryDragos, Inc.
 
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...Marina Krotofil
 
Best practices in solving PNT threats in critical defense communications infr...
Best practices in solving PNT threats in critical defense communications infr...Best practices in solving PNT threats in critical defense communications infr...
Best practices in solving PNT threats in critical defense communications infr...Adtran
 
[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT ConvergenceSchneider Electric
 
Accelerating Monetization of M2M/Connected Devices
Accelerating Monetization of M2M/Connected DevicesAccelerating Monetization of M2M/Connected Devices
Accelerating Monetization of M2M/Connected DevicesCartesian
 

Similar to CEMA and Information Manoeuvre in the A2/AD Battlespace (20)

Future SEAD Developments: Delivering Air Superiority in Contested Environments
Future SEAD Developments: Delivering Air Superiority in Contested EnvironmentsFuture SEAD Developments: Delivering Air Superiority in Contested Environments
Future SEAD Developments: Delivering Air Superiority in Contested Environments
 
Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18
 
Rotary Wing Platforms: Delivering Information Advantage to the Joint Force
Rotary Wing Platforms: Delivering Information Advantage to the Joint ForceRotary Wing Platforms: Delivering Information Advantage to the Joint Force
Rotary Wing Platforms: Delivering Information Advantage to the Joint Force
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Defending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRICDefending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRIC
 
Mavenir: Small Cells Security - Overcoming Deployment Challenges
Mavenir: Small Cells Security  - Overcoming Deployment ChallengesMavenir: Small Cells Security  - Overcoming Deployment Challenges
Mavenir: Small Cells Security - Overcoming Deployment Challenges
 
Falcon Shield: Countering the drone threat
Falcon Shield: Countering the drone threatFalcon Shield: Countering the drone threat
Falcon Shield: Countering the drone threat
 
Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
 
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
 
Best practices in solving PNT threats in critical defense communications infr...
Best practices in solving PNT threats in critical defense communications infr...Best practices in solving PNT threats in critical defense communications infr...
Best practices in solving PNT threats in critical defense communications infr...
 
25 Feb 2014 CDE enduring challenge competition briefings
25 Feb 2014 CDE enduring challenge competition briefings 25 Feb 2014 CDE enduring challenge competition briefings
25 Feb 2014 CDE enduring challenge competition briefings
 
Deception towards Moving Target Defense
Deception towards Moving Target DefenseDeception towards Moving Target Defense
Deception towards Moving Target Defense
 
[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence
 
Accelerating Monetization of M2M/Connected Devices
Accelerating Monetization of M2M/Connected DevicesAccelerating Monetization of M2M/Connected Devices
Accelerating Monetization of M2M/Connected Devices
 

More from Leonardo

The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationLeonardo
 
Leonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdfLeonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdfLeonardo
 
The Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results PresentationThe Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results PresentationLeonardo
 
Leonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results PresentationLeonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results PresentationLeonardo
 
Leonardo 1H 2023 Results
Leonardo 1H 2023 ResultsLeonardo 1H 2023 Results
Leonardo 1H 2023 ResultsLeonardo
 
Leonardo 1Q 2023 Results
Leonardo 1Q 2023 ResultsLeonardo 1Q 2023 Results
Leonardo 1Q 2023 ResultsLeonardo
 
Leonardo FY 2022 Results
Leonardo FY 2022 ResultsLeonardo FY 2022 Results
Leonardo FY 2022 ResultsLeonardo
 
Leonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 ResultsLeonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 ResultsLeonardo
 
Leonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results PresentationLeonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results PresentationLeonardo
 
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and UpdatesLeonardo
 
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...Leonardo
 
Leonardo 1Q 2022 Results
Leonardo 1Q 2022 ResultsLeonardo 1Q 2022 Results
Leonardo 1Q 2022 ResultsLeonardo
 
Leonardo FY2021 Results
Leonardo FY2021 ResultsLeonardo FY2021 Results
Leonardo FY2021 ResultsLeonardo
 
European Rotors - Certification by Simulation
European Rotors - Certification by SimulationEuropean Rotors - Certification by Simulation
European Rotors - Certification by SimulationLeonardo
 
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...Leonardo
 
European Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL SymposiumEuropean Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL SymposiumLeonardo
 
European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day Leonardo
 
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation FuelEuropean Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation FuelLeonardo
 
European Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft OperationsEuropean Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft OperationsLeonardo
 
European Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS MarketEuropean Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS MarketLeonardo
 

More from Leonardo (20)

The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
 
Leonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdfLeonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdf
 
The Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results PresentationThe Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results Presentation
 
Leonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results PresentationLeonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results Presentation
 
Leonardo 1H 2023 Results
Leonardo 1H 2023 ResultsLeonardo 1H 2023 Results
Leonardo 1H 2023 Results
 
Leonardo 1Q 2023 Results
Leonardo 1Q 2023 ResultsLeonardo 1Q 2023 Results
Leonardo 1Q 2023 Results
 
Leonardo FY 2022 Results
Leonardo FY 2022 ResultsLeonardo FY 2022 Results
Leonardo FY 2022 Results
 
Leonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 ResultsLeonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 Results
 
Leonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results PresentationLeonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results Presentation
 
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
 
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
 
Leonardo 1Q 2022 Results
Leonardo 1Q 2022 ResultsLeonardo 1Q 2022 Results
Leonardo 1Q 2022 Results
 
Leonardo FY2021 Results
Leonardo FY2021 ResultsLeonardo FY2021 Results
Leonardo FY2021 Results
 
European Rotors - Certification by Simulation
European Rotors - Certification by SimulationEuropean Rotors - Certification by Simulation
European Rotors - Certification by Simulation
 
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
 
European Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL SymposiumEuropean Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL Symposium
 
European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day
 
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation FuelEuropean Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
 
European Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft OperationsEuropean Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft Operations
 
European Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS MarketEuropean Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS Market
 

Recently uploaded

Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfAbrahamGadissa
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationRobbie Edward Sayers
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfKamal Acharya
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopEmre Günaydın
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxwendy cai
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdfKamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxViniHema
 
Danfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdfDanfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdfNurvisNavarroSanchez
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringC Sai Kiran
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdfKamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234AafreenAbuthahir2
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdfKamal Acharya
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdfKamal Acharya
 
Introduction to Casting Processes in Manufacturing
Introduction to Casting Processes in ManufacturingIntroduction to Casting Processes in Manufacturing
Introduction to Casting Processes in Manufacturingssuser0811ec
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdfKamal Acharya
 

Recently uploaded (20)

Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Danfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdfDanfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdf
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Introduction to Casting Processes in Manufacturing
Introduction to Casting Processes in ManufacturingIntroduction to Casting Processes in Manufacturing
Introduction to Casting Processes in Manufacturing
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 

CEMA and Information Manoeuvre in the A2/AD Battlespace

  • 1. CEMA and Information Manoeuvre in the A2/AD Battlespace 6th June 2018 Sam Qaisar Capability Engineer (TVACD/RF Cyber)
  • 2. 2 © 2018 Leonardo MW Ltd – All rights reserved Information Warfare • Adversarial pursuit of a competitive information advantage • Typically seeks to degrade, remove, or control an adversary’s situational awareness CommsC2 Nodes Sensors Doctrine Key Personnel Information Processing
  • 3. 3 © 2018 Leonardo MW Ltd – All rights reserved Information Manoeuvre (1) • Need to find a way to integrate Information Warfare into existing warfighting doctrine • In particular, we must link Information Warfare to the physical domain • The current model focusses on kinetic effects and manoeuvre in the physical domain • This not sufficient for future operating environments Fire Offensive Support Physical Manoeuvre
  • 4. 4 © 2018 Leonardo MW Ltd – All rights reserved Information Manoeuvre (2) • As a result, Information Manoeuvre is currently very poorly integrated into many armed forces • There are two main approaches: Intelligence • Identify enemy dispositions and intent • Predict and manipulate future behaviour Plans • Generate decision points • Use of deception plans Execution • Information and sensor feeds back to intelligence function to help refine future plans Planning Focussed or “J25” Approach Intelligence •Identify weaknesses in enemy doctrine and processes Targeting •Exploit weaknesses to identify and target positions of enemy units Execution •Destruction of enemy using fires •Create maximum confusion to degrade enemy response Targeting Focussed or “J23” Approach
  • 5. 5 © 2018 Leonardo MW Ltd – All rights reserved Information Manoeuvre (3) • Neither implementations is sufficient • “Planning focussed” – too rigid and slow, unable to seize the initiative • “Targeting focussed” – unable to turn tactical success into strategic victory • Both implementations suffer from being “enemy focussed” and reliant on kinetic effects • A better approach is to apply the principles of manoeuvre warfare and develop an “effects focussed” method that can operate at all levels in the information domain • Delay decision making • Degrade situational awareness • Deny sensor feeds
  • 6. 6 © 2018 Leonardo MW Ltd – All rights reserved Cyber Electromagnetic Activity (CEMA) • These effects can be achieved through the use of electronic warfare and cyber techniques • The integration of these techniques is referred to as Cyber Electromagnetic Activity (CEMA) • CEMA can be used to attack almost any piece of equipment with a sensor or communications link • Allows military units to manoeuvre through the information domain in a similar manner to the physical domain • Particularly useful in environments with highly networked threat systems and sensors • CEMA is not an “all in one” solution to information manoeuvre, but offers very good capability that maps well to existing tactics and doctrine
  • 7. 7 © 2018 Leonardo MW Ltd – All rights reserved Anti-Access/Area-Denial (A2AD) Environments • Many nations are developing Anti-Access/Area-Denial capabilities. China is a good example • Dense threat environment of air defence assets, cruise missiles, warships, aircraft, and satellites • Threat environment is dense and unpredictable, unable to plan for every eventuality or destroy every enemy asset • Extensive use of networking and sensors allows A2AD environment to react quickly • Use CEMA to attack the network rather than the individual nodes Image taken from IISS
  • 8. 8 © 2018 Leonardo MW Ltd – All rights reserved Implementing a CEMA Capability • Counter-A2AD warfighting is expeditionary • Low combat mass • Long supply lines • Limited ISTAR • Advantageous to have maximum capability per platform, and mutually reinforcing capabilities • Ideally, CEMA capability should be: • Distributed • Networked • Re-taskable • Planned for at the highest level, and enabled at the lowest level • The use of CEMA in A2AD therefore allows for increased: • Operational effect from each platform • Survivability of platforms and formations • Tempo and mission coverage
  • 9. 9 © 2018 Leonardo MW Ltd – All rights reserved Using CEMA in A2AD Environments • Attack strategic ISTAR collection capabilities (satellites, comms, open source, sensors) • Enemy will struggle to deploy appropriate troops or conduct strategic fires • Electronic deception to create fake troop positions or spoof equipment signatures • Difficult to identify real targets and their associated equipment • Deploy offensive CEMA payloads against enemy comms networks • Slower decision making, degrade sensor fusion between networked equipment • Self protection CEMA capabilities to enhance platform survivability • Unable to reliably detect or engage targets • Attack of key equipment and network nodes using CEMA and kinetic effects (network based targeting) in order to degrade situational awareness • Disproportionate degradation of A2AD network and loss of freedom of manoeuvre • Kinetic strikes against military targets • Manipulation of sensors, comms, and open source to prevent accurate enemy damage assessment • Over/under commitment of forces in response to attack STRATEGIC TACTICAL Enduring tasks On demand/ Mission specific tasks
  • 10. 10 © 2018 Leonardo MW Ltd – All rights reserved Leonardo Strategy • Leonardo is investing in new technologies and tools to achieve information manoeuvre • Electronic Warfare line of business is now following a “Suppression of Enemy Air Defence” (SEAD) strategy • Novel electronic warfare equipment and technology • Mission planning tools • Enterprise level support such as mission data management • All Leonardo divisions across Land, Air, and Maritime are working together to achieve mutually supporting capabilities • Underpinned by CEMA expertise from Security and Information Systems division • A single supplier for the entirety of information manoeuvre
  • 11. THANK YOU FOR YOUR ATTENTION