SlideShare a Scribd company logo
Intelligence Support Requirements
  for Offensive CNO: An Achilles’
               Heel?
       Jeff Malone - UNSW@ADFA
Cyber Warfare and Nation States Conference
      Canberra - 23 September 2010
Scope
• Overview of Offensive CNO

• Intelligence Requirements Across the Weapon
  System Life Cycle

• Intelligence Requirements of Offensive CNO

• Implications for a Usable CNO Capability
Caveats
• Presentation reflects my personal views

• Dependence on US (military) literature

• First principle arguments
CNO as an element of IO
•   Psychological Operations (PSYOP)
•   Military Deception (MILDEC)
•   Operational Security (OPSEC)
•   Electronic Warfare (EW)
•   Computer Network Operations (CNO)
•   Other Supporting Capabilities
    – Physical Attack (etc)

Source: US Joint Publication 3-13, Information Operations, 13 February 2006
Components of CNO
• Computer Network Attack (CNA)

• Computer Network Exploitation (CNE)

• Computer Network Defence (CND)
Access Approaches to Offensive CNO
• Close Access

• Proximate Access

• Remote Access
Objectives of Offensive CNO
• Tactical – immediate battlefield

• Operational – theatre level

• Strategic – national level
The Weapon System Life Cycle

                        In-Service Modification and Upgrade




                                  Acquisition and
 Needs and                                                                Retirement and
               Development        Introduction to        In-Service Use
Requirements                                                                 Disposal
                                      Service
Intelligence Requirements Across the
            Weapon System Life Cycle
                        Intelligence                                                                           Intelligence
Intelligence              Support                                                                                Support
  Support                                   In-Service Modification and Upgrade




                                                   Acquisition and
     Needs and                                                                                             Retirement and
                              Development          Introduction to        In-Service Use
    Requirements                                                                                              Disposal
                                                       Service




               Intelligence
                                                                                   Planning
                 Support
                                              Intelligence
                                                Support

                                                                      Assessment              Operations
Types of Intelligence Requirements for
            Offensive CNO
• Access-centred
  – Relates to characteristics of target systems
  – Collection emphasis on CNE


• Effect-centred
  – Relates to outcomes sought by attack
  – Collection emphasis will vary, but has greater role
    for all-source collection
Factors Influencing Intelligence Support
   Requirements for Offensive CNO
• Difficulty/complexity of access

• Precision of effect sought

• Overt versus covert action

• Target responsiveness
Vignette 1 – Close Access Attack on an
    Integrated Air Defence System
Vignette 2 – Proximate Attack on an
   Integrated Air Defence System
Vignette 3 – Remote Attack on
Strategic C3I Enabling Systems
Vignette 4 – Remote Attack to undertake
             targeted PSYOP
Implications for a Usable Offensive
            CNO Capability
• Intelligence support requirements crucial to a
  usable offensive CNO capability
• Intelligence support requirements will impact
  on all collection disciplines, not just CNE
• Intelligence support to offensive CNO as an
  opportunity cost
• Less discriminate CNO attacks more likely to
  be viable
Conclusion

More Related Content

Similar to Intelligence Support Requirements for Offensive Computer Network Operations

Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)
Ian Sommerville
 
Miratech Infrastructure Support Services
Miratech Infrastructure Support ServicesMiratech Infrastructure Support Services
Miratech Infrastructure Support Services
Miratech
 
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud Computing
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud ComputingIDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud Computing
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud Computing
Open Data Center Alliance
 
ThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBMThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBM
Zyma Arsalan
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013
Ian Sommerville
 
Enterprise Mobility Strategy Webinar by Endeavour
Enterprise Mobility Strategy Webinar by EndeavourEnterprise Mobility Strategy Webinar by Endeavour
Enterprise Mobility Strategy Webinar by Endeavour
Endeavour Software Technologies
 
Value Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge MgtValue Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge Mgt
Arnaldo Colombo
 
Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochure
cwoodson
 
NCI Network Engineering
NCI Network EngineeringNCI Network Engineering
NCI Network Engineering
Chris Young
 
Layer 7: Robust Net-Centric Services
Layer 7: Robust Net-Centric ServicesLayer 7: Robust Net-Centric Services
Layer 7: Robust Net-Centric Services
CA API Management
 
Better security through IT operations
Better security through IT operationsBetter security through IT operations
Better security through IT operations
slighltyanon
 
12.08.09 Event Mike Perdue Presentation
12.08.09 Event   Mike Perdue Presentation12.08.09 Event   Mike Perdue Presentation
12.08.09 Event Mike Perdue Presentation
mcini
 
ITIL and IT Security Architecture
ITIL and IT Security ArchitectureITIL and IT Security Architecture
ITIL and IT Security Architecture
Leo de Sousa
 
New Vvma Presentation
New Vvma PresentationNew Vvma Presentation
New Vvma Presentation
mhunter22
 
De-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco ServicesDe-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco Services
Cisco Canada
 
GIS POV
GIS POVGIS POV
GIS POV
Sougata Mitra
 
Day 3 p1 - itsm
Day 3   p1 - itsmDay 3   p1 - itsm
Day 3 p1 - itsm
Lilian Schaffer
 
Day 3 p1 - itsm
Day 3   p1 - itsmDay 3   p1 - itsm
Day 3 p1 - itsm
Lilian Schaffer
 
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
Mingxia Zhang, Ph.D.
 
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)
Ian Sommerville
 

Similar to Intelligence Support Requirements for Offensive Computer Network Operations (20)

Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)
 
Miratech Infrastructure Support Services
Miratech Infrastructure Support ServicesMiratech Infrastructure Support Services
Miratech Infrastructure Support Services
 
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud Computing
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud ComputingIDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud Computing
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud Computing
 
ThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBMThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBM
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013
 
Enterprise Mobility Strategy Webinar by Endeavour
Enterprise Mobility Strategy Webinar by EndeavourEnterprise Mobility Strategy Webinar by Endeavour
Enterprise Mobility Strategy Webinar by Endeavour
 
Value Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge MgtValue Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge Mgt
 
Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochure
 
NCI Network Engineering
NCI Network EngineeringNCI Network Engineering
NCI Network Engineering
 
Layer 7: Robust Net-Centric Services
Layer 7: Robust Net-Centric ServicesLayer 7: Robust Net-Centric Services
Layer 7: Robust Net-Centric Services
 
Better security through IT operations
Better security through IT operationsBetter security through IT operations
Better security through IT operations
 
12.08.09 Event Mike Perdue Presentation
12.08.09 Event   Mike Perdue Presentation12.08.09 Event   Mike Perdue Presentation
12.08.09 Event Mike Perdue Presentation
 
ITIL and IT Security Architecture
ITIL and IT Security ArchitectureITIL and IT Security Architecture
ITIL and IT Security Architecture
 
New Vvma Presentation
New Vvma PresentationNew Vvma Presentation
New Vvma Presentation
 
De-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco ServicesDe-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco Services
 
GIS POV
GIS POVGIS POV
GIS POV
 
Day 3 p1 - itsm
Day 3   p1 - itsmDay 3   p1 - itsm
Day 3 p1 - itsm
 
Day 3 p1 - itsm
Day 3   p1 - itsmDay 3   p1 - itsm
Day 3 p1 - itsm
 
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
 
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)
 

Recently uploaded

2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
CIkumparan
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
hindustaninsider22
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
46adnanshahzad
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
Pragencyuk
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
El Estrecho Digital
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
Abdul-Hakim Shabazz
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
Filippo64
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
bhavenpr
 

Recently uploaded (9)

2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
 

Intelligence Support Requirements for Offensive Computer Network Operations

  • 1. Intelligence Support Requirements for Offensive CNO: An Achilles’ Heel? Jeff Malone - UNSW@ADFA Cyber Warfare and Nation States Conference Canberra - 23 September 2010
  • 2. Scope • Overview of Offensive CNO • Intelligence Requirements Across the Weapon System Life Cycle • Intelligence Requirements of Offensive CNO • Implications for a Usable CNO Capability
  • 3. Caveats • Presentation reflects my personal views • Dependence on US (military) literature • First principle arguments
  • 4. CNO as an element of IO • Psychological Operations (PSYOP) • Military Deception (MILDEC) • Operational Security (OPSEC) • Electronic Warfare (EW) • Computer Network Operations (CNO) • Other Supporting Capabilities – Physical Attack (etc) Source: US Joint Publication 3-13, Information Operations, 13 February 2006
  • 5. Components of CNO • Computer Network Attack (CNA) • Computer Network Exploitation (CNE) • Computer Network Defence (CND)
  • 6. Access Approaches to Offensive CNO • Close Access • Proximate Access • Remote Access
  • 7. Objectives of Offensive CNO • Tactical – immediate battlefield • Operational – theatre level • Strategic – national level
  • 8. The Weapon System Life Cycle In-Service Modification and Upgrade Acquisition and Needs and Retirement and Development Introduction to In-Service Use Requirements Disposal Service
  • 9. Intelligence Requirements Across the Weapon System Life Cycle Intelligence Intelligence Intelligence Support Support Support In-Service Modification and Upgrade Acquisition and Needs and Retirement and Development Introduction to In-Service Use Requirements Disposal Service Intelligence Planning Support Intelligence Support Assessment Operations
  • 10. Types of Intelligence Requirements for Offensive CNO • Access-centred – Relates to characteristics of target systems – Collection emphasis on CNE • Effect-centred – Relates to outcomes sought by attack – Collection emphasis will vary, but has greater role for all-source collection
  • 11. Factors Influencing Intelligence Support Requirements for Offensive CNO • Difficulty/complexity of access • Precision of effect sought • Overt versus covert action • Target responsiveness
  • 12. Vignette 1 – Close Access Attack on an Integrated Air Defence System
  • 13. Vignette 2 – Proximate Attack on an Integrated Air Defence System
  • 14. Vignette 3 – Remote Attack on Strategic C3I Enabling Systems
  • 15. Vignette 4 – Remote Attack to undertake targeted PSYOP
  • 16. Implications for a Usable Offensive CNO Capability • Intelligence support requirements crucial to a usable offensive CNO capability • Intelligence support requirements will impact on all collection disciplines, not just CNE • Intelligence support to offensive CNO as an opportunity cost • Less discriminate CNO attacks more likely to be viable