2. 2
Network Centric Enterprise
Infostructure
Sensor Netting
Data Fusion
Information Management
Vastly Improved Awareness
Shared Awareness
Virtual Collaboration
Virtual Organizations
Substitution of Info for
People and Material
Self-Synchronization
Increased Tempo
Increased Responsiveness
Lower Risks
Lower Costs
Higher Profits
From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC,
CCRP Press, 1999 www.dodccrp.org/publicat.htm
The Entry Fee
The Bottom Line
(Measurable)
Enabler
Process for
generating
awareness
Enabler
Process for
exploiting
awareness
Results
3. 3
Military as a Network Centric Enterprise
Infostructure
Sensor Netting
Data Fusion
Information Management
Vastly Improved Awareness
Shared Battlespace Awareness
Virtual Collaboration
Virtual Organizations
Substitution of Info for
People and Material
Self-Synchronization Forces
Increased Operations Tempo
Increased Responsiveness
Lower Risks
Lower Costs
Increased Combat Effectiveness
From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC,
CCRP Press, 1999 www.dodccrp.org/publicat.htm
Execution
(Measurable)
Battlespace Awareness
&
Knowledge
4. 4
Network Organizational Models
Standard Hierarchy Chain Network Hub & Spoke All-Channel
From Friel, Hierarchies and Networks , Government Executive, April, 2002
Nodes: The actors, or points on a network. A node can form connections
with any and all other nodes on the network
Centrality: The degree to which a node connects other nodes
Boundary spanners: Nodes that have connections between groups
Self-synchronization: The ability of low-level groups to coordinate and act
without going through a central authority
Swarming: The act of attacking a target from many different directions,
using many different means, often making a force appear larger than it is
5. 5
Key Observations
The World has become a network of networks, filled
with actors who behave in increasingly interconnected
ways and with wide-reaching and rapid consequences
One major component of a network centric enterprise
is speed…. The payoff is in the initial very high rate of
change
A Northern Alliance commander suggested bombing
Taliban positions. Nineteen minutes later the
positions were struck
The critical functions of a network centric enterprise
are NOT tied to any one platform; multiple new
pathways to delivering capabilities, shifting in time
The swarming technique requires a key feature of
networks -- adaptability
Swarming behavior visible in the war on terrorism
6. 6
One Vision of Future Cyber Warfare
• Two competing all-channel network “organizations” dueling in
Cyberspace.
• Each of these “organizations” might have many multiple ways
they can deliver fatal blows
• No longer "platform centric", their lethality is now multi-threaded
• Multiple pathways imply that no single asset is on the critical path
• The number of network pathways is growing exponentially.
• Cyberwar might involve identifying and managing the network
means of delivery in such a way that the adversary never has a
lethal combination of delivery mechanisms for massed effects.
• Once the adversary achieves just one such combination, the swarming strike
will come at the speed of electrons.
• A large scale, fast paced, distributed, deadly game of Cyber chess
with missing or unknown pieces (capabilities, vulnerabilities).
7. 7
Active Defense in Cyberspace
Future Cyberwars will be fought to defend / destroy,
not just the individual assets of the computer network,
but the future combat capabilities achieved through a networked force
8. 8
Characteristics:
Aerospace Vehicle: UCAV
Flight Medium: Air & Space
Weapons: Missiles & Bombs
Desired “Effect”: Destroy Target
Control: Flight Path
LPI: Stealth (Physical)
LPD: Terrain Masking
Homebase: Predetermined Airfield
Logistics: Heavy, Continual
Cyber Warfare Model vs.
Classical Warfare Model
Kinetic Warfare Cyber Warfare
Characteristics:
Cyberspace Vehicle: Info-Craft
Flight Medium: Cyberspace
Weapons: Virus, Worm, Soft Bombs, etc
Desired “Effect”: Destroy, Degrade, Co-opt
Control: Network Links
LPI: Stealth (Software)
LPD: Network Masking
Homebase: Any Cyberspace Portal
Logistics: Light, Infrequent (software)
Net Result or “Effect” Can be Exactly the Same – Impede the Enemy
9. 9
Principles of War Remain
Objective
– Focus effort to achieve objective
Economy of Force
– Minimize use of capacity in pursuit
of non-objective goals
Security
– Protecting & maintaining
operational LOCs
Offensive
– Seizing & maintaining the offensive in
order to dictate the terms of combat
Maneuver
– Constrain enemy COA through
environmental & other aspects
Surprise
– The ability to strike the enemy at a
time, place or manner for which he
is not prepared
Mass
– Concentrating military capabilities at
the decisive time & space
Unity of Command
– The ability to build and maintain a
shared understanding of the
commander’s intent
Simplicity
– Need to keep plans, guidance &
orders clear and uncomplicated
Joint
Allied
&
Coalition
10. 10
Some Possible Future Cyber Weapons
Cyber weapons attack and control our adversary’s Information
and C3I capabilities through intelligent use of information and
controlled effects generated in Cyberspace.
Stealthy Agents
Network Blocking Mines
Traffic Redirection (active & passive)
Network Re-mapping
Camouflaged Implants
Sleeper Agents
Adversary Finger Printing & Tracking
Cyber Identity Theft
Obfuscation (speed/mobility/deception) Tools
Tribal Operators
Remote Cyber Forensics