SlideShare a Scribd company logo
1 of 11
Network Centric Warfare,
Cyber Warfare,
&
KSCO
Nort Fowler
AFRL/IF
26 Electronic parkway, Rome NY 13441
Email: fowlern@rl.af.mil
Tel: (315) 330-4512
2
Network Centric Enterprise
Infostructure
Sensor Netting
Data Fusion
Information Management
Vastly Improved Awareness
Shared Awareness
Virtual Collaboration
Virtual Organizations
Substitution of Info for
People and Material
Self-Synchronization
Increased Tempo
Increased Responsiveness
Lower Risks
Lower Costs
Higher Profits
From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC,
CCRP Press, 1999 www.dodccrp.org/publicat.htm
The Entry Fee
The Bottom Line
(Measurable)
Enabler
Process for
generating
awareness
Enabler
Process for
exploiting
awareness
Results
3
Military as a Network Centric Enterprise
Infostructure
Sensor Netting
Data Fusion
Information Management
Vastly Improved Awareness
Shared Battlespace Awareness
Virtual Collaboration
Virtual Organizations
Substitution of Info for
People and Material
Self-Synchronization Forces
Increased Operations Tempo
Increased Responsiveness
Lower Risks
Lower Costs
Increased Combat Effectiveness
From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC,
CCRP Press, 1999 www.dodccrp.org/publicat.htm
Execution
(Measurable)
Battlespace Awareness
&
Knowledge
4
Network Organizational Models
Standard Hierarchy Chain Network Hub & Spoke All-Channel
From Friel, Hierarchies and Networks , Government Executive, April, 2002
 Nodes: The actors, or points on a network. A node can form connections
with any and all other nodes on the network
 Centrality: The degree to which a node connects other nodes
 Boundary spanners: Nodes that have connections between groups
 Self-synchronization: The ability of low-level groups to coordinate and act
without going through a central authority
 Swarming: The act of attacking a target from many different directions,
using many different means, often making a force appear larger than it is
5
Key Observations
 The World has become a network of networks, filled
with actors who behave in increasingly interconnected
ways and with wide-reaching and rapid consequences
 One major component of a network centric enterprise
is speed…. The payoff is in the initial very high rate of
change
 A Northern Alliance commander suggested bombing
Taliban positions. Nineteen minutes later the
positions were struck
 The critical functions of a network centric enterprise
are NOT tied to any one platform; multiple new
pathways to delivering capabilities, shifting in time
 The swarming technique requires a key feature of
networks -- adaptability
 Swarming behavior visible in the war on terrorism
6
One Vision of Future Cyber Warfare
• Two competing all-channel network “organizations” dueling in
Cyberspace.
• Each of these “organizations” might have many multiple ways
they can deliver fatal blows
• No longer "platform centric", their lethality is now multi-threaded
• Multiple pathways imply that no single asset is on the critical path
• The number of network pathways is growing exponentially.
• Cyberwar might involve identifying and managing the network
means of delivery in such a way that the adversary never has a
lethal combination of delivery mechanisms for massed effects.
• Once the adversary achieves just one such combination, the swarming strike
will come at the speed of electrons.
• A large scale, fast paced, distributed, deadly game of Cyber chess
with missing or unknown pieces (capabilities, vulnerabilities).
7
Active Defense in Cyberspace
Future Cyberwars will be fought to defend / destroy,
not just the individual assets of the computer network,
but the future combat capabilities achieved through a networked force
8
Characteristics:
Aerospace Vehicle: UCAV
Flight Medium: Air & Space
Weapons: Missiles & Bombs
Desired “Effect”: Destroy Target
Control: Flight Path
LPI: Stealth (Physical)
LPD: Terrain Masking
Homebase: Predetermined Airfield
Logistics: Heavy, Continual
Cyber Warfare Model vs.
Classical Warfare Model
Kinetic Warfare Cyber Warfare
Characteristics:
Cyberspace Vehicle: Info-Craft
Flight Medium: Cyberspace
Weapons: Virus, Worm, Soft Bombs, etc
Desired “Effect”: Destroy, Degrade, Co-opt
Control: Network Links
LPI: Stealth (Software)
LPD: Network Masking
Homebase: Any Cyberspace Portal
Logistics: Light, Infrequent (software)
Net Result or “Effect” Can be Exactly the Same – Impede the Enemy
9
Principles of War Remain
 Objective
– Focus effort to achieve objective
 Economy of Force
– Minimize use of capacity in pursuit
of non-objective goals
 Security
– Protecting & maintaining
operational LOCs
 Offensive
– Seizing & maintaining the offensive in
order to dictate the terms of combat
 Maneuver
– Constrain enemy COA through
environmental & other aspects
 Surprise
– The ability to strike the enemy at a
time, place or manner for which he
is not prepared
 Mass
– Concentrating military capabilities at
the decisive time & space
 Unity of Command
– The ability to build and maintain a
shared understanding of the
commander’s intent
 Simplicity
– Need to keep plans, guidance &
orders clear and uncomplicated
Joint
Allied
&
Coalition
10
Some Possible Future Cyber Weapons
Cyber weapons attack and control our adversary’s Information
and C3I capabilities through intelligent use of information and
controlled effects generated in Cyberspace.
Stealthy Agents
Network Blocking Mines
Traffic Redirection (active & passive)
Network Re-mapping
Camouflaged Implants
Sleeper Agents
Adversary Finger Printing & Tracking
Cyber Identity Theft
Obfuscation (speed/mobility/deception) Tools
Tribal Operators
Remote Cyber Forensics
11
KSCO Opportunities

More Related Content

Similar to Network Centric Warfare

Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
Russell Publishing
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
Information Technology
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
Adil Khan
 
Meeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domainMeeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domain
Darwin Chimbo
 

Similar to Network Centric Warfare (20)

ChaosVPN 5mof
ChaosVPN 5mofChaosVPN 5mof
ChaosVPN 5mof
 
Exp w22 exp-w22
Exp w22 exp-w22Exp w22 exp-w22
Exp w22 exp-w22
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 
Improving routing security through concerted action
Improving routing security through concerted actionImproving routing security through concerted action
Improving routing security through concerted action
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
communication in distributed systems
communication in distributed systemscommunication in distributed systems
communication in distributed systems
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
 
Metacomputer Architecture of the Global LambdaGrid
Metacomputer Architecture of the Global LambdaGridMetacomputer Architecture of the Global LambdaGrid
Metacomputer Architecture of the Global LambdaGrid
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation Model
 
Impact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail Applications
 
Meeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domainMeeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domain
 
The Importance of Large-Scale Computer Science Research Efforts
The Importance of Large-Scale Computer Science Research EffortsThe Importance of Large-Scale Computer Science Research Efforts
The Importance of Large-Scale Computer Science Research Efforts
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

Network Centric Warfare

  • 1. Network Centric Warfare, Cyber Warfare, & KSCO Nort Fowler AFRL/IF 26 Electronic parkway, Rome NY 13441 Email: fowlern@rl.af.mil Tel: (315) 330-4512
  • 2. 2 Network Centric Enterprise Infostructure Sensor Netting Data Fusion Information Management Vastly Improved Awareness Shared Awareness Virtual Collaboration Virtual Organizations Substitution of Info for People and Material Self-Synchronization Increased Tempo Increased Responsiveness Lower Risks Lower Costs Higher Profits From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC, CCRP Press, 1999 www.dodccrp.org/publicat.htm The Entry Fee The Bottom Line (Measurable) Enabler Process for generating awareness Enabler Process for exploiting awareness Results
  • 3. 3 Military as a Network Centric Enterprise Infostructure Sensor Netting Data Fusion Information Management Vastly Improved Awareness Shared Battlespace Awareness Virtual Collaboration Virtual Organizations Substitution of Info for People and Material Self-Synchronization Forces Increased Operations Tempo Increased Responsiveness Lower Risks Lower Costs Increased Combat Effectiveness From Alberts, Garstka, & Stein, Network Centric Warfare: Developing & Leveraging Information Superiority, 2nd edition, Washington, DC, CCRP Press, 1999 www.dodccrp.org/publicat.htm Execution (Measurable) Battlespace Awareness & Knowledge
  • 4. 4 Network Organizational Models Standard Hierarchy Chain Network Hub & Spoke All-Channel From Friel, Hierarchies and Networks , Government Executive, April, 2002  Nodes: The actors, or points on a network. A node can form connections with any and all other nodes on the network  Centrality: The degree to which a node connects other nodes  Boundary spanners: Nodes that have connections between groups  Self-synchronization: The ability of low-level groups to coordinate and act without going through a central authority  Swarming: The act of attacking a target from many different directions, using many different means, often making a force appear larger than it is
  • 5. 5 Key Observations  The World has become a network of networks, filled with actors who behave in increasingly interconnected ways and with wide-reaching and rapid consequences  One major component of a network centric enterprise is speed…. The payoff is in the initial very high rate of change  A Northern Alliance commander suggested bombing Taliban positions. Nineteen minutes later the positions were struck  The critical functions of a network centric enterprise are NOT tied to any one platform; multiple new pathways to delivering capabilities, shifting in time  The swarming technique requires a key feature of networks -- adaptability  Swarming behavior visible in the war on terrorism
  • 6. 6 One Vision of Future Cyber Warfare • Two competing all-channel network “organizations” dueling in Cyberspace. • Each of these “organizations” might have many multiple ways they can deliver fatal blows • No longer "platform centric", their lethality is now multi-threaded • Multiple pathways imply that no single asset is on the critical path • The number of network pathways is growing exponentially. • Cyberwar might involve identifying and managing the network means of delivery in such a way that the adversary never has a lethal combination of delivery mechanisms for massed effects. • Once the adversary achieves just one such combination, the swarming strike will come at the speed of electrons. • A large scale, fast paced, distributed, deadly game of Cyber chess with missing or unknown pieces (capabilities, vulnerabilities).
  • 7. 7 Active Defense in Cyberspace Future Cyberwars will be fought to defend / destroy, not just the individual assets of the computer network, but the future combat capabilities achieved through a networked force
  • 8. 8 Characteristics: Aerospace Vehicle: UCAV Flight Medium: Air & Space Weapons: Missiles & Bombs Desired “Effect”: Destroy Target Control: Flight Path LPI: Stealth (Physical) LPD: Terrain Masking Homebase: Predetermined Airfield Logistics: Heavy, Continual Cyber Warfare Model vs. Classical Warfare Model Kinetic Warfare Cyber Warfare Characteristics: Cyberspace Vehicle: Info-Craft Flight Medium: Cyberspace Weapons: Virus, Worm, Soft Bombs, etc Desired “Effect”: Destroy, Degrade, Co-opt Control: Network Links LPI: Stealth (Software) LPD: Network Masking Homebase: Any Cyberspace Portal Logistics: Light, Infrequent (software) Net Result or “Effect” Can be Exactly the Same – Impede the Enemy
  • 9. 9 Principles of War Remain  Objective – Focus effort to achieve objective  Economy of Force – Minimize use of capacity in pursuit of non-objective goals  Security – Protecting & maintaining operational LOCs  Offensive – Seizing & maintaining the offensive in order to dictate the terms of combat  Maneuver – Constrain enemy COA through environmental & other aspects  Surprise – The ability to strike the enemy at a time, place or manner for which he is not prepared  Mass – Concentrating military capabilities at the decisive time & space  Unity of Command – The ability to build and maintain a shared understanding of the commander’s intent  Simplicity – Need to keep plans, guidance & orders clear and uncomplicated Joint Allied & Coalition
  • 10. 10 Some Possible Future Cyber Weapons Cyber weapons attack and control our adversary’s Information and C3I capabilities through intelligent use of information and controlled effects generated in Cyberspace. Stealthy Agents Network Blocking Mines Traffic Redirection (active & passive) Network Re-mapping Camouflaged Implants Sleeper Agents Adversary Finger Printing & Tracking Cyber Identity Theft Obfuscation (speed/mobility/deception) Tools Tribal Operators Remote Cyber Forensics