Вы находитесь на странице: 1из 24

C4ISR and Information

Warfare
Naval Weapons Systems
Putting It All Together - C4ISR

Command Computers

Surveillance C4ISR Reconnaissance

Control Intelligence

Communications
Why We Need 4
C ISR

Faster response times


required.

Joint Operations require high


levels of coordination.

More sophisticated weapons


require more information.
Functions of C4I
 Creates a common tactical
picture. Ensures all information is
available to operators &
commanders.
 Ensures connectivity and
information exchange.
 Directly links the sensor to the
shooter.
 Supports and uses information
warfare (IW).
C4ISR Supports At All Levels
 Watchstanders
 Composite Warfare Commander
 Commander of the JTF
 The Shore Commanders
Command and Control Warfare

Objectives:
1. Defeat the enemy by destroying its C2W
systems.
2. Separate the enemy’s command structure
from its forces.
3. Protect one’s own C2W forces.
4. Connect commanders and forces.
Tools to Achieve C2W
Objectives
 Operational Security
 Military Deception
 Psychological
Operations
 Electronic Warfare
 Physical Destruction
C2W Decision Making Cycle

Observe

Act Orient

Decide
(OODA loop)
Intelligence
“There are 3 kinds of people: those
who can count & those who can't”
Intelligence

Product of collecting, exploiting, processing,


integrating, analyzing and interpreting
information.
Types:
1. Strategic Intelligence
2. Operational Intelligence
3. Tactical Intelligence
Function of Intelligence

 Prepare the Battle space


• Define environment or physical
characteristics.
• Evaluate the threat and determine
threat’s course of action.
 Provide Early Warning
 Evaluate the situation (current
actions & changes)
Function of Intelligence cont.

 Identify and Target the Enemy’s


Vulnerabilities
 Assess Battle Damage (own and
enemy’s)
 Manage Intelligence Information
 Prevent Enemy’s Intelligence
Efforts (Offensive & Defensive)
Information Warfare (IW)

IW is action taken to preserve the integrity


of own information systems from
exploitation, disruption, and destruction
while achieving an information advantage
over the enemy.
IW Tools
 Surveillance Systems
• Satellites
• EW and SIGINT
• HUMINT
 Communications Systems
 Tactical Network
• Computers
• Database management
Offensive - Opportunities
 Degrade or exploit enemy’s collection
or use of information
• “Antihead” – traditional means of
removing commander or command
center
• “Antineck” – nontraditional method of
cutting enemy’s communications
Defensive - Vulnerabilities
 Protection of our ability to conduct
information operations
• Physical security
• Encryption
• Antivirus
• Secure data transmissions
Navy Tactical Data System
(NTDS)
Interceptor
Interceptor

Early Warning
Aircraft

Link 4A

NTDS Ship
Non-NTDS Ship

NTDS Ship
Advanced Combat Direction
System

 Follow on to NTDS
 Incorporates various
communication circuits into one
unified system
Communications Security

Protection resulting from all measures designed


to deny unauthorized persons information and
the possession of telecommunications data.
Called CMS.

Elements:
Crypto Security
Transmission Security
Emission Security
Physical Security
Computers
 Information Management – ensures
quality of information
• Sort, process, organize, correlate, and
disseminate information
 Real time
Computer Requirements
 Blend critical tactical, operational,
and administrative data
 Deliver rapid information to
operational commanders
 Multimedia format (to suit)
 Standardized equipment
 Standardized hardware
(upgrade/additions)
Space and EW
 Space Dominance
• Integral to strategic and tactical
command and control architecture
• How is C4I delivered?
 Opportunities
• Communication
 UHF Satellite – nav, surveillance, ID, track
 SHF/EHF Satellite – scintillation
• Sensing/Surveillance
 Missile attack warning (IR sensors)
Mission Planning
 Meteorological data
 Preview lay of the land
• Terrain
• Ocean depth
• Shoreline characteristics
• Vehicle/aircraft/ship locations
Questions?

Вам также может понравиться