protecting friendly command and control capability the ... · capability the army’s c2 protect...

35
IA-00010 INFOFUMATION WARFARE Protecting Friendly Command and Control Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I SAIS-C4C, 703-697-l 474 MR PHILLIP LORANGER HQDA, DISC4 SAIS-C4C, 704-696-8070

Upload: others

Post on 14-Jul-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

IA-00010

INFOFUMATION WARFARE

Protecting FriendlyCommand and Control

Capability

The Army’s C2 Protect Effortsan

In Process ReviewLTC MIKE BROWN

HQDA, , DISC4I

SAIS-C4C, 703-697-l 474

MR PHILLIP LORANGER

HQDA, DISC4

SAIS-C4C, 704-696-8070

Page 2: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

Form SF298 Citation Data

Report Date("DD MON YYYY") 01051995

Report TypeN/A

Dates Covered (from... to)("DD MON YYYY")

Title and Subtitle Protecting Friendly Command and Control Capability TheArmys C2 Protect Efforts an In Process Review

Contract or Grant Number

Program Element Number

Authors Project Number

Task Number

Work Unit Number

Performing Organization Name(s) and Address(es) HQDA

Performing Organization Number(s)

Sponsoring/Monitoring Agency Name(s) and Address(es) Monitoring Agency Acronym

Monitoring Agency Report Number(s)

Distribution/Availability Statement Approved for public release, distribution unlimited

Supplementary Notes

Abstract

Subject Terms

Document Classification unclassified

Classification of SF298 unclassified

Classification of Abstract unclassified

Limitation of Abstract unlimited

Number of Pages 34

Page 3: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

REPORT DOCUMENTATION PAGEForm Approved

OMB No. 074-0188Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering andmaintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,including suggestions for reducing this burden to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503

1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE

5/1/953. REPORT TYPE AND DATES COVERED

Briefing4. TITLE AND SUBTITLE

Information Warfare - Protecting Friendly Command andControl Capability: The Army's C2 Protect Efforts an InProcess Review

5. FUNDING NUMBERS

6. AUTHOR(S)

Mike Brown|Phillip Loranger

7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER

IATACInformation Assurance Technology AnalysisCenter3190 Fairview Park DriveFalls Church VA 220429. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING

AGENCY REPORT NUMBER

Defense Technical Information CenterDTIC-IA8725 John J. Kingman Rd, Suite 944Ft. Belvoir, VA 2206011. SUPPLEMENTARY NOTES

12a. DISTRIBUTION / AVAILABILITY STATEMENT

A

12b. DISTRIBUTION CODE

13. ABSTRACT (Maximum 200 Words)

This briefing is a roadmap for the U.S. Army as they move to Command and Control (C2)Protect in support of the Army's Force 21transition. It addresses C2 protect in a digitalbattlefield environment, the threat and vulnerabilities environment, and Approach to theproblem of C2 Protect.

14. SUBJECT TERMS

IA15. NUMBER OF PAGES

16. PRICE CODE

17. SECURITY CLASSIFICATION OF REPORT

Unclassified

18. SECURITY CLASSIFICATION OF THIS PAGE

UNCLASSIFIED

19. SECURITY CLASSIFICATION OF ABSTRACT

UNCLASSIFIED

20. LIMITATION OF ABSTRACT

None

Page 4: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

What is I?orce XXI?

. . .Operate in an unpredictable an&hanging environment, throughout L

the depth (and altitude) of the Battle Space (all the way back to the CONUS and/or forward base);

Simultaneously execute, mount, and recover from operations ranging from war to PKO;orchestrate all the operating systems; aud do all of this very, very quickly.

-The quantum competitive advantage -will derive from the quantity, quality and usability of the inf

The architecture of Force XXI must derive from arobust, versatile concept of information based BattleCommand.”

GEN Gordon IL Sullivan

z Americds Army ,*. Into Eke 21st cmtt.lIyAs of: 5/24/95

Page 5: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

Force XXIThe Army of the 2lst Centu

. . . ,.., ., .A..., ., ., ,.,., ,I. ,, ,I. ,... . . . . . .i.: .':':.:'?:':.:.:.:,:,;.~~;.~~~:.:.::.:.:.~~:.~:.~:.~:.~~:.:.:.:.:.~~:.:.:I.. .: . . . . . . . . . . . . . . .:.:.:.:.:.:;.:.:.~.:.~,~,~,.;.;.;,;.;.;.;.:.:.~:::~~:.::~~:::~~::~:~~:~::~~~:.:.: .,...,. >:.:. ..,.: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. .. ..._ ,_ .,_ * ._.,,, _DCSOPS

/ l l l Fpont to Reap

We will Create LearningOrganizationsOrganized around information -not hardwareInherently versatile at every levelSimultaneously execute, plan,recover-continuous operationsLeverage skip echelon and splitbased operationsShared situational awareness, notthe same map sheet, the same map

Page 6: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

/

FM 100-6 (Draft)“INFORMATION OPERATIONS”

/ Continuous COMBINED ARMS OPERATIONS that enable and protect thecommander’s decision cycle while influencing an opponent’s Accomplished through

command and control and intelligence operations, Information Operations areconducted across the full range of military operations.

Page 7: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

DCSOPS

Page 8: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

l ocu~ initial effo& on Task Force .,.;:.:.: :,, ‘.,.‘Y;:‘:.’ ,:. . . . . ::.::.:: :,.::,,:::.: ,,.:. .,,I:. ,; .,~j;jjjj~~j~j~j: :),:, :. ..:: :. ..”::. : ,: .:: ::;s:::‘(; ,(:.. . . ,. ., ,..).,.:::~ :...: ;,.‘I.planned demonstrations,.,~~ii:;/:,~i!~~~~~.~~~.,-:i~~~.

., ., ,.,.,, ..:::. . . ;...:; .:;.;.;:~:;.y 1.: :.: . . . . . . . . . . >:.. ,.. . . . . . . ..,:. .,.,., ~:: ~ ,: :::: :,::::: :,,:: . . . . .,.,.,.,.(.,. .(. .,.:.,+, ..:.:. . . . . . . . ,.:.:.:.:..‘G.‘. .A..: ..A .A. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..:, .(. .,.: .:: j:‘:II:I/:.::.::‘:.:. :,: :: ,.:(I .(. . . . . ..~, >:::,::, .:,+.,::.::: .:q+>::::::: . . ..,. . . . . . . . . ., ,. .:.:...:., ,.,., . . .,.: : . . . . .‘(.o. ,:.:.:~:(::::,.::.,:::~:,:‘:,,( i!:it :,:::::, :,:~ ::::,,.: “““.‘.ii.i:i:“.g!....::.:.jiIi: g,;:j:: ?I...:.::.::. z:+ :p: >:‘)A “? :::.:i:i .:::,.,. ,:. .:.: .,,., :.:.:+:.:+:.: :,:. ~i:i::.I:I:I:j:i.i::.~.~.~:~~ ,...:, ,:;:$.:,:y,urity review 0 f do cu~~~~~~~~~~~C~:-..: .,.:::.::. . . . . . . . . . . . . . . . . . . :... ~:.~~(.~, .y.:.

..::::::,.~:)::::::::.:~~..‘.‘..~: : .::. .,, :I:-,. .:: . . . . ., . . . ,::;,.,I .:.:,::. . . . ,I, (...,.. ~: ~,.. .~: ,.. ‘+:‘I.: “’ :::.::::;:; .((. :.:.. .::::,.:.. . . . . . . . . . . . . . .

(1” ,..:.j::j! : ..:I:i (. ..:j ‘: j: :,:, ,.: (‘.. ‘: ,..I ‘1. .i:::;j: .;: ~;:$;:::g:; .,,jj,.:‘.3rCe xx Am ,::,, ;,,,m’.;;,::; ,,,:, I ~..:,‘.~~:I~~~~~:~,.~~,.~~~~~“~:!i::l.~,~ ;;

:. ,,., :‘::.:::.(+::: ..,,:’ ..’ ..:,.. .:.. .:.i .:.,,:. .,I ::‘.y::.j: :.i ‘i.&:,..’ : .::.,.::.: .I>,’ ‘> ,,” ..:,:.. . . . ...‘.:, ..,.,. ,.... ‘::/.:,.:: ,::, ;: ,;j,:, ,.::,,.:.:::: ::,: .,. .:::,: ,.,, ::::: . . ..:.:.:..::::::j:i:, ;:: ,,.: .:., ,:: ,”” :..;. “‘Z :;::::‘.;.::::: ‘; .,.: . . . . . . ~.(.::;.:,::.:..?’ “j:.:.‘.‘~‘:::““::.‘j,‘::: .:j I:.....: ,..A .,.. ,:.,.. ,:.: ::::..: . . . . . . ,.: :‘::?,I ,;y;: .(. . . :.+:.. .,.: ..:., ,:.:.:.. ::i::;ii:: :::: :::::::: ~: .,: :,:::,:,: . . ::..~:::.>:.:::::; ,... ..:, ,.. . . . . . . . . . . :.:;:::+::,r: ;:::. ,::: : : :,:, . . . . . :.. . . ‘. .:,:;.:j,:::. ::j::+: :.j:::. ::j::;. :,:.y .:;,;’ (, ,A’:::;:;:,‘].,:: (.... ‘::...:“:‘:: : ;:.:“:.6: ,:,::::,,,:..::::,.:.:.:::,:::,,, ::.y.;. ::;: ,:.:..:. ‘..:.:,.:: ,, .,.,... .(. .._ ,:. .(. . . . . . . . .,,,: :.,.:.,: 1;: . ...,., > :...A......... :. ,. . . . . . ,,,,,,,. . . . ..,:,,:,,, :,: :y> .:.. ,I:, ,,‘,:,,.( p>:. :,:,. >:. :‘:‘::,, ,:, ,:,:,:jy, .:“.“:.:;.::.i::,:~“:.:‘.,. . . . . .,. .( ,.,:;: : .:.. ,.” “:‘: :’ Y.. ‘.:“::.:..:‘:::. . . .,, ,. . . .,,,. ,.,. ,,>: .,. .:, . . ,:$::::. . . : : : : : : . . . . . ..: >: > .: : : 11:: . . “.:..... ‘. “? ,.‘( j :.:. . ,:, ,,.,.,,:.,,. .: .: ,,\:i: “,j::;‘;j; :,:, .: .” j, I::.. : ~.:~~:.::~~:.~::~~,.~~~.~.~~~‘.:.:.~.~.::

‘, “.’ :,‘.... :y,. ,,,,: .,., :,,j;:,::,,:,i ““: ‘. :” “.:jj::::Ki ,,:,,:,. ,:::‘:_:.j,, :::,.:.:,., .:: / : . . . . . . .: ,,:. ~ .:.,. . . . . . . . . ..:, .:.:. .&.(.. :.. ,I::..: . . . . ‘. . . :.. . . . . . . . . . . . . . . . . . :... ., . . . . . /,:. . . . . . . /i..::,: j j:j: ::;:: ..I. ,:: ,. ,, ‘. .y,: ..:;:::i ‘.‘.‘. ,,: .,,,: :,::::;..% ,..,:..:. .:::.:. ,,,,, .,., .,.(_ . / .,. ., .,.,. .(. ., .,. ., .(..’ ,( ,,,. :p:,:. :. .:, ‘y,>: ‘.‘> :,.,, . . . . . . ::,., :,,: ,, ,:,~,, :;:y:::,~ ,:,., :::.::j\y : ..:::,x;+ ‘:.. :I:.::::::.:..::.:: . . . . . . . . ,..:.,: . . . . . . . .,. . . . . . .,. .(.(. . . . . . ..,. . . . . . . I..: ‘(, ,,’ .,>: . . . . . ...I .., ,... . . . . ,:;...‘““‘,:.~~i’l:,~.;~:.~~~~~~.:.~~~::::~~.~~~: .,: .,...“.. . . . . ::.. .:. . . . . ,. (. .(. :,:,:,:: :( :,: :,:, :( :,. .,..,. ,,. .:, .: ,:,_;.: :.:::,,‘,’ . . ..I.‘. ‘( .‘.,,, ,::;;,,:,::j, ‘:(;:;:‘:,.‘, :~~,:j:.~lj,ii~:::‘.:::,:.::, .,,, ,,.,.,.....,. .,. .( ., .,.,. .,,..: ::::‘: . . . . . . :+ ,,: . . . . :.:, .,‘,.+ ..:.::: ,’ ,::, ,::~:,:~::::i’::~,:::,::::::’ . . . . . . .. . . . . . . . . .. . .. . . .. . . . . . . . ..:::,:,:,:,::,.,.. /....:;:::::: y::,:,::.. ‘:‘:‘....A. . . . . . . . . . . . . . . . . . ~ . . . . . . ...(.. .., . . . . . . . . . . . ,, :~:‘:,.‘:::.:.‘.’ .: ‘T ,‘:A : 4: y: ,.:1x1:, :i:j.;, ‘.‘.‘::::,:,:.:::,:,:,::,::: ::‘:(, ,+:.. ,,,,,,“‘.‘. .,.i.. :x.:::.::.::.:.:,:.:::.::::::::.:i~::~ i,j,j;j ;::I

: ::: ,, :, .:,;, :,,., . . . . . . .’ . . . . . . . . :,., .: ,.,.,: ,,/: .;:,i:r::;:;:$i:.: Yi:;:‘:‘: ,.,, .,.:.: :..‘.... :::.,:::.::...... .:.:.:x:..:.:.::::.:...:.::: ;,. : ,, ‘_:>A( ..‘.’ .,::::: ,i::~:,‘:.:.:.:.:.:::.(:::“.~~:::”.,:.:: ..:.:,::::::,~:,‘~:::“‘:‘:.::.:::,:.:::;.~:,_, ,.. :. .,.,. .,.,. .,.:. .:.: ‘y,:::. .,. .(.( ~:(,: .:.,.:: :, (( ::;,.: ,. ,, .,.,.,:. (, : ,: . . . . . . . . . . . . . . . . . . . . . . . . . . .v.....:....: .,..,.....,..(. :.~,..:.:.:. .:.:.._A,.,.: .., .,.:. .:.:.:_. .,.,.: .(.(.,. . . . . .,.,. :.:... . . . . . . . . :t::‘::::7::::.: .:.:. .,... >::::.:.“.( .:..;‘..(., . . . . . . . . . . . .,,:: .:.:. “; ,‘y:,y,,‘: . . .,.. ,.>>:.>:....A . . . . ./....““.‘.‘.““.““‘.‘..:..:i’::::.::‘:::::,:::::.:(, .,,.., > ,,/,,.,..:.:. ~.~.~:...‘+:::,:,::.::.:.i:::.::::::&:~:‘:. ..:. .,;:.::::: :, .:,:,:,,, ~, ,. .;,:: ,’ ,Jj:,:‘, ::.,,, ..,, (.,.,., .:.:::.::;:.::: ./.. :...:.: . . . . . ::i.~.:::~:::i:..:::‘::.:...‘.‘:.:.:::::::.:: . . . . . . . . . . . . . ..::.......:.::.:.‘:‘~::.:::~:.:.:.::::::.:.::’:.:.::::.:.:,‘::‘::.‘~.1........‘............:::::,,: . . . . . . :..,. .,.,. .( . . . . . ,, ,:.:..: .,....: (..,......, ‘,,’ :i., :, ,::: :: ::::::::xj::: f: : :::::.::,::::i: :.: : ::I: :::::i:.:.:::‘::::‘.:.:::.:.: :. :::...(... ), . . . . . . ..A.. / . . .,..v (, ), (( . . . ‘7.i: i:jji i:iii::l ,.:: j:i j;,; i:i:;ilqi:ii:i:i ;,;;.;;;:;:

..p .:y.>.: :::,:,::,,. .A,. .., I. . . . . .,... ,: ~ ::,::,:::..::,:::::::::::‘:::. ..‘.....):.‘.‘:.: ,,.,.,. . . . . . . . .),.,,,.(. .A.. . . . . ..~.....:::.:::.:.~.:..\.~.:.. .::.: . . . . . :.:. . . . . . . . . . . ::::.. . . . :. ..(. .: .:.,,: :.‘:.:.~ i., : ‘fl.j :>I. ,::I ::(.:I: ;, .,.,., ‘::h ” ‘.’ .:+::..A..... . . . . . . . . . . . :..:‘:“:‘)> ,.,,,:,:,,,.,.,:,:,:,.,:,:,.,,,:,:,:,,,,,,,,,,,,,“.:.:x.....:.: .A._. . . ..x+.+:.:::: .:::::::::.:::‘::::Y.:.:.:.. .,.,. .(. ..::::::.:::,:::‘.:,: :...:.:.:.._. . . . . .y,.,;; ..(.. . ..~. \fc,.’ . . ., ‘.‘. ~‘+‘~~::::::: :‘::::::i’ y$: :::.!:: ,.:.:.: :.:,:,:,: :,:.:,: :,.,: :,: :;, i: : : :: .:::.::.:.:.:.~:.:.:.::‘::.,:.:::.::::.::::::~:~:~~~,~.::::.::.:‘.:‘::1’1’1::.“.‘.::::.:: . . . . . . . . . . . . . . . . ..i /.....: . . . . . :.: . . . . . . . . . . . :.‘..:.::.:::::.‘::.::“‘::‘::::‘::.::::~.:.::::,.y:‘:‘.:.. ‘: ” ..:,: ,,:.::.:: .,.:,.,,,,: ::,,‘,:::::,:‘,:::‘::::,‘:,“:::,:~::,:~:,:,::,::,.:,::,‘::.:.:,::~‘::.::.:.: ,,:::::,,:~i:.:,,‘.:::::::.:::::.:.’,:.. .A. . . . . . >‘:, ,: ,/” ” :’ .(.( ., ., ., ., . . . . . . . . . . . . . . . . . ., . . ,. ,. . . . . . . . .._ . . . . . . . ,t.:./. . . . . . . . . . . . . . . . . . . . :: :... >:,>.& . ...,:... .~:;. .,, .,(I .,::.: j ..:.:. .: . . . . . . . . . ..,:: ..A/...... .,.....,::::. :.:.:::y:.~:.::‘.:.‘:::‘:(:,, . . . . . . . . . .,.(.,., ., ., ., .,.(.” “” ‘. . . . . . ,, : ,,, ,, ,(, ..(,., ‘::,::.:.:,:,:::::.:::‘::‘::::::,::,:.:,... ,,,,,__,,,,,:.,.(. .,.,.(.,.,.,.(. .(. “:,::::::,::.:::.:.: :,:::‘:::::::::‘::::i::::,::~:.::!:::.:.:.:. ,,,.: . . . . :.>>..:.>:.::,: : .A.’ ,A’:: .:. :.:.:.: .:.:::>: . . . . ::+::: ,.:::::::..,: ::.:::.:.: .(,, ,. :.:.:. . ..., ,:i,~.~... .,.:. .A, ,.. . . /...,” -2.. ‘:.:..‘..., Y .v,. :::.:.::::,::x: ..,,,,.__ :.,.: .,(.,_.,.,,,.~~~~, :::,~ ,:,,:,:::: ,::,,,.:. 1:::; j :11;. : ., ‘7 :::,:‘:.:::.:,: :::.:.::::: y:::::,:::::::,..: ::::::.::;:;:;:::j:+;;;;;: ::jl:l$i ,( $i:,;:iy .j.:.:j,::j:j,j ; ,Iji::j$:j:j::jl::l::Ij ,::, i:;:,+:.:: .::c :.:. ~:,i:gl;i,:..::z :,:.::~;$i I,i:~i’i::,:~i:~,~i::I:I::~:,~ ::,,:,: :::::::i::::~:I:::i:;i :::::: :: ,:,, ,,, ,,,:,“” “.‘,“.‘,“.‘.” ‘.‘.‘.“.‘:.:.:.:.:.:.:.:i,:.:.:...:.:... . . . . . . . . . . . ..::‘:.:::p’:>: . . . . . . . . . . . :.:.:,:::::,:,:::‘:“‘..‘.‘:~,~~,.......,..........:.... ‘.,.,....,.,.,.,,,:,:,~,,,:,:,:,~,~,~,~,~,~,~,‘( :::..: : j;:: ,,, ,. > ,.,:,,,., .( :,..+..:,..i.. :.y: ..,.A. :.::. ., ,>>?> .( : .,..:.. :. :. .,.:.,. .A’.‘.““.” .“.:...‘.:.,.>..:.::.:.:.:.:.j:.~ j:..:.:..:::: .:.:::,:::.:.i: . . . . .._ i.. .,. .,. . . ..y.: . . . ..A . . . .,.,.,.,., ~ (,._.(_. ..:t:,;+:,:::: ,‘>:q >>::>. . . . . . . . . . . . ..A.......~ .,.,.(.,.,. . . . . . .: : : : : : : .,..., .(.. ..k. ,. ..,..... . . . . . . . . . ..I iiilliiiiil::::‘:::.::“::::,:::::.:’:.yf.:.~:..:,~,:::~,~~ ,:,, >::.::,:,:,, ;.:. :::::.:. :::::::::. :” . . . . .:::...“:::.:. :. .’ ‘:.::.:‘::.:.:.:: ::‘: :

. . . . . . . . . . . . . . . . .: ,(,.. j,.::..:i:i,:,ii.,:. ;:F :.: :.:,.., :...(. :,. ,:,:,: : :

“y 1: I”: s tx y r..~:.:.:::,&O F.e~~:l~:~.~~~~~. . ,: :.:.:.,,: :::::::,:;:,. ..:.:. . . . . ;::::.:.:>>. :,:, .‘x::.i:I:;:x ...: :&+:: :cc I.. :.: .,.,..... :.:.:...: . . . . . . . ~ . . . .:::j:::j::::.:. ,‘:~:~,:‘:‘::,‘,‘, :,.,. .: . . . . :.,. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . :.: .A............ . . . . . . ._I.. ./.:.:c.:.:.:.:.:.:::.:qx.~ :,:,:,:.:. ~:9,:,~:;?~::~~~.:~~~~:.;.:.:~~::~:~::;~;~.~~~~~~.:~~i~~:~~~:~~ ,:,. *>b.. :. : : ;: y<::::::$y+y.::‘:‘+:.:‘::::::?:i i...,.. L ._____.__........,.,.,...,...., ~ ..,,,,,,_,, ~,..(,. .,,. . . . . . . . i,,::: :‘: :::+.: ” “‘.“‘.‘.‘.‘.‘.‘“.‘.:r.:.::::::.:,~.~.:.:.:,:,:,:.:,~,:,:.:.:.:,:.~..~,.~, ..,, *>=,.,rr\ /., ,,.,“‘::‘:“‘.‘.‘..... . . . . . . . . .._....................,.,.,.,.,..........: : ::.?>... i ..,.,.A.... . . . .“‘:C’.“.‘.‘....‘.‘..‘.‘.. ,x..< ,...z,.......... . . . . . . . . . <\ . . . . . . . . . . :.:.~.~.)~~.~,.~,~.:.: ..,,/, .,).<<~,<,,>,..&” ‘. ..c.. . . . ..,.~.~?~,:~?~~~~~~;~~~~~.~,:,~,.*~,~.~*. . ..A. .,I A. y&.~>.M,,d.$$>,.

Page 9: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

to C2 Information SystemsDCSOPS

,:: . ..A .:.. ,I r.5 ,,

.‘.

Page 10: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

C2 Protect Development

. ...;...:..: : ‘..,. ,I.:,:., ,.:.. ..:.I.;.. ,: ;,. ,,,i;:y;,::: :::,:c ..: ::. ..,. ..,. “,,::::‘::,‘,, : ,,::,, ~:::::./. .: .:.:., ,::l~::::i,:::,:,‘,,:::.:::.:.::::.,.: ,.... :.:,.. .A,.,. .,..::,..:.., . . . . . . . . . ,.: . . . . ::,:.::,:+ .:...:.:..>‘:::.:.‘:.:.:.:.:..(‘...:1.: :;:::: ,:,:,: :,~,:(.:.:,:.,.:. ~ :::,:..,:, ,.:...:::j. ..:,..: ii,.:.>:.7. ..>:.>:.,. .,. ., . . . . ..~......,., ,.,.,., ,.,. >; ,:,. :,:::,:,:::::,>:,.‘:lil:lij:::i:‘Il:I:::i:l:l:::l:: I:i:i:l.l::::.iliiii:il::itili:jiijl.li ;,;;;;i:,g::::::.:::::y,:; .,.““:‘:::::::::::::::::::.:.:.:.~,:.:...:,:.:.: .,.,. ,.,,,:,.,,: ,,,,. .:y:: ~,...,...~,~,~.~,.....\~...~...~..,..,..........~~.....:,. .:.;.,::.,:,.,.,:::.:: :y::.;:.:::. .::.- .,..:.,:.:.:.: �:.�y.�.b>:;�:,;:I:�~~ ,,,:,

l Near Terln Action Itelns from:: tthe. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~..~:::%:::::,:,:,::::::.::.:...:,::,..,. .,.,.., ......: .: .:: .� �.,. �.: .:.:. 1 ,�, ;: ,�,�,I,, ,::,:.j:.:.j:. ,,,,(..,(/(. :::.>>:::.:::.,,,,..,..,....,...,.....,,. ::.�.:::�::::j,l::jI::.I. ,�. ~,~,.,.,.,.,.,. .,. .,. .

.�AT-n /y l 1 fin 1 1 .:.,.

: :. ;:,, ,. . . . . . . . { .,:, .�. .,

�.;I;,; ,;:;f .I,:;,$j:;,�:.:,jj,:,:I,~:l;:i~,~,~,~,~�:li:.~l ;::�l�<;;r;,::.:::,, . .

.,. .: �.�:,,~~,j~.~~~j~~~i:;~~~~~~~~~~~:,~~,~:,~~~::,:,~~:

,, .� ,. (. .: .,., .:>: : .::I: .:. p ,, . . . I..%-:,:,;>:,.�.�:�::�::,:,:::,::::,:,:::,::::::.:,:.:: .:,,,:,,.

� ..,.�,, .�:�;,:, ,.,

:,;;; ,:,::,. .(. . .,:::,:,:::l:j:j:::j::::~,:�:,. . ,.....: :7..:: �.:: :: :(: ;,,. .,. .,.:. .,... . .:. ., .:::::::::: :,:,:,?:: ~: :. ,,: ,.,:

: . . . . . . . . . . . . . ,... . . ..,. . . . . . . . . . .,.,.,.,, .,, .,. ./.,.,. .> .:. .::.),:j::):j:j: ::j.::::.:::::.:.:,:::, ,. .,.,...,.,.. .~...,..,.,.,...............,...,.,... ., ,..):~::y ..: .:,�,. ::�,j,::,,. ,,., .,: :.::.:.:. 7 �,:,�,~:,�,�,�:: ,:~,�j,,j☺:::,: :;;, ;:.. .:j( ;:. .,.,,:.,,, :, ,,:: .:�. . ::~..~:�,�:,::�..�~.,:::~ ,...,. .,. .,. .:. . :, .: .: : : :.;, �,I�,: ..?,.:::::,:::,I~ ... . . . . . . . . . . . . . ,...,.: ..,.... ::: :⌧.:+:.:⌧:: ::::.:::::,:,:,:::::::::::�:�l.l.l.l,i.:,.:~ :.:::.::,

:j:::: :,:,:,):,,�:::j�:.,��,�j~:l:l:l:j:::j:j:::,::.:::,:.:.:.:.:.:.�.~:; ,:�:,::::,:,:,:,: ~::*:,~:,:.:,:�,:::,: :.,,,,,,.,,,,,,,

. . ,,.. ~.,...,C,, .,,,, ,,,,, :~ ,:: .,:,. .,., v:,, ,, ,,., .c

.~.~.~.~~��.:.,�:�,:,:::,:,:,::.:.: :,.: :.:::::::::::::::::::::~~~:~:~:~::~~:.~:,::::. :::>:.:: ,:,:, >::::y . . .. . . . . . :,::,:::,::::::::,:,:,:.�j.i.j.I.i.:.. ;: ,:,:,:;, �I�.:: .�.�::.:::~.:.�~�:.j jj,.::,.: .� :...::.::.,.:::::::::::.:,:::::.::.::::,::,:::::::~::::~ ..,.., �:::,:::,:::.:.:.:.:::I::::.:::~:,:::,::,:,:::.:.:.:.:,~ :,:. .,.:,,,:,,,,, ,:,: . . . . . . . . . . ..,.,.,,. .::. . . . . . :..: . ,..... :/ ,,. :j: ., :,::: ‘: ‘)‘,l L 0 n g Term C 2 ,:,I ;,,... .,,,.. ::.::.:.:.~:.~j:,..::::::~::;::;:::,::::::::::... . . . . . ,. . . . . :.: .,.,. .:.:;.::::.,. .,. .,.,. .,::: :,:,.,:.:. ~:.~p r 0 t e cti:~~s~~~~~:~~i:-:i:~ ~~~~~~~-~~~~~~~~~~

“.“‘.‘.‘.’‘.‘.‘.’ : : ,.’ ” ,‘:, :,:: ,.,.,.: .,. ,,, ,, ,..::.:.::, ....:::::.:~:::?:. ..::::y .+A . . . . ..\ . . .. . . . “““’::‘.‘.‘.‘::. ,,. .,.,.,.,.,...,.,, ,, ,.,,,,,,,(,,,,, :. . . . . . ..,. ,... ,.....““” : ,,,, ‘,’ ” .:. .:‘.

,,. ““(“‘..(‘.:.‘:::‘:‘::: . ../ :.::::::: :,:,:::,:,:,,::,:,,,.’ ., ,., . . :, .,., ..:. .+:..:::: : >:. :. . .::y,, :,, ,., ..:,, .:... . ..x.....:. :..,.....,.,.. ~i~)~~:-~~‘.~.“~“~‘.‘~‘.(‘~~~~.~.(.:.~:.:.~~~::::,:,:,: :.,,,., ;,:,: ::.:.,:,:,:,.,::,::-,,, :,,:.:.:,:. . . . .. .::.:.........x:: xx>:,:,:,:::: ::: . ../... ~.. .,.

-. :, .:.:.I: .:....... ‘.. . .:. ::,::, :,::: :,,, :; ,.:. ,., ,.,., ,.,.,. .,.,...,.,. .,. . . . . .,.,,,,.,., ,,,.,., ..,.,....... .A..... ...., . ...\ . . . . . . . . . . . . . . ,. .:::““‘.~:(::.:,.,........ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..,.,...,. . . . . ./..:::.:.:: :.:.‘.~::::.:.::::::,,.:~:,:,:.. . . . . . . . . . . . . . . ..~.........

.’ ” ,..:.,.,.:,,,. .::: ./.:; ,,,,,: .:‘,: :‘:‘, ;:;;;, ;,::>y:. . ,:,: :::..x.. .,,. . .,. :. : :,, : :,: ,, ,,, :,::: ..:,:,.,:,:,.,.,:.:, ~ :,:,., ,~~ ::.:::.:.,. .,.,. :..::::::.:::::.:::.~::~::i::~,~:~:~:~~::~:,:,:.:.‘.’ ” ‘.. . (,. ::.::.::::‘::::~:,:::,‘:::::‘::::.::...~.~,~.::~::,,:,., . . . . . . . . . .::::::,:::::,‘:,:.:~:::::::.:::::.:.:.:...:.:.~: . . . . . . . . . . . . . .;, ., ,,,, ,,, ,‘,‘::,‘,:,:::,‘,::‘: :.:, ,., ,., ,~ . . :..::.:. :, ‘:‘,,il::;i:i,i:i:;r ,,... :,:., ,.: . . . . . .,.,. :.,.F . . . . ::: . . . . . . . . . . . . . :...:.:.:...c .,. . . . . . . . . . . . . . . . . .._...........; ,, : .; . ..>.y ., ,x>; .‘.Z.. ; .:‘C. :, ,~ ,/. . . . . :.:... . . .;.: ., . . . . . . . . . . . . . . .,.. . ..,,.,.,.,.,. : ..> ,.,. : . . .:‘:(:.::!:l’:i”“I’i’:‘: ~:i.i:i:i’-‘4”‘i:~~~ j,j ; ; j >y .:. .‘...W i’:i.:i::::~~:::::~::::.:.:.: gz:;z,::, ,: .‘.F .:: : . . . . . . . . ..:I:::.:..:.:::.):~::~,: ;,.,. ,,.

Page 11: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY
Page 12: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY
Page 13: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

C2 Protect DevelopmentConcerns

DCSOPS. . . . . . ..: :., .: .; .‘...~~..~,.::.:.:.:.::.:-:.:.:.-~~::~:;::::::;:::~::::::::::::::::~::~~::::::::,:.:.:.: :.:.:.:.:.:,:.:.~.:.:.:.:,: ,:,,,,,,,, :,:,: ,.,,, :,:,:,:.: :_ ~;; _,.,.,.,...““:“‘)‘),“““‘,,.,.‘., L, 1. _,,..,,....,./.,.“““““““‘.’ ““I...., .‘. i..:...:. . . . . . ..l.. /

Page 14: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY
Page 15: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

/

C2 PROTECT

INTDISC4

DCSOPS

I Lead Developers and Signatures on all C2 Protect Volumes

i .

Page 16: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

DISC4 C2 Protect Mission

In coordination with DCSOPS and DCSINT, DISC4is responsible for implementing procedural andmaterial protective measures, to protect Command,Control, Commtinications, and Computers (C4Protect).

Page 17: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

DCSINT C2 Protect

Page 18: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

\

Page 19: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

Land Information Warfare Activity

“LI WA”

MISSION: . .

Provide DA level Information Warfare/Command and ControlWarfare support to Land Components and separate Army commands to

, facilitate planning and execution of Information Operations. Coordinate1 with National, Joint, and Service IW/C2W centers to exchange and

synchronize intelligence,and information support across the operationalcontinuum.

I

Page 20: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

Land Information Warfare

Act as Operational Focal Point for IWArmy Staff (DCSOPSLDCSINTLDISC4)Joint, Service, and National AgenciesMACOMs and MSCs

Arrange for and Coordinate Support to CDRs

Coordinate and Deploy Field Support Teams

Integrate Compartmented Programs with OtherActivities

Page 21: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

C2 Protect Issues

Page 22: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

I/

I

I rmy Informationare Under Attack

Sys terns

Attacks are frequent and highly sophisticatedArmv had 90 reDorted penetrations in CY 94

JI .A -L

of detected penetrations go unreported

means that Army had 1800 detected

95%This

94%

Total penetrations to Army approx 4500of penetrations are undetected

3/30/95 2

Page 23: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

How Do Intruders Get InI

+ Through cotimercial service providers+ 95’% of of DOD comms use commercial .

service ,+ MILNET is mostly leased commercial.

service+ Run automated attack

+ Use software utility tools to obtain systeminfo

+ Exploit system info to get user access

/

4

Page 24: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

at Intruders Can Do

+ Obtain password file

II+ ObtAin system administrator privileges,I

I + Plant undetectable programs

+ Change, alter or destroy information

+ Shut down system (now or later)

+ Log on to next system as valid user+ Down stream liability issue+ Makes Army responsible for damage

3/30/95 5

Page 25: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

Example Internal Hackingssified info on unclas MILNET

1 + OSD budget infoII + DIA reports with names & locations of indivuals

1 + Air Force flights with dates, times, code names etc.

+ Civ & Mil (AF) passing info td hacker network:+ Member of Inaugration team selling access to

BCN

&Users from HQ DA extracing pornographic” material & games

3/30/95 10

Page 26: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

xample of PenetrationsA r m y S y s t e m s

+ ODISC4 LANI + Requested Vulnerability analysis by SAM

I+ Used commonly available software tools+ Penetrated in 5 min+ Gained superuser (ROOT) access in 15 min+ Potential impact total enemy control plus+ trusted launching platform to other syst+ Penetration,was not noticed or reported

3/30/95 6

Page 27: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

---

-.-..-- ___,,

+

---

-

.

Page 28: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

I

Example of Penetrations” I

’ ‘+ DSS-WI

i’

4 3 MB of data stolendata involved contract sensitive informationISC-P stopped the attack .ISC-P assisted in p&venting subsequent attacks

. .

3/30/95

Page 29: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

xample - pentagon Broadband

Cable Network (BCN)1 + Unauthorized user from Swedish host

logged in+ Executed several commands+ Posible loss of password file

Unauthorized user from Virgina Tech host+ Repeated attempts using various user IDS

SuSessful using-&7stem. .

admimistrator’s IDUnauthorized user from NASA host+ Logged into two $iJj&rent user accounts

8

Page 30: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

’ Infofmation SecurityDCSOPS

Education/Awareness

Training

Public ForumsArmy Information Systems Security Council

Polkies and Procedures* The Army Plan* A R 3 8 0 4 9* AR 25170 series

Land Information Warfare Activity

Page 31: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

C2 Protect Planning Evolves into AR XXX-XX

Page 32: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY
Page 33: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

ARMY.. ISSP REQUIREMENTSWITHIN FUNDING PEGS DCSOPS

,: ,,,,. .., ,:, .A:: : .:.L.. ,:::.i::::::::::.:::::::::.:.:.:.:,:.:.:.:.:.:.:.:..,:.:.~:.:.:.:.~~.:.:.:.:.:.s.:.:.:.:.: .,., <., ,.. . . ,,A ,.., ,., ,.. . . . :. I......,.....,.. :.i:r,::I.a,:,:,:.~~~~~~;~~~~~

MODERNIZATION PEGAIRTERM

INFORMATION MANAGEMENT PEGDefense Message System

BENIGN FILL

AKMS TIER 1 (EKMS) COMPUSEC

SECURE TERMINAL EQUIPMENT

KIV-7

KG-40A

Multi Information System Security Initiative

MACOM

Page 34: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

P‘

Page 35: Protecting Friendly Command and Control Capability The ... · Capability The Army’s C2 Protect Efforts an In Process Review LTC MIKE BROWN HQDA, , DISC4 I ... DISTRIBUTION / AVAILABILITY

::::r::::::fi;$$y&::+*,

mu-nary I ~L~~~:~.:~::~:?~.::.:.:DCSOPS

..I......:,.::.,:.. ,,““.‘.‘,‘.‘.‘.‘,‘.‘.‘.‘.‘.‘.‘.““.’..’.’.’. /.....,...,. .,.,...,.,.,.,‘.‘,‘........,:,:.: ~.;~:::::i:!::~.:::i:::j~,::::::~.~~~~~.~.~~.~.~~:~~:~:~.~: : :...: ::.:: :.: ::‘.:‘::::>:i; . .._i........(.._,...,........ I.:,,.::::::::;:~,:‘:‘. ;,., ,‘,‘, y:; ‘,‘,’ ‘,..