protecting friendly command and control capability the ... · capability the army’s c2 protect...
TRANSCRIPT
IA-00010
INFOFUMATION WARFARE
Protecting FriendlyCommand and Control
Capability
The Army’s C2 Protect Effortsan
In Process ReviewLTC MIKE BROWN
HQDA, , DISC4I
SAIS-C4C, 703-697-l 474
MR PHILLIP LORANGER
HQDA, DISC4
SAIS-C4C, 704-696-8070
Form SF298 Citation Data
Report Date("DD MON YYYY") 01051995
Report TypeN/A
Dates Covered (from... to)("DD MON YYYY")
Title and Subtitle Protecting Friendly Command and Control Capability TheArmys C2 Protect Efforts an In Process Review
Contract or Grant Number
Program Element Number
Authors Project Number
Task Number
Work Unit Number
Performing Organization Name(s) and Address(es) HQDA
Performing Organization Number(s)
Sponsoring/Monitoring Agency Name(s) and Address(es) Monitoring Agency Acronym
Monitoring Agency Report Number(s)
Distribution/Availability Statement Approved for public release, distribution unlimited
Supplementary Notes
Abstract
Subject Terms
Document Classification unclassified
Classification of SF298 unclassified
Classification of Abstract unclassified
Limitation of Abstract unlimited
Number of Pages 34
REPORT DOCUMENTATION PAGEForm Approved
OMB No. 074-0188Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering andmaintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,including suggestions for reducing this burden to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503
1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE
5/1/953. REPORT TYPE AND DATES COVERED
Briefing4. TITLE AND SUBTITLE
Information Warfare - Protecting Friendly Command andControl Capability: The Army's C2 Protect Efforts an InProcess Review
5. FUNDING NUMBERS
6. AUTHOR(S)
Mike Brown|Phillip Loranger
7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER
IATACInformation Assurance Technology AnalysisCenter3190 Fairview Park DriveFalls Church VA 220429. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING
AGENCY REPORT NUMBER
Defense Technical Information CenterDTIC-IA8725 John J. Kingman Rd, Suite 944Ft. Belvoir, VA 2206011. SUPPLEMENTARY NOTES
12a. DISTRIBUTION / AVAILABILITY STATEMENT
A
12b. DISTRIBUTION CODE
13. ABSTRACT (Maximum 200 Words)
This briefing is a roadmap for the U.S. Army as they move to Command and Control (C2)Protect in support of the Army's Force 21transition. It addresses C2 protect in a digitalbattlefield environment, the threat and vulnerabilities environment, and Approach to theproblem of C2 Protect.
14. SUBJECT TERMS
IA15. NUMBER OF PAGES
16. PRICE CODE
17. SECURITY CLASSIFICATION OF REPORT
Unclassified
18. SECURITY CLASSIFICATION OF THIS PAGE
UNCLASSIFIED
19. SECURITY CLASSIFICATION OF ABSTRACT
UNCLASSIFIED
20. LIMITATION OF ABSTRACT
None
What is I?orce XXI?
. . .Operate in an unpredictable an&hanging environment, throughout L
the depth (and altitude) of the Battle Space (all the way back to the CONUS and/or forward base);
Simultaneously execute, mount, and recover from operations ranging from war to PKO;orchestrate all the operating systems; aud do all of this very, very quickly.
-The quantum competitive advantage -will derive from the quantity, quality and usability of the inf
The architecture of Force XXI must derive from arobust, versatile concept of information based BattleCommand.”
GEN Gordon IL Sullivan
z Americds Army ,*. Into Eke 21st cmtt.lIyAs of: 5/24/95
Force XXIThe Army of the 2lst Centu
. . . ,.., ., .A..., ., ., ,.,., ,I. ,, ,I. ,... . . . . . .i.: .':':.:'?:':.:.:.:,:,;.~~;.~~~:.:.::.:.:.~~:.~:.~:.~:.~~:.:.:.:.:.~~:.:.:I.. .: . . . . . . . . . . . . . . .:.:.:.:.:.:;.:.:.~.:.~,~,~,.;.;.;,;.;.;.;.:.:.~:::~~:.::~~:::~~::~:~~:~::~~~:.:.: .,...,. >:.:. ..,.: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. .. ..._ ,_ .,_ * ._.,,, _DCSOPS
/ l l l Fpont to Reap
We will Create LearningOrganizationsOrganized around information -not hardwareInherently versatile at every levelSimultaneously execute, plan,recover-continuous operationsLeverage skip echelon and splitbased operationsShared situational awareness, notthe same map sheet, the same map
/
FM 100-6 (Draft)“INFORMATION OPERATIONS”
/ Continuous COMBINED ARMS OPERATIONS that enable and protect thecommander’s decision cycle while influencing an opponent’s Accomplished through
command and control and intelligence operations, Information Operations areconducted across the full range of military operations.
DCSOPS
l ocu~ initial effo& on Task Force .,.;:.:.: :,, ‘.,.‘Y;:‘:.’ ,:. . . . . ::.::.:: :,.::,,:::.: ,,.:. .,,I:. ,; .,~j;jjjj~~j~j~j: :),:, :. ..:: :. ..”::. : ,: .:: ::;s:::‘(; ,(:.. . . ,. ., ,..).,.:::~ :...: ;,.‘I.planned demonstrations,.,~~ii:;/:,~i!~~~~~.~~~.,-:i~~~.
., ., ,.,.,, ..:::. . . ;...:; .:;.;.;:~:;.y 1.: :.: . . . . . . . . . . >:.. ,.. . . . . . . ..,:. .,.,., ~:: ~ ,: :::: :,::::: :,,:: . . . . .,.,.,.,.(.,. .(. .,.:.,+, ..:.:. . . . . . . . ,.:.:.:.:..‘G.‘. .A..: ..A .A. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..:, .(. .,.: .:: j:‘:II:I/:.::.::‘:.:. :,: :: ,.:(I .(. . . . . ..~, >:::,::, .:,+.,::.::: .:q+>::::::: . . ..,. . . . . . . . . ., ,. .:.:...:., ,.,., . . .,.: : . . . . .‘(.o. ,:.:.:~:(::::,.::.,:::~:,:‘:,,( i!:it :,:::::, :,:~ ::::,,.: “““.‘.ii.i:i:“.g!....::.:.jiIi: g,;:j:: ?I...:.::.::. z:+ :p: >:‘)A “? :::.:i:i .:::,.,. ,:. .:.: .,,., :.:.:+:.:+:.: :,:. ~i:i::.I:I:I:j:i.i::.~.~.~:~~ ,...:, ,:;:$.:,:y,urity review 0 f do cu~~~~~~~~~~~C~:-..: .,.:::.::. . . . . . . . . . . . . . . . . . . :... ~:.~~(.~, .y.:.
..::::::,.~:)::::::::.:~~..‘.‘..~: : .::. .,, :I:-,. .:: . . . . ., . . . ,::;,.,I .:.:,::. . . . ,I, (...,.. ~: ~,.. .~: ,.. ‘+:‘I.: “’ :::.::::;:; .((. :.:.. .::::,.:.. . . . . . . . . . . . . . .
(1” ,..:.j::j! : ..:I:i (. ..:j ‘: j: :,:, ,.: (‘.. ‘: ,..I ‘1. .i:::;j: .;: ~;:$;:::g:; .,,jj,.:‘.3rCe xx Am ,::,, ;,,,m’.;;,::; ,,,:, I ~..:,‘.~~:I~~~~~:~,.~~,.~~~~~“~:!i::l.~,~ ;;
:. ,,., :‘::.:::.(+::: ..,,:’ ..’ ..:,.. .:.. .:.i .:.,,:. .,I ::‘.y::.j: :.i ‘i.&:,..’ : .::.,.::.: .I>,’ ‘> ,,” ..:,:.. . . . ...‘.:, ..,.,. ,.... ‘::/.:,.:: ,::, ;: ,;j,:, ,.::,,.:.:::: ::,: .,. .:::,: ,.,, ::::: . . ..:.:.:..::::::j:i:, ;:: ,,.: .:., ,:: ,”” :..;. “‘Z :;::::‘.;.::::: ‘; .,.: . . . . . . ~.(.::;.:,::.:..?’ “j:.:.‘.‘~‘:::““::.‘j,‘::: .:j I:.....: ,..A .,.. ,:.,.. ,:.: ::::..: . . . . . . ,.: :‘::?,I ,;y;: .(. . . :.+:.. .,.: ..:., ,:.:.:.. ::i::;ii:: :::: :::::::: ~: .,: :,:::,:,: . . ::..~:::.>:.:::::; ,... ..:, ,.. . . . . . . . . . . :.:;:::+::,r: ;:::. ,::: : : :,:, . . . . . :.. . . ‘. .:,:;.:j,:::. ::j::+: :.j:::. ::j::;. :,:.y .:;,;’ (, ,A’:::;:;:,‘].,:: (.... ‘::...:“:‘:: : ;:.:“:.6: ,:,::::,,,:..::::,.:.:.:::,:::,,, ::.y.;. ::;: ,:.:..:. ‘..:.:,.:: ,, .,.,... .(. .._ ,:. .(. . . . . . . . .,,,: :.,.:.,: 1;: . ...,., > :...A......... :. ,. . . . . . ,,,,,,,. . . . ..,:,,:,,, :,: :y> .:.. ,I:, ,,‘,:,,.( p>:. :,:,. >:. :‘:‘::,, ,:, ,:,:,:jy, .:“.“:.:;.::.i::,:~“:.:‘.,. . . . . .,. .( ,.,:;: : .:.. ,.” “:‘: :’ Y.. ‘.:“::.:..:‘:::. . . .,, ,. . . .,,,. ,.,. ,,>: .,. .:, . . ,:$::::. . . : : : : : : . . . . . ..: >: > .: : : 11:: . . “.:..... ‘. “? ,.‘( j :.:. . ,:, ,,.,.,,:.,,. .: .: ,,\:i: “,j::;‘;j; :,:, .: .” j, I::.. : ~.:~~:.::~~:.~::~~,.~~~.~.~~~‘.:.:.~.~.::
‘, “.’ :,‘.... :y,. ,,,,: .,., :,,j;:,::,,:,i ““: ‘. :” “.:jj::::Ki ,,:,,:,. ,:::‘:_:.j,, :::,.:.:,., .:: / : . . . . . . .: ,,:. ~ .:.,. . . . . . . . . ..:, .:.:. .&.(.. :.. ,I::..: . . . . ‘. . . :.. . . . . . . . . . . . . . . . . . :... ., . . . . . /,:. . . . . . . /i..::,: j j:j: ::;:: ..I. ,:: ,. ,, ‘. .y,: ..:;:::i ‘.‘.‘. ,,: .,,,: :,::::;..% ,..,:..:. .:::.:. ,,,,, .,., .,.(_ . / .,. ., .,.,. .(. ., .,. ., .(..’ ,( ,,,. :p:,:. :. .:, ‘y,>: ‘.‘> :,.,, . . . . . . ::,., :,,: ,, ,:,~,, :;:y:::,~ ,:,., :::.::j\y : ..:::,x;+ ‘:.. :I:.::::::.:..::.:: . . . . . . . . ,..:.,: . . . . . . . .,. . . . . . .,. .(.(. . . . . . ..,. . . . . . . I..: ‘(, ,,’ .,>: . . . . . ...I .., ,... . . . . ,:;...‘““‘,:.~~i’l:,~.;~:.~~~~~~.:.~~~::::~~.~~~: .,: .,...“.. . . . . ::.. .:. . . . . ,. (. .(. :,:,:,:: :( :,: :,:, :( :,. .,..,. ,,. .:, .: ,:,_;.: :.:::,,‘,’ . . ..I.‘. ‘( .‘.,,, ,::;;,,:,::j, ‘:(;:;:‘:,.‘, :~~,:j:.~lj,ii~:::‘.:::,:.::, .,,, ,,.,.,.....,. .,. .( ., .,.,. .,,..: ::::‘: . . . . . . :+ ,,: . . . . :.:, .,‘,.+ ..:.::: ,’ ,::, ,::~:,:~::::i’::~,:::,::::::’ . . . . . . .. . . . . . . . . .. . .. . . .. . . . . . . . ..:::,:,:,:,::,.,.. /....:;:::::: y::,:,::.. ‘:‘:‘....A. . . . . . . . . . . . . . . . . . ~ . . . . . . ...(.. .., . . . . . . . . . . . ,, :~:‘:,.‘:::.:.‘.’ .: ‘T ,‘:A : 4: y: ,.:1x1:, :i:j.;, ‘.‘.‘::::,:,:.:::,:,:,::,::: ::‘:(, ,+:.. ,,,,,,“‘.‘. .,.i.. :x.:::.::.::.:.:,:.:::.::::::::.:i~::~ i,j,j;j ;::I
: ::: ,, :, .:,;, :,,., . . . . . . .’ . . . . . . . . :,., .: ,.,.,: ,,/: .;:,i:r::;:;:$i:.: Yi:;:‘:‘: ,.,, .,.:.: :..‘.... :::.,:::.::...... .:.:.:x:..:.:.::::.:...:.::: ;,. : ,, ‘_:>A( ..‘.’ .,::::: ,i::~:,‘:.:.:.:.:.:::.(:::“.~~:::”.,:.:: ..:.:,::::::,~:,‘~:::“‘:‘:.::.:::,:.:::;.~:,_, ,.. :. .,.,. .,.,. .,.:. .:.: ‘y,:::. .,. .(.( ~:(,: .:.,.:: :, (( ::;,.: ,. ,, .,.,.,:. (, : ,: . . . . . . . . . . . . . . . . . . . . . . . . . . .v.....:....: .,..,.....,..(. :.~,..:.:.:. .:.:.._A,.,.: .., .,.:. .:.:.:_. .,.,.: .(.(.,. . . . . .,.,. :.:... . . . . . . . . :t::‘::::7::::.: .:.:. .,... >::::.:.“.( .:..;‘..(., . . . . . . . . . . . .,,:: .:.:. “; ,‘y:,y,,‘: . . .,.. ,.>>:.>:....A . . . . ./....““.‘.‘.““.““‘.‘..:..:i’::::.::‘:::::,:::::.:(, .,,.., > ,,/,,.,..:.:. ~.~.~:...‘+:::,:,::.::.:.i:::.::::::&:~:‘:. ..:. .,;:.::::: :, .:,:,:,,, ~, ,. .;,:: ,’ ,Jj:,:‘, ::.,,, ..,, (.,.,., .:.:::.::;:.::: ./.. :...:.: . . . . . ::i.~.:::~:::i:..:::‘::.:...‘.‘:.:.:::::::.:: . . . . . . . . . . . . . ..::.......:.::.:.‘:‘~::.:::~:.:.:.::::::.:.::’:.:.::::.:.:,‘::‘::.‘~.1........‘............:::::,,: . . . . . . :..,. .,.,. .( . . . . . ,, ,:.:..: .,....: (..,......, ‘,,’ :i., :, ,::: :: ::::::::xj::: f: : :::::.::,::::i: :.: : ::I: :::::i:.:.:::‘::::‘.:.:::.:.: :. :::...(... ), . . . . . . ..A.. / . . .,..v (, ), (( . . . ‘7.i: i:jji i:iii::l ,.:: j:i j;,; i:i:;ilqi:ii:i:i ;,;;.;;;:;:
..p .:y.>.: :::,:,::,,. .A,. .., I. . . . . .,... ,: ~ ::,::,:::..::,:::::::::::‘:::. ..‘.....):.‘.‘:.: ,,.,.,. . . . . . . . .),.,,,.(. .A.. . . . . ..~.....:::.:::.:.~.:..\.~.:.. .::.: . . . . . :.:. . . . . . . . . . . ::::.. . . . :. ..(. .: .:.,,: :.‘:.:.~ i., : ‘fl.j :>I. ,::I ::(.:I: ;, .,.,., ‘::h ” ‘.’ .:+::..A..... . . . . . . . . . . . :..:‘:“:‘)> ,.,,,:,:,,,.,.,:,:,:,.,:,:,.,,,:,:,:,,,,,,,,,,,,,“.:.:x.....:.: .A._. . . ..x+.+:.:::: .:::::::::.:::‘::::Y.:.:.:.. .,.,. .(. ..::::::.:::,:::‘.:,: :...:.:.:.._. . . . . .y,.,;; ..(.. . ..~. \fc,.’ . . ., ‘.‘. ~‘+‘~~::::::: :‘::::::i’ y$: :::.!:: ,.:.:.: :.:,:,:,: :,:.:,: :,.,: :,: :;, i: : : :: .:::.::.:.:.:.~:.:.:.::‘::.,:.:::.::::.::::::~:~:~~~,~.::::.::.:‘.:‘::1’1’1::.“.‘.::::.:: . . . . . . . . . . . . . . . . ..i /.....: . . . . . :.: . . . . . . . . . . . :.‘..:.::.:::::.‘::.::“‘::‘::::‘::.::::~.:.::::,.y:‘:‘.:.. ‘: ” ..:,: ,,:.::.:: .,.:,.,,,,: ::,,‘,:::::,:‘,:::‘::::,‘:,“:::,:~::,:~:,:,::,::,.:,::,‘::.:.:,::~‘::.::.:.: ,,:::::,,:~i:.:,,‘.:::::::.:::::.:.’,:.. .A. . . . . . >‘:, ,: ,/” ” :’ .(.( ., ., ., ., . . . . . . . . . . . . . . . . . ., . . ,. ,. . . . . . . . .._ . . . . . . . ,t.:./. . . . . . . . . . . . . . . . . . . . :: :... >:,>.& . ...,:... .~:;. .,, .,(I .,::.: j ..:.:. .: . . . . . . . . . ..,:: ..A/...... .,.....,::::. :.:.:::y:.~:.::‘.:.‘:::‘:(:,, . . . . . . . . . .,.(.,., ., ., ., .,.(.” “” ‘. . . . . . ,, : ,,, ,, ,(, ..(,., ‘::,::.:.:,:,:::::.:::‘::‘::::::,::,:.:,... ,,,,,__,,,,,:.,.(. .,.,.(.,.,.,.(. .(. “:,::::::,::.:::.:.: :,:::‘:::::::::‘::::i::::,::~:.::!:::.:.:.:. ,,,.: . . . . :.>>..:.>:.::,: : .A.’ ,A’:: .:. :.:.:.: .:.:::>: . . . . ::+::: ,.:::::::..,: ::.:::.:.: .(,, ,. :.:.:. . ..., ,:i,~.~... .,.:. .A, ,.. . . /...,” -2.. ‘:.:..‘..., Y .v,. :::.:.::::,::x: ..,,,,.__ :.,.: .,(.,_.,.,,,.~~~~, :::,~ ,:,,:,:::: ,::,,,.:. 1:::; j :11;. : ., ‘7 :::,:‘:.:::.:,: :::.:.::::: y:::::,:::::::,..: ::::::.::;:;:;:::j:+;;;;;: ::jl:l$i ,( $i:,;:iy .j.:.:j,::j:j,j ; ,Iji::j$:j:j::jl::l::Ij ,::, i:;:,+:.:: .::c :.:. ~:,i:gl;i,:..::z :,:.::~;$i I,i:~i’i::,:~i:~,~i::I:I::~:,~ ::,,:,: :::::::i::::~:I:::i:;i :::::: :: ,:,, ,,, ,,,:,“” “.‘,“.‘,“.‘.” ‘.‘.‘.“.‘:.:.:.:.:.:.:.:i,:.:.:...:.:... . . . . . . . . . . . ..::‘:.:::p’:>: . . . . . . . . . . . :.:.:,:::::,:,:::‘:“‘..‘.‘:~,~~,.......,..........:.... ‘.,.,....,.,.,.,,,:,:,~,,,:,:,:,~,~,~,~,~,~,~,‘( :::..: : j;:: ,,, ,. > ,.,:,,,., .( :,..+..:,..i.. :.y: ..,.A. :.::. ., ,>>?> .( : .,..:.. :. :. .,.:.,. .A’.‘.““.” .“.:...‘.:.,.>..:.::.:.:.:.:.j:.~ j:..:.:..:::: .:.:::,:::.:.i: . . . . .._ i.. .,. .,. . . ..y.: . . . ..A . . . .,.,.,.,., ~ (,._.(_. ..:t:,;+:,:::: ,‘>:q >>::>. . . . . . . . . . . . ..A.......~ .,.,.(.,.,. . . . . . .: : : : : : : .,..., .(.. ..k. ,. ..,..... . . . . . . . . . ..I iiilliiiiil::::‘:::.::“::::,:::::.:’:.yf.:.~:..:,~,:::~,~~ ,:,, >::.::,:,:,, ;.:. :::::.:. :::::::::. :” . . . . .:::...“:::.:. :. .’ ‘:.::.:‘::.:.:.:: ::‘: :
. . . . . . . . . . . . . . . . .: ,(,.. j,.::..:i:i,:,ii.,:. ;:F :.: :.:,.., :...(. :,. ,:,:,: : :
“y 1: I”: s tx y r..~:.:.:::,&O F.e~~:l~:~.~~~~~. . ,: :.:.:.,,: :::::::,:;:,. ..:.:. . . . . ;::::.:.:>>. :,:, .‘x::.i:I:;:x ...: :&+:: :cc I.. :.: .,.,..... :.:.:...: . . . . . . . ~ . . . .:::j:::j::::.:. ,‘:~:~,:‘:‘::,‘,‘, :,.,. .: . . . . :.,. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . :.: .A............ . . . . . . ._I.. ./.:.:c.:.:.:.:.:.:::.:qx.~ :,:,:,:.:. ~:9,:,~:;?~::~~~.:~~~~:.;.:.:~~::~:~::;~;~.~~~~~~.:~~i~~:~~~:~~ ,:,. *>b.. :. : : ;: y<::::::$y+y.::‘:‘+:.:‘::::::?:i i...,.. L ._____.__........,.,.,...,...., ~ ..,,,,,,_,, ~,..(,. .,,. . . . . . . . i,,::: :‘: :::+.: ” “‘.“‘.‘.‘.‘.‘.‘“.‘.:r.:.::::::.:,~.~.:.:.:,:,:,:.:,~,:,:.:.:.:,:.~..~,.~, ..,, *>=,.,rr\ /., ,,.,“‘::‘:“‘.‘.‘..... . . . . . . . . .._....................,.,.,.,.,..........: : ::.?>... i ..,.,.A.... . . . .“‘:C’.“.‘.‘....‘.‘..‘.‘.. ,x..< ,...z,.......... . . . . . . . . . <\ . . . . . . . . . . :.:.~.~.)~~.~,.~,~.:.: ..,,/, .,).<<~,<,,>,..&” ‘. ..c.. . . . ..,.~.~?~,:~?~~~~~~;~~~~~.~,:,~,.*~,~.~*. . ..A. .,I A. y&.~>.M,,d.$$>,.
to C2 Information SystemsDCSOPS
,:: . ..A .:.. ,I r.5 ,,
.‘.
C2 Protect Development
. ...;...:..: : ‘..,. ,I.:,:., ,.:.. ..:.I.;.. ,: ;,. ,,,i;:y;,::: :::,:c ..: ::. ..,. ..,. “,,::::‘::,‘,, : ,,::,, ~:::::./. .: .:.:., ,::l~::::i,:::,:,‘,,:::.:::.:.::::.,.: ,.... :.:,.. .A,.,. .,..::,..:.., . . . . . . . . . ,.: . . . . ::,:.::,:+ .:...:.:..>‘:::.:.‘:.:.:.:.:..(‘...:1.: :;:::: ,:,:,: :,~,:(.:.:,:.,.:. ~ :::,:..,:, ,.:...:::j. ..:,..: ii,.:.>:.7. ..>:.>:.,. .,. ., . . . . ..~......,., ,.,.,., ,.,. >; ,:,. :,:::,:,:::::,>:,.‘:lil:lij:::i:‘Il:I:::i:l:l:::l:: I:i:i:l.l::::.iliiii:il::itili:jiijl.li ;,;;;;i:,g::::::.:::::y,:; .,.““:‘:::::::::::::::::::.:.:.:.~,:.:...:,:.:.: .,.,. ,.,,,:,.,,: ,,,,. .:y:: ~,...,...~,~,~.~,.....\~...~...~..,..,..........~~.....:,. .:.;.,::.,:,.,.,:::.:: :y::.;:.:::. .::.- .,..:.,:.:.:.: �:.�y.�.b>:;�:,;:I:�~~ ,,,:,
l Near Terln Action Itelns from:: tthe. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~..~:::%:::::,:,:,::::::.::.:...:,::,..,. .,.,.., ......: .: .:: .� �.,. �.: .:.:. 1 ,�, ;: ,�,�,I,, ,::,:.j:.:.j:. ,,,,(..,(/(. :::.>>:::.:::.,,,,..,..,....,...,.....,,. ::.�.:::�::::j,l::jI::.I. ,�. ~,~,.,.,.,.,.,. .,. .,. .
.�AT-n /y l 1 fin 1 1 .:.,.
: :. ;:,, ,. . . . . . . . { .,:, .�. .,
�.;I;,; ,;:;f .I,:;,$j:;,�:.:,jj,:,:I,~:l;:i~,~,~,~,~�:li:.~l ;::�l�<;;r;,::.:::,, . .
.,. .: �.�:,,~~,j~.~~~j~~~i:;~~~~~~~~~~~:,~~,~:,~~~::,:,~~:
,, .� ,. (. .: .,., .:>: : .::I: .:. p ,, . . . I..%-:,:,;>:,.�.�:�::�::,:,:::,::::,:,:::,::::::.:,:.:: .:,,,:,,.
� ..,.�,, .�:�;,:, ,.,
:,;;; ,:,::,. .(. . .,:::,:,:::l:j:j:::j::::~,:�:,. . ,.....: :7..:: �.:: :: :(: ;,,. .,. .,.:. .,... . .:. ., .:::::::::: :,:,:,?:: ~: :. ,,: ,.,:
: . . . . . . . . . . . . . ,... . . ..,. . . . . . . . . . .,.,.,.,, .,, .,. ./.,.,. .> .:. .::.),:j::):j:j: ::j.::::.:::::.:.:,:::, ,. .,.,...,.,.. .~...,..,.,.,...............,...,.,... ., ,..):~::y ..: .:,�,. ::�,j,::,,. ,,., .,: :.::.:.:. 7 �,:,�,~:,�,�,�:: ,:~,�j,,j☺:::,: :;;, ;:.. .:j( ;:. .,.,,:.,,, :, ,,:: .:�. . ::~..~:�,�:,::�..�~.,:::~ ,...,. .,. .,. .:. . :, .: .: : : :.;, �,I�,: ..?,.:::::,:::,I~ ... . . . . . . . . . . . . . ,...,.: ..,.... ::: :⌧.:+:.:⌧:: ::::.:::::,:,:,:::::::::::�:�l.l.l.l,i.:,.:~ :.:::.::,
:j:::: :,:,:,):,,�:::j�:.,��,�j~:l:l:l:j:::j:j:::,::.:::,:.:.:.:.:.:.�.~:; ,:�:,::::,:,:,:,: ~::*:,~:,:.:,:�,:::,: :.,,,,,,.,,,,,,,
. . ,,.. ~.,...,C,, .,,,, ,,,,, :~ ,:: .,:,. .,., v:,, ,, ,,., .c
.~.~.~.~~��.:.,�:�,:,:::,:,:,::.:.: :,.: :.:::::::::::::::::::::~~~:~:~:~::~~:.~:,::::. :::>:.:: ,:,:, >::::y . . .. . . . . . :,::,:::,::::::::,:,:,:.�j.i.j.I.i.:.. ;: ,:,:,:;, �I�.:: .�.�::.:::~.:.�~�:.j jj,.::,.: .� :...::.::.,.:::::::::::.:,:::::.::.::::,::,:::::::~::::~ ..,.., �:::,:::,:::.:.:.:.:::I::::.:::~:,:::,::,:,:::.:.:.:.:,~ :,:. .,.:,,,:,,,,, ,:,: . . . . . . . . . . ..,.,.,,. .::. . . . . . :..: . ,..... :/ ,,. :j: ., :,::: ‘: ‘)‘,l L 0 n g Term C 2 ,:,I ;,,... .,,,.. ::.::.:.:.~:.~j:,..::::::~::;::;:::,::::::::::... . . . . . ,. . . . . :.: .,.,. .:.:;.::::.,. .,. .,.,. .,::: :,:,.,:.:. ~:.~p r 0 t e cti:~~s~~~~~:~~i:-:i:~ ~~~~~~~-~~~~~~~~~~
“.“‘.‘.‘.’‘.‘.‘.’ : : ,.’ ” ,‘:, :,:: ,.,.,.: .,. ,,, ,, ,..::.:.::, ....:::::.:~:::?:. ..::::y .+A . . . . ..\ . . .. . . . “““’::‘.‘.‘.‘::. ,,. .,.,.,.,.,...,.,, ,, ,.,,,,,,,(,,,,, :. . . . . . ..,. ,... ,.....““” : ,,,, ‘,’ ” .:. .:‘.
,,. ““(“‘..(‘.:.‘:::‘:‘::: . ../ :.::::::: :,:,:::,:,:,,::,:,,,.’ ., ,., . . :, .,., ..:. .+:..:::: : >:. :. . .::y,, :,, ,., ..:,, .:... . ..x.....:. :..,.....,.,.. ~i~)~~:-~~‘.~.“~“~‘.‘~‘.(‘~~~~.~.(.:.~:.:.~~~::::,:,:,: :.,,,., ;,:,: ::.:.,:,:,:,.,::,::-,,, :,,:.:.:,:. . . . .. .::.:.........x:: xx>:,:,:,:::: ::: . ../... ~.. .,.
-. :, .:.:.I: .:....... ‘.. . .:. ::,::, :,::: :,,, :; ,.:. ,., ,.,., ,.,.,. .,.,...,.,. .,. . . . . .,.,,,,.,., ,,,.,., ..,.,....... .A..... ...., . ...\ . . . . . . . . . . . . . . ,. .:::““‘.~:(::.:,.,........ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..,.,...,. . . . . ./..:::.:.:: :.:.‘.~::::.:.::::::,,.:~:,:,:.. . . . . . . . . . . . . . . ..~.........
.’ ” ,..:.,.,.:,,,. .::: ./.:; ,,,,,: .:‘,: :‘:‘, ;:;;;, ;,::>y:. . ,:,: :::..x.. .,,. . .,. :. : :,, : :,: ,, ,,, :,::: ..:,:,.,:,:,.,.,:.:, ~ :,:,., ,~~ ::.:::.:.,. .,.,. :..::::::.:::::.:::.~::~::i::~,~:~:~:~~::~:,:,:.:.‘.’ ” ‘.. . (,. ::.::.::::‘::::~:,:::,‘:::::‘::::.::...~.~,~.::~::,,:,., . . . . . . . . . .::::::,:::::,‘:,:.:~:::::::.:::::.:.:.:...:.:.~: . . . . . . . . . . . . . .;, ., ,,,, ,,, ,‘,‘::,‘,:,:::,‘,::‘: :.:, ,., ,., ,~ . . :..::.:. :, ‘:‘,,il::;i:i,i:i:;r ,,... :,:., ,.: . . . . . .,.,. :.,.F . . . . ::: . . . . . . . . . . . . . :...:.:.:...c .,. . . . . . . . . . . . . . . . . .._...........; ,, : .; . ..>.y ., ,x>; .‘.Z.. ; .:‘C. :, ,~ ,/. . . . . :.:... . . .;.: ., . . . . . . . . . . . . . . .,.. . ..,,.,.,.,.,. : ..> ,.,. : . . .:‘:(:.::!:l’:i”“I’i’:‘: ~:i.i:i:i’-‘4”‘i:~~~ j,j ; ; j >y .:. .‘...W i’:i.:i::::~~:::::~::::.:.:.: gz:;z,::, ,: .‘.F .:: : . . . . . . . . ..:I:::.:..:.:::.):~::~,: ;,.,. ,,.
C2 Protect DevelopmentConcerns
DCSOPS. . . . . . ..: :., .: .; .‘...~~..~,.::.:.:.:.::.:-:.:.:.-~~::~:;::::::;:::~::::::::::::::::~::~~::::::::,:.:.:.: :.:.:.:.:.:,:.:.~.:.:.:.:,: ,:,,,,,,,, :,:,: ,.,,, :,:,:,:.: :_ ~;; _,.,.,.,...““:“‘)‘),“““‘,,.,.‘., L, 1. _,,..,,....,./.,.“““““““‘.’ ““I...., .‘. i..:...:. . . . . . ..l.. /
/
C2 PROTECT
INTDISC4
DCSOPS
I Lead Developers and Signatures on all C2 Protect Volumes
i .
DISC4 C2 Protect Mission
In coordination with DCSOPS and DCSINT, DISC4is responsible for implementing procedural andmaterial protective measures, to protect Command,Control, Commtinications, and Computers (C4Protect).
DCSINT C2 Protect
\
Land Information Warfare Activity
“LI WA”
MISSION: . .
Provide DA level Information Warfare/Command and ControlWarfare support to Land Components and separate Army commands to
, facilitate planning and execution of Information Operations. Coordinate1 with National, Joint, and Service IW/C2W centers to exchange and
synchronize intelligence,and information support across the operationalcontinuum.
I
Land Information Warfare
Act as Operational Focal Point for IWArmy Staff (DCSOPSLDCSINTLDISC4)Joint, Service, and National AgenciesMACOMs and MSCs
Arrange for and Coordinate Support to CDRs
Coordinate and Deploy Field Support Teams
Integrate Compartmented Programs with OtherActivities
C2 Protect Issues
I/
I
I rmy Informationare Under Attack
Sys terns
Attacks are frequent and highly sophisticatedArmv had 90 reDorted penetrations in CY 94
JI .A -L
of detected penetrations go unreported
means that Army had 1800 detected
95%This
94%
Total penetrations to Army approx 4500of penetrations are undetected
3/30/95 2
How Do Intruders Get InI
+ Through cotimercial service providers+ 95’% of of DOD comms use commercial .
service ,+ MILNET is mostly leased commercial.
service+ Run automated attack
+ Use software utility tools to obtain systeminfo
+ Exploit system info to get user access
/
4
at Intruders Can Do
+ Obtain password file
II+ ObtAin system administrator privileges,I
I + Plant undetectable programs
+ Change, alter or destroy information
+ Shut down system (now or later)
+ Log on to next system as valid user+ Down stream liability issue+ Makes Army responsible for damage
3/30/95 5
Example Internal Hackingssified info on unclas MILNET
1 + OSD budget infoII + DIA reports with names & locations of indivuals
1 + Air Force flights with dates, times, code names etc.
+ Civ & Mil (AF) passing info td hacker network:+ Member of Inaugration team selling access to
BCN
&Users from HQ DA extracing pornographic” material & games
3/30/95 10
xample of PenetrationsA r m y S y s t e m s
+ ODISC4 LANI + Requested Vulnerability analysis by SAM
I+ Used commonly available software tools+ Penetrated in 5 min+ Gained superuser (ROOT) access in 15 min+ Potential impact total enemy control plus+ trusted launching platform to other syst+ Penetration,was not noticed or reported
3/30/95 6
---
-.-..-- ___,,
+
---
-
.
I
Example of Penetrations” I
’ ‘+ DSS-WI
i’
4 3 MB of data stolendata involved contract sensitive informationISC-P stopped the attack .ISC-P assisted in p&venting subsequent attacks
. .
3/30/95
xample - pentagon Broadband
Cable Network (BCN)1 + Unauthorized user from Swedish host
logged in+ Executed several commands+ Posible loss of password file
Unauthorized user from Virgina Tech host+ Repeated attempts using various user IDS
SuSessful using-&7stem. .
admimistrator’s IDUnauthorized user from NASA host+ Logged into two $iJj&rent user accounts
8
’ Infofmation SecurityDCSOPS
Education/Awareness
Training
Public ForumsArmy Information Systems Security Council
Polkies and Procedures* The Army Plan* A R 3 8 0 4 9* AR 25170 series
Land Information Warfare Activity
C2 Protect Planning Evolves into AR XXX-XX
ARMY.. ISSP REQUIREMENTSWITHIN FUNDING PEGS DCSOPS
,: ,,,,. .., ,:, .A:: : .:.L.. ,:::.i::::::::::.:::::::::.:.:.:.:,:.:.:.:.:.:.:.:..,:.:.~:.:.:.:.~~.:.:.:.:.:.s.:.:.:.:.: .,., <., ,.. . . ,,A ,.., ,., ,.. . . . :. I......,.....,.. :.i:r,::I.a,:,:,:.~~~~~~;~~~~~
MODERNIZATION PEGAIRTERM
INFORMATION MANAGEMENT PEGDefense Message System
BENIGN FILL
AKMS TIER 1 (EKMS) COMPUSEC
SECURE TERMINAL EQUIPMENT
KIV-7
KG-40A
Multi Information System Security Initiative
MACOM
P‘
::::r::::::fi;$$y&::+*,
mu-nary I ~L~~~:~.:~::~:?~.::.:.:DCSOPS
..I......:,.::.,:.. ,,““.‘.‘,‘.‘.‘.‘,‘.‘.‘.‘.‘.‘.‘.““.’..’.’.’. /.....,...,. .,.,...,.,.,.,‘.‘,‘........,:,:.: ~.;~:::::i:!::~.:::i:::j~,::::::~.~~~~~.~.~~.~.~~:~~:~:~.~: : :...: ::.:: :.: ::‘.:‘::::>:i; . .._i........(.._,...,........ I.:,,.::::::::;:~,:‘:‘. ;,., ,‘,‘, y:; ‘,‘,’ ‘,..