ELECTROMAGNETIC OPERATING ENVIRONMENT (EME) & UK JOINT ELECTRONIC WARFARE (EW)

Similar documents
Hybrid Warfare & Cyber Defence

Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence

Electronic Warfare System Integrated Electronic Warfare System. Own the Enemy s Battlespace

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189

Director of Intelligence Proposed Research Topics

Army Doctrine Update

UK UNCLASSIFIED. Crown Copyright 2012 UK UNCLASSIFIED

Navy Information Dominance Industry Day

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support

ELBIT SYSTEMS. Jefferies Global Industrials Conference - August Joseph Gaspar EVP & CFO

Bio-inspired cyber security for your enterprise

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

Resources projected in the previous development plan and the reality

Training NATO for an uncertain future: An interview with Major General Erhard Bühler

Codification World Forum Industry and Defence working together

Trends Concerning Cyberspace

Technology and Cyber Resilience Benchmarking Report December 2013

AUSA Background Brief

The EU s approach to Cyber Security and Defence

Mainstreaming European Military Cyber Defence Training & Exercises

Overview TECHIS Carry out security testing activities

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Recruitment of Procurement staff for the MOD Commercial Function

Department of Defense NetOps Strategic Vision

Development, Concepts and Doctrine Centre. Rear Admiral J M L Kingwell Director DCDC

Other reports in this series. National Cyber Security Organisation in Czech Republic. National Cyber Security Organisation in Estonia

THE CERTIFICATE OF THE COMPTROLLER AND AUDITOR GENERAL TO THE HOUSE OF COMMONS

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

Department of Defense DIRECTIVE. SUBJECT: The National Security Agency and the Central Security Service

SUFFOLK COASTAL DISTRICT COUNCIL DOMESTIC FLOOD PROTECTION POLICY

Overview TECHIS Manage information security business resilience activities

Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience

CYBER SECURITY TRAINING SAFE AND SECURE

NATO Organization & Structure

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY

Guideline. Operational Risk Management. Category: Sound Business and Financial Practices. No: E-21 Date: June 2016

NEXIUM SAT. Satcom systems solutions

Center of Excellence Concept Plan

Risk Management Handbook

Cyber Security Evolved

Risk Management Policy

ESKISP Manage security testing

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives:

NATO AND ALLIED CIVIL-MILITARY CO-OPERATION DOCTRINE, OPERATIONS, & ORGANIZATION OF FORCES

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

UNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 12 R-1 Line #145

OUTCOME OF PROCEEDINGS

THE BENEFITS. Facts/Figures

Playing Our Part in Responding to National Threats

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

Civilian Headline Goal 2010

SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC)

IBM Penetration Testing Services

Tackling fraud in the charity sector Making your money count

Public Private Partnerships and National Input to International Cyber Security

Legal Issues / Estonia Cyber Incident

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Individual/Staff Training

GOOD SECURITY IS A GROUP EFFORT

CHAPTER 6 HUMAN RESOURCE MANAGEMENT CONTENTS. Leadership/Management and Command Development 83

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

Business Continuity Management

National Cyber Crime Unit

Department of Defense INSTRUCTION

Gregg Gerber. Strategic Engagement, Emerging Markets

JOINT DOCTRINE PUBLICATION 2-00 UNDERSTANDING AND INTELLIGENCE SUPPORT TO JOINT OPERATIONS

www. thalesgroup. com Network Management Systems

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013

NOTE NATO Missile defence

NATO COMMITTEE ON GENDER PERSPECTIVES 2013 NATIONAL REPORT BULGARIA

ISTAR and CD&E CICDE. Centre interarmées de concepts, de doctrines et d expérimentations

Department of Defense DIRECTIVE

Advanced Electronics Company. Photonics Based ELINT for Interception and Analysis of Radar Signals

UNCLASSIFIED. R-1 Program Element (Number/Name) PE N / Directed Energy and Electric Weapon System. Prior Years FY 2013 FY 2014 FY 2015

The Department for Business, Innovation and Skills IMA Action Plan PRIORITY RECOMMENDATIONS

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Signals Intelligence

Final reports on deepened defence cooperation between Finland and Sweden

Intelligence, Information Technology and Cyber Programs

UNDERSEA WARFARE (USW) ELECTROMAGNETIC SYSTEMS DEPARTMENT CODE 34 OVERVIEW

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October Author note

FUTURE NAVY VISION. The Royal Navy Today, Tomorrow and Towards Projecting maritime power to protect and promote our nation s interests

Benefits. MIRACLE Benefits. I have no idea! What is going on in here? Konferencja "Bezpieczny Projekt" WARSZAWA 11 maja 2010 r.

BSC. Planning for the Berlin Security Conference 2016 Review Europe at risk what are our answers to common threats? Berlin Security Conference

MI5. Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.

SOTERIA. Understanding, Training, Contingency. Understanding, Training, Contingency

While interagency education and training have long been staples of the intelligence and

Joint Communications System

National Initiative for Cyber Security Education

Transcription:

ELECTROMAGNETIC OPERATING ENVIRONMENT (EME) & UK JOINT ELECTRONIC WARFARE (EW) Commander Dave Hewitt OC JOINT EW OPERATIONAL SUPPORT CENTRE (JEWOSC)

Electronic Warfare Military action to Exploit the Electromagnetic Spectrum (EMS) which encompasses the interception and identification of EM emissions, the employment of EM energy, including directed energy, to Reduce or Prevent hostile use of the EMS and actions to ensure its effective use by own/friendly forces. EW enables EM Situational Awareness (SA) which critically informs decision making and the execution of Joint Effects/Action. Note this statement should also include elements of Cyber

EM Operating Environment Complex, Congested and Contested - EME Situational Awareness critically Informs and/or enables: Planning, C2, manoeuvre, exploitation, denial, Battlespace Management, CID, Targeting, BDA, Threat Warning, Platform Protection and future capability development

EME & UK Defence EW 1980 2014 + Period EME Defence EW 1980-2000 Analogue, emerging digital caps, limited proliferation and commercial exploitation 2000-2013 Digitisation and non-traditional emitter technology development, proliferation, EMS Commercial exploitation, Cyber, Asymmetric applications 2014 2025+ Above + Complex, Congested & Contested Traditional War Fighting - EW focus maintained across ES, EA, ED and SIGINT DLoDs. EW Governance, C2, Doctrine, training established and enabled. COIN EW shift to protection aspects of ES, EA, ED. ELINT and Collect caps reduced. Limited EW Governance, C2, Doctrine and training focus. Capability Development failed to integrate and enable all aspects of the EW Defence Lines of Development, particularly Training and Information (data). Post Libya/Syria lessons increased EME and EW awareness. 5th+ Generation capability data requirements, recognition of non-equipment DLoD aspects (especially Governance, C2, training, people, information), ELINT.

UK Defence Review of EW (Jan 2013) Identify the risk to Defence outputs caused by deinvestment Develop a coherent model for exploitation of the EME Recognise synergies between EW and Cyber Build on existing National and International EW relations Update National EW policy Produce a National EW Operating directive

Review Scope Background - Relevance of EME and EW interfaces EME Framework - Policy, Command, Spectrum Management, MOUs Capability Stocktake - Evidence based against Risks, Scenarios Organisation - Joint and single service elements engaged in EW activities Governance & Tasking - Collection & Analysis tasking mechanisms & Governance models Manpower & Training - Skills & training. Manpower Review & Cyber career stream work Future of EME - Evidenced view of future EM environment & challenges

Review Outcomes Key Points Risks, weaknesses, capability gaps & incoherency across ES, EA, ED and EM components of EW Recommendations Some quick wins Governance, Tasking Some longer term Equipment, People and training Improved coherency (Included DEWC move to JEWOSC) Summary Lacked EW champion for years No Joint oversight of pan-dlod issues; ES, EA, ED, EM activities Equip often Urgent Operational Requirement derived, single service specific and not sustained Establish operating coherence with Cyber, IO and ISR EW effects not considered in the round lack of whole EM spectrum Management, Planning & Operational C2 Various Governance, Tasking, Project lines The need to reinvigorate collaborative working with Allies and partners

EW ESM ECM EPM EW Management Search Intercept Identify Locate Record (ES) = EME SA Prevent, Reduce (EA) = Deceive Deny Protect, Ensure (ED) = Counter ES & EA Command, Direct Integrate, sustain, Develop Policy & Governance Jt Battlespace Management & Integration Operational Command, Control, Coordinate EWCC End-to-End EME Operating Process SIGINT, MASINT, Cyber Threat Warning, Targeting, CID Info, Comms, Cyber, Jt Fires across networks and sensors Physical and Procedural Spectrum Management, EWOS, EOB, Training, trials, CNO

Initial Actions Establish UK Defence Authority for EW Comd JFC EW Policy set & issued under CDI leadership, consistent with NATO (29 May 14) Delegate specific EW responsibilities for Develop, Plan, Manage, Deliver, Generate and Operate functions EW Delivery Programme (equip & enablers) established ES,EA,ED and EM Establish Joint EW operational planning team (EM Battlestaff) Develop Joint EW Operating Directive Develop a 1 Star Joint Force EW Group EW Capability assessment in advance of SDSR 15

UK Joint EW Command Structure CDS/VCDS Commander Jt Forces (4 Star) Chief Defence Intelligence (3 Star) Director Cyber, Intelligence & Information Integration (2 Star) Joint Force EW Group Commander (1 Star) Single Service Headquarters EW Staff

UK Joint Operational EW Command Structure Director Joint Warfare (2 Star) Director Cyber, Intelligence & Information Integration (2 Star) UK Govt Depts Allies MoUs Joint Spectrum Authority PJHQ, EWCC, NATO Research & Development Joint Force Group EW Commander (1 Star) EWOS SIGINT EMBM Embeds Spectrum, Cyber, IO, Joint Intelligence Operations Centre EWCC DE&S Joint Force Intelligence Group Cyber and Info Ops NAVY LAND AIR Allies Industry Others

Summary Work is progressing much more to do EW has become more complex Art of the possible vs risk It must be carried out with less resource Efficiencies, collaboration, partnerships Equipment is only part of the solution Other Defence Lines of EW Development are equally as important Sustainability is key Must have Governance, resilience and through-life support solutions Collaboration and Integration is Key

Questions