Long Term Defence Study



Similar documents
NOTE NATO Missile defence

Harmful Interference into Satellite Telecommunications by Cyber Attack

White Paper: Cyber Hawk or Digital Dove

Hybrid Warfare & Cyber Defence

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

CYBER WARFARE AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF SELECTED NATION STATES INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE

2 Gabi Siboni, 1 Senior Research Fellow and Director,

CyberSecurity Solutions. Delivering

COMBATSS-21 Scalable combat management system for the world s navies

UN Emergency Summit on Cyber Security Topic Abstract

Nasams. Air Defence System.

Surveillance and Security Systems

SADEC - VIRTUAL TRAINING LABORATORY

WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)

Active Engagement, Modern Defence

Training NATO for an uncertain future: An interview with Major General Erhard Bühler

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM

Navy Information Dominance Industry Day

Operation IMPACT (Injured Military Pursuing Assisted Career Transition)

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016

Services we provide. Tel:

capabilities Emerging Trends and Key Priorities

working group on foreign policy and grand strategy

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION

WHITE HOUSE OFFICE, OFFICE OF THE SPECIAL ASSISTANT FOR NATIONAL SECURITY AFFAIRS: Records, NSC Series, Briefing Notes Subseries

Predictive Cyber Defense A Strategic Thought Paper

ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session

Secure Data Centers For America A SOLUTION TO

Cyber Security Strategy of Georgia

Director of Intelligence Proposed Research Topics

NATIONAL DEFENSE AND SECURITY ECONOMICS

REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015

Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS

The Boeing Company Strategic Missile & Defense Systems

EXPERT EVIDENCE REPORT

"The European Union's Security Architecture and its role to strengthen Peace and Security"

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Means of Personal Identification

JIUS Maritime Security Coalition

The European Security Strategy Austrian Perspective

AUSA Background Brief

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives:

Final reports on deepened defence cooperation between Finland and Sweden

GCC Homeland Security in a New Order. Dr. Theodore Karasik Director of Research and Consultancy INEGMA. September 2013

DEPARTMENT OF DEFENSE

Venator -110 General Purpose Light Frigate Technical Brief

A Detailed Strategy for Managing Corporation Cyber War Security

On the European experience in critical infrastructure protection

ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education

Home Security: Russia s Challenges

ATM Security. Emergent challenges and opportunities focusing on increasing automation and cyber-security. Antonio Nogueras

Coast Guard Top Acquisition Priorities and the Interoperability Imperative

From Big Data to Rich Data How Data Analytics Add Value to Security Risk Management. Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016

GENERAL BIENIEK, DEPUTY COMMANDER SUPREME ALLIED COMMAND VICE-ADMIRAL FRANK PANDOLFE, COMMANDER OF STRIKEFORNATO

DEPARTMENT OF DEFENSE

APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES

Public Private Partnerships and National Input to International Cyber Security

Network Mission Assurance

Leveraging Virtualization Technology for Command and Control Systems Training

USAF Air Battle Manager (AF , version 2). 9 Credits: 3 Credits for High Performance Management Core Course, and two 3 Credit Electives.

Technology in the littorals Below the surface and in-shore. Linus Fast R&D SwAF HQ, Naval Dpt linus.fast@foi.se

Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation

Emerging Threats and Challenges for Homeland Air Security

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Confrontation or Collaboration?

Trends Concerning Cyberspace

Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011

A NEW APPROACH TO CYBER SECURITY

Department of Defense

NATO UNCLASSIFIED Releasable to the Public MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE GOVERNMENT OF THE REPUBLIC OF FINLAND AND

FUTURE NAVY VISION. The Royal Navy Today, Tomorrow and Towards Projecting maritime power to protect and promote our nation s interests

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189

Bio-inspired cyber security for your enterprise

United States Cyber Security in the 21st Century

A logistic capability, protected and non protected

Intelligence, Information Technology and Cyber Programs

Security Threats on National Defense ICT based on IoT

Covert Operations: Kill Chain Actions using Security Analytics

Resolution 1244 (1999) Adopted by the Security Council at its 4011th meeting, on 10 June 1999

COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft

Cyber Diplomacy A New Component of Foreign Policy 6

Legal Issues / Estonia Cyber Incident

Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett

Security Vulnerability Assessment

Transcription:

Long Term Defence Study 2014-09-10 LtCol Johan Hansson SwAF HQ 1

Long Term Defence Studies Three main objectives: To identify uncertainties. To create some scenarios which demonstrates the coming challenges rather than an exact forecast. To develop a flexible, robust and adaptive Defence Force which can meet the coming challenges.

Two concepts identical method Perspective Study Has the objective to fulfil the need for a political decision basis, when government so requests, e.g. in their preparation of Defence Bills or related to the work in the Parliamentary Defence Commission. Long Term Military-Strategic Analysis Forms the base for internal decisions by the Supreme Commander, concerning the direction of the Armed Forces, e.g. the yearly Armed Forces Strategic Directional Document. 3

Perspective Study - Aim and role The aim is to identify changes or trends, both externally and within the Armed Forces, leading to a potential need to change the strategic directives to the Armed Forces, and in what ways this should be done. Now Armed Forces directional documents 10 years Beyond and beside current plans Beyond and beside current political directives The role is to identify crossroads and study different alternatives and plausible development of the future, beyond and beside defence policy decisions and current plans. 4

Defence Review Process General Election Planning Instrux Defence Commission Report 1 Defence Commission Report 2 Defence Bill to the Parliament 2013 Q1 Q2 Q3 Q4 2014 Q1 Q2 Q3 Q4 2015 Q1 Q2 Q3 Q4 Budget Proposal PerP Study Budget Proposal SwAf Answer Budget Proposal

Global Strategic Trends 1. The significance of Asia 2. The significance of the Arctic region 3. The development of the trans-atlantic link? 9 1 4. USA focussing towards Asia 5. The European influence 2 9 6. The Western influence in the Middle East 7. Ecological challenges 3? 1 8. Energy dependence 5 9 9. Globalization and focus on sustainable flows / choke-points 6? 9 6

The Military Balance 1. Un-coordinated Europé with less military spending 2. US drawdown in Europe 3. Russian military reform non contact war 4. US and China in ASIA increased focus on military capabilities. Europe US Russia Increased Russian military capabilty and freedom of action

Military Technology Trends Long range strike weapons Unmanned system Cyber capacity Space based capacities Cooperative Engagement Capability Cyber

Military Technology Trends Long range strike weapons Unmanned system Cyber capacity Space based capacities Cooperative Engagement Capability Cyber

Military Technology Trends Long range strike weapons Unmanned system Cyber capacity Space based capacities Cooperative Engagement Capability Cyber

Military Technology Trends Long range strike weapons Unmanned system Cyber capacity Space based capacities Cooperative Engagement Capability Cyber

Force Development Cooperative Engagement Capability Position Distance to target Bearing to target Doppler Air Sea Battle Fast data links: Parallel high speed transmission and sensor fusion Position Distance to target Bearing to target Doppler Requirements examples: Exact time sync between nodes Navigation according to WGS 84 Radars with ability for continuous tracking Low sensitivity to jamming CEC Cooperative Engagement Capability 12

Conclusions - Change in use of military force Cyber OODA Space EWS Long range weapon systems Unmanned systems Unconventional capabilities Automation Stealth Lower threashold - military force System of systems / CEC (DEW) Computer & communication Technologies Sensorfusion & signalprocessing

Future Caracter of Conflict in Our Area Means: Cyber warfare Target: Command and Control Target: Tech. infrastructur Target: - Lines of communications - Military strategic important areas Means: Mission based standing units Means: Long distance weapons A future armed attack involving Sweden, will seek to defeat our Armed Forces from a distance, before exposing its own personnel to danger. It can be done through specific target selection and precision strikes with noncontact warfare, special operations and cyber operations. Infrastructure and nodes, especially civil and military headquarters, logistics hub, air bases and ports are expected to be particularly vulnerable to kinetic and electronic warfare. Not least because of its vulnerability and links to their physical and electromagnetic signatures.

Long Term Study concept Koncept Pro Active Offensive Long Distance Missiles Cyber Operative Depth Koncept Active Manouvre Warfare Koncept Re-Active Endurnace Secure Inrastructure Cyber Defence Cyber Space CEC Missile Defence Drones

The Strategic Challange How to create a credible threshold effect with the armed forces as an instrument? Geography Treshold Capabilities Strategic context & sitution

Future Character of Conflicts A future operational commander will most likely be much concerned with cyber and e dimensions as he will with traditional environmental factors. This may necessitate a rebalancing of our environmental focus over the next 20 years, more towards the virtual environments. Attacks in the future could come from a greater variety of different sources: from seemingly harmless civilians such as hactivists in cities far from an operational theatre that may elect to disrupt operations and homeland infrastructure and from swarm attacks in any environment that may be initiated and launched through the Internet, including social media; to increasingly automated conventional or ballistic missile attack but also swarm attacks from unmanned systems. Our strategic communications will need to be increasingly agile in response to the likely tempo of activity. The future operating environment will be more uncertain; more dynamic; more demanding and more complex, from physical to virtual aspects. It will require ever more agile forces, that can adapt and operate in dynamic ways across all environments including once committed exploiting the latest means against an array of threats and challenges.

Thank You! LtCol Johan Hansson SwAF HQ