SlideShare uma empresa Scribd logo
1 de 17
Intelligence Support Requirements
  for Offensive CNO: An Achilles’
               Heel?
       Jeff Malone - UNSW@ADFA
Cyber Warfare and Nation States Conference
      Canberra - 23 September 2010
Scope
• Overview of Offensive CNO

• Intelligence Requirements Across the Weapon
  System Life Cycle

• Intelligence Requirements of Offensive CNO

• Implications for a Usable CNO Capability
Caveats
• Presentation reflects my personal views

• Dependence on US (military) literature

• First principle arguments
CNO as an element of IO
•   Psychological Operations (PSYOP)
•   Military Deception (MILDEC)
•   Operational Security (OPSEC)
•   Electronic Warfare (EW)
•   Computer Network Operations (CNO)
•   Other Supporting Capabilities
    – Physical Attack (etc)

Source: US Joint Publication 3-13, Information Operations, 13 February 2006
Components of CNO
• Computer Network Attack (CNA)

• Computer Network Exploitation (CNE)

• Computer Network Defence (CND)
Access Approaches to Offensive CNO
• Close Access

• Proximate Access

• Remote Access
Objectives of Offensive CNO
• Tactical – immediate battlefield

• Operational – theatre level

• Strategic – national level
The Weapon System Life Cycle

                        In-Service Modification and Upgrade




                                  Acquisition and
 Needs and                                                                Retirement and
               Development        Introduction to        In-Service Use
Requirements                                                                 Disposal
                                      Service
Intelligence Requirements Across the
            Weapon System Life Cycle
                        Intelligence                                                                           Intelligence
Intelligence              Support                                                                                Support
  Support                                   In-Service Modification and Upgrade




                                                   Acquisition and
     Needs and                                                                                             Retirement and
                              Development          Introduction to        In-Service Use
    Requirements                                                                                              Disposal
                                                       Service




               Intelligence
                                                                                   Planning
                 Support
                                              Intelligence
                                                Support

                                                                      Assessment              Operations
Types of Intelligence Requirements for
            Offensive CNO
• Access-centred
  – Relates to characteristics of target systems
  – Collection emphasis on CNE


• Effect-centred
  – Relates to outcomes sought by attack
  – Collection emphasis will vary, but has greater role
    for all-source collection
Factors Influencing Intelligence Support
   Requirements for Offensive CNO
• Difficulty/complexity of access

• Precision of effect sought

• Overt versus covert action

• Target responsiveness
Vignette 1 – Close Access Attack on an
    Integrated Air Defence System
Vignette 2 – Proximate Attack on an
   Integrated Air Defence System
Vignette 3 – Remote Attack on
Strategic C3I Enabling Systems
Vignette 4 – Remote Attack to undertake
             targeted PSYOP
Implications for a Usable Offensive
            CNO Capability
• Intelligence support requirements crucial to a
  usable offensive CNO capability
• Intelligence support requirements will impact
  on all collection disciplines, not just CNE
• Intelligence support to offensive CNO as an
  opportunity cost
• Less discriminate CNO attacks more likely to
  be viable
Conclusion

Mais conteúdo relacionado

Semelhante a Intelligence Support Requirements for Offensive Computer Network Operations

Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)Ian Sommerville
 
Miratech Infrastructure Support Services
Miratech Infrastructure Support ServicesMiratech Infrastructure Support Services
Miratech Infrastructure Support ServicesMiratech
 
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud Computing
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud ComputingIDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud Computing
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud ComputingOpen Data Center Alliance
 
ThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBMThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBMZyma Arsalan
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013Ian Sommerville
 
Value Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge MgtValue Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge MgtArnaldo Colombo
 
Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochurecwoodson
 
NCI Network Engineering
NCI Network EngineeringNCI Network Engineering
NCI Network EngineeringChris Young
 
Layer 7: Robust Net-Centric Services
Layer 7: Robust Net-Centric ServicesLayer 7: Robust Net-Centric Services
Layer 7: Robust Net-Centric ServicesCA API Management
 
Better security through IT operations
Better security through IT operationsBetter security through IT operations
Better security through IT operationsslighltyanon
 
12.08.09 Event Mike Perdue Presentation
12.08.09 Event   Mike Perdue Presentation12.08.09 Event   Mike Perdue Presentation
12.08.09 Event Mike Perdue Presentationmcini
 
ITIL and IT Security Architecture
ITIL and IT Security ArchitectureITIL and IT Security Architecture
ITIL and IT Security ArchitectureLeo de Sousa
 
New Vvma Presentation
New Vvma PresentationNew Vvma Presentation
New Vvma Presentationmhunter22
 
De-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco ServicesDe-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco ServicesCisco Canada
 
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...Mingxia Zhang, Ph.D.
 
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Ian Sommerville
 

Semelhante a Intelligence Support Requirements for Offensive Computer Network Operations (20)

Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)Requirements Engineering (CS 5032 2012)
Requirements Engineering (CS 5032 2012)
 
Miratech Infrastructure Support Services
Miratech Infrastructure Support ServicesMiratech Infrastructure Support Services
Miratech Infrastructure Support Services
 
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud Computing
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud ComputingIDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud Computing
IDF 2011: ODCA & Developing a Usage Model Roadmap for Cloud Computing
 
ThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBMThinkFaculty ITIL Training Course IBM
ThinkFaculty ITIL Training Course IBM
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013
 
Enterprise Mobility Strategy Webinar by Endeavour
Enterprise Mobility Strategy Webinar by EndeavourEnterprise Mobility Strategy Webinar by Endeavour
Enterprise Mobility Strategy Webinar by Endeavour
 
Value Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge MgtValue Reference Model - Information and Knowledge Mgt
Value Reference Model - Information and Knowledge Mgt
 
Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochure
 
NCI Network Engineering
NCI Network EngineeringNCI Network Engineering
NCI Network Engineering
 
Layer 7: Robust Net-Centric Services
Layer 7: Robust Net-Centric ServicesLayer 7: Robust Net-Centric Services
Layer 7: Robust Net-Centric Services
 
Better security through IT operations
Better security through IT operationsBetter security through IT operations
Better security through IT operations
 
12.08.09 Event Mike Perdue Presentation
12.08.09 Event   Mike Perdue Presentation12.08.09 Event   Mike Perdue Presentation
12.08.09 Event Mike Perdue Presentation
 
ITIL and IT Security Architecture
ITIL and IT Security ArchitectureITIL and IT Security Architecture
ITIL and IT Security Architecture
 
New Vvma Presentation
New Vvma PresentationNew Vvma Presentation
New Vvma Presentation
 
De-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco ServicesDe-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco Services
 
GIS POV
GIS POVGIS POV
GIS POV
 
Day 3 p1 - itsm
Day 3   p1 - itsmDay 3   p1 - itsm
Day 3 p1 - itsm
 
Day 3 p1 - itsm
Day 3   p1 - itsmDay 3   p1 - itsm
Day 3 p1 - itsm
 
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
TeleManagement Forum OSSera Case Study - AIS Thailand Service Manager Present...
 
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)
 

Último

16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendExperience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendFabwelt
 

Último (8)

16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendExperience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming Trend
 

Intelligence Support Requirements for Offensive Computer Network Operations

  • 1. Intelligence Support Requirements for Offensive CNO: An Achilles’ Heel? Jeff Malone - UNSW@ADFA Cyber Warfare and Nation States Conference Canberra - 23 September 2010
  • 2. Scope • Overview of Offensive CNO • Intelligence Requirements Across the Weapon System Life Cycle • Intelligence Requirements of Offensive CNO • Implications for a Usable CNO Capability
  • 3. Caveats • Presentation reflects my personal views • Dependence on US (military) literature • First principle arguments
  • 4. CNO as an element of IO • Psychological Operations (PSYOP) • Military Deception (MILDEC) • Operational Security (OPSEC) • Electronic Warfare (EW) • Computer Network Operations (CNO) • Other Supporting Capabilities – Physical Attack (etc) Source: US Joint Publication 3-13, Information Operations, 13 February 2006
  • 5. Components of CNO • Computer Network Attack (CNA) • Computer Network Exploitation (CNE) • Computer Network Defence (CND)
  • 6. Access Approaches to Offensive CNO • Close Access • Proximate Access • Remote Access
  • 7. Objectives of Offensive CNO • Tactical – immediate battlefield • Operational – theatre level • Strategic – national level
  • 8. The Weapon System Life Cycle In-Service Modification and Upgrade Acquisition and Needs and Retirement and Development Introduction to In-Service Use Requirements Disposal Service
  • 9. Intelligence Requirements Across the Weapon System Life Cycle Intelligence Intelligence Intelligence Support Support Support In-Service Modification and Upgrade Acquisition and Needs and Retirement and Development Introduction to In-Service Use Requirements Disposal Service Intelligence Planning Support Intelligence Support Assessment Operations
  • 10. Types of Intelligence Requirements for Offensive CNO • Access-centred – Relates to characteristics of target systems – Collection emphasis on CNE • Effect-centred – Relates to outcomes sought by attack – Collection emphasis will vary, but has greater role for all-source collection
  • 11. Factors Influencing Intelligence Support Requirements for Offensive CNO • Difficulty/complexity of access • Precision of effect sought • Overt versus covert action • Target responsiveness
  • 12. Vignette 1 – Close Access Attack on an Integrated Air Defence System
  • 13. Vignette 2 – Proximate Attack on an Integrated Air Defence System
  • 14. Vignette 3 – Remote Attack on Strategic C3I Enabling Systems
  • 15. Vignette 4 – Remote Attack to undertake targeted PSYOP
  • 16. Implications for a Usable Offensive CNO Capability • Intelligence support requirements crucial to a usable offensive CNO capability • Intelligence support requirements will impact on all collection disciplines, not just CNE • Intelligence support to offensive CNO as an opportunity cost • Less discriminate CNO attacks more likely to be viable