SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
CEMA and Information Manoeuvre in the A2/AD
Battlespace
6th June 2018
Sam Qaisar
Capability Engineer (TVACD/RF Cyber)
2
© 2018 Leonardo MW Ltd – All rights reserved
Information Warfare
• Adversarial pursuit of a competitive information advantage
• Typically seeks to degrade, remove, or control an adversary’s situational awareness
CommsC2 Nodes
Sensors Doctrine
Key
Personnel
Information
Processing
3
© 2018 Leonardo MW Ltd – All rights reserved
Information Manoeuvre (1)
• Need to find a way to integrate Information Warfare into existing warfighting doctrine
• In particular, we must link Information Warfare to the physical domain
• The current model focusses on kinetic effects and manoeuvre in the physical domain
• This not sufficient for future operating environments
Fire
Offensive
Support
Physical
Manoeuvre
4
© 2018 Leonardo MW Ltd – All rights reserved
Information Manoeuvre (2)
• As a result, Information Manoeuvre is currently very poorly integrated into many armed forces
• There are two main approaches:
Intelligence
• Identify enemy dispositions and intent
• Predict and manipulate future behaviour
Plans
• Generate decision points
• Use of deception plans
Execution
• Information and sensor feeds back to intelligence
function to help refine future plans
Planning Focussed or “J25” Approach
Intelligence
•Identify weaknesses in enemy doctrine
and processes
Targeting
•Exploit weaknesses to identify and
target positions of enemy units
Execution
•Destruction of enemy using fires
•Create maximum confusion to degrade
enemy response
Targeting Focussed or “J23” Approach
5
© 2018 Leonardo MW Ltd – All rights reserved
Information Manoeuvre (3)
• Neither implementations is sufficient
• “Planning focussed” – too rigid and slow, unable to seize the initiative
• “Targeting focussed” – unable to turn tactical success into strategic victory
• Both implementations suffer from being “enemy focussed” and reliant on kinetic effects
• A better approach is to apply the principles of manoeuvre warfare and develop an “effects
focussed” method that can operate at all levels in the information domain
• Delay decision making
• Degrade situational awareness
• Deny sensor feeds
6
© 2018 Leonardo MW Ltd – All rights reserved
Cyber Electromagnetic Activity (CEMA)
• These effects can be achieved through the use of electronic warfare and cyber techniques
• The integration of these techniques is referred to as Cyber Electromagnetic Activity (CEMA)
• CEMA can be used to attack almost any piece of equipment with a sensor or communications link
• Allows military units to manoeuvre through the information domain in a similar manner to the
physical domain
• Particularly useful in environments with highly networked threat systems and sensors
• CEMA is not an “all in one” solution to information manoeuvre, but offers very good capability that
maps well to existing tactics and doctrine
7
© 2018 Leonardo MW Ltd – All rights reserved
Anti-Access/Area-Denial (A2AD) Environments
• Many nations are developing Anti-Access/Area-Denial capabilities. China is a good example
• Dense threat environment of air defence assets, cruise missiles, warships, aircraft, and satellites
• Threat environment is dense and unpredictable, unable to plan for every eventuality or destroy
every enemy asset
• Extensive use of networking and sensors allows A2AD environment to react quickly
• Use CEMA to attack the network rather than the individual nodes
Image taken from IISS
8
© 2018 Leonardo MW Ltd – All rights reserved
Implementing a CEMA Capability
• Counter-A2AD warfighting is expeditionary
• Low combat mass
• Long supply lines
• Limited ISTAR
• Advantageous to have maximum capability per platform, and mutually reinforcing capabilities
• Ideally, CEMA capability should be:
• Distributed
• Networked
• Re-taskable
• Planned for at the highest level, and enabled at the lowest level
• The use of CEMA in A2AD therefore allows for increased:
• Operational effect from each platform
• Survivability of platforms and formations
• Tempo and mission coverage
9
© 2018 Leonardo MW Ltd – All rights reserved
Using CEMA in A2AD Environments
• Attack strategic ISTAR collection capabilities (satellites, comms, open source, sensors)
• Enemy will struggle to deploy appropriate troops or conduct strategic fires
• Electronic deception to create fake troop positions or spoof equipment signatures
• Difficult to identify real targets and their associated equipment
• Deploy offensive CEMA payloads against enemy comms networks
• Slower decision making, degrade sensor fusion between networked equipment
• Self protection CEMA capabilities to enhance platform survivability
• Unable to reliably detect or engage targets
• Attack of key equipment and network nodes using CEMA and kinetic effects (network based targeting) in order to
degrade situational awareness
• Disproportionate degradation of A2AD network and loss of freedom of manoeuvre
• Kinetic strikes against military targets
• Manipulation of sensors, comms, and open source to prevent accurate enemy damage assessment
• Over/under commitment of forces in response to attack
STRATEGIC
TACTICAL
Enduring
tasks
On
demand/
Mission
specific
tasks
10
© 2018 Leonardo MW Ltd – All rights reserved
Leonardo Strategy
• Leonardo is investing in new technologies and tools to achieve information manoeuvre
• Electronic Warfare line of business is now following a “Suppression of Enemy Air Defence”
(SEAD) strategy
• Novel electronic warfare equipment and technology
• Mission planning tools
• Enterprise level support such as mission data management
• All Leonardo divisions across Land, Air, and Maritime are working together to achieve mutually
supporting capabilities
• Underpinned by CEMA expertise from Security and Information Systems division
• A single supplier for the entirety of information manoeuvre
THANK YOU FOR YOUR ATTENTION

Mais conteúdo relacionado

Mais procurados

3. the-wireless-channel-2
3. the-wireless-channel-23. the-wireless-channel-2
3. the-wireless-channel-2Naga Sirisha
 
Basics of EBG structures
Basics of EBG structuresBasics of EBG structures
Basics of EBG structuressumanth75
 
Directed Infrared Countermeasures (DIRCM) Principles
Directed Infrared Countermeasures (DIRCM) PrinciplesDirected Infrared Countermeasures (DIRCM) Principles
Directed Infrared Countermeasures (DIRCM) PrinciplesJim Jenkins
 
Eccm in radar
Eccm in radarEccm in radar
Eccm in radarHo Son
 
Radar 2009 a 18 synthetic aperture radar
Radar 2009 a 18 synthetic aperture radarRadar 2009 a 18 synthetic aperture radar
Radar 2009 a 18 synthetic aperture radarForward2025
 
Electronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation TrainingElectronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation TrainingTonex
 
Radar fundamentals
Radar fundamentalsRadar fundamentals
Radar fundamentalsAli Sufyan
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsDarwin Nesakumar
 
Radar applications
Radar applicationsRadar applications
Radar applicationsnader babo
 
Introduction to radar
Introduction to radarIntroduction to radar
Introduction to radarUlsah T N
 
ppt presentation on vsat technology
ppt presentation on vsat technologyppt presentation on vsat technology
ppt presentation on vsat technologyVijay kumar
 
Self Learning Anti Drone System
Self Learning Anti Drone SystemSelf Learning Anti Drone System
Self Learning Anti Drone Systemyovist taufan
 
IBIS-L: IBIS-L: An innovative solution for remote monitoring of displacements...
IBIS-L: IBIS-L: An innovative solution for remote monitoring of displacements...IBIS-L: IBIS-L: An innovative solution for remote monitoring of displacements...
IBIS-L: IBIS-L: An innovative solution for remote monitoring of displacements...Giorgio Barsacchi
 
Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation Wesley Comal
 
Multiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdmaMultiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdmaShadab Siddiqui
 

Mais procurados (20)

Sar
SarSar
Sar
 
3. the-wireless-channel-2
3. the-wireless-channel-23. the-wireless-channel-2
3. the-wireless-channel-2
 
Basics of EBG structures
Basics of EBG structuresBasics of EBG structures
Basics of EBG structures
 
Directed Infrared Countermeasures (DIRCM) Principles
Directed Infrared Countermeasures (DIRCM) PrinciplesDirected Infrared Countermeasures (DIRCM) Principles
Directed Infrared Countermeasures (DIRCM) Principles
 
Eccm in radar
Eccm in radarEccm in radar
Eccm in radar
 
Radar 2009 a 18 synthetic aperture radar
Radar 2009 a 18 synthetic aperture radarRadar 2009 a 18 synthetic aperture radar
Radar 2009 a 18 synthetic aperture radar
 
Electronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation TrainingElectronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation Training
 
Radar fundamentals
Radar fundamentalsRadar fundamentals
Radar fundamentals
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Radar applications
Radar applicationsRadar applications
Radar applications
 
Introduction to radar
Introduction to radarIntroduction to radar
Introduction to radar
 
ppt presentation on vsat technology
ppt presentation on vsat technologyppt presentation on vsat technology
ppt presentation on vsat technology
 
Self Learning Anti Drone System
Self Learning Anti Drone SystemSelf Learning Anti Drone System
Self Learning Anti Drone System
 
IBIS-L: IBIS-L: An innovative solution for remote monitoring of displacements...
IBIS-L: IBIS-L: An innovative solution for remote monitoring of displacements...IBIS-L: IBIS-L: An innovative solution for remote monitoring of displacements...
IBIS-L: IBIS-L: An innovative solution for remote monitoring of displacements...
 
radar-ppt
radar-pptradar-ppt
radar-ppt
 
Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation
 
3D Beamforming
3D Beamforming3D Beamforming
3D Beamforming
 
UNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSUNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKS
 
Multiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdmaMultiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdma
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 

Semelhante a CEMA and Information Manoeuvre in the A2/AD Battlespace

Future SEAD Developments: Delivering Air Superiority in Contested Environments
Future SEAD Developments: Delivering Air Superiority in Contested EnvironmentsFuture SEAD Developments: Delivering Air Superiority in Contested Environments
Future SEAD Developments: Delivering Air Superiority in Contested EnvironmentsLeonardo
 
Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18David Sweigert
 
Rotary Wing Platforms: Delivering Information Advantage to the Joint Force
Rotary Wing Platforms: Delivering Information Advantage to the Joint ForceRotary Wing Platforms: Delivering Information Advantage to the Joint Force
Rotary Wing Platforms: Delivering Information Advantage to the Joint ForceLeonardo
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsSolarWinds
 
Defending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRICDefending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRICOMNETRIC
 
Mavenir: Small Cells Security - Overcoming Deployment Challenges
Mavenir: Small Cells Security  - Overcoming Deployment ChallengesMavenir: Small Cells Security  - Overcoming Deployment Challenges
Mavenir: Small Cells Security - Overcoming Deployment ChallengesSmall Cell Forum
 
Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Heather-Fiona Egan
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...David Sidhu
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MECSabidur Rahman
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Deepak Shankar
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustryDragos, Inc.
 
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...Marina Krotofil
 
Best practices in solving PNT threats in critical defense communications infr...
Best practices in solving PNT threats in critical defense communications infr...Best practices in solving PNT threats in critical defense communications infr...
Best practices in solving PNT threats in critical defense communications infr...Adtran
 
[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT ConvergenceSchneider Electric
 
Accelerating Monetization of M2M/Connected Devices
Accelerating Monetization of M2M/Connected DevicesAccelerating Monetization of M2M/Connected Devices
Accelerating Monetization of M2M/Connected DevicesCartesian
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
 

Semelhante a CEMA and Information Manoeuvre in the A2/AD Battlespace (20)

Future SEAD Developments: Delivering Air Superiority in Contested Environments
Future SEAD Developments: Delivering Air Superiority in Contested EnvironmentsFuture SEAD Developments: Delivering Air Superiority in Contested Environments
Future SEAD Developments: Delivering Air Superiority in Contested Environments
 
Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18
 
Rotary Wing Platforms: Delivering Information Advantage to the Joint Force
Rotary Wing Platforms: Delivering Information Advantage to the Joint ForceRotary Wing Platforms: Delivering Information Advantage to the Joint Force
Rotary Wing Platforms: Delivering Information Advantage to the Joint Force
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Defending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRICDefending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRIC
 
Mavenir: Small Cells Security - Overcoming Deployment Challenges
Mavenir: Small Cells Security  - Overcoming Deployment ChallengesMavenir: Small Cells Security  - Overcoming Deployment Challenges
Mavenir: Small Cells Security - Overcoming Deployment Challenges
 
Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
 
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded D...
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
 
Best practices in solving PNT threats in critical defense communications infr...
Best practices in solving PNT threats in critical defense communications infr...Best practices in solving PNT threats in critical defense communications infr...
Best practices in solving PNT threats in critical defense communications infr...
 
25 Feb 2014 CDE enduring challenge competition briefings
25 Feb 2014 CDE enduring challenge competition briefings 25 Feb 2014 CDE enduring challenge competition briefings
25 Feb 2014 CDE enduring challenge competition briefings
 
Deception towards Moving Target Defense
Deception towards Moving Target DefenseDeception towards Moving Target Defense
Deception towards Moving Target Defense
 
[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence
 
Accelerating Monetization of M2M/Connected Devices
Accelerating Monetization of M2M/Connected DevicesAccelerating Monetization of M2M/Connected Devices
Accelerating Monetization of M2M/Connected Devices
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 

Mais de Leonardo

The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationLeonardo
 
Leonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdfLeonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdfLeonardo
 
The Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results PresentationThe Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results PresentationLeonardo
 
Leonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results PresentationLeonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results PresentationLeonardo
 
Leonardo 1H 2023 Results
Leonardo 1H 2023 ResultsLeonardo 1H 2023 Results
Leonardo 1H 2023 ResultsLeonardo
 
Leonardo 1Q 2023 Results
Leonardo 1Q 2023 ResultsLeonardo 1Q 2023 Results
Leonardo 1Q 2023 ResultsLeonardo
 
Leonardo FY 2022 Results
Leonardo FY 2022 ResultsLeonardo FY 2022 Results
Leonardo FY 2022 ResultsLeonardo
 
Leonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 ResultsLeonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 ResultsLeonardo
 
Leonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results PresentationLeonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results PresentationLeonardo
 
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and UpdatesLeonardo
 
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...Leonardo
 
Leonardo 1Q 2022 Results
Leonardo 1Q 2022 ResultsLeonardo 1Q 2022 Results
Leonardo 1Q 2022 ResultsLeonardo
 
Leonardo FY2021 Results
Leonardo FY2021 ResultsLeonardo FY2021 Results
Leonardo FY2021 ResultsLeonardo
 
European Rotors - Certification by Simulation
European Rotors - Certification by SimulationEuropean Rotors - Certification by Simulation
European Rotors - Certification by SimulationLeonardo
 
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...Leonardo
 
European Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL SymposiumEuropean Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL SymposiumLeonardo
 
European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day Leonardo
 
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation FuelEuropean Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation FuelLeonardo
 
European Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft OperationsEuropean Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft OperationsLeonardo
 
European Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS MarketEuropean Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS MarketLeonardo
 

Mais de Leonardo (20)

The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
 
Leonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdfLeonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdf
 
The Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results PresentationThe Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results Presentation
 
Leonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results PresentationLeonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results Presentation
 
Leonardo 1H 2023 Results
Leonardo 1H 2023 ResultsLeonardo 1H 2023 Results
Leonardo 1H 2023 Results
 
Leonardo 1Q 2023 Results
Leonardo 1Q 2023 ResultsLeonardo 1Q 2023 Results
Leonardo 1Q 2023 Results
 
Leonardo FY 2022 Results
Leonardo FY 2022 ResultsLeonardo FY 2022 Results
Leonardo FY 2022 Results
 
Leonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 ResultsLeonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 Results
 
Leonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results PresentationLeonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results Presentation
 
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
 
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
 
Leonardo 1Q 2022 Results
Leonardo 1Q 2022 ResultsLeonardo 1Q 2022 Results
Leonardo 1Q 2022 Results
 
Leonardo FY2021 Results
Leonardo FY2021 ResultsLeonardo FY2021 Results
Leonardo FY2021 Results
 
European Rotors - Certification by Simulation
European Rotors - Certification by SimulationEuropean Rotors - Certification by Simulation
European Rotors - Certification by Simulation
 
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
 
European Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL SymposiumEuropean Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL Symposium
 
European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day
 
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation FuelEuropean Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
 
European Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft OperationsEuropean Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft Operations
 
European Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS MarketEuropean Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS Market
 

Último

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 

Último (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 

CEMA and Information Manoeuvre in the A2/AD Battlespace

  • 1. CEMA and Information Manoeuvre in the A2/AD Battlespace 6th June 2018 Sam Qaisar Capability Engineer (TVACD/RF Cyber)
  • 2. 2 © 2018 Leonardo MW Ltd – All rights reserved Information Warfare • Adversarial pursuit of a competitive information advantage • Typically seeks to degrade, remove, or control an adversary’s situational awareness CommsC2 Nodes Sensors Doctrine Key Personnel Information Processing
  • 3. 3 © 2018 Leonardo MW Ltd – All rights reserved Information Manoeuvre (1) • Need to find a way to integrate Information Warfare into existing warfighting doctrine • In particular, we must link Information Warfare to the physical domain • The current model focusses on kinetic effects and manoeuvre in the physical domain • This not sufficient for future operating environments Fire Offensive Support Physical Manoeuvre
  • 4. 4 © 2018 Leonardo MW Ltd – All rights reserved Information Manoeuvre (2) • As a result, Information Manoeuvre is currently very poorly integrated into many armed forces • There are two main approaches: Intelligence • Identify enemy dispositions and intent • Predict and manipulate future behaviour Plans • Generate decision points • Use of deception plans Execution • Information and sensor feeds back to intelligence function to help refine future plans Planning Focussed or “J25” Approach Intelligence •Identify weaknesses in enemy doctrine and processes Targeting •Exploit weaknesses to identify and target positions of enemy units Execution •Destruction of enemy using fires •Create maximum confusion to degrade enemy response Targeting Focussed or “J23” Approach
  • 5. 5 © 2018 Leonardo MW Ltd – All rights reserved Information Manoeuvre (3) • Neither implementations is sufficient • “Planning focussed” – too rigid and slow, unable to seize the initiative • “Targeting focussed” – unable to turn tactical success into strategic victory • Both implementations suffer from being “enemy focussed” and reliant on kinetic effects • A better approach is to apply the principles of manoeuvre warfare and develop an “effects focussed” method that can operate at all levels in the information domain • Delay decision making • Degrade situational awareness • Deny sensor feeds
  • 6. 6 © 2018 Leonardo MW Ltd – All rights reserved Cyber Electromagnetic Activity (CEMA) • These effects can be achieved through the use of electronic warfare and cyber techniques • The integration of these techniques is referred to as Cyber Electromagnetic Activity (CEMA) • CEMA can be used to attack almost any piece of equipment with a sensor or communications link • Allows military units to manoeuvre through the information domain in a similar manner to the physical domain • Particularly useful in environments with highly networked threat systems and sensors • CEMA is not an “all in one” solution to information manoeuvre, but offers very good capability that maps well to existing tactics and doctrine
  • 7. 7 © 2018 Leonardo MW Ltd – All rights reserved Anti-Access/Area-Denial (A2AD) Environments • Many nations are developing Anti-Access/Area-Denial capabilities. China is a good example • Dense threat environment of air defence assets, cruise missiles, warships, aircraft, and satellites • Threat environment is dense and unpredictable, unable to plan for every eventuality or destroy every enemy asset • Extensive use of networking and sensors allows A2AD environment to react quickly • Use CEMA to attack the network rather than the individual nodes Image taken from IISS
  • 8. 8 © 2018 Leonardo MW Ltd – All rights reserved Implementing a CEMA Capability • Counter-A2AD warfighting is expeditionary • Low combat mass • Long supply lines • Limited ISTAR • Advantageous to have maximum capability per platform, and mutually reinforcing capabilities • Ideally, CEMA capability should be: • Distributed • Networked • Re-taskable • Planned for at the highest level, and enabled at the lowest level • The use of CEMA in A2AD therefore allows for increased: • Operational effect from each platform • Survivability of platforms and formations • Tempo and mission coverage
  • 9. 9 © 2018 Leonardo MW Ltd – All rights reserved Using CEMA in A2AD Environments • Attack strategic ISTAR collection capabilities (satellites, comms, open source, sensors) • Enemy will struggle to deploy appropriate troops or conduct strategic fires • Electronic deception to create fake troop positions or spoof equipment signatures • Difficult to identify real targets and their associated equipment • Deploy offensive CEMA payloads against enemy comms networks • Slower decision making, degrade sensor fusion between networked equipment • Self protection CEMA capabilities to enhance platform survivability • Unable to reliably detect or engage targets • Attack of key equipment and network nodes using CEMA and kinetic effects (network based targeting) in order to degrade situational awareness • Disproportionate degradation of A2AD network and loss of freedom of manoeuvre • Kinetic strikes against military targets • Manipulation of sensors, comms, and open source to prevent accurate enemy damage assessment • Over/under commitment of forces in response to attack STRATEGIC TACTICAL Enduring tasks On demand/ Mission specific tasks
  • 10. 10 © 2018 Leonardo MW Ltd – All rights reserved Leonardo Strategy • Leonardo is investing in new technologies and tools to achieve information manoeuvre • Electronic Warfare line of business is now following a “Suppression of Enemy Air Defence” (SEAD) strategy • Novel electronic warfare equipment and technology • Mission planning tools • Enterprise level support such as mission data management • All Leonardo divisions across Land, Air, and Maritime are working together to achieve mutually supporting capabilities • Underpinned by CEMA expertise from Security and Information Systems division • A single supplier for the entirety of information manoeuvre
  • 11. THANK YOU FOR YOUR ATTENTION