Command and Control in Operations and Cyber Security
Total Page:16
File Type:pdf, Size:1020Kb
COMMAND AND CONTROL IN OPERATIONS AND CYBER SECURITY Jiří Černý, Petr Hrůza Abstract: Command of armies is one of the areas where there occur frequent changes and which is the object of examination in all armies. The combat power of the armed forces does not depend only on equipping them with modern weapons and equipment, but it also depends on how their actions will be planned before the fight and how they are managed in combat. Every military operation conducted around the world is enabled by space as well as cyber operations, domains closely linked and threatened alike. Cyberspace is increasingly becoming a contested domain. Keywords: Command and Control, Communication, Cyber Security 1. Introduction Command and control is a multifaceted art and creative activity consisting of deliberate regulation of combat power to achieve its goals within the specified time and with minimum losses. Commander plays crucial and irreplaceable role. In the process of command, he decides how to use military force and imprints to subordinates his will and intentions. In the process of control, he and his staff, manage and coordinate activities of subordinates to meet the set task. To ensure reliable and effective command and control of combat forces, it is necessary to develop command and control system. It consists of three interlinked components: authorities, processes and means of command and control. Role of Command and Control System (Command and Control - C2) in command of troops is so crucial that no one questions it. Yet, it has to be clear that the system of command is an open system, in which constant changes take place. This system thus directly presupposes the search for ways and means to further improve the system itself. C2 and the communication is a sum of facilities, equipment, methods, procedures and staff, which enable commanders and their staffs to carry out command and control. It also includes command and control communications systems - that provide information transmission between command posts. 2. Command and Control From security standpoint, communication systems can be divided into classified and unclassified. Cryptography means are those, in which the use of technical means secret cryptographic are of sufficient value for the transmission of classified information along the entire route of communications. These must be certified by the National Security Authority under applicable legislation. Unclassified communications systems are those, in which uncertified technical means or no means at all are used. To transmit classified information, it is necessary to use encryption and cryptography appropriate for 18 cryptographic values. For effective command and control of troops in the operation, place from which commander commands and controls combat is highly important. Generally, the commander should be in such places, where during crucial situations, he can effectively influence the activities of subordinate forces. Therefore, for the command of troops it is practice to set up command posts. At all the command posts, there works at every level of command and control a commander, his staff, liaison teams (Liaison Teams) and a control of group assigned to the elements - the modules of military branches. The current command posts are centers of control, coordination and communication on the respective level of command and control, which maintain a permanent communication and coordination with the superior level of command, subordinates and adjacent units. 3. Communication and Information System Commanders and staffs of task forces constantly utilize communication and information systems (Communication and Information System - CIS) to continuously collect information from command posts in near real time and maintain a common operating picture (Common Operational Picture - COP) up to date. Data and information are shared jointly between command posts. Under normal circumstances, the information (data) are transmitted and shared through command and control systems. In this way subordinate officers send messages to their superiors in specified format and with specified purpose. The flow of information during the operation, therefore, takes place both in the vertical and in the horizontal plane in the vertical plane for the implementation of the command (command includes situations) and in the horizontal plane to ensure the synchronization between the units on the sides and other common components. "Without a communication there is no leadership" may be trite, but valid saying that have a permanent applicability. Due to the developments in cyberspace, however, the present time requires a new adage that "without encrypted communication there is no leadership." That conclusion follows from the fact that every military communication (starting with radiostations at the tactical level) is encrypted. It remains a fact that due to the advancement of technology, it is a matter of time before it will be possible to break the key and debunk the transmitted information. 4. Protection against detection, against analysis and against deception Particularly vulnerable in terms of security of communication are radio communication systems, including classified systems. To achieve the maximum possible level of safety, basic security measures should be continuously and skillfully conducted. These measures can be divided into three groups - protection against detection, against analysis and against deception. Detection means searching, interception and recording of radio communications and other electromagnetic radiation for the purpose of obtaining information. No radio transmissions are safe from detection. Scouting devices are more sensitive receivers, and effective antennas are usually able to find out the position of radio stations. Analysis means examining and evaluating the intercepted communications and radiation in order to obtain valuable information. Deceit means an unauthorized entry into the communication system, in order to pretend plausible broadcasting with the intent to bring the system into confusion and misleading 19 information. In peacetime, this activity is unlikely. It is almost exclusively carried out during conflicts. This increases its hazards. Unprepared operators and users facing urgent tactical issues may become an easy target for such an attack. 5. Sharing of information between components Multinational (joint) operations will always require the sharing of information between components of the individual branches of the forces (Ground Forces, Air Force, Navy, Special Forces). Information exchange is critical for the successful coordination of the operation. Therefore, as a minimum, the COP is required, in order to provide other components of armed forces to have good knowledge of the situation and the possibility of retaliation by supporting components in favor of supported components. Different branches of forces must exchange information through their national communication means and CIS in the operational area actively and effectively, in order to contribute to the creation of effective and efficient information transmission infrastructure. Although the details of the information requirements for the exchange of information will be specific to each operation, there exists a number of different types of information to be exchanged horizontally and vertically in any context of operations. These types of information can be divided into following categories: • Documents for command and control - operational orders (OPORD), instructions and plans. • Knowledge of the situation, including our own, hostile and neutral (civilian) forces and information about the environment, including the operation of meteorological information. • Information about control measures (including orders to control, such as orders for firing tasks and to control airspace (Air Control - ACO) and the results of control and information). • Information on combat support and services of combat support. • Reports. • Information from specialist’s areas, such as artillery, combat engineers, aviation and others. 6. Security and system requirements Security management is the identification of an organization's assets, followed by the development, documentation, and implementation of policies and procedures for protecting these assets. An organization uses such security management procedures as information classification, risk assessment, and risk analysis to identify threats, categories assets, and rate system vulnerabilities so that they can implement effective controls. Security and system requirements require that certain information is designated as classified or designated as nationally sensitive and such information should not be passed over. The key requirement is to maintain the security of information exchange between the CIS at the each respective level. Standard protection from sender to recipient should be up to the level "SECRET". When planning a military mission at command posts, it is important to take measures to ensure that all participants have access to the information essential to conduct combined joint operations. There must be guaranteed integrity and availability of information. Modern computers, which are now standard equipment of 20 command posts, offer new possibilities to support the military decision making process by providing commanders with data quickly and better, both horizontally and vertically. Thus increase the quality, quantity and level of detail of the plans (including partial and crisis), which are commanders