Computer network operations

From Wikipedia, the free encyclopedia

Computer Network Operations (CNO) is a broad term that has both military and non-military application. Conventional wisdom is that information is power, and more and more of the information necessary to make intelligent decisions is digitized and conveyed over an ever expanding network of computers and other electronic devices. CNO are the deliberate actions taken to leverage and optimize these networks to improve human endeavor and enterprise or, in warfare, to gain information superiority and deny the enemy this enabling capability.

Contents

[edit] CNO in the Military Domain

Within the military domain, CNO is considered one of five core capabilities under Information Operations (IO) Information Warfare. The other capabilities include Psychological Operations (PSYOP), Military Deception (MILDEC), Operations Security (OPSEC) and Electronic Warfare (EW).

Computer Network Operations, in concert with EW, is used primarily to disrupt, disable, degrade or deceive an enemy’s command and control, thereby crippling the enemy’s ability to make effective and timely decisions, while simultaneously protecting and preserving friendly command and control.

[edit] Types of Military CNO

According to Joint Pub 3-13, CNO consists of computer network attack (CNA), computer network defense (CND) and computer network exploitation (CNE).

  • Computer Network Attack (CNA): Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves.
  • Computer Network Defense (CND): Includes actions taken via computer networks to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions or other unauthorized actions that would compromise or cripple defense information systems and networks.
  • Computer Network Exploitation (CNE): Includes enabling actions and intelligence collection via computer networks that exploit data gathered from target or enemy information systems or networks.

[edit] United States Army Computer Network Operations-Electronic Warfare Proponents (USACEWP)

USACEWP is the United States Army agency responsible for ensuring Cyber Electronic Warfare capabilities are fully integrated into full-spectrum operations for the land component commander. Cyber Warfare is an evolving land component doctrinal precept comprised of Computer network operations and Electronic Warfare. The Director, USACEWP, reports to the Commanding General, United States Army Combined Arms Center, Fort Leavenworth, Kansas.

USACEWP Mission: Develop, synchronize, integrate, and coordinate the Army Culture and the CNO-EW Capabilities and Capacity across the DOTMLPF (doctrine, organization, training, materiel, leadership and education, personnel, and facilities) domains in order to prepare the Army and the Land Component for future challenges in Cyberspace.

USACEWP Vision: Cyberspace and the broader electromagnetic spectrum (EMS) are optimized by soldiers and leaders who understand both the operational and technical dimensions of this segment of the operational environment and are outfitted with cyber and electronic capabilities enabling a broad range of joint, interagency, intergovernmental, and multinational activities during full spectrum operations while concurrently reducing risk to the force.

USACEWP Tasks:

  • Decision authority to synchronize, integrate, and coordinate CNO and EW with modularity and future requirements
  • Develop CNO and EW doctrine, organization, training, materiel, leadership and education, personnel, and facilities (DOTMLPF) requirements
  • Determine the scope of future CNO and EW capabilities development efforts
  • Determine integration tasks for Army, Joint, Interagency, Intergovernmental, and Multinational computer network and electronic warfare operations
  • Perform as the Army’s centralized manager and integrator for CNO and EW combat development and force management activities

[edit] Byzantine Foothold

BF is supposedly a classified United States Department of Defense emergency program within the larger Cyber Initiative framework, specifically aimed at curbing and preventing foreign intrusions into the computer networks of US federal agencies. The twenty largest American military-industrial contractors have also been invited to participate in the program, after a highly potent hacker attack was detected at Booz Allen Corp.[1]

[edit] References

  1. ^ Grow, Brian; Keith Epstein, Chi-Chu Tschang. "The New E-spionage Threat", BusinessWeek, 2008-04-10. Retrieved on 2008-04-15. 

[edit] External links

Languages