Computer network operations: Difference between revisions

Content deleted Content added
Updated introduction; minor edits to existing text; added USACEWP portion
Line 1:
'''Computer Network Operations''' ('''CNO''') is a broad term that has both military and non-military application. Conventional wisdom is that information is power, and more and more of the information necessary to make intelligent decisions is digitized and conveyed over an ever expanding network of computers and other electronic devices. CNO are the deliberate actions taken to leverage and optimize these networks to improve human endeavor and enterprise or, in warfare, to gain information superiority and deny the enemy this enabling capability.
'''Computer Network Operations''' ('''CNO''') is a U.S. military doctrinal term which comprises [[computer network attack]], [[computer network defense]], and related [[computer network exploitation]] enabling operations.
 
==CNO in the Military Domain==
* ''Computer Network Attack'' ('''CNA'''): Actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.
Within the military ___domain, CNO is considered one of five core capabilities under Information Operations (IO) [see Joint Pub 3-13]. The other capabilities include [[Psychological Operations[[ (PSYOPS), [[Military Deception]] (MILDEC), Operations Security]] (OPSEC) and [[Electronic Warfare]] (EW).
 
Computer Network Operations, in concert with EW, is used primarily to disrupt, disable, degrade or deceive an enemy’s command and control, thereby crippling the enemy’s ability to make effective and timely decisions, while simultaneously protecting and preserving friendly command and control.
* ''Computer Network Defense'' ('''CND'''): Actions taken through the use of computer networks to protect, monitor, analyze, detect and respond to unauthorized activity within Department of Defense information systems and computer networks.
 
==Types of Military CNO==
* ''Computer Network Exploitation'' ('''CNE'''): Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks.
According to Joint Pub 3-13, CNO consists of computer network attack (CNA), computer network defense (CND) and computer network exploitation (CNE).
* ''Computer Network Attack'' ('''CNA'''): ActionsIncludes actions taken through the use ofvia computer networks to disrupt, deny, degrade, or destroy informationthe residentinformation inwithin computers and computer networks, and/or the computers and /networks themselves.
 
* ''Computer Network Defense'' ('''CND'''): ActionsIncludes actions taken through the use ofvia computer networks to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions or other unauthorized activityactions withinthat Departmentwould ofcompromise Defenseor cripple defense information systems and computer networks.
 
* ''Computer Network Exploitation'' ('''CNE'''): EnablingIncludes operationsenabling actions and intelligence collection capabilities conducted through the use ofvia computer networks tothat gatherexploit data gathered from target or adversary automatedenemy information systems or networks.
 
==United States Army Computer Network Operations-Electronic Warfare Proponent==
'''USACEWP''' is the U.S. Army agency responsible for ensuring Cyber Electronic Warfare capabilities are fully integrated into full-spectrum operations for the land component commander. The Director, USACEWP, reports to the Commanding General, [[United States Army Combined Arms Center]], Fort Leavenworth, Kansas.
 
'''USACEWP Mission:''' Develop, synchronize, integrate, and coordinate the Army Culture and the CNO-EW Capabilities and Capacity across the DOTMLPF domains IOT prepare the Army and the Land Component for future challenges in Cyberspace.
 
'''USACEWP Vision:''' Cyberspace and the broader electromagnetic spectrum (EMS) are optimized by soldiers and leaders who understand both the operational and technical dimensions of this segment of the operational environment and are outfitted with cyber and electronic capabilities enabling a broad range of joint, interagency, intergovernmental, and multinational activities during full spectrum operations while concurrently reducing risk to the force.
 
'''USACEWP Tasks:'''
 
* Decision authority to synchronize, integrate, and coordinate CNO and EW with modularity and future requirements
* Develop CNO and EW doctrine, organization, training, materiel, leadership and education, personnel, and facilities (DOTMLPF) requirements
* Determine the scope of future CNO and EW capabilities development efforts
* Determine integration tasks for Army, Joint, Interagency, Intergovernmental, and Multinational computer network and electronic warfare operations
* Perform as the Army’s centralized manager and integrator for CNO and EW combat development and force management activities
 
==Byzantine Foothold==
Line 15 ⟶ 37:
==External links==
* [http://www.dtic.mil/doctrine/jel/new_pubs/jp3_13.pdf United States Joint Information Operations Doctrine]
* [http://www.leavenworth.army.mil United States Army Combined Arms Center]
 
[[Category:Information operations| ]]