III.F.09. Information Warfare Attack and Protect. Demonstrate the ability to launch effective Command and Control (C2) Attack against Integrated Battlefield Area Communications Systems (IBACS) (threat information systems). Demonstrate the ability to protect the Armys Tactical Internet (TI) information systems and components from modern network attacks. Leverage existing technologytake advantage of modeling and simulation for concept exploration and definitionuse C2 attack capabilities against TI information systems and componentsfor each C2 attack method incorporate a "counter" (C2 Protect) capability. By FY02, provide the ability to selectively control an adversarys use of information, information-based processes, and information systems through the application of offensive capabilities that deny, disrupt, or degrade operations or capabilities. Demonstrate protection of friendly Tactical Internet Command and Control Systems and components.
Supports: Intercept, location, and electronic attack of modern, digital C2 systems; and C2 Protection of Tactical Internet Components and Networks, including radios, routers, and host computers.
|STO Manager:||TSO:||TRADOC POC:|
|George Morris||Carolyn Nash||(TBD)|