UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS
|
|
- Elfreda Roberts
- 8 years ago
- Views:
Transcription
1 CYBER REQUIREMENTS MAJ Hurcules Murray TCM- CYBER DCO Chief 1
2 Purpose Purpose: A broad overview of the current and emergent Army cyberspace requirements identified through capability based assessments, with a synopsis of all the work coming from the cyber capabilities based analysis. 2
3 Agenda TOPICS: Army Required & Current Capabilities IS D: DCO / OCO / Cyber Situational Awareness Prioritized Gaps Cyber CBA Conclusions Recommended Solution Sets 3
4 Army Cyber Required Capabilities Required Capabilities: Each echelon requires the ability to access capabilities resident at other echelons Task + Condition + Standard (metrics) Conduct: to direct or take part in the operation or management of (administer, control, direct, lead, operate, order, organize). Perform: to carry out an action or pattern of behavior complete, move, observe, operate, react Deliver: to send to an intended target or destination Company Company includes: Platoon, Squad, Fire team, Soldier Battalion CEM Bde/BCT CEM Division Corps Defend in Depth; Ability to protect individuals and platforms. ASCC Conduct CEMA; Perform DODIN operations, EW and EMSO; Deliver EA. Build, Operate and Defend a network that ensures Mission Command Commanders SA, includes social media/layer (Cyber CBA #1 Capability Gap) CEM ARCYBER JFHQ ACOIC Conduct CEMA. Perform/Deliver DODIN operations, DCO,OCO, Hunt, Support to tactical forces. Conduct CEMA; Perform/Deliver DODIN operations, DCO, OCO, EW & EMSO. Support to tactical forces. Conduct CEMA; Perform/Deliver DODIN operations, DCO, OCO, EW & EMSO. Support to tactical forces. Extend cyber Conduct CEMA; Perform DODIN operations, DCO, EW & SMO; Deliver EA; to Operational Integrate OCO. and Tactical Commanders CEM CCMD CSE CEM USCC TEAM S 4
5 Army Current Capabilities Limited cyber doctrine, training and leader development Policy and authorities do not support tactical commanders. GENFOR limited ability to provide cyber & EW capabilities to operational forces limited velocity & capacity Legacy, non-standard networks, undefendable, expensive. Limited self-protection, understanding of Limited offensive capabilities CEM Staff element limited capacity and training Partial tactical expertise Battalion and Below includes: Company Platoon Squad Fire team Soldier 5 Battalion and Below CoIST DCGS-A Self protect jammers (CREW, CVRJ, MMBJ) 25 Series 29 Series 35Series S2 S3 S6 MC/NetOps (CPOF, FBCB2, NIPR, SIPR) S2 S3 S6 25 Series 29 Series 35Series Bde/BCT TROJAN DCGS-A MI CO SBCT SURV TRP MC/NetOps (CPOF, FBCB2, NIPR, SIPR, JWICS) Prophet UAS Plt Self protect jammers (CREW, CVRJ, MMBJ) G2 / ACE G3 G6 Fires 25 Series Division/Corps 29 Series 35Series MI BN BFSB Expeditionary Signal BN DCGS-A MC/NetOps (GNEC) Aircraft Survivability Equipment Prophet TROJAN CAB NOSC Joint & National G2 / ACE G3 G6 Fires MI BDE Theater Signal Command Theater Tactical Sig Bde TNOSC ASCC JSTARS TROJAN DCGS-A (FIXED) MC/NetOps (GNEC) Aircraft Survivability Equipment 25 Series 29 Series 35Series Army Cyber Command Space Systems NTM Multi-Intel Sensors/ Platforms DCGS-A 25 Series 35Series NETCOM INSCOM 1 st IO (Cyber Elements) Cyber Bde 5
6 Army Prioritized Cyber Gaps 6 Cyber CBA FNA Gap Overall Priority Cyber Gap 17: Commanders SA (Includes social media/layer) 01 Cyber Gap 07: Defend in Depth 02 Cyber Gap 13: DCyD, Hunt and DCO-RA 03 Cyber Gap 05: Operate Networks 04 Cyber Gap 15: Collect, Process and Analyze Adversary Information 05 Cyber Gap 24: RDT&E, RDA and Technical Architecture 06 Cyber Gap 11: Offensive Architecture and Infrastructure 07 Cyber Gap 16: Cyber Attack/OCO 08 Cyber Gap 12: Access to Adversaries 09 Cyber Gap 03: Establish the Enterprise 10 Cyber Gap 14: Exploit Cyber and EW Capabilities 11 Cyber Gap 31: Electronic Protection 12 Cyber Gap 26: Security and Vul Assessments 13 Cyber Gap 32: Electronic Warfare Support 14 Cyber Gap 01 Cyber (Cyber/Electromagnetic) Integration 15 Cyber Gap 30: Conduct Electronic Attack 16 Cyber Gap 27: SE and Forensics 17 Cyber Gap 22: Integrate WfFs and Assess (BDA) 18 Cyber Gap 25: Legal and Policy Oversight 19 Cyber Gap 08: Information, Services and Applications 20 Cyber Gap 04: Access and Authentication 21 Cyber Gap 06: Integrate Mission Partners 22 Cyber Gap 29: Homeland Defense/DSCA 23 Cyber Gap 09: Unity of Command/Governance 24 Mission critical, we must do! Mission essential to take the initiative! Sustain the operational initiative! Commanders SA and understanding the social dimension of cyberspace are critical to Joint and Unified Land Operations Many of the gaps cross multiple required capabilities DOTmLPF actions such as Doctrine and LDE&T can mitigate large portions of these gaps. Materiel development is REQUIRED. An Army Cyber Roadmap could provide synergy of these areas (RDT&E, RDA, S&T) Cell Color Indicates Level of Risk: Extremely High Risk High Risk Moderate Risk Low Risk 6
7 7 Commanders SA and the COP See Yourself, the Threat & the Cyberspace Terrain Understand Operational Impact, Risk and Mitigation Cyber and the EMS in Unified Land Operations Network as an Operational Platform Single, Secure Network, Must defend to operate Full spectrum Cyberspace and EW Operations Ensure Mission Command Commanders require freedom to maneuver Must have tactical offensive cyber & EW capabilities If not, Army cedes the initiative to the adversary Integrated Cyber Planning and Execution Cyber/EW Effects tied to Commander s Objectives Synchronize Lethal & Non-Lethal Robust CEMA element tied to CNMTs (Joint teams) Transform the Army, Trained and Ready Forces Fundamental Principles Doctrine, Education, Training, and Leader Development is Key 7
8 Commanders and Units Commanders must understand: Staffs: How the cyber domain and EMS influences and impacts their operational environment How to fully leverage cyber and EW capabilities holistically in Unified Land Operations Integrate Cyber and EW in maneuver How to call for support, reach-back capabilities Cyber/EW Units: Ability to create the operational cyber conditions throughout their area of operations Capacity to adeptly apply multiple capabilities, responsively, simultaneously Synchronization and collaboration among all mission elements, joint and Army Timely, responsive, continuous support for offensive cyber and EW. Can be done within today's authorities, extends the joint Title-X platform (USCC/ARCC) to the tactical level. Units simultaneously act across the physical domains, cyberspace, and the electromagnetic spectrum x 8 8
9 DCO IS D Description: The Defensive Cyberspace Operations capability is an integrated solution that provides protection against, monitoring/detection/analysis of, and response to known/unknown network and information system threats and vulnerabilities to achieve freedom of action in the cyberspace domain in support of unified land operations. The approval of the DCO IS D is a critical step towards establishing a true defense-in-depth across a friendly, neutral, and adversary portions of the Cyberspace domain. Gaps: 07 Defend in Depth 11 Offensive Architecture and Infrastructure 12 Access to Adversaries 13 DCyD, Hunt, and DCO-RA 16 Cyber Attack/OCO 22 Integrate WfFs and Assess Battle Damage 26 Security and Vulnerability Assessments 27 SE and Forensics 29 Homeland Defense/DCSA Protect JIE NEMC I Detect DCO GIG IA Response LWN Assess Capabilities: 9 P P P Gaining/Maintaining SA Discovery, Detecting, Analyzing, Mitigating Responding Outmaneuvering Actively Hunting Dynamically Re-establishing, Re-securing, Re-routing, Reconstituting, and Isolating DCO-RA Protecting Networks, Platforms, and Data Transferring Data Securely Managing User Identities Protecting Key/Critical Cyber Terrain/Infrastructure In-depth Assessments Site Exploitation/Forensics P
10 Offensive Cyber Operations IS I Description: The Offensive Cyberspace Operations (OCO) Information System Initial Capability Document (IS I) will establish the framework for the rapid identification, validation, development and fielding of capabilities required to execute OCO by ARCYBER operational forces in support of Service and Joint operations and requirements. The OCO IS I will align existing programs, emergent technologies, and resources to form an all-inclusive offensive cyber capabilities portfolio. This will enable the transition or acquisition of people, processes and technologies into a development methodology consistent with the Joint Capability Integration and Development System (JCIDS) and the Defense Acquisition System, promoting unity of effort throughout the community. Gaps: Offensive Architecture and Infrastructure Collect, Process and Analyze adversary information Cyber Attack/OCO Access to adversaries Exploit Cyber and EW capabilities DCyD, Hunt and DCO-RA Capabilities: An Army offensive infrastructure A common offensive firing platform Gaining and maintaining situational awareness Offensive Capabilities against tactical military communications Offensive Capabilities against critical ground force support infrastructure Offensive Capabilities against ground force systems OCO IS I OCO Infrastructure OCO Firing Platform Situation Awareness Tactical Military Communications Critical Ground Force Support Infrastructure Ground Force Systems 10
11 Cyber SA D Description: Situational Awareness (SA) ranges from understanding how tactical level actions within the cyber domain can have strategic implications within DoD, public, and private sector cyberspace to shared scalable awareness of joint, coalition, and interagency, operational status and intent. Cyber SA provides the Army and Joint Forces commanders an understanding of cyberspace infrastructure, its use by adversaries and neutral users, and impact on decisive operations. Gaps: 17 Commander s SA 05 Operate Networks 15 Collect Process and Analyze adversary Information 11 Offensive Architecture and Infrastructure 14 Exploit Cyber and EW Capabilities 31 Electronic Protection 26 Security and Vulnerability Assessments 32 Electronic warfare Support 01 Cyber (Cyber Electromagnetic SA is required) Integration 22 Integrate Warfighting Functions (WfF) and Assess BDA 23 Integrate Mission Partners Capabilities: Corps SA of the cyberspace domain and EMS; blue, white, grey, and red Internet Topography Targeting in cyber (includes EMS) and as part of land operations Connection to National Capacities (IC, National and Service Labs, AMC) Division SA/Identification Friend or Foe capability; blue, white, grey and red; internet topography Targeting in cyber (includes EMS) and as part of land operations CEM deconfliction with Organic and non-organic Elements and BCT and BCT and Below (ATO, Cyber, IC) May be restricted to TS level (limited STO) Visualization of task/org elements from BDE and Below to echelons above ASCC Brigade SA/Identification Friend or Foe capability; blue, white, grey and red; graphic representation (dash board) Highly Defined Targeting-e.g. route clearance support, mapped key terrain (cyber to geo and/or mission impact) Provide Real-Time/Near Real Time data; BW limits, EMS Considerations; MC System Capable; Tied to Physical 11 Topography
12 Solution Sets FSA identified 45 solutions to mitigate 24 FNA gaps Solutions were aligned to the gaps in the RSA worksheet focusing on the Technical Risk, Supportability, Feasibility, Affordability, and DOTMLPF-P implications Solutions were then prioritized by the overall gap priority and by the number of gaps the solution addressed Interdependent solutions were grouped together Based on the above, solutions were grouped into first, second and third priority groups. Within each priority are interdependent solutions that support each other and need to be implemented on a similar timeline (supporting and related solutions)
13 Priority Solution Sets Organization O01 - Army Construct for USCC C2 CONOPS O02 - Develop Robust CEM Element O06 - Army Cyber CoE Training T01 - Develop Army Cyber LDE&T Strategy Materiel M02 - Produce Cyber JCIDS Documents M04 - Transition Cyber Ops Arch/Infrastructure M06 - Implement IEWS M07 - Army Cyberspace Ops Arch/Infra Leader Development L01 - Specialized CMF Cyber LDE&T L02 - Incorporate basic cyberspace objectives L03 Develop cyber specific LD&E objectives in non-cyber LDE&T training Personnel P03 - Cyberspace Planners BCT to ASCC P05 - Manpower study (USCC & CEM Element) Facilities F02 - Ensure Adequacy of Facilities & Ranges Policy Policy06 - Army Materiel Development Strategy Organization O Integration Training T04 - Continue NETOPS Training Program T05 - Cyberspace / EW Modeling & Simulation T06 - Develop Digital Literacy Fitness Program T07 - Enterprise IA Awareness Training Materiel M01 - Providing Timely Cyber / EA Payloads Personnel P02 - MOS 25D / 35Q / 255S / FA 26 Facilities F01 - Service Facilities Assessment Policy Policy01 - Update Regulations (Army / DoD / USC) Policy02 - Update Title 10 for DCO-RA Policy03 - LandWarNet / JIE & GNE alignment Policy04 - Securing CONUS Infrastructure Policy05 - RC Alignment for ARFORGEN Organization O04 - Army Service Theater Cyber Organizations O05 - Develop Army Cyber and EW Tactical Units Training T02 - Legal/JAG Cyber Operations Training T03 - Leverage Joint Cyber Training Exercise Materiel M03 - Develop Mobile SCIFs M05 - Army Cyberspace Innovation Program Personnel P01 - Cyber S&T/RDT&E Personnel P04 - Review roles of cyber workforce Facilities F03 - Identify agency for facilities / ranges Policy Policy07 - Army Service Cyber Roadmap Policy08 - Cyber QRCs and Review Board Policy09 - Support to Cyber Mobilization Strategy Policy10 - JCIDS Modification Solution Set # 1 Solution Set # 2 Solution Set # 3 13
14 Way Ahead 14 14
15 15 DOMTMLPF Integrated Capabilities Recommendation (DICR) The DICR focuses on those Cyber CBA Solutions not currently being implemented. Doctrine FM 3-12 Cyberspace Operations (in progress) Organization Organization Develop a robust and capable Cyber Electromagnetic (CEM) Element, ASCC to BCT (Cyber CBA O02). Create Army Service Theater Cyber Organizations (Cyber CBA O04) COMPLETE Develop Army Cyber and EW tactical units (Cyber CBA O05). Training Assess and identify legal support to cyberspace operations for Judge Advocate General (JAG) Training (Cyber CBA T02). Leverage a Joint Cyber Training Enterprise (Cyber CBA T03). Incorporate cyberspace and EW modeling and simulation (M&S) capabilities into cyberspace and EW training and exercises (Cyber CBA T05). Leadership & Education Incorporate additional specialized cyberspace training into specified Career Management Fields (CMF) and Functional Areas (FA) (Cyber CBA L01). Incorporate basic cyberspace learning objectives into the Officer Education System, Warrant Officer Education System, Noncommissioned Officer Education System, and Civilian Education System (Cyber CBA L02). Develop cyber specific LD&E objectives in non-cyber LDE&T training (educate and train the force) (Cyber CBA L03). Personnel Determine Personnel Requirements in the Research, Development, Test, and Evaluation (RDT&E) Research Development, Acquisition (RDA), and Science and Technology (S&T) Communities (Cyber CBA P01). Add Cyberspace Operations Planners to the CEM Element, at BCT to ASCC (Cyber CBA P03). Conduct a manpower study for USCC C2 CONOPS and CEM Element (Cyber CBA P05). Facilities Conduct Army Service Facilities Assessment and Strategy (Cyber CBA F01). Ensure adequate facilities and ranges are available (Cyber CBA F02). Identify a Service coordination agency for Army and joint cyber ranges (Cyber CBA F03). 15
16 Questions 16
US Army EW Training Overview. LTC Steve Oatman TRADOC Capability Manager Electronic Warfare (TCM EW) 30 JUL 2014
US Army EW Training Overview LTC Steve Oatman TRADOC Capability Manager Electronic Warfare (TCM EW) 30 JUL 2014 UNCLASSIFIED Agenda EW School Mission Doctrine EW Courses FA29 290A WOBC 290A WOAC 29E AOEWC
More informationArmy Intelligence Industry Day Foundation Layer Technology Focus Areas
CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,
More informationCenter of Excellence Concept Plan
1 Agenda Spectrum Management Operations have evolved in recent years from a pre-mission planning task into an ongoing operational activity spanning well beyond Signal operations across all Warfighting
More informationFM 6-02 SIGNAL SUPPORT TO OPERATIONS
FM 6-02 SIGNAL SUPPORT TO OPERATIONS JANUARY 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at
More informationDoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
More informationDepartment of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
More informationLandWarNet Initial Capabilities Document NetOps Tools Convergence Strategy Update
1 LandWarNet Initial Capabilities Document NetOps Tools Convergence Strategy Update 11 September 2013 Al Morrison TCM GNE Signal CDID 1. LandWarNet Initial Capabilities Document (LWN ICD) LandWarNet ICD
More informationArmy Doctrine Update
Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near
More informationGAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
More informationCyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
More informationCyberspace Operations
Joint Publication 3-12 (R) R TMENT THI S W E' L L O F D E F E N D THE ARMY DEPA U NI TE D S TAT E S F O A AME RI C Cyberspace Operations 5 February 2013 PREFACE 1. Scope This publication provides joint
More informationNetwork Operations (NetOps)
Network Operations (NetOps) COL Debbie Theall Project Manager, PM I3C2 22 May 2013 UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 1 UNCLASSIFIED Agenda UNCLASSIFIED Context NetOps
More informationCHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST
More informationSoftware Reprogramming Policy for Electronic Warfare and Target Sensing Systems
Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY
More informationAUSA Background Brief
AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of
More informationPartnering with Small Business
Partnering with Small Business Small Business Breakfast Ms. Essye Miller Director, Cyber Security, Army CIO/G-6 1 UNCLASSIFIED Army CIO/G-6 Organization CIO / G-6 Deputy, CIO / G-6 LTG Robert Ferrell Mr.
More informationSIGNAL SOLDIER S GUIDE
FM 6-02.43 SIGNAL SOLDIER S GUIDE March 2009 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army
More informationSystems Engineering and Integration Efforts. 11 Dec 2013
Systems Engineering and Integration Efforts 11 Dec 2013 Mr. Leo Smith Director, PoR Engineering Support ASA(ALT) System of Systems Engineering & Integration Directorate (SOSE&I) Approved for Public Release;
More informationDEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
More informationJoint Communications System
Joint Publication 6-0 R TMENT THI S W E' L L O F D E F E N D THE ARMY DEPA U NI TE D S TAT E S F O A AME RI C Joint Communications System 10 June 2015 This publication is the keystone document for communications
More informationAn Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
More informationOperationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
More informationG2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE
G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs
More informationBig Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
More informationFEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY
A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job
More informationADRP20 AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY
ADRP20 I NTELLI GENCE AUGUST201 2 DI STRI BUTI ONRESTRI CTI ON: Appr ov edf orpubl i cr el eas e;di s t r i but i oni sunl i mi t ed. HEADQUARTERS,DEPARTMENTOFTHEARMY This publication is available at Army
More informationThe virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
More informationDirector of Intelligence Proposed Research Topics
Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis
More informationCyber Domain and LandWarNet: Powering the Army AUSA 2012
Cyber Domain and LandWarNet: Powering the Army AUSA 2012 Lead: LTG Rhett A. Hernandez, Commanding General, United States Army Cyberspace Command LTG Donald M. Campbell, Jr., Commanding General, III Corps
More informationArmy Foundry Intelligence Training Program
Army Regulation 350 32 Training Army Foundry Intelligence Training Program Headquarters Department of the Army Washington, DC 2 June 2015 UNCLASSIFIED SUMMARY of CHANGE AR 350 32 Army Foundry Intelligence
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationArmy Cloud Computing Strategy
Army Cloud Computing Strategy MARCH 2015 Enterprise Architecture Division Army Architecture Integration Center HQDA CIO/G-6 Version 1.0 This page intentionally left blank. TABLE OF CONTENTS FOREWORD...
More informationHuman Resources Management. Portfolio Management Concept of Operations
Human Resources Management Portfolio Management Concept of Operations September 30, 2012 Table of Contents 1.0 Overview... 2 1.1 Background... 2 1.2 Purpose... 2 1.3 Organization of This Document... 2
More informationDOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
More informationA Comprehensive Cyber Compliance Model for Tactical Systems
A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
More informationCyber Workforce Training
Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1 DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA
More informationDOCUMENT CHANGE RECORD
DOCUMENT CHANGE RECORD Version Number Date Description V 0.1 April 19, 2010 Pre-Decisional Draft Release V 0.2 July 23, 2010 Pre-Decisional Draft Release V 0.3 September 15, 2010 Pre-Decisional Draft Release
More informationSubj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING
SECNAV INSTRUCTION 1543.2 From: Secretary of the Navy SECNAVINST 1543.2 DON CIO Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING Ref: See Enclosure (1) Encl: (1) References (2) Responsibilities
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
More informationFORT BRAGG, NC JOB POSTINGS
FORT BRAGG, NC JOB POSTINGS Release date: 7/28/15 To apply for these positions, please send your cover letter and resume to: HR@ICPSYSTEMS.COM. Thanks! These are the positions available at this time: 1.
More informationDepartment of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)
Department of Defense DIRECTIVE NUMBER 4630.05 May 5, 2004 Certified Current as of April 23, 2007 ASD(NII)/DoD CIO SUBJECT: Interoperability and Supportability of Information Technology (IT) and National
More informationTHE MILITARY APPLICATIONS OF CLOUD COMPUTING TECHNOLOGIES
THE MILITARY APPLICATIONS OF CLOUD COMPUTING TECHNOLOGIES A Monograph By MAJ Dallas A. Powell, jr. SAMS Class 13-01, U.S. Army School of Advanced Military Studies United States Army Command and General
More informationCyber Superiority. Weapon System Normalization Update. Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority. AFCEA Luncheon Jan 2015
Cyber Superiority Weapon System Normalization Update AFCEA Luncheon Jan 2015 Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority Overview A5/8 Organization Where We Were/Are Way Forward Challenges
More informationJoint Information Environment Single Security Architecture (JIE SSA)
Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz DISA JIE Special Assistant to the Mission Assurance Executive /JIE SSA Integrated Design Team Lead 12 May 2014 Problem
More informationThe State of DoD Biometrics
The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E thomas.dee@osd.mil 1 Agenda What We ve Done Biometrics
More informationNICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
More informationDISA and the Evolving DoD Enterprise
1 DISA and the Evolving DoD Enterprise 11 June 2014 Major General Alan R. Lynn Vice Director, Defense Information Systems Agency 20th Century Circuit & Dial tone Delivery UNCLASSIFIED DISA is Changing
More informationCyber Mission Analysis
Cyber Mission Analysis Mission Analysis for Cyber Operations of Department of Defense Submitted in compliance with the reporting requirement contained in the Fiscal Year 2014 National Defense Authorization
More informationSecurity and Emergency Services Community of Interest 0089 Emergency Management Career Road Map
Security and Emergency Services Community of Interest 0089 Emergency Management Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 0089 Occupational Series is Marked by Support
More informationCybersecurity: The Defense Perspective
Cybersecurity: The Defense Perspective Ms. Essye Miller Director, Cybersecurity Army CIO/G-6 October 15, 2015 1 CIO/G-6 As the CIO As the G-6 Reports directly to the Secretary of the Army for setting the
More informationPRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING
BACKGROUNDER Point of Contact: Mr. James L. Lindsey (703) 704-0194 James.L.Lindsey8.civ@mail.mil PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING Product Director, Enterprise Content,
More informationLeading Teams of Army Cyber Warriors
To: Company Commanders From: Company-grade Cyber Leaders Leading Teams of Army Cyber Warriors Our mission is to fight and win our nation s wars across all operational domains: land, sea, air, space and
More informationSimulation and Training Solutions
Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,
More informationU.S. Military Cybersecurity-related Provisions Comparison Fiscal Year 2014 Space Foundation Page 1 of 13
U.S. Military Cybersecurity-related Provisions Comparison for Fiscal Year 2014 Update 2 U.S. House of Representatives passed FY 2014 National Defense Authorization Act [NDAA] Act (H.R. 1960); U.S. Senate
More informationThis publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html).
This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). *FM 3-13 Field Manual No. 3-13 Headquarters Department of the Army Washington, DC, 25 January
More informationMs. Sandy Veautour Chief Systems Engineer PSG
Ms. Sandy Veautour Chief Systems Engineer PSG SBIR Initiatives Phase I FY 07 3 Awards High Speed Wireless 3-D Video Transmission to Support Virtual Dismounted Training 2 Phase I contract awards Battlefield
More informationThe DoD CIO Charter:
George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive
More informationCybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
More informationU.S. Army Network Operations Reference Architecture. (Aligned to the DOD Enterprise)
U.S. Army Network Operations Reference Architecture (Aligned to the DOD Enterprise) Version 1.0 6 March 2014 Executive Summary The Army relies on the current Network to support warfighting and business
More informationFM 1-04 LEGAL SUPPORT TO THE OPERATIONAL ARMY
FM 1-04 LEGAL SUPPORT TO THE OPERATIONAL ARMY MARCH 2013 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available
More informationHeadquarters Department of the Army
ATP 4-93 Sustainment Brigade August 2013 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. Headquarters Department of the Army This publication is available at Army Knowledge
More informationDepartment of Defense Information Enterprise Architecture (DoD IEA) Version 2.0
Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0 Volume I Management Overview of the DoD IEA July 2012 Prepared by: Department of Defense Office of the Chief Information
More informationOperational Energy Strategy: Implementation Plan
Operational Energy Strategy: Implementation Plan Department of Defense March 2012 Preparation of this report/study cost the Department of Defense 2011 - a 2012. total of approximately Generated $240,000
More informationData Intensive Science and Computing
DEFENSE LABORATORIES ACADEMIA TRANSFORMATIVE SCIENCE Efficient, effective and agile research system INDUSTRY Data Intensive Science and Computing Advanced Computing & Computational Sciences Division University
More informationCOMMAND AND CONTROL OF DETAINEE OPERATIONS
FMI 3-63.6 COMMAND AND CONTROL OF DETAINEE OPERATIONS September 2005 Expires September 2007 HEADQUARTERS, DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
More informationAIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013
AIR- SEA BATTLE Service Collaboration to Address Anti-Access & Area Denial Challenges White PantoneBlackC PantoneReflexBlueC Pantone 116C Pantone 165C Pantone 422C Pantone 471C Pantone 551C May 2013 This
More informationNational Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
More informationADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
ADP 3-0 UNIFIED LAND OPERATIONS OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army
More informationNavy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
More informationThis Conference brought to you by www.ttcus.com
This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army
More informationNAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered
More informationRear Detachment Commander. Computer-Based Training. Module 10: Training Management
Rear Detachment Commander Computer-Based Training Module 10: Training Management Table of Contents 1. TRAINING MANAGEMENT... 1 1.1. IMPLEMENTING A TRAINING PLAN... 1 1.1.1. Principles Of Training... 2
More informationDepartment of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 COST ($ in Millions) All Prior Years FY 2012 FY 2013 # Base OCO ## FY 2015 FY 2016 FY 2017 FY 2018
More informationLeveraging Virtualization Technology for Command and Control Systems Training
Leveraging Virtualization Technology for Command and Control Systems Training Joseph J. Connery, Jr., Robert C. Callahan, Dr. Philip N. Brown NORAD and USNORTHCOM/J7 Joint Training and Exercises Directorate
More informationPanel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
More informationDefining a Secure Mobile Framework Architecture at DHA
Ms. Janine Oakley, Transition Manager Innovation and Advanced Technology Development Division 2015 Defense Health Information Technology Symposium Defining a Secure Mobile Framework Architecture at DHA
More informationWorking Group 9 Cyber Analysis
Working Group 9 Cyber Analysis Co-Chair: Mr. David Silvernail Space and Missile Defense Command (SMDC), Huntsville, AL. david.l.silvernail.civ@mail.mil Co-Chair: Mr. Paul Works TRADOC Analysis Center (TRAC),
More informationSubj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE
D E PAR TME NT OF THE N A VY OFFICE OF T HE SECRET ARY 1000 NAVY PENT AGON WASHINGT ON D C 20350-1000 SECNAVINST 5239.20 DON CIO SECNAV INSTRUCTION 5239.20 From: Secretary of the Navy Subj: DEPARTMENT
More information1. Contracting Officer Representative (COR)
DRAFT 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Contract Number: Task Order Number: United States Cyber Command (USCYBERCOM) OMNIBUS Performance Work Statement (PWS) USCYBERCOM Cyber Operations (J3) Task
More informationForecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
More informationHeadquarters Department of the Army
ATP 6-01.1 (FM 6-01.1) Techniques for Effective Knowledge Management MARCH 2015 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. Headquarters Department of the Army This
More informationReliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
More informationDeputy Assistant Secretary of Defense for Cyber, Identity, and Information Assurance Strategy
Deputy Assistant Secretary of Defense for Cyber, Identity, and Information Assurance Strategy August 2009 The Office of the Assistant Secretary of Defense for Networks and Information Integration / DoD
More informationCYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
More informationMilper Message Number 15-166 Proponent ATZH-CS INITIAL MOS 170A WARRANT OFFICER CYBER BRANCH VOLUNTARY TRANSFER...Issued: [04 Jun 15]...
Milper Message Number 15-166 Proponent ATZH-CS INITIAL MOS 170A WARRANT OFFICER CYBER BRANCH VOLUNTARY TRANSFER...Issued: [04 Jun 15]... A. AR 614-100 (OFFICER ASSIGNMENT POLICIES, DETAILS, AND TRANSFERS),
More informationTest/Cyber Requirements and Capability Gaps Abstract
Test/Cyber Requirements and Capability Gaps Abstract The use of cyberspace operations to defend supported networks and project power through the digital domain is at the leading edge of new age warfare.
More informationSTATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
More informationUS Army Intelligence and Security Command (INSCOM)
US Army Intelligence and Security Command (INSCOM) Overview Briefing for National Defense Industrial Association (NDIA) Presented by Brigadier General Robert L. Walter Jr. INSCOM Deputy Commanding General
More informationWhen developing capabilities, the Army. I never blame myself when I m not hitting. I just blame the bat, and if it keeps up, I change bats.
(Photo by Capt. Meredith Mathis, U.S. Army) Spc. Casey Payne (left), 201st Expeditionary Military Intelligence Brigade, and Sgt. Andrew Lee, Company D, 14th Brigade Engineer Battalion, 2-2 ID (SBCT), pull
More informationSTATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE
STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE BEFORE THE SENATE COMMITTEE ON APPROPRIATIONS CYBERSECURITY:
More informationSTATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
More informationCyber Security Research and Development: A Homeland Security Perspective
Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders
More informationDoD Mobility Kim Rice
DoD Mobility Kim Rice Mobility PMO Contact: 301-225-5670 17 Jun 2015 DoD Mobility PMO Concept Vision: Secure, reliable and responsive infrastructure and services for the mobile users across the DoD. Mission:
More informationFM 4-0. Sustainment APRIL 2009. DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS DEPARTMENT OF THE ARMY
FM 4-0 Sustainment APRIL 2009 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS DEPARTMENT OF THE ARMY This publication is available at Army Knowledge Online
More informationCybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
More informationPEO LAND SYSTEMS MARINE CORPS Planning Brief to Industry. 22 Sep 2015 Michael D. Halloran Director S&T, PEO LS
PEO LAND SYSTEMS MARINE CORPS Planning Brief to Industry 22 Sep 2015 Michael D. Halloran Director S&T, PEO LS 1 Who we are What we do So what? 2 PEO LS Established in 2007 to enhance acquisition oversight
More information