Army Cyber Command Security Cooperation: Building Partner Capacity (BPC) in Cyberspace
|
|
- Annabel Pitts
- 7 years ago
- Views:
Transcription
1 Army Cyber Command Security Cooperation: Building Partner Capacity (BPC) in Cyberspace Mr. Jim Wasson This briefing is /APPROVED FOR PUBLIC RELEASE Transforming Cyberspace While at War Can t Afford Not To! 1
2 Army Security Cooperation Army Security Cooperation = Army engagements with foreign defense establishments to build relationships, develop partner nation capabilities, and provide US access in pursuit of national level goals. Helping partners help themselves solve internal and regional problems Develops capable partners for coalition operations Army Engagement objectives are described in the Army Campaign Support Plan (ACSP) ACSP is a GEF/JSCP requirement to describe support for Combatant Command campaign plans Focused on the Army s shape activities ACSP Relationship to Other Campaign Plans Army contributions to Engagement have been significant Support to security assistance (e.g., FMF, Int l Military Education & Training program) National Guard State Partnership Program and multinational exercises Army Foreign Area Officers Supporting the building of International Security Assistance Force Including Cyberspace in Army Security Cooperation is relatively new 2
3 Win SHAPE Prevent Army Cyber Command/2 nd ARMY Shape in DOD Guidance Prevent Maintain credibility based on capacity, readiness and modernization. Shape Sustain strong relationships with other Armies, building their capacity, and facilitating strategic access. Win If prevention fails, apply combined arms capabilities to dominate the environment and win decisively. Maintain a Safe, Secure and Effective Nuclear Deterrent Deter Aggression Provide a Stabilizing Presence Conduct Stability and Counterinsurgency Operations Project Power Despite A2/AD Challenges Conduct Humanitarian, Disaster Relief, and other Operations Counter Terrorism and Irregular Warfare Counter WMD Operate effectively in Cyberspace and Space Defend the Homeland and Provide Support to Civil Authorities Deter and Defeat Aggression 3
4 Why Cyberspace Security Cooperation Global nature of the threat - potential shared threats in cyberspace Growing reliance upon cyberspace for key defense systems Our desire for partners that are interoperable and that can be fully integrated with us in combined/coalition operations We desire partners that can defend themselves and operate effectively with us in cyberspace 4
5 Cyber Security Cooperation Acknowledging that cybersecurity is a global issue that must be addressed with national efforts on the part of all countries, we will expand and regularize initiatives focused on cybersecurity capacity building President s International Strategy for Cyberspace, May 2012 Multiple lens for viewing security cooperation in Cyberspace Cyber security cooperation with partners who have cyber capabilities to offer Cyber BPC with emerging partners and countries of interest Cyber security cooperation as a tool for achievement of non-cyber specific goals Cyber security cooperation in pursuit of National/Trans-Regional objectives Cyber security cooperation in pursuit of regional goals and objectives Myriad of issues in cyberspace when dealing with our partners and potential partners Software, Processes, Hardware, Infrastructure, Training, Leader Development How can we get updates and security patches for pirated/unlicensed software? - Comment following Information Assurance engagement with partner nation 5
6 Army Cyber Command Security Cooperation Our Mission Army Cyber Command/2 nd Army plans, coordinates, integrates, synchronizes, directs, and conducts network operations and defense of all Army networks; when directed, conducts cyberspace operations in support of full spectrum operations to ensure U.S./Allied freedom of action in cyberspace, and to deny the same to our adversaries. Serve as Cyber Proponent Conduct Information Operations 2 nd Army / Army Cyber Command 6
7 A Global Command Fort Belvoir, VA/ Fort Meade, MD HQ s Army Cyber Cmd/2 nd Army HQ s INSCOM 1 st IO CMD 780 th MI BDE (Cyber) Army Cyberspace Operation and Integration Center (ACOIC) Cyberspace Proponent Germany 5 th Signal Command (T) Regional Cyber Center (Europe) Fort Huachuca, AZ NETCOM/9 th Signal Command Regional Cyber Center (CONUS) KOREA 1 st Signal Brigade Regional Cyber Center (Korea) Fort Shafter, HI 311th Signal Command (T) Regional Cyber Center (Pacific) Fort Gordon, GA 7 th Signal Command (T) Regional Cyber Center (South) 335 th Signal Command (FWD) Regional Cyber Center (SWA) 335 th Signal Command (T) Uniquely Organized Geographically Well-Positioned 7
8 Commander s Intent Purpose: Army Cyber Cmd/2d Army conducts security cooperation with US Allies and International Partners in support of Army, Joint, and National interests, by building partner capacity, strengthening collective cyber security, and improving interoperability, in order to enhance U.S. Cyber Security and achieve national security objectives. Key Tasks: 1. Provide cyber and IO Security Cooperation support by, with, and thru supported ASCCs 2. Support USCC Theater Campaign Plan (TBP), the Army Campaign Plan and Army Campaign Support Plan 3. Focus on Building Partner Capacity, shared awareness, coordinating partner cyberspace and IO activities 4. Cyberspace becomes integral part of Security Cooperation Vision Robust influence and relationship with key allies and partners Strengthening collective Cyber Security and Interoperability Provide increased Cyber and IO capacity to regional commanders US allies and international partners enhance US security through effective contributions to collective cyber security and interoperability with US forces, and can effectively use information operations to integrate functions within the information environment. 8
9 Education Assistance Engagement Leader Development Training Exchanges Army Cyber Command/2 nd ARMY Pillars of Support ARCYBER Security Cooperation Program Tools and Capabilities 9
10 # 1 Build Relationships & Access: Lines of Effort & Categories of Support Lines Of Effort Engage w/ countries IOT enhance relationship; gain & maintain access; develop basic self-def capability #2 Develop Countries of Interest: Engage w/ countries with potential capabilities, influence, and/or regional/geo-political significance #3 Engage w/capable & Influential PNs: Engage w/ capable & influential Partners to achieve ASCC and ARCYBER Objectives Focus Areas ASCC driven by ASCC Objectives Global/Trans-regional driven by Global/Trans-regional Objectives Supported by Pillars 10
11 MEANS = Toolkit and Support Pillars Education Assistance Engagement Leader Development Training Exchanges Education Assistance Engagement Leader Development Training Exchanges Education Assistance Engagement Leader Development Training Exchanges Army Cyber Command/2 nd ARMY WAYS/LOEs Security Cooperation Plan (Linking Ends, Ways, Means) ENDS LOE #1 Build Relationships & Access LOE #2 Develop Countries of Interest Support Pillars Support Pillars LOE #3 Engage w/ Capable & Influential PNs Support Pillars ASCC Campaign Support Plan Objectives & End- States LOE Support Pillar Priority in red ARCYBER Strategic Goal & Op Objectives PNs influence Actors of Concern Collective Cyber Sec strengthened PN capable of combined ops with US PN able to defend themselves ASCCs are supported GEF ARCBER Toolkit: Staff; NETCOM; 1 st IO; Army Programs; Trng Courses; MTTs; Mil-Mil; Sr Ldrs; Exercise spt ARCYBER Toolkit PNs=Partner Nations 11
12 Army Cyber Command s Engagement Process with ASCC s Coordination of Support to ASCCs GEF Army Campaign Support Plan Start Army Cyber Command DOD Strategy for Operating in Cyberspace International Strategy for Cyberspace 12
13 SC Tools/Capabilities Confidence Building / Info Sharing Cyber Organizational Briefs Best Practices Cyber & IO Senior Leader Visits Mil-to-Mil Staff and Assistance Visits Generic Threat Exchanges Assessments/Assistance Tailored to PN Needs and Security Concerns IO/IA/CNO Assessments Cyber Architecture Assessments Vulnerability Assessments Staff Assistance Visits ICW DASA(DEC) potential FMF/FMS cases Combined Training/Familiarization/Exercises Combined Exercises IO Fundamentals Course MTT IA Familiarization Classes: Leaders, Managers, Technicians Proposed: Basic CNO Planners Course Familiarization IO Fundamentals Familiarization All Courses will be cleared for use with allies and PNs All activities designed for specific PN requirements and capabilities ICW the responsible ASCC 13
14 FY 12 Activities Initiation of Army Cyber Command s Security Cooperation Program Initiated Security Cooperation Program, 4 th QTR FY 11 Draft Security Cooperation Plan, 2 nd QTR FY 12 Analyzing support requirements/opportunities with ASCCs - Ongoing Coordinating new CSA cyber Building Partner Capacity in Pacific initiative with USARPAC Engagements ARCENT USARSO/HQDA ARNORTH USAREUR Developing POM requirements with ASCCs 14
15 FY 13 Goals Bring Army Cyber Command s Security Cooperation Program to Maturity Complete ARCYBER security cooperation plan Support/execute new CSA/USARPAC cyberspace BPC initiative Expand support to ARCENT with designated countries Cyber seminars Assessments Staff assistance visits Development of potential FMS programs Further develop way ahead with ARNORTH Develop initial requirements for remaining ASCCs Develop Base Line resource/funding requirements 15
16 Conclusion Significant interest in cyberspace security cooperation activities In our interest to help partners and potential partners defend their own cyberspace Global nature of cyberspace A threat to one can become a threat to all Cyberspace security cooperation can be a powerful tool for Combatant Commands and Army Service Component Commands The nature of cyberspace security cooperation is determined by the partners with whom we are working and the objectives Cyberspace security cooperation is a key element in the Army s re-focus toward the Pacific 16
17 Questions Transforming Cyberspace While at War Can t Afford Not To! 17
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
More informationU.S. Defense Priorities OSD PA&E
1 U.S. Defense Priorities Deter potential adversaries and defend America and American interests Counter asymmetric threats including terrorism, cyber attacks and ballistic and cruise missiles Fight and
More informationArmy Foundry Intelligence Training Program
Army Regulation 350 32 Training Army Foundry Intelligence Training Program Headquarters Department of the Army Washington, DC 2 June 2015 UNCLASSIFIED SUMMARY of CHANGE AR 350 32 Army Foundry Intelligence
More informationVirginia National Guard. The Commonwealth s Guardian
Virginia National Guard The Commonwealth s Guardian Objective To understand the origins, constitutional and legal underpinnings of the National Guard To understand the roles, missions, and capabilities
More informationCYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science
More informationSTATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
More informationThe virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
More informationAUSA Background Brief
AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of
More informationTable of Contents TABLE OF CONTENTS Letter from the Under Secretary of Defense... 4 Executive Summary... 5 Introduction... 7 Approach... 9 Assumptions... 9 Vision... 11 Goal One... 12 Objectives... 12
More informationAn Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
More informationIntroduction The United States has played a leading role in transforming the international system over the past sixty-five years. Working with like-minded nations, the United States has created a safer,
More informationA Commander s Perspective on Building the Capacity of Foreign Countries Military Forces
STATEMENT OF GENERAL JAMES L. JONES, USMC COMMANDER, UNITED STATES EUROPEAN COMMAND BEFORE THE HOUSE ARMED SERVICES COMMITTEE ON APRIL 7, 2006 A Commander s Perspective on Building the Capacity of Foreign
More informationGAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
More informationSEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY. " 166c. Geographic combatant commander's authority to transfer excess defense articles
SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY GEOGRAPHIC COMBATANT COMMANDERS. 1 7 8 9 10 11 1 1 1 1 1 17 18 19 0 1 (a) IN GENERAL. Chapter of title 10, United States Code, is amended by inserting
More informationCyber Domain and LandWarNet: Powering the Army AUSA 2012
Cyber Domain and LandWarNet: Powering the Army AUSA 2012 Lead: LTG Rhett A. Hernandez, Commanding General, United States Army Cyberspace Command LTG Donald M. Campbell, Jr., Commanding General, III Corps
More informationCYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
More informationArmy Doctrine Update
Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near
More informationWhile interagency education and training have long been staples of the intelligence and
Navigating Interagency Education and Training Courses by John Dyson While interagency education and training have long been staples of the intelligence and law enforcement communities, such efforts are
More informationUNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS
CYBER REQUIREMENTS MAJ Hurcules Murray TCM- CYBER DCO Chief 1 Purpose Purpose: A broad overview of the current and emergent Army cyberspace requirements identified through capability based assessments,
More informationSoftware Reprogramming Policy for Electronic Warfare and Target Sensing Systems
Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY
More informationFM 6-02 SIGNAL SUPPORT TO OPERATIONS
FM 6-02 SIGNAL SUPPORT TO OPERATIONS JANUARY 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at
More informationThis publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html).
This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). *FM 3-13 Field Manual No. 3-13 Headquarters Department of the Army Washington, DC, 25 January
More informationCyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
More informationActive Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010
1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue
More informationOverview THE COLLEGE OF INTERNATIONAL SECURITY AFFAIRS. South and. Security Studies Program: Overview for the Board of Visitors
THE COLLEGE OF INTERNATIONAL SECURITY AFFAIRS South and Central Curriculum Asia Overview Security Studies Program: Overview for the Board of Visitors NATIONAL DEFENSE UNIVERSITY 21 May 2013 Dr. Michael
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More information(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
More informationThe Guidelines for U.S.-Japan Defense Cooperation April 27, 2015
The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 I. Defense Cooperation and the Aim of the Guidelines In order to ensure Japan s peace and security under any circumstances, from peacetime
More informationUpdate on U.S. Critical Infrastructure and Cybersecurity Initiatives
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
More informationSTRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
More informationSTATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
More informationPartnering with Small Business
Partnering with Small Business Small Business Breakfast Ms. Essye Miller Director, Cyber Security, Army CIO/G-6 1 UNCLASSIFIED Army CIO/G-6 Organization CIO / G-6 Deputy, CIO / G-6 LTG Robert Ferrell Mr.
More informationDEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
More informationADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
ADP 3-0 UNIFIED LAND OPERATIONS OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army
More informationAIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013
AIR- SEA BATTLE Service Collaboration to Address Anti-Access & Area Denial Challenges White PantoneBlackC PantoneReflexBlueC Pantone 116C Pantone 165C Pantone 422C Pantone 471C Pantone 551C May 2013 This
More informationDoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
More informationTorchbearer National Security Report. The U.S. Army in the Pacific: Assuring Security and Stability
Torchbearer National Security Report The U.S. Army in the Pacific: Assuring Security and Stability An AUSA Torchbearer Issue April 2013 9 April 2013 The American military experience in the Asia Pacific
More informationSupport to Civil Administration
Chapter 11 Support to Civil Administration Support to civil administration is the most specialized CA supporting mission. CA commands and brigades are organized to support civil administration in support
More informationJoint Publication 3-0. Doctrine for Joint Operations
Joint Publication 3-0 Doctrine for Joint Operations 10 September 2001 This revised edition of JP 3-0, Doctrine for Joint Operations, represents the latest in a series of updates to joint doctrine. It reflects
More informationNational Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1322.24 October 6, 2011 ASD(HA) SUBJECT: Reference: Medical Readiness Training (a) DoD Directive 5124.02, Under Secretary of Defense for Personnel and Readiness
More informationOPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations
More informationSTATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE
STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE BEFORE THE SENATE COMMITTEE ON APPROPRIATIONS CYBERSECURITY:
More informationPreventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
More informationAppendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
More informationhttps://usawc.blackboard.com/bbcswebdav/pid-82431-dt-content-rid-112988_1/institution/...
Unit 6 - Homeland Security, Homeland Defense, and Defense Support of Civil Authorities Page 1 of 5 The defense of the homeland is a significant contemporary security issue. Defending the homeland is a
More informationRaymond T. Odierno, General, United States Army Chief of Stal\
The Army's Strategic Vision The All-Volunteer Army will remain the most highly trained and professional land force in the world. It is uniquely organized with the capability and capacity to provide expeditionary,
More informationFEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY
A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job
More informationOn the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation
More informationForecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
More informationAmerica s Force of Decisive Action
Distribution A - Approved for public release, distribution is unlimited 2 Huachuca Training and Support Contract (HTASC) The United States Army Intelligence Center of Excellence (USAICoE) trains, develops,
More informationCMU s military-friendly formats and servicesh include:
Established in 1892, Central Michigan University, located in Mount Pleasant, Michigan was originally founded as a school for teacher and business education. Today, this doctoral research university is
More informationThe National Military Strategy of the United States of America 2015
The National Military Strategy of the United States of America 2015 The United States Military s Contribution To National Security June 2015 ii Chairman s Foreword Today s global security environment is
More informationTOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
More informationADRP20 AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY
ADRP20 I NTELLI GENCE AUGUST201 2 DI STRI BUTI ONRESTRI CTI ON: Appr ov edf orpubl i cr el eas e;di s t r i but i oni sunl i mi t ed. HEADQUARTERS,DEPARTMENTOFTHEARMY This publication is available at Army
More informationRay A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA
Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA A Marine Corps fighting force armed with assured, secure, accurate, and timely information,
More informationDEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE
DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE JULY 2011 CONTENTS INTRODUCTION 1 STRATEGIC CONTEXT 2 FIVE STRATEGIC INITIATIVES Strategic Initiative 1: Treat cyberspace as an operational domain
More informationESC/HI VENDOR DAY. ESC/HIJ Enterprise Services Division. Mr. Timothy C. Nixon ESC/HIJ 334-416-2303
ESC/HI VENDOR DAY ESC/HIJ Enterprise Services Division Mr. Timothy C. Nixon ESC/HIJ 334-416-2303 1 Overview Mission Organization Industry Opportunities How Industry Can Help Summary 2 ESC/HIJ Enterprise
More informationRear Detachment Commander. Computer-Based Training. Module 10: Training Management
Rear Detachment Commander Computer-Based Training Module 10: Training Management Table of Contents 1. TRAINING MANAGEMENT... 1 1.1. IMPLEMENTING A TRAINING PLAN... 1 1.1.1. Principles Of Training... 2
More informationFlexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
More informationCyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
More informationCyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
More informationDEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000
DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 5000 Ser NOO / )00063 21 May 10 MEMORANDUM FOR DISTRIBUTION From: Subj: Ref: Encl: Chief of Naval Operations
More informationProspects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016
Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 NATO is anything but obsolete. It is needed more now than at any point since the end
More informationFACT SHEET. General Information about the Defense Contract Management Agency
FACT SHEET General Information about the Defense Contract Management Agency Mission: We are the independent eyes and ears of DoD and its partners, delivering actionable acquisition insight from the factory
More informationJoint Communiqué The 46 th ROK-U.S. Security Consultative Meeting October 23, 2014 Washington D.C.
Joint Communiqué The 46 th ROK-U.S. Security Consultative Meeting October 23, 2014 Washington D.C. 1. The 46th United States-Republic of Korea (U.S.-ROK) Security Consultative Meeting (SCM) was held in
More informationCybersecurity: The Defense Perspective
Cybersecurity: The Defense Perspective Ms. Essye Miller Director, Cybersecurity Army CIO/G-6 October 15, 2015 1 CIO/G-6 As the CIO As the G-6 Reports directly to the Secretary of the Army for setting the
More informationC ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
More informationManned Information Security
Manned Information Security Adversary Pursuit and Active Network Defense root9b Technologies (RTNB) Presented By: John Harbaugh, COO CONFIDENTIALITY NOTICE This briefing, including any attachments, is
More informationComprehensive Soldier and Family Fitness Directive
Comprehensive Soldier and Family Fitness Directive The Ready and Resilient Campaign is a far reaching and comprehensive campaign to enhance individual and collective resilience in order to improve readiness
More informationDepartment of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
More informationBRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS
ARF WORKSHOP 21-22 JUNE 2005 ULAANBAATAR, MONGOLIA BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS Overall, Brunei Darussalam security assessment remains peaceful and stable. However, the range of
More informationToward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership
Joint Statement of the Security Consultative Committee Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership June 21, 2011 by Secretary of State Clinton Secretary of Defense
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationIn June 1998 the Joint Military Intelligence. Intelligence Education for Joint Warfighting A. DENIS CLIFT
Defense Intelligence Analysis Center, home of JMIC. Intelligence Education for Joint Warfighting Courtesy Joint Military Intelligence College By A. DENIS CLIFT In June 1998 the Joint Military Intelligence
More informationCounterintelligence Awareness Glossary
Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity
More informationPreventing and Defending Against Cyber Attacks October 2011
Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationHybrid Warfare & Cyber Defence
Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency
More informationDOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
More informationImage credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations
More informationSECRETARY OF THE ARMY WASHINGTON
SECRETARY OF THE ARMY WASHINGTON 2 2 JUN 2016 MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2016-18 (Divesting Legacy Information Technology Hardware, Software, and Services in Support of the
More informationTHE WHITE HOUSE Office of the Press Secretary. Annex to U.S. - Gulf Cooperation Council Camp David Joint Statement
THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 14, 2015 Annex to U.S. - Gulf Cooperation Council Camp David Joint Statement President Obama and Heads of Delegations of the Gulf
More informationTHE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY
THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy
More informationConfrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
More informationTeam Redstone Small Business
Team Redstone Small Business March 30, 2015 Ms. Pamela Monroe Assistant to the Director, Subcontracting and Mentor Protégé Program Manager Mission Advise the Secretary of the Army and the Army leadership
More informationDEPARTMENT OF DEFENSE
DEPARTMENT OF DEFENSE The Department of Defense (DoD) provides military forces and capabilities to project power in order to protect the security of the United States and its interests around the world
More informationARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence
ARI ARI 26/2013 (Translated from Spanish) 17 September 2013 Cyber cells: a tool for national cyber security and cyber defence Thiber Theme 1 Cyber cells are effective tools that enable countries to operate,
More informationPreventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
More informationFACT SHEET. General Information About the Defense Contract Management Agency
FACT SHEET General Information About the Defense Contract Management Agency Mission: We provide Contract Administration Services to the Department of Defense Acquisition Enterprise and its partners to
More informationThe Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
More informationPacific Theater operations
Pacific Theater operations Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the
More informationMA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION
MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION WHAT IS MSS The interdisciplinary Military Strategic Studies program is concerned with understanding, analyzing and explaining the military dimension
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5000.01 May 12, 2003 Certified Current as of November 20, 2007 SUBJECT: The Defense Acquisition System USD(AT&L) References: (a) DoD Directive 5000.1, The Defense
More informationDepartment of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
More informationCapabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
More informationAT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
More informationU.S. DoD Physical Security Market
U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request
More informationDefense Budget Programs That Provide Assistance To Foreign Countries
Defense Budget Programs That Provide Assistance To Foreign Countries 1. Accounting for Missing United States Government Personnel First legislated in 2008. $1,000,000 Section 408 of Title 10, U.S. Code
More informationII. DESCRIPTION OF PROGRAMS
II. DESCRIPTION OF PROGRAMS A. GENERAL Foreign military assistance directly contributes to U.S. national security and foreign policy objectives. The principal components of foreign military assistance
More information