Army Cyber Command Security Cooperation: Building Partner Capacity (BPC) in Cyberspace

Size: px
Start display at page:

Download "Army Cyber Command Security Cooperation: Building Partner Capacity (BPC) in Cyberspace"

Transcription

1 Army Cyber Command Security Cooperation: Building Partner Capacity (BPC) in Cyberspace Mr. Jim Wasson This briefing is /APPROVED FOR PUBLIC RELEASE Transforming Cyberspace While at War Can t Afford Not To! 1

2 Army Security Cooperation Army Security Cooperation = Army engagements with foreign defense establishments to build relationships, develop partner nation capabilities, and provide US access in pursuit of national level goals. Helping partners help themselves solve internal and regional problems Develops capable partners for coalition operations Army Engagement objectives are described in the Army Campaign Support Plan (ACSP) ACSP is a GEF/JSCP requirement to describe support for Combatant Command campaign plans Focused on the Army s shape activities ACSP Relationship to Other Campaign Plans Army contributions to Engagement have been significant Support to security assistance (e.g., FMF, Int l Military Education & Training program) National Guard State Partnership Program and multinational exercises Army Foreign Area Officers Supporting the building of International Security Assistance Force Including Cyberspace in Army Security Cooperation is relatively new 2

3 Win SHAPE Prevent Army Cyber Command/2 nd ARMY Shape in DOD Guidance Prevent Maintain credibility based on capacity, readiness and modernization. Shape Sustain strong relationships with other Armies, building their capacity, and facilitating strategic access. Win If prevention fails, apply combined arms capabilities to dominate the environment and win decisively. Maintain a Safe, Secure and Effective Nuclear Deterrent Deter Aggression Provide a Stabilizing Presence Conduct Stability and Counterinsurgency Operations Project Power Despite A2/AD Challenges Conduct Humanitarian, Disaster Relief, and other Operations Counter Terrorism and Irregular Warfare Counter WMD Operate effectively in Cyberspace and Space Defend the Homeland and Provide Support to Civil Authorities Deter and Defeat Aggression 3

4 Why Cyberspace Security Cooperation Global nature of the threat - potential shared threats in cyberspace Growing reliance upon cyberspace for key defense systems Our desire for partners that are interoperable and that can be fully integrated with us in combined/coalition operations We desire partners that can defend themselves and operate effectively with us in cyberspace 4

5 Cyber Security Cooperation Acknowledging that cybersecurity is a global issue that must be addressed with national efforts on the part of all countries, we will expand and regularize initiatives focused on cybersecurity capacity building President s International Strategy for Cyberspace, May 2012 Multiple lens for viewing security cooperation in Cyberspace Cyber security cooperation with partners who have cyber capabilities to offer Cyber BPC with emerging partners and countries of interest Cyber security cooperation as a tool for achievement of non-cyber specific goals Cyber security cooperation in pursuit of National/Trans-Regional objectives Cyber security cooperation in pursuit of regional goals and objectives Myriad of issues in cyberspace when dealing with our partners and potential partners Software, Processes, Hardware, Infrastructure, Training, Leader Development How can we get updates and security patches for pirated/unlicensed software? - Comment following Information Assurance engagement with partner nation 5

6 Army Cyber Command Security Cooperation Our Mission Army Cyber Command/2 nd Army plans, coordinates, integrates, synchronizes, directs, and conducts network operations and defense of all Army networks; when directed, conducts cyberspace operations in support of full spectrum operations to ensure U.S./Allied freedom of action in cyberspace, and to deny the same to our adversaries. Serve as Cyber Proponent Conduct Information Operations 2 nd Army / Army Cyber Command 6

7 A Global Command Fort Belvoir, VA/ Fort Meade, MD HQ s Army Cyber Cmd/2 nd Army HQ s INSCOM 1 st IO CMD 780 th MI BDE (Cyber) Army Cyberspace Operation and Integration Center (ACOIC) Cyberspace Proponent Germany 5 th Signal Command (T) Regional Cyber Center (Europe) Fort Huachuca, AZ NETCOM/9 th Signal Command Regional Cyber Center (CONUS) KOREA 1 st Signal Brigade Regional Cyber Center (Korea) Fort Shafter, HI 311th Signal Command (T) Regional Cyber Center (Pacific) Fort Gordon, GA 7 th Signal Command (T) Regional Cyber Center (South) 335 th Signal Command (FWD) Regional Cyber Center (SWA) 335 th Signal Command (T) Uniquely Organized Geographically Well-Positioned 7

8 Commander s Intent Purpose: Army Cyber Cmd/2d Army conducts security cooperation with US Allies and International Partners in support of Army, Joint, and National interests, by building partner capacity, strengthening collective cyber security, and improving interoperability, in order to enhance U.S. Cyber Security and achieve national security objectives. Key Tasks: 1. Provide cyber and IO Security Cooperation support by, with, and thru supported ASCCs 2. Support USCC Theater Campaign Plan (TBP), the Army Campaign Plan and Army Campaign Support Plan 3. Focus on Building Partner Capacity, shared awareness, coordinating partner cyberspace and IO activities 4. Cyberspace becomes integral part of Security Cooperation Vision Robust influence and relationship with key allies and partners Strengthening collective Cyber Security and Interoperability Provide increased Cyber and IO capacity to regional commanders US allies and international partners enhance US security through effective contributions to collective cyber security and interoperability with US forces, and can effectively use information operations to integrate functions within the information environment. 8

9 Education Assistance Engagement Leader Development Training Exchanges Army Cyber Command/2 nd ARMY Pillars of Support ARCYBER Security Cooperation Program Tools and Capabilities 9

10 # 1 Build Relationships & Access: Lines of Effort & Categories of Support Lines Of Effort Engage w/ countries IOT enhance relationship; gain & maintain access; develop basic self-def capability #2 Develop Countries of Interest: Engage w/ countries with potential capabilities, influence, and/or regional/geo-political significance #3 Engage w/capable & Influential PNs: Engage w/ capable & influential Partners to achieve ASCC and ARCYBER Objectives Focus Areas ASCC driven by ASCC Objectives Global/Trans-regional driven by Global/Trans-regional Objectives Supported by Pillars 10

11 MEANS = Toolkit and Support Pillars Education Assistance Engagement Leader Development Training Exchanges Education Assistance Engagement Leader Development Training Exchanges Education Assistance Engagement Leader Development Training Exchanges Army Cyber Command/2 nd ARMY WAYS/LOEs Security Cooperation Plan (Linking Ends, Ways, Means) ENDS LOE #1 Build Relationships & Access LOE #2 Develop Countries of Interest Support Pillars Support Pillars LOE #3 Engage w/ Capable & Influential PNs Support Pillars ASCC Campaign Support Plan Objectives & End- States LOE Support Pillar Priority in red ARCYBER Strategic Goal & Op Objectives PNs influence Actors of Concern Collective Cyber Sec strengthened PN capable of combined ops with US PN able to defend themselves ASCCs are supported GEF ARCBER Toolkit: Staff; NETCOM; 1 st IO; Army Programs; Trng Courses; MTTs; Mil-Mil; Sr Ldrs; Exercise spt ARCYBER Toolkit PNs=Partner Nations 11

12 Army Cyber Command s Engagement Process with ASCC s Coordination of Support to ASCCs GEF Army Campaign Support Plan Start Army Cyber Command DOD Strategy for Operating in Cyberspace International Strategy for Cyberspace 12

13 SC Tools/Capabilities Confidence Building / Info Sharing Cyber Organizational Briefs Best Practices Cyber & IO Senior Leader Visits Mil-to-Mil Staff and Assistance Visits Generic Threat Exchanges Assessments/Assistance Tailored to PN Needs and Security Concerns IO/IA/CNO Assessments Cyber Architecture Assessments Vulnerability Assessments Staff Assistance Visits ICW DASA(DEC) potential FMF/FMS cases Combined Training/Familiarization/Exercises Combined Exercises IO Fundamentals Course MTT IA Familiarization Classes: Leaders, Managers, Technicians Proposed: Basic CNO Planners Course Familiarization IO Fundamentals Familiarization All Courses will be cleared for use with allies and PNs All activities designed for specific PN requirements and capabilities ICW the responsible ASCC 13

14 FY 12 Activities Initiation of Army Cyber Command s Security Cooperation Program Initiated Security Cooperation Program, 4 th QTR FY 11 Draft Security Cooperation Plan, 2 nd QTR FY 12 Analyzing support requirements/opportunities with ASCCs - Ongoing Coordinating new CSA cyber Building Partner Capacity in Pacific initiative with USARPAC Engagements ARCENT USARSO/HQDA ARNORTH USAREUR Developing POM requirements with ASCCs 14

15 FY 13 Goals Bring Army Cyber Command s Security Cooperation Program to Maturity Complete ARCYBER security cooperation plan Support/execute new CSA/USARPAC cyberspace BPC initiative Expand support to ARCENT with designated countries Cyber seminars Assessments Staff assistance visits Development of potential FMS programs Further develop way ahead with ARNORTH Develop initial requirements for remaining ASCCs Develop Base Line resource/funding requirements 15

16 Conclusion Significant interest in cyberspace security cooperation activities In our interest to help partners and potential partners defend their own cyberspace Global nature of cyberspace A threat to one can become a threat to all Cyberspace security cooperation can be a powerful tool for Combatant Commands and Army Service Component Commands The nature of cyberspace security cooperation is determined by the partners with whom we are working and the objectives Cyberspace security cooperation is a key element in the Army s re-focus toward the Pacific 16

17 Questions Transforming Cyberspace While at War Can t Afford Not To! 17

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST

More information

U.S. Defense Priorities OSD PA&E

U.S. Defense Priorities OSD PA&E 1 U.S. Defense Priorities Deter potential adversaries and defend America and American interests Counter asymmetric threats including terrorism, cyber attacks and ballistic and cruise missiles Fight and

More information

Army Foundry Intelligence Training Program

Army Foundry Intelligence Training Program Army Regulation 350 32 Training Army Foundry Intelligence Training Program Headquarters Department of the Army Washington, DC 2 June 2015 UNCLASSIFIED SUMMARY of CHANGE AR 350 32 Army Foundry Intelligence

More information

Virginia National Guard. The Commonwealth s Guardian

Virginia National Guard. The Commonwealth s Guardian Virginia National Guard The Commonwealth s Guardian Objective To understand the origins, constitutional and legal underpinnings of the National Guard To understand the roles, missions, and capabilities

More information

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term

More information

AUSA Background Brief

AUSA Background Brief AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of

More information

Table of Contents TABLE OF CONTENTS Letter from the Under Secretary of Defense... 4 Executive Summary... 5 Introduction... 7 Approach... 9 Assumptions... 9 Vision... 11 Goal One... 12 Objectives... 12

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

Introduction The United States has played a leading role in transforming the international system over the past sixty-five years. Working with like-minded nations, the United States has created a safer,

More information

A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces

A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces STATEMENT OF GENERAL JAMES L. JONES, USMC COMMANDER, UNITED STATES EUROPEAN COMMAND BEFORE THE HOUSE ARMED SERVICES COMMITTEE ON APRIL 7, 2006 A Commander s Perspective on Building the Capacity of Foreign

More information

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate

More information

SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY. " 166c. Geographic combatant commander's authority to transfer excess defense articles

SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY.  166c. Geographic combatant commander's authority to transfer excess defense articles SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY GEOGRAPHIC COMBATANT COMMANDERS. 1 7 8 9 10 11 1 1 1 1 1 17 18 19 0 1 (a) IN GENERAL. Chapter of title 10, United States Code, is amended by inserting

More information

Cyber Domain and LandWarNet: Powering the Army AUSA 2012

Cyber Domain and LandWarNet: Powering the Army AUSA 2012 Cyber Domain and LandWarNet: Powering the Army AUSA 2012 Lead: LTG Rhett A. Hernandez, Commanding General, United States Army Cyberspace Command LTG Donald M. Campbell, Jr., Commanding General, III Corps

More information

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922. CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -

More information

Army Doctrine Update

Army Doctrine Update Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near

More information

While interagency education and training have long been staples of the intelligence and

While interagency education and training have long been staples of the intelligence and Navigating Interagency Education and Training Courses by John Dyson While interagency education and training have long been staples of the intelligence and law enforcement communities, such efforts are

More information

UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS

UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS CYBER REQUIREMENTS MAJ Hurcules Murray TCM- CYBER DCO Chief 1 Purpose Purpose: A broad overview of the current and emergent Army cyberspace requirements identified through capability based assessments,

More information

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY

More information

FM 6-02 SIGNAL SUPPORT TO OPERATIONS

FM 6-02 SIGNAL SUPPORT TO OPERATIONS FM 6-02 SIGNAL SUPPORT TO OPERATIONS JANUARY 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at

More information

This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html).

This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). *FM 3-13 Field Manual No. 3-13 Headquarters Department of the Army Washington, DC, 25 January

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

Overview THE COLLEGE OF INTERNATIONAL SECURITY AFFAIRS. South and. Security Studies Program: Overview for the Board of Visitors

Overview THE COLLEGE OF INTERNATIONAL SECURITY AFFAIRS. South and. Security Studies Program: Overview for the Board of Visitors THE COLLEGE OF INTERNATIONAL SECURITY AFFAIRS South and Central Curriculum Asia Overview Security Studies Program: Overview for the Board of Visitors NATIONAL DEFENSE UNIVERSITY 21 May 2013 Dr. Michael

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 I. Defense Cooperation and the Aim of the Guidelines In order to ensure Japan s peace and security under any circumstances, from peacetime

More information

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

Partnering with Small Business

Partnering with Small Business Partnering with Small Business Small Business Breakfast Ms. Essye Miller Director, Cyber Security, Army CIO/G-6 1 UNCLASSIFIED Army CIO/G-6 Organization CIO / G-6 Deputy, CIO / G-6 LTG Robert Ferrell Mr.

More information

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,

More information

ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. ADP 3-0 UNIFIED LAND OPERATIONS OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army

More information

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013 AIR- SEA BATTLE Service Collaboration to Address Anti-Access & Area Denial Challenges White PantoneBlackC PantoneReflexBlueC Pantone 116C Pantone 165C Pantone 422C Pantone 471C Pantone 551C May 2013 This

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

Torchbearer National Security Report. The U.S. Army in the Pacific: Assuring Security and Stability

Torchbearer National Security Report. The U.S. Army in the Pacific: Assuring Security and Stability Torchbearer National Security Report The U.S. Army in the Pacific: Assuring Security and Stability An AUSA Torchbearer Issue April 2013 9 April 2013 The American military experience in the Asia Pacific

More information

Support to Civil Administration

Support to Civil Administration Chapter 11 Support to Civil Administration Support to civil administration is the most specialized CA supporting mission. CA commands and brigades are organized to support civil administration in support

More information

Joint Publication 3-0. Doctrine for Joint Operations

Joint Publication 3-0. Doctrine for Joint Operations Joint Publication 3-0 Doctrine for Joint Operations 10 September 2001 This revised edition of JP 3-0, Doctrine for Joint Operations, represents the latest in a series of updates to joint doctrine. It reflects

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 1322.24 October 6, 2011 ASD(HA) SUBJECT: Reference: Medical Readiness Training (a) DoD Directive 5124.02, Under Secretary of Defense for Personnel and Readiness

More information

OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014

OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014 DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations

More information

STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE

STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE BEFORE THE SENATE COMMITTEE ON APPROPRIATIONS CYBERSECURITY:

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

https://usawc.blackboard.com/bbcswebdav/pid-82431-dt-content-rid-112988_1/institution/...

https://usawc.blackboard.com/bbcswebdav/pid-82431-dt-content-rid-112988_1/institution/... Unit 6 - Homeland Security, Homeland Defense, and Defense Support of Civil Authorities Page 1 of 5 The defense of the homeland is a significant contemporary security issue. Defending the homeland is a

More information

Raymond T. Odierno, General, United States Army Chief of Stal\

Raymond T. Odierno, General, United States Army Chief of Stal\ The Army's Strategic Vision The All-Volunteer Army will remain the most highly trained and professional land force in the world. It is uniquely organized with the capability and capacity to provide expeditionary,

More information

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

Forecast to Industry 2015

Forecast to Industry 2015 Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:

More information

America s Force of Decisive Action

America s Force of Decisive Action Distribution A - Approved for public release, distribution is unlimited 2 Huachuca Training and Support Contract (HTASC) The United States Army Intelligence Center of Excellence (USAICoE) trains, develops,

More information

CMU s military-friendly formats and servicesh include:

CMU s military-friendly formats and servicesh include: Established in 1892, Central Michigan University, located in Mount Pleasant, Michigan was originally founded as a school for teacher and business education. Today, this doctoral research university is

More information

The National Military Strategy of the United States of America 2015

The National Military Strategy of the United States of America 2015 The National Military Strategy of the United States of America 2015 The United States Military s Contribution To National Security June 2015 ii Chairman s Foreword Today s global security environment is

More information

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012 (U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)

More information

ADRP20 AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY

ADRP20 AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY ADRP20 I NTELLI GENCE AUGUST201 2 DI STRI BUTI ONRESTRI CTI ON: Appr ov edf orpubl i cr el eas e;di s t r i but i oni sunl i mi t ed. HEADQUARTERS,DEPARTMENTOFTHEARMY This publication is available at Army

More information

Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA

Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA A Marine Corps fighting force armed with assured, secure, accurate, and timely information,

More information

DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE

DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE JULY 2011 CONTENTS INTRODUCTION 1 STRATEGIC CONTEXT 2 FIVE STRATEGIC INITIATIVES Strategic Initiative 1: Treat cyberspace as an operational domain

More information

ESC/HI VENDOR DAY. ESC/HIJ Enterprise Services Division. Mr. Timothy C. Nixon ESC/HIJ 334-416-2303

ESC/HI VENDOR DAY. ESC/HIJ Enterprise Services Division. Mr. Timothy C. Nixon ESC/HIJ 334-416-2303 ESC/HI VENDOR DAY ESC/HIJ Enterprise Services Division Mr. Timothy C. Nixon ESC/HIJ 334-416-2303 1 Overview Mission Organization Industry Opportunities How Industry Can Help Summary 2 ESC/HIJ Enterprise

More information

Rear Detachment Commander. Computer-Based Training. Module 10: Training Management

Rear Detachment Commander. Computer-Based Training. Module 10: Training Management Rear Detachment Commander Computer-Based Training Module 10: Training Management Table of Contents 1. TRAINING MANAGEMENT... 1 1.1. IMPLEMENTING A TRAINING PLAN... 1 1.1.1. Principles Of Training... 2

More information

Flexible, Life-Cycle Support for Unique Mission Requirements

Flexible, Life-Cycle Support for Unique Mission Requirements Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics

More information

Cyber Situational Awareness - Big Data Solution

Cyber Situational Awareness - Big Data Solution Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000

DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 5000 Ser NOO / )00063 21 May 10 MEMORANDUM FOR DISTRIBUTION From: Subj: Ref: Encl: Chief of Naval Operations

More information

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 NATO is anything but obsolete. It is needed more now than at any point since the end

More information

FACT SHEET. General Information about the Defense Contract Management Agency

FACT SHEET. General Information about the Defense Contract Management Agency FACT SHEET General Information about the Defense Contract Management Agency Mission: We are the independent eyes and ears of DoD and its partners, delivering actionable acquisition insight from the factory

More information

Joint Communiqué The 46 th ROK-U.S. Security Consultative Meeting October 23, 2014 Washington D.C.

Joint Communiqué The 46 th ROK-U.S. Security Consultative Meeting October 23, 2014 Washington D.C. Joint Communiqué The 46 th ROK-U.S. Security Consultative Meeting October 23, 2014 Washington D.C. 1. The 46th United States-Republic of Korea (U.S.-ROK) Security Consultative Meeting (SCM) was held in

More information

Cybersecurity: The Defense Perspective

Cybersecurity: The Defense Perspective Cybersecurity: The Defense Perspective Ms. Essye Miller Director, Cybersecurity Army CIO/G-6 October 15, 2015 1 CIO/G-6 As the CIO As the G-6 Reports directly to the Secretary of the Army for setting the

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

Manned Information Security

Manned Information Security Manned Information Security Adversary Pursuit and Active Network Defense root9b Technologies (RTNB) Presented By: John Harbaugh, COO CONFIDENTIALITY NOTICE This briefing, including any attachments, is

More information

Comprehensive Soldier and Family Fitness Directive

Comprehensive Soldier and Family Fitness Directive Comprehensive Soldier and Family Fitness Directive The Ready and Resilient Campaign is a far reaching and comprehensive campaign to enhance individual and collective resilience in order to improve readiness

More information

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:

More information

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS ARF WORKSHOP 21-22 JUNE 2005 ULAANBAATAR, MONGOLIA BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS Overall, Brunei Darussalam security assessment remains peaceful and stable. However, the range of

More information

Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership

Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership Joint Statement of the Security Consultative Committee Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership June 21, 2011 by Secretary of State Clinton Secretary of Defense

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

In June 1998 the Joint Military Intelligence. Intelligence Education for Joint Warfighting A. DENIS CLIFT

In June 1998 the Joint Military Intelligence. Intelligence Education for Joint Warfighting A. DENIS CLIFT Defense Intelligence Analysis Center, home of JMIC. Intelligence Education for Joint Warfighting Courtesy Joint Military Intelligence College By A. DENIS CLIFT In June 1998 the Joint Military Intelligence

More information

Counterintelligence Awareness Glossary

Counterintelligence Awareness Glossary Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Hybrid Warfare & Cyber Defence

Hybrid Warfare & Cyber Defence Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency

More information

DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE

DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

SECRETARY OF THE ARMY WASHINGTON

SECRETARY OF THE ARMY WASHINGTON SECRETARY OF THE ARMY WASHINGTON 2 2 JUN 2016 MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2016-18 (Divesting Legacy Information Technology Hardware, Software, and Services in Support of the

More information

THE WHITE HOUSE Office of the Press Secretary. Annex to U.S. - Gulf Cooperation Council Camp David Joint Statement

THE WHITE HOUSE Office of the Press Secretary. Annex to U.S. - Gulf Cooperation Council Camp David Joint Statement THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 14, 2015 Annex to U.S. - Gulf Cooperation Council Camp David Joint Statement President Obama and Heads of Delegations of the Gulf

More information

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

Team Redstone Small Business

Team Redstone Small Business Team Redstone Small Business March 30, 2015 Ms. Pamela Monroe Assistant to the Director, Subcontracting and Mentor Protégé Program Manager Mission Advise the Secretary of the Army and the Army leadership

More information

DEPARTMENT OF DEFENSE

DEPARTMENT OF DEFENSE DEPARTMENT OF DEFENSE The Department of Defense (DoD) provides military forces and capabilities to project power in order to protect the security of the United States and its interests around the world

More information

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence ARI ARI 26/2013 (Translated from Spanish) 17 September 2013 Cyber cells: a tool for national cyber security and cyber defence Thiber Theme 1 Cyber cells are effective tools that enable countries to operate,

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

FACT SHEET. General Information About the Defense Contract Management Agency

FACT SHEET. General Information About the Defense Contract Management Agency FACT SHEET General Information About the Defense Contract Management Agency Mission: We provide Contract Administration Services to the Department of Defense Acquisition Enterprise and its partners to

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

Pacific Theater operations

Pacific Theater operations Pacific Theater operations Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the

More information

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION WHAT IS MSS The interdisciplinary Military Strategic Studies program is concerned with understanding, analyzing and explaining the military dimension

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5000.01 May 12, 2003 Certified Current as of November 20, 2007 SUBJECT: The Defense Acquisition System USD(AT&L) References: (a) DoD Directive 5000.1, The Defense

More information

Department of Defense NetOps Strategic Vision

Department of Defense NetOps Strategic Vision Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps

More information

Capabilities for Cybersecurity Resilience

Capabilities for Cybersecurity Resilience Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

U.S. DoD Physical Security Market

U.S. DoD Physical Security Market U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request

More information

Defense Budget Programs That Provide Assistance To Foreign Countries

Defense Budget Programs That Provide Assistance To Foreign Countries Defense Budget Programs That Provide Assistance To Foreign Countries 1. Accounting for Missing United States Government Personnel First legislated in 2008. $1,000,000 Section 408 of Title 10, U.S. Code

More information

II. DESCRIPTION OF PROGRAMS

II. DESCRIPTION OF PROGRAMS II. DESCRIPTION OF PROGRAMS A. GENERAL Foreign military assistance directly contributes to U.S. national security and foreign policy objectives. The principal components of foreign military assistance

More information