CyberVision and Cyber Force Development
|
|
|
- Horatio Shaw
- 9 years ago
- Views:
Transcription
1 We encourage you to your comments to us at: CyberVision and Cyber Force Development Kamal Jabbour, ST Widely reported compromises to the Department of Defense global information grid (GIG) punctuate a recent study by the Defense Science Board 1 that the primary focus of a cyber force must remain the assurance of mission-essential functions (MEF) of the commander. Additionally, the distinction between intelligence (Title 50) and offense (Title 10) authorities notwithstanding, the proliferation of digital technology and the overlap between networks and computers blurred the traditional boundaries between offensive and defensive activities. Organizationally, the activation on 1 October 2009 of the US Cyber Command (USCYBERCOM) brought together computer network attack (CNA) and computer network defense (CND) activities of the Joint Functional Component Command for Network Warfare (JFCC-NW) and the Joint Task Force for Global Network Operations (JTF-GNO) under the USCYBERCOM. It is in this environment that the USAF vision of global vigilance, global reach, and global power across the full spectrum of conflict from peacetime to major combat operations drives the science and technology (S&T) requirements for cyber operations, as well as the educational requirements for cyber force development. Essential to USAF cyber forces is an organizing construct with a primary responsibility for assuring the USAF mission-essential functions in a contested cyber environment and a deployed responsibility to the joint force commander (JFC) through an expeditionary framework. However, properly educating that force of cyber warriors is a prerequisite. Cyber Support to the USAF Vision Rapid technology advances over the past three decades and the proliferation of computers into weapon systems created a dichotomy of net-centric military superiority and a commensurate reliance on vulnerable technology. The simultaneous depletion of the US computer industrial base and its Dr. Kamal Jabbour, Scientific and Professional (ST), serves as the principal scientific authority and independent researcher in the field of information assurance, including defensive information warfare and offensive information warfare technology, for the AF Research Laboratory, Rome, New York. He conceives, plans, and advocates major research and development activities, monitors and guides the quality of scientific and technical resources, and provides expert technical consultation to Air Force organizations, the DoD, other government agencies, universities, and industry. Strategic Studies Quarterly Spring 2010 [ 63 ] Disclaimer The views and opinions expressed or implied in the SSQ are those of the authors and should not be construed as carrying the official sanction of the United States Air Force, the Department of Defense, Air Education and Training Command, Air University, or other agencies or departments of the US government.
2 Kamal Jabbour migration overseas reduced further the cost of net-centricity and increased disproportionately military dependence on foreign technology. Budgetary pressures compounded the slide away from assured government off-theshelf (GOTS) stand-alone weapons towards affordable commercial off-theshelf (COTS) networked systems. Given this climate of rapid technological advance and global political change, the USAF recognizes the duality of cyberspace as a war-fighting domain as well as a foundational domain. As a war-fighting domain, cyberspace affords irregular adversaries a low-cost option to attack our global interests. As a foundational domain, cyberspace offers our peers an attack vector to negate our superiority in the traditional domains of land, sea, air, and space. By adding cyberspace to its mission statement and standing up a cyberspace command, the USAF took on the challenge to develop and present forces ready to fight in this domain. This recognition of cyber warfare as a revolution in military affairs (RMA) raises fundamental questions on concepts, organization, and technology. Amidst these questions lies the challenge of presenting cyber options to the National Command Authority (NCA) and cyber-ready forces to the combatant commanders. Whether or not Julius Caesar influenced the US Air Force vision of Global Vigilance, Global Reach, Global Power with his Veni, Vidi, Vici message to the Roman senate in 47 BC does not negate the evidence that these three tenets of warfare transcend time and technology. Two millennia later, the USAF S&T strategic vectors embody the Roman tenets and provide a road map to the USAF vision by (1) offering persistent situational awareness (SA), (2) delivering precision effects, and (3) providing access and survival in the battlespace. The changing mix of vigilance, reach, and power as tensions escalate toward major combat operations requires that cyber operations provide a necessary enabler for air and space power while providing an additional domain for delivering effects. 2 Global Vigilance Global vigilance is the ability to keep an unblinking eye on any entity to provide warning on capabilities and intentions as well as identify needs and opportunities. The primary challenges of global vigilance include maintaining persistent, global, multi-domain SA using assured, trusted systems that can avoid a broad spectrum of threats. In turn, global vigilance depends to some extent on elements of global reach to support sensor positioning and forward basing of assets for SA. We identify situational awareness, [ 64 ] Strategic Studies Quarterly Spring 2010
3 Cyber Vision and Cyber Force Development assurance and trust, and threat avoidance as the three main capabilities necessary to achieve global vigilance in and through cyberspace. Mica Endsley defines situational awareness as the perception of the elements in the environment within a volume of time and space, the comprehension of their meaning, and the projection of their status in the near future. 3 An objective of cyber SA is to provide automated situation assessment and analysis that meets the operational requirements of all areas within the cyber domain friendly blue networks, traversal gray networks or global commons, and adversary red networks across the entire spectrum of conflict. Mission awareness lies at the heart of situational awareness. Understanding the dependence of missions on specific assets, the interdependence of assets, and the interdependence of missions drives the requirements for SA. Assuring missions and information and trusting systems and data provide the foundation for global vigilance across the spectrum of conflict. DoD Directive , Defense Critical Infrastructure Program, defines mission assurance (MA) as a process to ensure that assigned tasks or duties can be performed in accordance with the intended purpose or plan. Joint Publication (JP) 3-13, Joint Doctrine for Information Operations, defines information assurance (IA) as measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. Trust in a system requires trusting its hardware and software to maintain the integrity of data at rest and in motion as systems evolve in capability and technology. Avoiding a threat through deterrence, domain modification, or agility provides a strategic defensive strategy that can reduce or eliminate the need to fight that threat. Effective cyber deterrence requires either a credible threat of retaliation with timely detection and attribution of attacks or a disincentive by increasing the cost of an attack and lowering its perceived benefits. Modifying the cyberspace domain to eliminate vulnerabilities or make them inaccessible to an adversary through sound hardware and software development practices can eliminate beforehand vulnerabilities by designing them out of a system. Agility includes establishing indications and warnings (I&W) mechanisms that detect anomalous activities or entities, rapid analysis of the activity to include attribution and geo-location, anticipation of future behaviors and effects, and effective real-time provisioning of defensive measures. Strategic Studies Quarterly Spring 2010 [ 65 ]
4 Kamal Jabbour Global Reach Global reach is the ability to move, supply, and position assets with unrivaled velocity and precision anywhere. The concepts that support global reach in cyberspace include access technologies to position and deploy cyber assets, survival in a contested cyber environment, and crossdomain superiority for command and control of integrated mission execution. Global reach encompasses the predominantly defensive measures of access, survival, and cross-domain operations. When a situation escalates from peace towards conflict, these measures enable the capabilities that support global power for major combat operations. In all domains of land, sea, air, space, and cyberspace, access refers to deploying and positioning friendly forces across blue, gray, and red spaces. While traditional domains are fixed in size the amount of available land, sea, air, and orbital space is essentially constant the cyberspace domain changes dynamically and increases indefinitely in size and shape, creating unique technical challenges for the positioning of cyber assets. An effective defense in depth avoids the majority of threats and defeats those threats that turn into attacks. When an attack evades detection and defeat and disrupts US systems and networks, the defensive priority turns to survival and mission assurance. In this context, MA seeks to ensure that critical MEFs fight through and recover from attacks against the underlying cyber infrastructure. Mission-aware systems that control dynamically end-to-end resources for IA-enabled mission assurance adapt to failures and attacks by reconfiguring resources to provide an acceptable level of service and security. Cross-domain operations are another issue. In Internet terminology, a domain refers to a group of computers or IP addresses that share higher-order addressing bits or higher-order naming convention, while computer security terminology calls cross-domain operations those transactions that occur across different classification levels or across Internet domains at the same classification. We maintain consistency with the joint definition of domains as they pertain to war-fighting domains, and we use the term cross-domain to represent operations across land, sea, air, space, and cyberspace. Robust modeling and simulation and realistic war gaming permit experimental predeployment prototyping and evaluation of cross-domain effects, including the integrated delivery of effects from blue and red systems in every domain against red and blue systems in every domain. Integrated planning requirements for cyber assets mirror those for traditional intelligence, surveillance, and reconnaissance (ISR) and combat assets, yet the practice of procedural versus positive control [ 66 ] Strategic Studies Quarterly Spring 2010
5 Cyber Vision and Cyber Force Development over air assets and the time scales of the air operations center (AOC) do not translate well to cyberspace, where decision cycles hover around a fraction of a second. 4 Cross-domain command and control enables cross-domain superiority and the freedom of use of air, space, and cyberspace, leading ultimately to cross-domain dominance and the freedom to attack and the freedom from attack in and through air, space, and cyberspace. 5 Global Power Global power is the ability to hold at risk or strike any target, anywhere, and project swift, frequently decisive, precise effects. Delivery of global power in any war-fighting domain requires command and control of cyberspace, on which modern US military capability depends. The global projection of cyber power to complement or enable kinetic power creates S&T challenges of developing precise cyber effects; estimating first-, second-, and higher-order effects; and taking response actions to external events. Precision effects are the intended outcomes of offensive operations in any war-fighting domain. With conventional kinetic weapons, precision effects became synonymous with low collateral damage, given the maturity of tools and techniques for measuring the effectiveness of munitions. In measuring the effects of cyber operations, operators rely on intuitive estimates of effectiveness that depend in large part on the experience and expertise of the operator. Cyberspace operations can produce robust strategic, operational, and tactical effects across the entire spectrum of conflict. Secondand higher-order effects of cyberspace operations may extend beyond the immediate effects on a specific system necessitating a clear understanding of sustained cyberspace operations. Cyberspace operations can also create effects in other domains, enabling cross-domain effects delivery based on a cyber effects-based assessment (EBA). Cyber EBA refers to the process that provides the war fighter with measured effects that quantify the outcome of a cyber operation into tactical, operational, and strategic impact. This process must occur in near real time during the prosecution of a mission by fusing multiple sensors and combining multiple means of measuring effects. This process must determine first-, second-, and higher-order effects on systems and on users while providing a side benefit of cyber EBA of kinetic operations. At the same time, cyber professionals must consider response action plans. Computer network defense response action (CND-RA) refers to actions taken in cyberspace to defend blue forces against adversary attack. These Strategic Studies Quarterly Spring 2010 [ 67 ]
6 Kamal Jabbour response actions must take place in real time during the prosecution of a cyber mission and must include response action for attack containment as well as offensive response action. The greatest complement to cyber vision support to global vigilance, reach, and power is a well-organized, welleducated cyber offcer corps. Organizing and Building an Initial Cyber Force Assuring the mission of the USAF in a contested cyber domain remains the top priority of a USAF cyber force. Activating the Twenty-fourth Air Force under Air Force Space Command brings to the forefront the question of presenting cyber forces to the JFC. An expeditionary framework gives cyber offcers a hands-on understanding of the threat through a joint force assignment and permits them to bring back to their mission assurance jobs a heightened appreciation for the risk trade-space between threats and vulnerabilities. To expedite this, the USAF must establish an expeditionary deployment schedule for the current cyber force in support of joint force commanders. A centrally-managed, locally-commanded cyber force whose primary function is to assure essential functions of the various USAF commands is required. These extended periods of MA support include training on the latest tools, threat situational awareness, and the pursuit of graduate academic degrees, while exercising defensive measures to secure local cyberspace and the mission it supports. Role and Responsibilities A foundational principle of unity of command maintains that the success of a mission remains ultimately the responsibility of the commander. Therefore the USAF must delegate to local commanders the responsibility for assuring that piece of cyberspace on which their missions depend. Recent air, sea, and space mishaps bring into focus the question of responsibility. The collision between two vessels may have resulted from the lack of timely SA. The crash of a remotely piloted aircraft (RPA) may have resulted from a dropped communication link. The aborted launch of a satellite may have resulted from indications of a mechanical malfunction. In all cases, cyberspace played the dual role of communicating SA to commanders and carrying back command and control instructions representing their intent. Under no circumstance can the responsibility for mission assurance shift away from the mission commander to a JFC responsible for securing the network a piece of the cyber domain that enables the mission. [ 68 ] Strategic Studies Quarterly Spring 2010
7 Cyber Vision and Cyber Force Development While a case may be made that JFCs must maintain command authority of offensive cyber forces operating under Title 10 authority in their area of responsibility (AOR), an equally compelling argument can be made that assuring a critical function in a contested cyber domain remains the responsibility of the MEF commander. Centralized command by a JFC of the cyber assets that enable essential cyber functions and the cyber forces that assure them creates an enormous challenge of understanding the complexity of every MEF and its dependence on cyberspace to the same fidelity as a local mission commander. The central authority of a JFC or a USAF cyber command must extend only to the gateway of the critical systems that support individual essential functions. Thus, the computers and networks aboard a ship or an aircraft remain the responsibility of the platform commander, and those of a critical MEF remain the responsibility of the cyber MEF commander. The present stance in favor of central management of cyberspace assets argues that a vulnerability in one system is a liability to all. By equipping MEF commanders with cyber offcers educated to assure these functions in a contested cyber domain and delegating to those commanders responsibility and accountability for those cyberspace assets under their control, the cyber risk assumed by all becomes comparable to the risk of fratricide in conventional warfare. All services Army, Navy, Marines, and Air Force operate aircraft in the air domain and use elaborate deconfliction measures to minimize fratricide. Similarly, in cyberspace we must develop deconfliction procedures to enable MEF autonomy while minimizing the shared risk of fratricide. Organizing the cyber force begins with a long-term strategy to develop cyber offcers complemented with a stop-gap initiative to secure the USAF mission and present forces to the JFC. Currently, the Air Force does not have an adequate cadre of appropriately educated offcers performing the cyber mission. Although they constitute only 7 percent of USAF offcers, computer engineering (CE) and electrical engineering (EE) degree holders provide a solid foundation for the initial cyber offcer corps. The USAF should recruit nonrated company-grade offcers with CE and EE degrees for development into cyber offcers through advanced graduate education and specialized DoD organic training. Replicating the success of the recent effort to recruit nonrated CGOs into RPA pilot-training slots, the Air Force should also invite young offcers with technical degrees to apply for initial qualification as cyber offcers. As the Air Force builds an initial cadre of cyber offcers, it must keep sight of their primary function to assure the mission of the USAF in Strategic Studies Quarterly Spring 2010 [ 69 ]
8 Kamal Jabbour a contested cyber domain. Upon completing graduate education, cyber offcers must lead the task of mapping the dependence of critical MEFs on cyber systems to give commanders a first line of defense against cyber attacks. For the long term, however, the Air Force must commit to deliberately educating its cyber leaders. Educating Cyber Offcers Educating cyber offcers on the fundamentals of cyber operations leads to the development of a cyber force capable of dominating cyberspace across the entire spectrum of conflict. In his book Strategic Warfare in Cyberspace, Dr. Gregory Rattray contrasted the World War II strategic bombardment RMA to the current cyber warfare RMA. 6 He attributed the success of the former to a technology-enabled, industry-driven superiority and predicated the success of the latter on an education-enabled, technology-driven framework. The USAF vision of global vigilance, global reach, and global power provides the doctrinal foundation for the S&T of cyber warfare, while an S&T foundation provides the educational framework for cyber warfare. Preparing forces for cyber warfare mandates distinguishing between education and training, a distinction one can ignore only at great peril. Training provides Airmen with proficiency to operate current tools, whereas education builds a foundation that prepares offcers to deal with uncertain future challenges. Delivering military options in cyberspace requires an elite, educated cyber offcer corps augmented with a well-trained cyber force. A balance between educated strategic thinkers and trained tactical operators ensures the ability to fight in cyberspace across the entire spectrum of conflict. When educating a new breed of cyber offcers, it is imperative to educate first on the science of information assurance and then train on the art of cyber operations. An examination of Air Force Personnel Center records reveals an alarming drop in the number of engineers and overall scientific qualifications of USAF offcers. National trends exacerbate this shortage. The US technological advantage as a nation and the corresponding military superiority depend vitally on the ability to reverse this trend. Deliberate cyber force development gives the USAF an opportunity to lead the nation in growing engineers. The scientific and mathematical complexity of computer and network systems, the critical dependence of USAF essential functions on their proper operation and the uncertain risk trade-space between threats and vulnerabilities mandate a relevant formal college education as the entry point into [ 70 ] Strategic Studies Quarterly Spring 2010
9 Cyber Vision and Cyber Force Development a cyber force. At a minimum, cyber warriors must hold an accredited bachelor s degree in computer or electrical engineering. This foundation provides the prerequisite grounding in the immutable fundamentals of cyber operations and prepares cyber offcers for the challenges of an uncertain future. Several additional recommendations surface when considering how the USAF can best develop and educate the future cyber cadre. An undergraduate degree in engineering as a prerequisite for admission into undergraduate pilot training (UPT) provides a first-order effect of an increase in the number of offcer candidates pursuing engineering degrees with the goal of securing pilot slots, increasing consequently the number of nonrated offcers with engineering degrees. As engineer-pilots move out of cockpits and into command positions, the second-order effect is a more technical leadership educated to deal with the uncertain challenges of the technological age. Requiring an engineering degree as a prerequisite to UPT gives American youth an incentive to take more high school courses in mathematics and science and contributes to reversing the free-fall in the national academic standards in mathematics and science. Additionally, the USAF is increasing the number of four-year full scholarships to top US programs in computer and electrical engineering. Targeting scholarships to a dozen premier institutions creates a class of young offcers with shared experiences and allows the USAF to influence curriculum development to meet national requirements. A secondary effect of targeting selected schools is the inevitable growth in civilian demand for these programs and the resulting increase in an educated civilian cyber workforce equipped to augment DoD assets. Designing the Cyber Curriculum The complexity of electronic systems, their rapid incorporation into all facets of traditional warfare, and the uncertainty of future threats necessitate educating cyber offcers on both timeless science and timely technology. The technical challenges form the basis of a balanced curriculum in cyber warfare education. The desired outcomes of this curriculum are (1) educating future cyber leaders on the science and technology of cyber warfare to prepare them to tackle the future challenges of a rapidly evolving domain, (2) providing them a solid grounding in the arts and sciences of a computer engineering foundation, and (3) developing them into cyber offcers Airmen, leaders, and warriors. What follows is the philosophy underlying an orthogonal curriculum and the outline for a sample track leading to a bachelor of science (BS) Strategic Studies Quarterly Spring 2010 [ 71 ]
10 Kamal Jabbour degree in cyber warfare. This representative curriculum recognizes physics and electrical engineering as the foundation for cyberspace, a domain characterized by the use of electronics and the electromagnetic spectrum and mathematics and computer science as the foundation for storing, modifying, and exchanging data via networked systems and associated physical infrastructures. Computer engineering, the center of gravity between electrical engineering and computer science, brings the theories underlying the domain into the practice of warfare. The requirements of a four-year BS degree in computer engineering are the cornerstone of cyber education and incorporate an eight-semester track on cyber warfare. The formal academic framework necessary to tackle the technical challenges in cyber warfare extends across a continuous spectrum from mathematics, computer science, computer engineering, electrical engineering, and physics, as shown in the figure below. 7 Foundation continuum for cyber education The primary goal of this cyber offcer development plan is to create cyber offcers who comprehend the concept of cyber as a revolution in military affairs. This concept seeks to instill an appreciation of the uniqueness of cyberspace as a war-fighting domain the third domain for the Air Force after air and space as well as a foundational domain vital to land, sea, air, and space operations. It teaches an appreciation of the broad range of functions and capabilities in cyberspace and differentiates between the limited scope of network operations and the pervasive scope of cyber warfare. Cyber Warfare Curriculum We divide the curriculum content for developing cyber warriors into a four-year course of study including fundamentals in the freshman year, tactical in the sophomore year, operational in the junior year, and strategic in the senior year. A typical CE curriculum permits the addition of the cyber warfare component as a concentration with minimal impact on accreditation. In fact, during the last two years, cyber courses can replace certain programming and system design courses while focusing the capstone design project on cyberspace. Alternately, cyber security electives or service-specific instruction may replace the AF-centric strategic cyber warfare component. Some of the topic areas presented as fundamentals include computer systems, information operations doctrine, cryptography, network architecture, [ 72 ] Strategic Studies Quarterly Spring 2010
11 Cyber Vision and Cyber Force Development and computer network operations. During the second year, candidates study access to adversary systems, stealth and persistence, cyber effects, cyber intelligence, and steganography. Year three introduces access control methods, secure network operations, cyber SA, digital forensics, high-assurance programming, and mission assurance. In the last year, students tackle problems concerning national security and military strategy, warfare in cyberspace, strategic effects of cyber war, challenges and constraints of cyber options, employing cyber options as a campaign plan, and cyber anticipation and adaptation. Throughout the course of study, cyber laboratories support experiential learning and greater appreciation for cyber capabilities. The age of cyber is upon us, and the USAF has a vested interest in organizing a cyber force to meet the challenges of the age while supporting the current vision of global vigilance, reach, and power. This challenge requires an organizing structure with expeditionary features, clear lines of authority, responsibility, and unity of command backed up by deliberately educated cyber leaders. Air Force cyber leadership presents a historic opportunity to put the nation on a correct vector to secure cyberspace and to help assure the national mission-essential functions that depend on it. Notes 1. Defense Science Board, Challenges to Military Operations in Support of U.S. Interests: Report of the 2007 Summer Study (Washington, DC: Offce of the Undersecretary of Defense for Acquisition, Technology, and Logistics, December 2008). 2. Kamal T. Jabbour, The Science and Technology of Cyber Operations, High Frontier Journal 5, no. 3 (May 2009). 3. Mica R. Endsley, Toward a Theory of Situation Awareness in Dynamic Systems, Human Factors 37, no. 1 (1995): Procedural control a method of airspace control that relies on a combination of previously agreed and promulgated orders and procedures (JP 3-01, Joint Doctrine for Countering Air and Missile Threats). Positive control a method of airspace control that relies on positive identification, tracking, and direction of aircraft within an airspace conducted with electronic means by an agency having the authority and responsibility therein. 5. The Strategic Studies Group at Checkmate said, We believe superiority represents freedom to act, but dominance includes the ability to exploit. This implies that dominance exceeds superiority. However, referencing the definition of air superiority from JP 1-02, Department of Defense Dictionary of Military and Associated Terms: air superiority That degree of dominance in the air battle of one force over another that permits the conduct of operations by the former and its related land, sea, and air forces at a given time and place without prohibitive interference by the opposing forces, superiority is a degree of dominance. Excerpts from Cross-Domain Dominance brief by Lt Col Brad Detroit Lyons and Lt Col Tim Dexter Rapp, AF Strategic Studies Group, Project Checkmate, 10 June Gregory J. Rattray, Strategic Warfare in Cyberspace (Boston: MIT Press, 2001). 7. For additional information, including detailed charts listing the complete four-year curriculum requirements for cyber development, contact the author, [email protected]. Strategic Studies Quarterly Spring 2010 [ 73 ]
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered
AUSA Background Brief
AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives:
TASK FORCE ASW Anti-Submarine Warfare Conceptt off Operrattiions fforr tthe 21 s st t Centturry BACKGROUND As we sail deeper into the 21 st century, Anti-Submarine Warfare (ASW) will remain a core mission
In June 1998 the Joint Military Intelligence. Intelligence Education for Joint Warfighting A. DENIS CLIFT
Defense Intelligence Analysis Center, home of JMIC. Intelligence Education for Joint Warfighting Courtesy Joint Military Intelligence College By A. DENIS CLIFT In June 1998 the Joint Military Intelligence
AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013
AIR- SEA BATTLE Service Collaboration to Address Anti-Access & Area Denial Challenges White PantoneBlackC PantoneReflexBlueC Pantone 116C Pantone 165C Pantone 422C Pantone 471C Pantone 551C May 2013 This
Navy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
Data Intensive Science and Computing
DEFENSE LABORATORIES ACADEMIA TRANSFORMATIVE SCIENCE Efficient, effective and agile research system INDUSTRY Data Intensive Science and Computing Advanced Computing & Computational Sciences Division University
Simulation and Training Solutions
Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015
The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 I. Defense Cooperation and the Aim of the Guidelines In order to ensure Japan s peace and security under any circumstances, from peacetime
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
United States Cyber Security in the 21st Century
United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a
Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)
Department of Defense DIRECTIVE NUMBER 4630.05 May 5, 2004 Certified Current as of April 23, 2007 ASD(NII)/DoD CIO SUBJECT: Interoperability and Supportability of Information Technology (IT) and National
Army Doctrine Update
Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near
Director of Intelligence Proposed Research Topics
Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Long Term Defence Study
Long Term Defence Study 2014-09-10 LtCol Johan Hansson SwAF HQ 1 Long Term Defence Studies Three main objectives: To identify uncertainties. To create some scenarios which demonstrates the coming challenges
Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems
Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
The Challenge. Shipboard crew members need training because cadres are not expected to provide a long-term ConOps for UUV employment.
Enabling Effective & Efficient Fleet UMV Operational Training through Distributed USW Test & Training Technology Michael Kelf Senior Systems Engineer Maritime System Solutions Division SAIC G. Michael
Venator -110 General Purpose Light Frigate Technical Brief
Technical Brief VENATOR-110 GENERAL PURPOSE LIGHT FRIGATE A TECHNICAL BRIEF 1. INTRODUCTION Flexible and affordable Globally deployable Fulfils comprehensive range of roles Designed for optimum balance
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
The National Security Act of 1947 July 26, 1947
The National Security Act of 1947 July 26, 1947 Public Law 253, 80th Congress; Chapter 343, 1st Session; S. 758. AN ACT To promote the national security by providing for a Secretary of Defense; for a National
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
capabilities Emerging Trends and Key Priorities
Future capabilities Emerging Trends and Key Priorities Emerging trends and key priorities Increased insecurity on Europe s borders combined with continued constraint on military budgets at home has refocused
OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations
Flexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note
A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE
D E PAR TME NT OF THE N A VY OFFICE OF T HE SECRET ARY 1000 NAVY PENT AGON WASHINGT ON D C 20350-1000 SECNAVINST 5239.20 DON CIO SECNAV INSTRUCTION 5239.20 From: Secretary of the Navy Subj: DEPARTMENT
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
IAI/Malat Solutions for the Maritime Arena
IAI/Malat Solutions for the Maritime Arena Any country with a proximity to the sea has an important operational need to positively and unambiguously identify, in time, threats that originate in the maritime
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
Corporate Overview A
Corporate Overview A WHO WE ARE ManTech International Corporation uses advanced technology to help government and industry meet some of their greatest challenges and succeed in their most important endeavors.
Command And Control Of Cyberspace Operations, A Strategic Perspective
REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
SatCom For Net-Centric Warfare July/August 2011. MilsatMagazine
SatCom For Net-Centric Warfare July/August 2011 MilsatMagazine Emergency Communications C-COM, Hughes Boeing GPS II-F IvySys Technologies Command Center Guardian Mobility idirect Government Technologies
Joint Communications System
Joint Publication 6-0 R TMENT THI S W E' L L O F D E F E N D THE ARMY DEPA U NI TE D S TAT E S F O A AME RI C Joint Communications System 10 June 2015 This publication is the keystone document for communications
Chapter 2 Strengthening of the Japan-U.S. Alliance
Chapter 2 Strengthening of the Japan-U.S. Alliance Based on the Japan U.S. Security Treaty, the Japan-U.S. Security Arrangements, together with Japan s own efforts, constitute the cornerstone for Japan
Operation IMPACT (Injured Military Pursuing Assisted Career Transition)
Operation IMPACT (Injured Military Pursuing Assisted Career Transition) January 2013 Operation IMPACT Program Management Office Northrop Grumman Today Leading global security company providing innovative
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 3000.09 November 21, 2012 USD(P) SUBJECT: Autonomy in Weapon Systems References: See Enclosure 1 1. PURPOSE. This Directive: a. Establishes DoD policy and assigns
DOCUMENT CHANGE RECORD
DOCUMENT CHANGE RECORD Version Number Date Description V 0.1 April 19, 2010 Pre-Decisional Draft Release V 0.2 July 23, 2010 Pre-Decisional Draft Release V 0.3 September 15, 2010 Pre-Decisional Draft Release
United States Guntai-Shù Martial arts Honoring our US Military Veterans
Guntai Shù ( 軍 隊 術 ) is a combination of Japanese and Chinese words that means military skills. Many military members have put a lot of time and practice in training for combat. These combat skills relate
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
AeroVironment, Inc. Unmanned Aircraft Systems Overview Background
AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment is a technology solutions provider with a more than 40-year history of practical innovation in the fields of unmanned aircraft
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
NATIONAL DEFENSE AND SECURITY ECONOMICS
NATIONAL DEFENSE AND SECURITY ECONOMICS FUTURE DEVELOPMENT OF ECONOMICS OF DEFENSE AND SECURITY ECONOMIC DIMENSION OF CYBERSPACE AS NEW SECURITY THREAT Content of Topic Introduction Basic Concepts Cyberspace
Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission
Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
Cybersecurity on a Global Scale
Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared
ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session
ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session Note by the Chairman I attach for your information a list of the decisions
COMBATSS-21 Scalable combat management system for the world s navies
COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,
Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189
CALL FOR PAPERS for the IST/SET-126 Symposium on Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 to be held in Norfolk Virginia,
LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW
TASK DESCRIPTION: LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW Learn the differences between planning for a campaign in war and planning
DoD CIVILIAN LEADER DEVELOPMENT FRAMEWORK COMPETENCY DEFINITIONS. Leading Change
DoD CIVILIAN LEADER DEVELOPMENT FRAMEWORK COMPETENCY DEFINITIONS Leading Change Definition: This core competency involves the ability to bring about strategic change, both within and outside the organization,
Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
Rear Detachment Commander. Computer-Based Training. Module 10: Training Management
Rear Detachment Commander Computer-Based Training Module 10: Training Management Table of Contents 1. TRAINING MANAGEMENT... 1 1.1. IMPLEMENTING A TRAINING PLAN... 1 1.1.1. Principles Of Training... 2
Usability Study of the Department of Defense Joint Analysis System
Usability Study of the Department of Defense Joint Analysis System Doug Bardin, Estelle Hong, Daniel O Loughlin and Zachary Maodus Abstract The Department of Defense (DoD) uses modeling and simulation
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1322.24 October 6, 2011 ASD(HA) SUBJECT: Reference: Medical Readiness Training (a) DoD Directive 5124.02, Under Secretary of Defense for Personnel and Readiness
PEO SYSCOM Conference Joint Pgm Management Perspective
Defense rmation Systems Agency A Combat Support Agency PEO SYSCOM Conference Joint Pgm Management Perspective Brigadier General Pete Hoene, USAF Program Executive Officer Command & Control Capabilities
Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace
, pp.137-146 http://dx.doi.org/10.14257/ijseia.2014.8.9.11 Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace Jung ho Eom Military Studies, Daejeon University, 62 Daehakro,
Statement of. Vice Admiral William A. Brown, United States Navy. Deputy Commander, United States Transportation Command
Statement of Vice Admiral William A. Brown, United States Navy Deputy Commander, United States Transportation Command Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
FUTURE NAVY VISION. The Royal Navy Today, Tomorrow and Towards 2025. Projecting maritime power to protect and promote our nation s interests
FUTURE NAVY VISION The Royal Navy Today, Tomorrow and Towards 2025 Projecting maritime power to protect and promote our nation s interests The Royal Marine Commandos - The UK s specialist amphibious force.
Architecture Modeling Approach for Net-Centric Enterprise Services (C4ISR/C2 Architecture Track)
A Paper submitted to the 10th International Command and Control Research and Technology Symposium "The Future of C2" Architecture Modeling Approach for Net-Centric Enterprise s (C4ISR/C2 Architecture Track)
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
Hybrid Warfare & Cyber Defence
Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency
Enterprise Capabilities Descriptions
1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC
Cyber Learning Solutions
Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) [email protected] www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The
[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
How To Build A More Agile Total Naval Force
DEPARTMENT of the NAVY HUMAN BUILDING AND MANAGING CAPITAL THE TOTAL NAVAL FORCE STRATEGY 2 0 0 7 Moving forward to execute a comprehensive strategy to enhance combat effectiveness in the 21st Century,
Surveillance and Security Systems
Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems
A Leader Development Strategy for a 21 st Century Army
A Leader Development Strategy for a 21 st Century Army 25 November 2009 At the intersection of globalization, environmental calamity, resource scarcity, demographic strain, and international political
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE
DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE JULY 2011 CONTENTS INTRODUCTION 1 STRATEGIC CONTEXT 2 FIVE STRATEGIC INITIATIVES Strategic Initiative 1: Treat cyberspace as an operational domain
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5000.01 May 12, 2003 Certified Current as of November 20, 2007 SUBJECT: The Defense Acquisition System USD(AT&L) References: (a) DoD Directive 5000.1, The Defense
FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY
A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job
