Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle

Size: px
Start display at page:

Download "Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle"

Transcription

1 Phantom Works Advanced Modeling & Simulation Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle Mark N. Clemente 15 th ICCRTS June 22, 2010 BOEING is a trademark of Boeing Management Company. Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-2312-NT 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 1

2 Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 2 U.S. Navy photo by Photographer's Mate Airman Apprentice Antonia Ramos (RELEASED)

3 Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt U.S. Army photo by Staff Sgt. Lorie Jewell (Released) 3

4 Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle A Battle of Complex, Adapting, Living Systems The Outer Air Battle plan for degradation Danger of Too Much Information Conclusion Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 4

5 Battle of Complex Adaptive Living Systems Copyright 2009 Boeing. All rights reserved. The adversary gets a vote U.S. Navy photo by Mass Communication Specialist 2nd Class William Pittman/Released Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 5

6 Battle of Complex Adaptive Living Systems Complicated Known/knowable, predictable cause and effect chain Inputs/outputs proportional Whole equals sum of parts Complex Multiple interdependent variables Changing cause and effect chain Inputs and outputs not proportional; whole does not equal sum of the parts Complex Adaptive System Reacts and evolves independently in ways we cannot entirely predict 6 Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 6

7 Complexity: Interdependent Variables Large numbers of interdependent variables shape the behavior of each actor but continually change t1 Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 7

8 Complexity: Interdependent Variables t-2 Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 8

9 Complexity: Interdependent Variables t-3 Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 9

10 Complexity: Interdependent Variables Each variable is two-directional affecting other actors Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 10

11 Complexity: Interdependent Variables who in turn co-evolve and affect each other. Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 11

12 Adaptation Key Traits Flexibility how robust an organization is in adapting to new mission sets at the strategic / operational (higher) level Resilience how robust an organization is in adapting to damage to their system Responsiveness how robust an organization is in adapting to new mission sets at the operational / tactical (lower) level Agility how quickly an organization adapts to a changing environment Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 12

13 Levels of Adaptation Action how well the system adapts at the tactical level the point of action. Learning how well the system absorbs and adapts to changes in the outer environment. Learning to learn how well the system is structured to learn and adapt. Defining success how well the system is able to redefine their fitness based on new information / lessons learned. Co-adaptation from the system of systems standpoint, how well the disparate organizations are able to co-adapt to improve the fitness of the greater system. Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 13

14 Adaptive Action How well the system adapts at the tactical level the point of action U.S. Navy photo by James D. Hamill/Released Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 14

15 Learning How well the system absorbs and adapts to changes in the outer environment U.S. Navy photo by Photographer's Mate 1st Class Michael W. Pendergrass. (RELEASED) Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 15

16 Learning to Learn How well the system is structured to learn and adapt U.S. Navy photo by Photographer s Mate 1st Class Mahlon K. Miller. (RELEASED) Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 16

17 Defining / Redefining Success How well the system is able to redefine their fitness based on new information / lessons learned Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 17

18 Co-Adaptation How well the disparate organizations are able to co-adapt to improve the fitness of the greater system U.S. Navy photo by Mass Communication Specialist 1st Class Kim McLendon/Released Complex Adaptive Living Systems may be a useful model for real world challenges U.S. Navy photo by Photographer s Mate 2nd Class Daniel J. McLain (RELEASED) Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 18 U.S. Navy photo by Mass Communication Specialist Seaman Patrick W. Mullen III (RELEASED)

19 The Outer Air Battle 02D 02C 04D 02B 04C 04B 06D U.S. Navy photo by Photographer's Mate 3rd Class Christopher B. Long (RELEASED) 06C 06B Shoot the Archer, not the Arrows Electrons on the Attack Plan for degradation Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 19 U.S. Navy photo by Mass Communication Specialist Seaman Adam K. Thomas/Released

20 Danger of Too Much Information Blurring Levels of War? Strategic GOOOAAAALLLL!!!!!! (a sports analogy) Operational Tactical Emergent functions at different scales may need different approaches and tools U.S. Navy photo by Mass Communication Specialist 2nd Class Johansen Laurel Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 20

21 Danger of Too Much Information Coordination over Time Major Combat Peace Crisis Response Post- Conflict Peace Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 21

22 Conclusion This is no black box solution to complex human challenges Never forget that your adversary gets a vote Complex adaptive living systems may be a useful model for real world challenges Plan for degradation Hierarchy is not inherently evil emergent functions at different scales may need different approaches and tools Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 22

23 Questions It's not if the nets go down but when they go down, because the enemy is going to try to take them down. There is no military in the world more vulnerable to losing its nets than the U.S. military because we are so reliant on them for our worldwide operations. We need to create a corps of officers who are comfortable with uncertainty and ensure that they can give commander's intent - broad guidance to their subordinates - so that when, not if, the nets go down, they can continue to operate at good speed, understanding what the commander needs done. Gen. James Mattis Commander, U.S. Joint Forces Command Interview with Vago Muradian 23 May 2010 Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 23

24 Questions We've raised a generation that, for the last nine years of active operations, have never been out of touch with their higher headquarters. What we're going to have to do is train by turning off the radios - as we did in the Cold War, when by pressing that handset key and transmitting, you were endangering yourself to the enemy's strikes on you. We're going to have to get used to turning off the handsets for other reasons: to see if people can operate on their own initiative. Gen. James Mattis Commander, U.S. Joint Forces Command Interview with Vago Muradian 23 May 2010 Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 24

25 Questions To the extent possible, naval forces will deploy and employ redundant systems to maintain command and control of dispersed forces in the face of such threats, and will maintain proficiency in retaining the operational and tactical initiative when communications and information systems are degraded or denied. Naval Operations Concept 2010 Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 25

NATO Flirting with a More Comprehensive Approach to Alliance Security

NATO Flirting with a More Comprehensive Approach to Alliance Security Analysis, Modeling, Simulation and Experimentation NATO Flirting with a More Comprehensive Approach to Alliance Security 13 th ICCRTS June 17-19 2008 Mark N. Clemente Senior Effects-Based Analyst The Boeing

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career

Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career Chad Storlie Author, Iraq Combat Veteran, Business Leader www.combattocorporate.com

More information

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events

More information

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION FEB 0 1 2013 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND DIRECTOR, MARINE

More information

Rear Detachment Commander. Computer-Based Training. Module 10: Training Management

Rear Detachment Commander. Computer-Based Training. Module 10: Training Management Rear Detachment Commander Computer-Based Training Module 10: Training Management Table of Contents 1. TRAINING MANAGEMENT... 1 1.1. IMPLEMENTING A TRAINING PLAN... 1 1.1.1. Principles Of Training... 2

More information

Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett

Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President

More information

FUTURE NAVY VISION. The Royal Navy Today, Tomorrow and Towards 2025. Projecting maritime power to protect and promote our nation s interests

FUTURE NAVY VISION. The Royal Navy Today, Tomorrow and Towards 2025. Projecting maritime power to protect and promote our nation s interests FUTURE NAVY VISION The Royal Navy Today, Tomorrow and Towards 2025 Projecting maritime power to protect and promote our nation s interests The Royal Marine Commandos - The UK s specialist amphibious force.

More information

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace , pp.137-146 http://dx.doi.org/10.14257/ijseia.2014.8.9.11 Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace Jung ho Eom Military Studies, Daejeon University, 62 Daehakro,

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Designing Law Enforcement: Adaptive Strategies for the Complex Environment

Designing Law Enforcement: Adaptive Strategies for the Complex Environment Designing Law Enforcement: Adaptive Strategies for the Complex Environment John A. Bertetto, Police Officer, Chicago Police Department Crime Control Strategies As law enforcement professionals, we often

More information

Legal Issues / Estonia Cyber Incident

Legal Issues / Estonia Cyber Incident Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia

More information

Patriot System Performance. Report Summary

Patriot System Performance. Report Summary Report of the Defense Science Board Task Force on Patriot System Performance Report Summary January 2005 Office of the Under Secretary of Defense For Acquisition, Technology, and Logistics Washington,

More information

Director of Intelligence Proposed Research Topics

Director of Intelligence Proposed Research Topics Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis

More information

We have come a long way since the Goldwater-Nichols Act became law more than 2j years ago, we can go further. We will.

We have come a long way since the Goldwater-Nichols Act became law more than 2j years ago, we can go further. We will. We have come a long way since the Goldwater-Nichols Act became law more than 2j years ago, we can go further. We will. Introduction: Why we must renew our commitment to the Profession of Arms 1. Values

More information

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,

More information

OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014

OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014 DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations

More information

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Mike O Neill Managing Director Graeme McGowan Associate Director of Cyber Security

More information

"Gaming versus Exercises: Designing Surprise-resilient Organizations for a Cybered World

Gaming versus Exercises: Designing Surprise-resilient Organizations for a Cybered World "Gaming versus Exercises: Designing Surprise-resilient Organizations for a Cybered World Chris C. Demchak Professor, United States Naval War College Co-Director, Center for Cybered Conflict Studies Strategic

More information

Hybrid Warfare & Cyber Defence

Hybrid Warfare & Cyber Defence Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency

More information

GOOD SECURITY IS A GROUP EFFORT

GOOD SECURITY IS A GROUP EFFORT THE OFFICE OF SECURITY Operations Security (OPSEC) GOOD SECURITY IS A GROUP EFFORT Operations Security (OPSEC) "Even minutiae should have a place in our collection, for things of a seemingly trifling nature,

More information

OPERATIONAL RISK MANAGEMENT B130786 STUDENT HANDOUT

OPERATIONAL RISK MANAGEMENT B130786 STUDENT HANDOUT UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 OPERATIONAL RISK MANAGEMENT B130786 STUDENT HANDOUT Basic Officer Course (ORM) Introduction Importance

More information

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests

More information

Cybersecurity Delivering Confidence in the Cyber Domain

Cybersecurity Delivering Confidence in the Cyber Domain Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your

More information

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate

More information

UN Emergency Summit on Cyber Security Topic Abstract

UN Emergency Summit on Cyber Security Topic Abstract UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

CHAPTER 11 INTERNATIONAL STRATEGY AND ORGANIZATION

CHAPTER 11 INTERNATIONAL STRATEGY AND ORGANIZATION CHAPTER 11 INTERNATIONAL STRATEGY AND ORGANIZATION LEARNING OBJECTIVES: 1. Explain the stages of identification and analysis that precede strategy selection. 2. Identify the two international strategies

More information

The Implication of TMD System in Japan to China s Security

The Implication of TMD System in Japan to China s Security The Sixth ISODARCO Beijing Seminar on Arms Control October 29-Novermber 1, 1998 Shanghai, China The Implication of TMD System in Japan to China s Security Institute of World Economics & Politics Chinese

More information

Department of Defense NetOps Strategic Vision

Department of Defense NetOps Strategic Vision Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps

More information

APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES

APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES APICS INSIGHTS AND INNOVATIONS ABOUT THIS REPORT This report examines the role that supply chain risk management plays in organizations

More information

Navy Information Dominance Industry Day

Navy Information Dominance Industry Day Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

PRISONER P-09 FREE INFINITY MISSION DOWNLOAD BEASTSOFWAR.COM

PRISONER P-09 FREE INFINITY MISSION DOWNLOAD BEASTSOFWAR.COM PRISONER P-09 FOR MORE INFO. ABOUT INFINITY VISIT: WWW.INFINITYTHEGAME.COM ALL NAMES, TRADEMARKS, & IMAGES ARE COPYRIGHT OF THEIR RESPECTIVE OWNERS. MISSION OBJECTIVES Prisoner P-09, an agent possessing

More information

Army Doctrine Update

Army Doctrine Update Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near

More information

Flexible, Life-Cycle Support for Unique Mission Requirements

Flexible, Life-Cycle Support for Unique Mission Requirements Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics

More information

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives:

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives: TASK FORCE ASW Anti-Submarine Warfare Conceptt off Operrattiions fforr tthe 21 s st t Centturry BACKGROUND As we sail deeper into the 21 st century, Anti-Submarine Warfare (ASW) will remain a core mission

More information

CNO: Good morning and thank you for being here. Today we are releasing the results of the investigation into the

CNO: Good morning and thank you for being here. Today we are releasing the results of the investigation into the Riverine Command Boat Investigation Press Remarks -As Prepared- CNO: Good morning and thank you for being here. Today we are releasing the results of the investigation into the seizure of two Riverine

More information

Symantec Cyber Security Services: DeepSight Intelligence

Symantec Cyber Security Services: DeepSight Intelligence Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW

LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW TASK DESCRIPTION: LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW Learn the differences between planning for a campaign in war and planning

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012 (U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)

More information

A Primer on Cyber Threat Intelligence

A Primer on Cyber Threat Intelligence A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly

More information

www.pwc.com Developing a robust cyber security governance framework 16 April 2015

www.pwc.com Developing a robust cyber security governance framework 16 April 2015 www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October

More information

WMD Incident Management Simulation and Tutor

WMD Incident Management Simulation and Tutor WMD Incident Management Simulation and Tutor NIEHS 30 March 2007 Presented by: Jim Ong [email protected] 650 931 2710 http://www.stottlerhenke.com Project Team Stottler Henke - Artificial intelligence

More information

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

HQMC 20 Aug 04 E R R A T U M. to MCO 3500.27B OPERATIONAL RISK MANAGEMENT (ORM)

HQMC 20 Aug 04 E R R A T U M. to MCO 3500.27B OPERATIONAL RISK MANAGEMENT (ORM) HQMC 20 Aug 04 E R R A T U M to MCO 3500.27B OPERATIONAL RISK MANAGEMENT (ORM) 1. For administrative purposes, the Publications Control Number (PCN) has been reidentified. Change the PCN "10203352700"

More information

Business Continuity & Disaster Recovery

Business Continuity & Disaster Recovery Business Continuity & Disaster Recovery Safety First Quality Every Time 1 Business Continuity & Disaster Recovery Planning Who here has a formal Business Continuity & Disaster Recovery plan? The purpose

More information

National Communications System. December 6, 2007

National Communications System. December 6, 2007 1 National Communications System December 6, 2007 2 National Communications System (NCS) Established in 1963 in response to communications failures associated with the Cuban Missile Crisis The mandate

More information

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:[email protected]

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:humayunbakht@yahoo.co.uk Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Strategic Design. To learn more about the Naval Facilities Engineering Command, please visit us at www.navfac.navy.mil and www.facebook.

Strategic Design. To learn more about the Naval Facilities Engineering Command, please visit us at www.navfac.navy.mil and www.facebook. To learn more about the Naval Facilities Engineering Command, please visit us at www.navfac.navy.mil and www.facebook.com/navfac Strategic Design Naval Facilities Engineering Command 1322 Patterson Avenue,

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Covert Operations: Kill Chain Actions using Security Analytics

Covert Operations: Kill Chain Actions using Security Analytics Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special

More information

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM Overlook Systems Technologies, Inc. 1950 Old Gallows Road, Suite 400 Vienna, VA 22182 (703)-893-1411 PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM A PROPOSED SOLUTION TO ADDRESS RISK TO U.S. CRITICAL INFRASTRUCTURE

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

BUSINESS COMPETITIVE INTELLIGENCE THE ULTIMATE USE OF INFORMATION TECHNOLOGIES IN STRATEGIC MANAGEMENT

BUSINESS COMPETITIVE INTELLIGENCE THE ULTIMATE USE OF INFORMATION TECHNOLOGIES IN STRATEGIC MANAGEMENT BUSINESS COMPETITIVE INTELLIGENCE THE ULTIMATE USE OF INFORMATION TECHNOLOGIES IN STRATEGIC MANAGEMENT Prof. Felicia Albescu, Ph.D Prof. Irina Pugna, Ph.D Reader Dorel Paraschiv, Ph.D The Bucharest Academy

More information

Cyber security in an organization-transcending way

Cyber security in an organization-transcending way Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security

More information

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013 AIR- SEA BATTLE Service Collaboration to Address Anti-Access & Area Denial Challenges White PantoneBlackC PantoneReflexBlueC Pantone 116C Pantone 165C Pantone 422C Pantone 471C Pantone 551C May 2013 This

More information

Resources projected in the previous development plan and the reality

Resources projected in the previous development plan and the reality NATIONAL DEFENCE DEVELOPMENT PLAN 2013-2022 Resources projected in the previous development plan and the reality 1. The previous 10-year development plan approved in 2009 (Military Defence Development

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation

More information

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term

More information

Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities

Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities Supply Chain Risk Management Operating ahead of the threat, not behind the vulnerabilities Navigation in the Meeting Room Notes box for audio information and other announcements To enlarge the slide, click

More information

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST

More information

Partnership for Cyber Resilience

Partnership for Cyber Resilience Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage

More information

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE SUBCOMMITTEE ON MILITARY PERSONNEL COMMITTEE ON ARMED SERVICES UNITED STATES HOUSE OF REPRESENTATIVES

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE SUBCOMMITTEE ON MILITARY PERSONNEL COMMITTEE ON ARMED SERVICES UNITED STATES HOUSE OF REPRESENTATIVES DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE SUBCOMMITTEE ON MILITARY PERSONNEL COMMITTEE ON ARMED SERVICES UNITED STATES HOUSE OF REPRESENTATIVES SUBJECT: SUICIDE PREVENTION STATEMENT OF: LIEUTENANT

More information

GLOBAL VALUE CHAINS UNDER THREAT

GLOBAL VALUE CHAINS UNDER THREAT GLOBAL VALUE CHAINS UNDER THREAT HOW RESILIENT IS YOUR SUPPLY CHAIN? By IMD Professor Ralf Seifert and Polina Bochukova April 2014 IMD Chemin de Bellerive 23 PO Box 915, CH-1001 Lausanne Switzerland Tel:

More information

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly

More information

Network Mission Assurance

Network Mission Assurance Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com

More information

Information Technology

Information Technology September 11, 2002 Information Technology The Defense Advanced Research Projects Agency s Transition of Advanced Information Technology Programs (D-2002-146) Department of Defense Office of the Inspector

More information

IBM index reveals key indicators of business continuity exposure and maturity

IBM index reveals key indicators of business continuity exposure and maturity IBM Global Technology Services Business Continuity and Resiliency Services IBM index reveals key indicators of business continuity exposure and maturity Will a more holistic approach to business continuity

More information

Virginia National Guard. The Commonwealth s Guardian

Virginia National Guard. The Commonwealth s Guardian Virginia National Guard The Commonwealth s Guardian Objective To understand the origins, constitutional and legal underpinnings of the National Guard To understand the roles, missions, and capabilities

More information

LEADERSHIP AND SUPERVISION

LEADERSHIP AND SUPERVISION CHAPTER 21 LEADERSHIP AND SUPERVISION To lead, you must firstbeable to follow; for without followers, there can be no leader. Navy Saying Today s Navy operates with fewer people and resources than before.

More information

Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s

Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s emerging threats. In today s sophisticated online env

More information

Long Term Defence Study

Long Term Defence Study Long Term Defence Study 2014-09-10 LtCol Johan Hansson SwAF HQ 1 Long Term Defence Studies Three main objectives: To identify uncertainties. To create some scenarios which demonstrates the coming challenges

More information

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING BACKGROUNDER Point of Contact: Mr. James L. Lindsey (703) 704-0194 [email protected] PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING Product Director, Enterprise Content,

More information

United States Army. Criminal Investigation Command. Keeping Our Army Safe CID Seeking Special Agents

United States Army. Criminal Investigation Command. Keeping Our Army Safe CID Seeking Special Agents United States Army Criminal Investigation Command Media contact: CID Public Affairs Office FOR IMMEDIATE RELEASE 571-305-4041 Keeping Our Army Safe CID Seeking Special Agents By Colby Hauser CID Public

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Active Engagement, Modern Defence

Active Engagement, Modern Defence Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,

More information

Preparing Millennials to Lead in Cyberspace

Preparing Millennials to Lead in Cyberspace Preparing Millennials to Lead in Cyberspace A Raytheon-commissioned study of attitudes, behaviors and career aspirations among young American adults online Overview Today s Highly Connected and networked

More information

A community of organizations working together to accomplish their respective missions with a common goal of improving human performance through

A community of organizations working together to accomplish their respective missions with a common goal of improving human performance through 1 A community of organizations working together to accomplish their respective missions with a common goal of improving human performance through simulation 2 Team Orlando Mission The mission of Team Orlando

More information