When developing capabilities, the Army. I never blame myself when I m not hitting. I just blame the bat, and if it keeps up, I change bats.
|
|
|
- Bridget Allison
- 9 years ago
- Views:
Transcription
1 (Photo by Capt. Meredith Mathis, U.S. Army) Spc. Casey Payne (left), 201st Expeditionary Military Intelligence Brigade, and Sgt. Andrew Lee, Company D, 14th Brigade Engineer Battalion, 2-2 ID (SBCT), pull security for a soldier from the 780th Military Intelligence Brigade as he sets up a patch panel antenna during a cyber training exercise 20 October 2015 on Joint Base Lewis-McChord, Washington. I never blame myself when I m not hitting. I just blame the bat, and if it keeps up, I change bats. 1 When developing capabilities, the Army could use a little of Yogi Berra s paradoxical wisdom that quickly gets to the heart of almost any matter. Like asking, If Army tactical commanders are utterly dependent on cyberspace, then why do they have no way of seeing it? All U.S. Army cyber capabilities ride on some kind of network, yet there is almost no means to provide real-time situational understanding of the cyberspace domain for tactical combat units. 2 This leaves tactical commanders blind to potential cyberspace threats and opportunities, lessens their ability to defend their own networks, and places traditional forms of combat power at risk. The Army is keenly aware of this predicament and considers cyberspace situational understanding (cyber SU) a top priority, but a technological solution to bring a cyber SU system to conventional combat units seems years away. 3 At present, the Army is simply struggling to define precisely what tactical 18
2 Cyberspace Situational Understanding for Tactical Army Commanders The Army Is Swinging for the Fence, but It Just Needs a Single Lt. Col. William Jay Martin, U.S. Air Force, Retired Emily Kaemmer commanders need to know about cyberspace. What s more, even after the Army figures out what it wants cyber SU to be, it must survive the realpolitik of the acquisition process. Even the best capability proposals can become watered down, distorted, or combined with other programs, resulting in less than ideal outcomes. Moreover, it is not uncommon for capability developers, in an attempt to create a solution that does it all, to make requirements so stringent and complex that the entire effort becomes paralyzed. All of these scenarios can lead to protracted timelines or solutions that are marginal or even obsolete before reaching initial operational capability. This article details why the Army s pursuit of cyber SU is stagnant and recommends a simplified approach toward fixing it. A Justified Need for Cyber SU I want to thank you for making this day necessary. 4 Any discussion of a better approach toward acquiring a cyber SU system must first begin with proof that such a system is needed, and there is plenty of evidence to support that it is. The Department of 19
3 Defense s (DOD) Joint Concept for Cyberspace states that shared situational awareness of cyberspace is one of eight key elements to joint cyberspace operations. 5 This concept gave birth to the Joint Cyber Situational Awareness Initial Capabilities Document, which describes requirements for situational awareness of cyberspace at strategic echelons. 6 Coincidentally, much of the same information applicable at joint strategic echelons is also relevant at Army tactical echelons, where the Army has asserted that its need for cyber SU is most urgent. 7 The U.S. Army Capstone Concept asserts that in order to maintain an advantage in cyberspace, the future Army must provide a capability for leaders and soldiers that helps them to understand how and when adversaries employ cyberspace capabilities, and how to respond. 8 It also recommends investments in mission command capabilities and systems that allow the Army to network the force and improve common situational understanding in order to gain and maintain a cyber electromagnetic activities advantage. 9 The U.S. Army Operating Concept identifies key capability development areas focused on science and technology initiatives to provide increased commanders situational understanding through common operational pictures down to the tactical edge. This, it states, may help commanders gain and maintain a position of relative advantage across the contested cyberspace domain and electromagnetic spectrum. 10 Joint and Army doctrine publications also point toward the need for cyber SU. JP 3-12(R), Cyberspace Operations, explicitly states that cyberspace operations depend upon current and predictive knowledge of cyberspace and the operational environment (OE). 11 ADRP 6-0, Mission Command, stresses the importance of the common operating picture (COP) in building situational understanding. 12 FM 6-02, Signal Support to Operations, says by integrating information from across the breadth of the area of operations, Army forces are able to maintain more relevant and complete situational understanding [allowing] commanders to employ the right capabilities, in the right place, and at the right time. 13 Not surprisingly, these doctrine documents reflect the strategic message of senior cyber leaders. In his Joint Force Quarterly article, Ten Propositions Regarding Cyberspace Operations, Maj. Gen. Brett Williams explains the urgency of cyberspace situational awareness. Williams writes, Developing cyber situational awareness is a high priority for DOD. The challenge is providing a complete picture of the domain that is consistent, accurate, current, and customizable for commanders at all levels. 14 Williams also concludes that commanders must be able to see and understand cyberspace in order to defend it. 15 This simple truth justifies a cyber SU capability for the Army. However, Army capability development efforts for cyber SU are presently stagnant. Why Army Cyber SU Capability Development Efforts are Stagnant If you don t know where you are going, you might wind up someplace else. 16 In a perfect world, the Army could anticipate its capability needs far enough in advance to permit the traditional acquisition process to succeed. Unfortunately, innovation in cyberspace is moving too fast to make that timeline practical for cyber SU. The typical timeframe for identifying a need, writing the requirements, negotiating the Joint Capabilities Integration and Development System (JCIDS) process, and then producing a new widget is five to eight years. The JCIDS process attempts to accommodate information systems software development with a more efficient Information Technology (IT)-Box option. 17 Although the Army is utilizing the IT-Box, it has been slow to approve the first cyberspace-related requirements document. 18 One of the Army s challenges might lie in an acquisition system that is tied to old paradigms. Training and Doctrine Command s Gen. David G. Perkins pointed out that the defense acquisition system is still geared toward filling gaps that differentiate us from a known enemy as opposed to increasing our rate of innovation. 19 Perkins said the Army must be willing to kill old programs and then put those resources into new and more transferrable technologies. 20 He added that in order to innovate, the Army must avoid creating requirements with too much specificity else they become self-confining. 21 Clearly, the Army has a strong desire to innovate, but an outmoded acquisition system and old thinking are not the only things slowing them down. Another challenge is a discordant cyberspace capabilities development effort. Currently, there are several overlapping information system capability documents in draft. 22 All of them 20
4 CYBERSPACE UNDERSTANDING (Photo by David Vergun, U.S. Army) Cyberwarriors defend the network at the tactical operations center for the 2nd Armored Brigade Combat Team, 1st Armored Division, on Fort Bliss, Texas, during Network Integration Evaluation (NIE) The NIE was conducted from 25 September to 8 October promise capabilities applicable to cyber SU. Though the Army Capabilities Integration Center (ARCIC) attempted to coordinate these disparate efforts, no significant economies have as yet been achieved. The assistant secretary of the Army for Acquisition, Logistics and Technology (ASA[ALT]) recently developed a coordinated approach to deliver cyberspace-related technologies. 23 However, it appears to be focused more on cyberspace defense and offense, not on enabling capabilities like cyber SU. 24 Although one of the ASA(ALT) goals is to create an integrated network operations capability that will increase understanding about the health of tactical networks, that capability appears to exclude other information pertaining to factors outside of friendly networks that might interest tactical commanders. 25 And, although in 2014 ASA(ALT) responded to ten operational needs statements from Army Cyber Command addressing near-term requirements, the primary focus has been on reducing network vulnerabilities and not cyber SU. 26 This top-down strategy is a positive step, but it has not yet translated into a coordinated cyberspace capabilities development effort at the bottom of the bureaucracy. A Simple Approach for Army Cyber SU Capability Developers You can observe a lot just by watching. 27 The U.S. Army does not need a perfect cyber SU system ten years from now; rather, it needs a good enough cyber SU system right now. To achieve this, capability developers are advised to take a simple approach by answering three basic questions: What information do commanders need? How do we obtain and consolidate it? How should it be displayed? In a broader sense, to successfully acquire cyber SU (or any other future capability), the Army must think of ways to innovate and incrementally reform a constraining acquisition process. First, Army capability developers 21
5 E W ENEMY RADAR CYBER TEAM CELL TOWER EW Current Summary Offensive Cyberspace Operations / Cyber Effects Request Status TYPE Emitter Detection STAT C Current Summary Cyberspace Operations Significant Activities Network Outage Network Impaired Social Media* F E E Current Summary Electromagnetic Spectrum Significant Activities TYPE STAT TYPE STAT Electronic Attack Emitter Detection A B BLUE NETWORK STATUS CELL TOWER ENEMY GPS JAMMER Enemy High Value Individual (HVI) Cyber Personas Cyber Force Protection Condition ALPHA BRAVO X CHARLIE DELTA Battle Drill in Effect Network 12D COMM 4A Brigade Combat Power TYPE QTY WOLFHOUND 3 SHADOW 1 GRAY EAGLE 1 DUKE 20 CREW 48 Joint Task Force/ Division Enablers TYPE AVAIL EC-130 N RC-12 Y EA-18G Y Combat Y Mission Team Cyber Protection Y Team GRAY NETWORK STATUS Name Location Alias AK47@ mail.com HVI #1 Operations: Current 24 hours Cyber-Electronic Warfare (EW) Support to Task Force (TF) Falcon during Operation RAZORBACK FURY Cyber-EW Support to TF Hawk vicinity: Objectives ANVIL and HAMMER Intel & Cyber-EW support to TF Dragon vicinity: Objective SAWBLADE RED NETWORK STATUS HVI #2 HVI #3 Operations: Next 24 hours SHADOW electronic attack on target (38S GH 12345, 54321) Counter UAS Cyber support to brigade combat team strategic messaging (Graphic from authors) Figure. Sample Cyber Situational Understanding Overlay on the Common Operational Picture must ascertain what information regarding cyberspace matters most to commanders. During combat operations, commanders, supported by their staffs, monitor and assess progress, make decisions to exploit opportunities and counter threats, and direct the application of combat power at decisive points in time. 28 Cyberspace is a significant part of that calculus, especially concerning its effects on mission command and highly networked forms of combat power. Information that will likely comprise the basic content of the cyber SU overlay for the COP include friendly, host-nation, and enemy network status, cyber threats and enemy capabilities, key cyberspace infrastructure in the area of operations, cyberspace authorities and rules of engagement, and social media trends, to name a few. Second, capability developers must consider where cyber SU information comes from and how to obtain it. Currently, only joint cyber mission forces are authorized to conduct cyberspace intelligence, surveillance, and reconnaissance and cyberspace operational preparation of the environment. So a great deal of information about cyberspace will originate and reside in databases at the national and strategic levels. That said, relevant data and information derived from organic information collection efforts at Army tactical echelons can provide important context. One practical example is connecting a cyber-persona, derived from a national or joint cyberspace asset, with the identity of a real person (or organization) known to be residing in a unit s OE, as derived through local information collection. Fusing these sources provides greater situational understanding for the tactical commander and will help higher headquarters see cyberspace more clearly. 22
6 CYBERSPACE UNDERSTANDING Third, capability developers must determine the best way to display the information. Cyber SU must provide adequate detail, but not too much. The Army can neither defend all of cyberspace, nor can it display all of it on a COP; otherwise, a commander s thinking could become obstructed by needless clutter. Commanders only need to know what impacts their mission, which aside from leveraging some joint cyberspace effects, consists mainly of employing traditional forms of combat power. Therefore, cyber SU must also allow information to be displayed contextually in order to facilitate broader situational understanding. This can be achieved through pictures, stoplight charts, gauges, ribbons, line-and-block diagrams, and side-by-side comparisons (as exemplified in the figure). Fourth, capability developers must avoid writing system requirements that attempt to replace human judgment and decision making. Cyber SU must provide understanding; but it is up to tactical commanders and staffs to discern how to act on that understanding. Fifth, and finally, the Army must think of ways to innovate and incrementally reform a constraining acquisition process. Army cyberspace requirements documents should strive to foster innovation by describing an overarching framework, grounded in sound doctrinal concepts that can be developed over time through successive software builds. 29 This is, in fact, the goal of the IT-Box. The challenge, therefore, is to identify the aspects of cyber SU that will become quickly outdated and make them modular, so they can be rapidly replaced by new innovations. In addition, Army capability developers must decide if cyber SU will be combined with other proposed or existing systems, or if it will remain pure. Combining multiple systems increases the risk that they could become bogged down for years in development. Meanwhile, the Army would be no closer to a cyber SU capability than it was in 2013 when the Army Cyberspace Operations Capabilities Based Assessment named its number one gap as commanders situational understanding. 30 Conclusion The other teams could make trouble for us if they win. 31 While several resources currently aid in providing cyber SU, the Army lacks a well-coordinated capability development effort to define and aggregate cyber SU-related requirements. Although the JCIDS process provides capability development options with shorter timelines, it still appears inadequate as evidenced by the Army s inability to bring neither cyber SU nor any other cyber-related JCIDS document to approval. 32 Whatever the case, commanders cannot continue to relinquish key operational decisions about their OE because they lack situational understanding of the domain. Cyber SU may not turn out to be a self-contained tool or system. Rather, the answer might be an aggregation of multiple situational understanding enabling capabilities. Therefore, the Army might be better off with an improvised system that gives them some cyber SU today, rather than a cure-all system that promises to deliver the world tomorrow. Many of America s enemies have no bureaucracies and no stovepipes that hamper their ability to employ new technologies in battle. So, while Army capability developers are defining requirements, analyzing alternatives, and running the wickets of JCIDS documentation and approval, potential adversaries will be playing small ball and winning the cyber contest by utilizing commercial off-the-shelf technologies. To make a comeback, the Army needs a game changing play. Because, let s face it; the future ain t what it used to be. 33 Biographies Lt. Col. William Jay Martin, U.S. Air Force, retired, is a senior military analyst with Command Decision Systems & Solutions, Inc. He received a BS from the University of Delaware and an MA from Louisiana Tech University. He is a graduate of the U.S. Air Force Weapons School, Air Force Air Command and Staff College, and Joint Forces Staff College. Emily Kaemmer is a senior military analyst with Command Decision Systems & Solutions, Inc. She specializes in Army cyberspace capabilities development. 23
7 Notes 1. Yogi Berra, The Yogi Book: I Really Didn t Say Everything I Said! (New York: Workman Publishing Company, 1998). 2. Army Doctrine Publication 5-0, The Operations Process (Washington, DC: U.S. Government Printing Office [GPO], May 2012). Situational understanding is the product of applying analysis and judgment to relevant information to determine the relationship among the operational and mission variables to facilitate decision making. For the purposes of this paper, it equates with situational awareness, which is not defined in joint or Army doctrine. 3. The term cyberspace situational understanding (cyber SU) refers to a notional capability that provides relevant data and information about cyberspace for display on a common operational picture or commander s dashboard. Cyber SU (the capability) is distinguished from the phrase cyberspace situational awareness (cyber SA), which per Joint Publication ( JP) 3-12(R), Cyberspace Operations (Washington, DC: U.S. GPO, February 2013), refers to the requisite current and predictive knowledge of cyberspace and the operational environment upon which cyberspace operations depend, including all factors affecting friendly and adversary cyberspace forces. 4. Yogi Berra, The Yogi Book. Said on Yogi Berra Appreciation Day, Saint Louis, Missouri, in Department of Defense, The Joint Concept for Cyberspace ( JCC) (August 2012), 9 (FOUO). 6. Joint Cyber Situational Awareness (Cyber SA) Initial Capabilities Document (ICD), 23 April 2012, approved by the Joint Chiefs of Staff Requirements Oversight Council ( JROC). Available on the JROC Knowledge Management and Decision Support (KM/ DS) System. 7. This statement is the authors assessment after comparing the Joint Cyber SA ICD with the Army Cyber Command (ARCY- BER)/2nd Army Support Element, Army Cyberspace Operations Capabilities Based Assessment (CBA) Final Report (U.S. Army Training and Doctrine Command [TRADOC], 15 December 2013), 34. See fig. 9, Functional Needs Analysis Gap Prioritization, and send document requests to ARCYBER. 8. TRADOC Pamphlet (TP) , The U.S. Army Capstone Concept (Fort Eustis, VA: TRADOC, 2012), Ibid., TP , The U.S. Army Operating Concept: Win in a Complex World (Fort Eustis, VA: TRADOC, 2014). 11. JP 3-12(R), Cyberspace Operations (Washington, DC: U.S. GPO, February 2013). 12. Army Doctrine Reference Publication 6-0, Mission Command (Washington, DC: U.S. GPO, May 2012). 13. Field Manual (FM) 6-02, Signal Support to Operations (Washington, DC: U.S. GPO, January 2014). 14. Brett T. Williams, Ten Propositions Regarding Cyberspace Operations, Joint Force Quarterly 61 (2nd Quarter, 2011): 15. Retired Maj. Gen. Williams is the former J3 of U.S. Cyber Command. 15. Ibid. 16. Yogi Berra and Dave Kaplan, When You Come to a Fork in the Road, Take It!: Inspiration and Wisdom From One of Baseball s Greatest Heroes (New York: Hyperion Books, 2001). 17. Joint Requirements Oversight Council, Manual for the Operation of the Joint Capabilities Integration and Development System ( JCIDS Manual) (12 February 2015). 18. A search of the Capabilities and Army Requirement Oversight Council Management System revealed that, to date, no cyberspace-related documents have been approved by the Army; meanwhile the Air Force and Navy have several approved documents. 19. David G. Perkins, Win in a Complex World -But How? Army AL&T Magazine ( January March 2015). 20. Ibid. 21. Ibid. 22. JCIDS Manual. Information System Capability Development Documents (CDDs) allow sponsors to describe initial minimum values for key performance parameters, key system attributes, and additional performance attributes. Sponsors of software systems, which benefit from continuous technology insertions, may approve follow on documents internally vice through the Joint Requirements Oversight Council. 23. Matthew Maier and Jerry Cook, Hacking Cyber Stovepipes, Army AL&T Magazine ( January March 2015). 24. The three program executive offices (PEO) that have key roles in supporting future cyber technologies are (1) Command, Control, and Communications Tactical (PEO C3T); (2) Enterprise Information Systems (PEO EIS); and (3) Intel, Electronic Warfare and Sensors (PEO IEW&S). PEO C3T is the lead for defense of the tactical network, PEO EIS is the lead for defense of the enterprise network, and PEO IEW&S is the lead for offensive cyberspace efforts. 25. Maier and Cook, Hacking Cyber Stovepipes. 26. Ibid. 27. Yogi Berra and Dave H. Kaplan, You Can Observe a Lot by Watching: What I ve Learned About Teamwork From the Yankees and Life (Hoboken, NJ: John Wiley & Sons, 2008). 28. FM 6-0, Command and Staff Organization and Operations (Washington, DC: U.S. GPO, May 2014). 29. Department of Defense, Instruction , Operation of the Defense Acquisition System, 7 January 2015, accessed 26 April 2016, pdf. Several builds and deployments of software will typically be necessary to satisfy approved requirements for an increment of capability. 30. ARCYBER/2nd Army Support Element, Army Cyberspace Operations. 31. Michael J. Pellowski, The Little Giant Book of Baseball Facts (New York: Sterling Publishing Company, 2007). 32. A search of the Capabilities and Army Requirement Oversight Council Management System revealed that, to date, no cyberspace related documents have been approved by the Army; meanwhile the Air Force and Navy have several approved documents. 33. This is a misattributed quote, which Yogi Berra claims he never said. But there are conflicting sources. See Berra and Kaplan, When You Come to a Fork in the Road, Take It. 24
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems
Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY
The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
Simulation and Training Solutions
Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,
Director of Intelligence Proposed Research Topics
Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
SITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
Rear Detachment Commander. Computer-Based Training. Module 10: Training Management
Rear Detachment Commander Computer-Based Training Module 10: Training Management Table of Contents 1. TRAINING MANAGEMENT... 1 1.1. IMPLEMENTING A TRAINING PLAN... 1 1.1.1. Principles Of Training... 2
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS
CYBER REQUIREMENTS MAJ Hurcules Murray TCM- CYBER DCO Chief 1 Purpose Purpose: A broad overview of the current and emergent Army cyberspace requirements identified through capability based assessments,
the ability to adapt to a variety of opponents over several Missions. So for example in a 500 point game you may spend 100 points on RD squads.
In Diesel Powered tournaments, players face off in a series of WARZONE RESURRECTION games and pit their skills against other players to determine who will emerge the victor. Diesel Powered tournaments
MEDICAL PLATOON LEADERS HANDBOOK TACTICS, TECHNIQUES, AND PROCEDURES TABLE OF CONTENTS
*FM 4-02.4 (FM 8-10-4) FIELD MANUAL HEADQUARTERS NUMBER 4-02.4 DEPARTMENT OF THE ARMY Washington, DC, 24 August 2001 MEDICAL PLATOON LEADERS HANDBOOK TACTICS, TECHNIQUES, AND PROCEDURES TABLE OF CONTENTS
A Comprehensive Cyber Compliance Model for Tactical Systems
A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical
Army Doctrine Update
Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near
G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE
G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs
U.S. Defense Priorities OSD PA&E
1 U.S. Defense Priorities Deter potential adversaries and defend America and American interests Counter asymmetric threats including terrorism, cyber attacks and ballistic and cruise missiles Fight and
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations
Encl: (1) Surface Warfare Tactical Requirement Group Membership
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5420.113 N9 OPNAV INSTRUCTION 5420.113 From: Chief of Naval Operations Subj: SURFACE
WEAPON SYSTEM ACQUISITIONS. Opportunities Exist to Improve the Department of Defense s Portfolio Management
United States Government Accountability Office Report to Congressional Committees August 2015 WEAPON SYSTEM ACQUISITIONS Opportunities Exist to Improve the Department of Defense s Portfolio Management
Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission
Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
FACT SHEET. General Information about the Defense Contract Management Agency
FACT SHEET General Information about the Defense Contract Management Agency Mission: We are the independent eyes and ears of DoD and its partners, delivering actionable acquisition insight from the factory
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST
KEYWORDS: Risk Assessment, Competitive Intelligence, National Security, Web Security, Defense, Information Security
The Competitive Intelligence and National Security Threat from Website Job Listings Jay D. Krasnow Georgetown University (M.A., May 2000) Communications, Culture and Technology Program 10706 Kings Riding
AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015
AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
PEO LAND SYSTEMS MARINE CORPS Planning Brief to Industry. 22 Sep 2015 Michael D. Halloran Director S&T, PEO LS
PEO LAND SYSTEMS MARINE CORPS Planning Brief to Industry 22 Sep 2015 Michael D. Halloran Director S&T, PEO LS 1 Who we are What we do So what? 2 PEO LS Established in 2007 to enhance acquisition oversight
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION FEB 0 1 2013 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND DIRECTOR, MARINE
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
ACC-NJ Small Business Overview
ACC-NJ Small Business Overview Presented by: Christopher Heim Small Business Specialist US Army Contracting Command-NJ [email protected] 609-562-3193 19 June 2014 W15QKN- DoDAAC 1 Army Contracting
Patriot System Performance. Report Summary
Report of the Defense Science Board Task Force on Patriot System Performance Report Summary January 2005 Office of the Under Secretary of Defense For Acquisition, Technology, and Logistics Washington,
Navy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY
A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job
UNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 COST ($ in Millions) All Prior Years FY 2012 FY 2013 # Base OCO ## FY 2015 FY 2016 FY 2017 FY 2018
Fort Monmouth Programs
Fort Monmouth Programs By: Igal Sharret President, TELEGRID Technologies, Inc. [email protected] 973-994-4440 A Technologies in Perspective Article Published in the Association of the United States
New Modular Tactical Vest improves Marines combat effectiveness
MTV New Modular Tactical Vest improves Marines combat effectiveness Dedra Jones, Corporate Communications, USMC, June 2009 Rather than waiting for the next generation of body armor in the years to come,
ort Office of the Inspector General Department of Defense YEAR 2000 COMPLIANCE OF THE STANDARD ARMY MAINTENANCE SYSTEM-REHOST Report Number 99-165
it ort YEAR 2000 COMPLIANCE OF THE STANDARD ARMY MAINTENANCE SYSTEM-REHOST Report Number 99-165 May 24, 1999 Office of the Inspector General Department of Defense Additional Copies To obtain additional
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
Army Intelligence Industry Day Foundation Layer Technology Focus Areas
CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
Leveraging Network Infrastructure to Bring Critical Information to Users
Leveraging Network Infrastructure to Bring Critical Information to Users 13 May 2013 Brian Slaughter Director, Global Public Safety Sales General Dynamics C4 Systems 2013 General Dynamics. All rights reserved.
A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note
A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,
Systems Engineering and Integration Efforts. 11 Dec 2013
Systems Engineering and Integration Efforts 11 Dec 2013 Mr. Leo Smith Director, PoR Engineering Support ASA(ALT) System of Systems Engineering & Integration Directorate (SOSE&I) Approved for Public Release;
AUSA Background Brief
AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of
Cyber Security and the Board of Directors
Helping clients build operational capability in cyber security. A DELTA RISK VIEWPOINT Cyber Security and the Board of Directors An essential responsibility in financial services About Delta Risk is a
Defense Systems Management College Fort Belvoir, VA 22060 5565 Phone, 703 805 3363; 800 845 7606 (toll free)
JOINT SERVICE SCHOOLS Defense Acquisition University 2001 North Beauregard Street, Alexandria, VA 22311 1772 Phone, 703 845 6772 THOMAS M. CREAN The Defense Acquisition University (DAU), established pursuant
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
CUSTOMER KEYNOTE Hal Buddenbohm
CUSTOMER KEYNOTE Hal Buddenbohm Supply Chain Director ITT Force Protection Systems Hal Buddenbohm is the Supply Chain Director at ITT Force Protection Systems in Thousand Oaks, CA. Prior to joining ITT,
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
ADRP20 AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY
ADRP20 I NTELLI GENCE AUGUST201 2 DI STRI BUTI ONRESTRI CTI ON: Appr ov edf orpubl i cr el eas e;di s t r i but i oni sunl i mi t ed. HEADQUARTERS,DEPARTMENTOFTHEARMY This publication is available at Army
Headquarters Department of the Army
ATP 6-01.1 (FM 6-01.1) Techniques for Effective Knowledge Management MARCH 2015 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. Headquarters Department of the Army This
STATEMENT BY BEFORE THE SUBCOMMITEE ON TACTICAL AIR AND LAND FORCES COMMITTEE ON ARMED SERVICES UNITED STATES HOUSE OF REPRESENTATIVES
RECORD VERSION STATEMENT BY MAJOR GENERAL JEFF SORENSON DEPUTY ASSISTANT SECRETARY OF THE ARMY (ACQUISITION, LOGISTICS AND TECHNOLOGY) FOR ACQUISITION AND SYSTEMS MANAGEMENT BEFORE THE SUBCOMMITEE ON TACTICAL
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Consolidated Afloat Networks and Enterprise Services (CANES)
Consolidated Afloat Networks and Enterprise Services (CANES) Re-architecting the Navy s s C4I Network Infrastructure Lockheed Martin SNA Media Brief 11 January 2010 Lockheed Martin Proprietary Information
The Terrain and Tactics of If You Survive
The Terrain and Tactics of If You Survive Mechelle Rouchon Course: History 498 Instructor: Dr. Harry Laver Assignment: Analysis First Lieutenant George Wilson served in the U.S. Army during the last, but
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Virginia National Guard. The Commonwealth s Guardian
Virginia National Guard The Commonwealth s Guardian Objective To understand the origins, constitutional and legal underpinnings of the National Guard To understand the roles, missions, and capabilities
Cyber Security Solutions Integrated. Proactive. Resilient.
Cyber Security Solutions Integrated. Proactive. Resilient. Between defending against cyber attacks and ensuring mission resilience, there is one important word: HOW Cyber attacks never stop coming. Intrusions
Coast Guard Top Acquisition Priorities and the Interoperability Imperative
Coast Guard Top Acquisition Priorities and the Interoperability Imperative CG 9 Capt Joe Vojvodich, C4ISR Acquisition Program Mgr ComDef West 2010 01 February 2010 Advancing Force Multiplicity Coast Guard
Levels of Threat Intelligence
Levels of Threat Intelligence SANS CTI Summit 2016 2016-02-03 Michael Cloppert LM-CIRT The Struggle is Real My challenge: Convey academic concepts to detail-oriented, technically proficient practitioners
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
TRADOC Pamphlet 525-97 SOLDIER AS A SYSTEM FOREWORD
TRADOC Pamphlet 525-97 SOLDIER AS A SYSTEM FOREWORD The Soldier as a System (SaaS) Concept will enhance individual Soldier capabilities to protect and defend ones self. In doing so, the collective efforts
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
America s Force of Decisive Action
Distribution A - Approved for public release, distribution is unlimited 2 Huachuca Training and Support Contract (HTASC) The United States Army Intelligence Center of Excellence (USAICoE) trains, develops,
OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations
Cybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
Duty Descriptions AS OF: 5/27/2006
Duty Descriptions AS OF: 5/27/2006 Introduction Duty Description Pamphlet by ArmyToolbag.com The purpose of this pamphlet is to compile various duty descriptions for NCOERs and OERs. This is a work in
The State of DoD Biometrics
The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E [email protected] 1 Agenda What We ve Done Biometrics
Architecture Modeling Approach for Net-Centric Enterprise Services (C4ISR/C2 Architecture Track)
A Paper submitted to the 10th International Command and Control Research and Technology Symposium "The Future of C2" Architecture Modeling Approach for Net-Centric Enterprise s (C4ISR/C2 Architecture Track)
Re-Imagining the Cyber Warrior of the Future
CSO Vantage Point : Re-Imagining the Cyber Warrior of the Future Close The Gap Today, Win the Fight Tomorrow Jeff Schilling Chief Security Officer FireHost The War is Real Perhaps James R. Clapper, U.S.
LandWarNet Initial Capabilities Document NetOps Tools Convergence Strategy Update
1 LandWarNet Initial Capabilities Document NetOps Tools Convergence Strategy Update 11 September 2013 Al Morrison TCM GNE Signal CDID 1. LandWarNet Initial Capabilities Document (LWN ICD) LandWarNet ICD
United States Cyber Security in the 21st Century
United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a
White Paper March 2009. Government performance management Set goals, drive accountability and improve outcomes
White Paper March 2009 Government performance management Set goals, drive accountability and improve outcomes 2 Contents 3 Business problems Why performance management? 4 Business drivers 6 The solution
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
ODIG-AUD (ATTN: Audit Suggestions) Department of Defense Inspector General 400 Army Navy Drive (Room 801) Arlington, VA 22202-4704
Additional Copies To obtain additional copies of this report, visit the Web site of the Department of Defense Inspector General at http://www.dodig.mil/audit/reports or contact the Secondary Reports Distribution
US Army EW Training Overview. LTC Steve Oatman TRADOC Capability Manager Electronic Warfare (TCM EW) 30 JUL 2014
US Army EW Training Overview LTC Steve Oatman TRADOC Capability Manager Electronic Warfare (TCM EW) 30 JUL 2014 UNCLASSIFIED Agenda EW School Mission Doctrine EW Courses FA29 290A WOBC 290A WOAC 29E AOEWC
FM 6-02 SIGNAL SUPPORT TO OPERATIONS
FM 6-02 SIGNAL SUPPORT TO OPERATIONS JANUARY 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Hybrid Warfare & Cyber Defence
Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency
Measuring Software Security
Measuring Software Security Defining Security Metrics Dr. Bill Young Department of Computer Science University of Texas at Austin Last updated: July 1, 2014 at 14:53 Dr. Bill Young: 1 Why Is CyberSecurity
SatCom For Net-Centric Warfare July/August 2011. MilsatMagazine
SatCom For Net-Centric Warfare July/August 2011 MilsatMagazine Emergency Communications C-COM, Hughes Boeing GPS II-F IvySys Technologies Command Center Guardian Mobility idirect Government Technologies
Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the
Remarks by Carolyn G. DuChene Deputy Comptroller Operational Risk at the Bank Safety and Soundness Advisor Community Bank Enterprise Risk Management Seminar Washington, D.C. October 22, 2012 Good afternoon,
Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career
Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career Chad Storlie Author, Iraq Combat Veteran, Business Leader www.combattocorporate.com
White Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
ROTC RANK STRUCTURE. 1 The Purpose of Army Ranks 2 The Cadet Ranks 3 The Cadet Unit Structure. 4 The Cadet Chain of Command e. Section 1.
Section 1 ROTC RANK STRUCTURE Key Points 1 The Purpose of Army Ranks 2 The Cadet Ranks 3 The Cadet Unit Structure Officership Track 4 The Cadet Chain of Command e As the Continental Army have unfortunately
Mobile Applications. Army s Direction and Our Challenges
Mobile Applications Army s Direction and Our Challenges AFCEA LUNCHEON 16 March 2011 Pete Marion APEO for Customer Support Purpose Who are the major players in the Army for Digital Applications? What are
INFLUENCING AND OPTIMIZING BUDGETS AND SPENDING
INFLUENCING AND OPTIMIZING BUDGETS AND SPENDING By: Major General (MG) Karen Dyson & Morteza Anvari Major General Karen E. Dyson serves as the Director of the Army Budget in the Office of the Assistant
Industry White Board Session
Industry White Board Session SYNOPSIS AFCEA White Board Lunch SYNOPSIS On Jan. 14, 2015, the U.S. Army Program Executive Office Command, Control and Communications - Tactical (PEO C3T), partnered with
