Cyber Superiority Weapon System Normalization Update AFCEA Luncheon Jan 2015 Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority
Overview A5/8 Organization Where We Were/Are Way Forward Challenges Operational Context Priorities Cyber Requirements Summary 2
A5/8, Directorate of Strategic Plans and Requirements A5E EXECUTIVE SERVICES A5/8 STRATEGIC PLANS & REQUIREMENTS A5C SPACE SUPERIORITY A5F GLOBAL WARNING AND DEFENSE A5I CYBER SUPERIORITY A5M SATCOM AND PNT A5R LAUNCH AND REQUIREMENTS OFFICE A5X STRATEGIC PLANS AND REQUIREMENTS A5CF FUTURE REQUIREMENTS A5FG GROUND BASED WARNING A5IC CYBER OPERATIONS A5MP POSITIONING, NAVIGATION AND TIMING A5XC CONCEPTS AND PROCESSES A5CN COMMAND AND CONTROL A5FS SPACE BASED WARNING A5IM CYBER MISSION ASSURANCE A5MS SATELLITE COMMUNICATIONS SPACE A5XI BASING & INTERNATIONAL AFFAIRS A5CS SPACE SITUATIONAL AWARENESS A5CY DEFENSIVE SPACE CONTROL OFFENSIVE SPACE CONTROL A5FW ENVIRONMENTAL MONITORING A5IW CYBER WARFARE A5MT SATELLITE COMMUNICATIONS TERMINALS A5XP STRATEGIC PLANS A5XR STRATEGIC REQUIREMENTS A5I New A5XY STRATEGIC ANALYSIS 3
Where We Were Cyber WS Capability Production Documents Draft AFRRG AFROC JROC Cyberspace Vulnerability Assessment / Hunter Cyberspace Defense Analysis Air Force Cyberspace Defense Cyber Command and Control Mission System Air Force Intranet Control Cyber Security and Control System Challenges Differing views of the As Is capability fielded at the operational units Definition of Good Enough Lengthy coordination processes Baselining the As-IS Capabilities of CSAF-Approved Weapon Systems
Cyber Warfare DoDIN Ops Where We Are Today Cyber Weapon Systems in Sustainment Cyber Security Control Sys Air Force Intranet Control AF Cyberspace Defense Cyberspace Defense Analysis Cyber C2 Mission System Cyberspace Vulnerability Assessment/Hunter Network Attack System Baselined the As-IS Capabilities of CSAF-Approved Weapon Systems 5
Way Forward -- Challenges AF Cyber Mission Forces Unique Capabilities to CMTs and NMTs? Future of CPTs Joint Solution? N/CSTs RTO&I / Trainers / Range? AF Environment in JIE Move from AF Gateways to Joint Gateways Transition to commercial & milcloud Impact to AF Cyber Weapon Systems? 6
Way Forward - Operational Context USCYBERCOM/J3 Cyberspace Operations Environment 7
AFSPC/CC Cyberspace Activities Way Forward - Priorities 1. Defensive Counter Cyberspace (Recon/Counter Recon) 2. Offensive Counter Cyberspace for Global Reach & Access 3. Cyberspace ISR & Situational Awareness 4. Proactive Defense 5. Persistent Network Operations 6. Data Confidentiality & Integrity Systems (DCIS) 7. Network Extension & Resiliency 8. Cyberspace Command & Control 8
Way Forward - Cyber Requirements Utilize JCIDS Information Systems (IS) Methodology Introduced in most recent JCIDS guidance Greater flexibility to incorporate evolving technologies Fewer iterations validating documents through JCIDS process streamlines cyber capabilities development Accelerates delivery from concept to capability Delivers early and continuous capability; maturity iteration with operator feedback Embraces changing/refining requirements (not scope) Frequent communication and collaboration across stakeholders Normalized Requirements and Acquisition Processes Can Be Exploited To Deliver Sustainable Future Capabilities To The Warfighter 9
Way Forward Today & Tomorrow Today Unified Platform IS-CDD In-progress Cyber Protection Team CBA In-Progress Tomorrow AFIN Ops CBA Cyber C2/SA CBA AF Cyber Range CBA In-Progress Defensive Cyber Operations CBA Kickoff Feb/Mar 15 Capability Based Approach to Requirements Generation Functional Area Analysis Functional Need Analysis Functional Solution Analysis 10
Summary What we ve done Normalized our Cyber Weapon Systems AFSPC/CC reprioritized cyberspace activities What do we need from you? Understand process to modify weapon-systems in sustainment Help us identify dynamic and agile technologies to meet AF and Joint operational needs Then what? New cyber requirements documents enable continuous development and delivery of capabilities Identify what we need from industry and science and technology 11
Questions? 12
JIE What We re Doing AFNet Migration to JIE Pillars Connect Normalize Network Transport Single gateway/base boundary Next-gen MPLS NW core services consolidation Protect Single Security Architecture Single AFNet directory Regional security w/army-disa Single CND- SP Common Store Core Computing & Data Centers JIE Inc 1 CDC & application migration Application rationalization Enterprise Services Unified capabilities NIPR e-mail SIPR DEE C2 Enterprise Ops Centers Unified NetOps Unified service desk Global net mgmt 13