Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle

Similar documents
NATO Flirting with a More Comprehensive Approach to Alliance Security

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

Rear Detachment Commander. Computer-Based Training. Module 10: Training Management

Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett

FUTURE NAVY VISION. The Royal Navy Today, Tomorrow and Towards Projecting maritime power to protect and promote our nation s interests

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

Designing Law Enforcement: Adaptive Strategies for the Complex Environment

Legal Issues / Estonia Cyber Incident

Patriot System Performance. Report Summary

Director of Intelligence Proposed Research Topics

We have come a long way since the Goldwater-Nichols Act became law more than 2j years ago, we can go further. We will.

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

CyberSecurity Solutions. Delivering

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

OPNAVINST A USFF/CNO N3/N5 10 Nov 2014

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience

"Gaming versus Exercises: Designing Surprise-resilient Organizations for a Cybered World

Hybrid Warfare & Cyber Defence

GOOD SECURITY IS A GROUP EFFORT

OPERATIONAL RISK MANAGEMENT B STUDENT HANDOUT

Oil and Gas Industry A Comprehensive Security Risk Management Approach.

Cybersecurity Delivering Confidence in the Cyber Domain

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

UN Emergency Summit on Cyber Security Topic Abstract

Cyber intelligence exchange in business environment : a battle for trust and data

CHAPTER 11 INTERNATIONAL STRATEGY AND ORGANIZATION

The Implication of TMD System in Japan to China s Security

Department of Defense NetOps Strategic Vision

APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES

Navy Information Dominance Industry Day

How To Create An Insight Analysis For Cyber Security

Security Threats on National Defense ICT based on IoT

PRISONER P-09 FREE INFINITY MISSION DOWNLOAD BEASTSOFWAR.COM

Army Doctrine Update

Flexible, Life-Cycle Support for Unique Mission Requirements

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives:

CNO: Good morning and thank you for being here. Today we are releasing the results of the investigation into the

Symantec Cyber Security Services: DeepSight Intelligence

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: OVERVIEW

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy February 2012

A Primer on Cyber Threat Intelligence

Developing a robust cyber security governance framework 16 April 2015

WMD Incident Management Simulation and Tutor

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

HQMC 20 Aug 04 E R R A T U M. to MCO B OPERATIONAL RISK MANAGEMENT (ORM)

Business Continuity & Disaster Recovery

National Communications System. December 6, 2007

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

AT A HEARING ENTITLED THREATS TO THE HOMELAND

Strategic Design. To learn more about the Naval Facilities Engineering Command, please visit us at and

Cyber security Building confidence in your digital future

Covert Operations: Kill Chain Actions using Security Analytics

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM

working group on foreign policy and grand strategy

BUSINESS COMPETITIVE INTELLIGENCE THE ULTIMATE USE OF INFORMATION TECHNOLOGIES IN STRATEGIC MANAGEMENT

Cyber security in an organization-transcending way

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013

Resources projected in the previous development plan and the reality

On the European experience in critical infrastructure protection

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

Partnership for Cyber Resilience

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE SUBCOMMITTEE ON MILITARY PERSONNEL COMMITTEE ON ARMED SERVICES UNITED STATES HOUSE OF REPRESENTATIVES

GLOBAL VALUE CHAINS UNDER THREAT

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

Network Mission Assurance

Information Technology

IBM index reveals key indicators of business continuity exposure and maturity

Virginia National Guard. The Commonwealth s Guardian

LEADERSHIP AND SUPERVISION

Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s

Long Term Defence Study

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING

United States Army. Criminal Investigation Command. Keeping Our Army Safe CID Seeking Special Agents

The UK cyber security strategy: Landscape review. Cross-government

Active Engagement, Modern Defence

Preparing Millennials to Lead in Cyberspace

A community of organizations working together to accomplish their respective missions with a common goal of improving human performance through

Transcription:

Phantom Works Advanced Modeling & Simulation Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle Mark N. Clemente 15 th ICCRTS June 22, 2010 BOEING is a trademark of Boeing Management Company. Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-2312-NT 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 1

Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 2 U.S. Navy photo by Photographer's Mate Airman Apprentice Antonia Ramos (RELEASED)

Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt U.S. Army photo by Staff Sgt. Lorie Jewell (Released) 3

Who s got the grease pencil?! What Cyber Security can Learn from the Outer Air Battle A Battle of Complex, Adapting, Living Systems The Outer Air Battle plan for degradation Danger of Too Much Information Conclusion Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 4

Battle of Complex Adaptive Living Systems Copyright 2009 Boeing. All rights reserved. The adversary gets a vote U.S. Navy photo by Mass Communication Specialist 2nd Class William Pittman/Released Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 5

Battle of Complex Adaptive Living Systems Complicated Known/knowable, predictable cause and effect chain Inputs/outputs proportional Whole equals sum of parts Complex Multiple interdependent variables Changing cause and effect chain Inputs and outputs not proportional; whole does not equal sum of the parts Complex Adaptive System Reacts and evolves independently in ways we cannot entirely predict 6 Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 6

Complexity: Interdependent Variables Large numbers of interdependent variables shape the behavior of each actor but continually change t1 Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 7

Complexity: Interdependent Variables t-2 Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 8

Complexity: Interdependent Variables t-3 Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 9

Complexity: Interdependent Variables Each variable is two-directional affecting other actors Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 10

Complexity: Interdependent Variables who in turn co-evolve and affect each other. Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 11

Adaptation Key Traits Flexibility how robust an organization is in adapting to new mission sets at the strategic / operational (higher) level Resilience how robust an organization is in adapting to damage to their system Responsiveness how robust an organization is in adapting to new mission sets at the operational / tactical (lower) level Agility how quickly an organization adapts to a changing environment Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 12

Levels of Adaptation Action how well the system adapts at the tactical level the point of action. Learning how well the system absorbs and adapts to changes in the outer environment. Learning to learn how well the system is structured to learn and adapt. Defining success how well the system is able to redefine their fitness based on new information / lessons learned. Co-adaptation from the system of systems standpoint, how well the disparate organizations are able to co-adapt to improve the fitness of the greater system. Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 13

Adaptive Action How well the system adapts at the tactical level the point of action U.S. Navy photo by James D. Hamill/Released Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 14

Learning How well the system absorbs and adapts to changes in the outer environment U.S. Navy photo by Photographer's Mate 1st Class Michael W. Pendergrass. (RELEASED) Copyright 2009 Boeing. All rights reserved. Approved for release to foreign persons. EM log # RBE-1843-NT Clemente, 7/13/2011, SAS 081.paper#7.26Apr2010.ppt 15

Learning to Learn How well the system is structured to learn and adapt U.S. Navy photo by Photographer s Mate 1st Class Mahlon K. Miller. (RELEASED) Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 16

Defining / Redefining Success How well the system is able to redefine their fitness based on new information / lessons learned Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 17

Co-Adaptation How well the disparate organizations are able to co-adapt to improve the fitness of the greater system U.S. Navy photo by Mass Communication Specialist 1st Class Kim McLendon/Released Complex Adaptive Living Systems may be a useful model for real world challenges U.S. Navy photo by Photographer s Mate 2nd Class Daniel J. McLain (RELEASED) Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 18 U.S. Navy photo by Mass Communication Specialist Seaman Patrick W. Mullen III (RELEASED)

The Outer Air Battle 02D 02C 04D 02B 04C 04B 06D U.S. Navy photo by Photographer's Mate 3rd Class Christopher B. Long (RELEASED) 06C 06B Shoot the Archer, not the Arrows Electrons on the Attack Plan for degradation Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 19 U.S. Navy photo by Mass Communication Specialist Seaman Adam K. Thomas/Released

Danger of Too Much Information Blurring Levels of War? Strategic GOOOAAAALLLL!!!!!! (a sports analogy) Operational Tactical Emergent functions at different scales may need different approaches and tools U.S. Navy photo by Mass Communication Specialist 2nd Class Johansen Laurel Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 20

Danger of Too Much Information Coordination over Time Major Combat Peace Crisis Response Post- Conflict Peace Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 21

Conclusion This is no black box solution to complex human challenges Never forget that your adversary gets a vote Complex adaptive living systems may be a useful model for real world challenges Plan for degradation Hierarchy is not inherently evil emergent functions at different scales may need different approaches and tools Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 22

Questions It's not if the nets go down but when they go down, because the enemy is going to try to take them down. There is no military in the world more vulnerable to losing its nets than the U.S. military because we are so reliant on them for our worldwide operations. We need to create a corps of officers who are comfortable with uncertainty and ensure that they can give commander's intent - broad guidance to their subordinates - so that when, not if, the nets go down, they can continue to operate at good speed, understanding what the commander needs done. Gen. James Mattis Commander, U.S. Joint Forces Command Interview with Vago Muradian 23 May 2010 Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 23

Questions We've raised a generation that, for the last nine years of active operations, have never been out of touch with their higher headquarters. What we're going to have to do is train by turning off the radios - as we did in the Cold War, when by pressing that handset key and transmitting, you were endangering yourself to the enemy's strikes on you. We're going to have to get used to turning off the handsets for other reasons: to see if people can operate on their own initiative. Gen. James Mattis Commander, U.S. Joint Forces Command Interview with Vago Muradian 23 May 2010 Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 24

Questions To the extent possible, naval forces will deploy and employ redundant systems to maintain command and control of dispersed forces in the face of such threats, and will maintain proficiency in retaining the operational and tactical initiative when communications and information systems are degraded or denied. Naval Operations Concept 2010 Copyright 2009 Boeing. All rights reserved. 1/5/2010 4:55 PM, #144.Clemente.15 th ICCRTS Jun 10.ppt 25