US Cyber Command Lt Col Paul Young J64 Acting Chief, Architectures and Engineering Division
Global Internet Growth DECEMBER 1995 16 million Internet users MARCH 2001 458 million Internet users FEBRUARY 2011 2.08 billion Internet users
Networks of Yesterday to Today Data transfer more than 1000 times faster than 10 years ago. Growth to 2.08 billion users. Easy application development aimed at nonexperts, complete with flaws and security vulnerabilities. Hardware is cheap, and has a much wider range of features. Tools: Ubiquitous and scripted.
Protection and Civil Liberties UNCLASSIFIED It is neither a choice nor a balance It is and always must be both. SAFEGUARDING OUR WEALTH & TREASURE PROTECTING & MAINTAINING PRIVACY & CIVIL LIBERTIES UNCLASSIFIED 4
A Disturbing Trend
Exploitation
Disruption
Operation BUCKSHOT YANKEE
Destruction Russian power facility remotely operated and controlled via a Supervisory Control and Data Acquisition (SCADA) system
Great Power Status In the 20 th century, developing, testing and possessing nuclear weapons conferred special power and prestige on a select group of nations In the 21 st century, this same power and prestige will be held by those that control the network.
Empowered Individual Status
Mitigating Network Vulnerabilities COCOMS CYBERCOM HQ, FT Meade, MD MARFORCYBER HQ, FT Meade, MD ARCYBER HQ, FT Meade, MD FT Belvoir INSIDE AFCYBER (24 th AF) HQ, San Antonio, TX Real-Time Distributed Architecture FLTCYBERCOM HQ, Ft Meade, MD NSA Global Platform PERIMETER DISA NSA CYBERCOM DHS USG OUTSIDE
Technology Priorities Virtualization Trusted computing/id validation Attribution/Forensics Shared situational awareness Role-based information sharing Cyber environment change detection Automated decision logic Personal security products/anonymizers Smart data/data tagging Tool development Social networking threat analysis
Evolution of USCYBERCOM The United States Cyber Command (USCYBERCOM): Plan, coordinate, integrate, synchronize, and conduct activities to direct operations and defense of Department of Defense information networks to prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure U.S./Allied freedom of action in cyberspace and deny the same to our adversaries. USCYBERCOM Lines of Operations 1. DoD Global Information Grid Ops (DGO) 2. Defensive Cyber Operations (DCO) 3. Offensive Cyber Operations (OCO)
Mission and Capabilities UNCLASSIFIED USCYBERCOM Mission: USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. DoD Global Information Grid Operations Employment of manual and automated methods to preserve and sustain the availability, confidentiality, integrity and non-repudiation of military information networks Defensive Cyber Operations Synchronized real-time capability to discover, detect, analyze and mitigate threats and vulnerabilities, and outmaneuver adversaries, in order to defend Cyberspace and enable freedom of action Full Spectrum Cyber Operations Employment of full spectrum cyberspace operations to support COCOM operational requirements and the defense of DoD information networks UNCLASSIFIED 15
Projecting Power Today Whole of Government approach Building the TEAM Partnering for capacity Integrating broad expertise Innovative workforce
Whole of Government 17
Building Cyber Capacity
CYBERCOM S Architectural Challenges Architectures have been largely considered not operational Importance of architectures in a federated environment generally understated We are coming late to the game... 19
QUESTIONS?