ARCYBER The Next Battlefield UNCLASSIFIED UNCLASSIFIED

Slides:



Advertisements
Similar presentations
Unified Land Operations
Advertisements

Special Operations Center of Excellence
Army Doctrine Publication (ADP) 3-07; and Army
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Defense Daily Open Architecture Summit EMS Panel
Introduction to Information Operations Attaché Corps- SEP 09
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
United States Marine Corps
The U.S. Coast Guard’s Role in Cybersecurity
DHS, National Cyber Security Division Overview
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Infrastructure Support – Administers, deploys, implements, and maintains network defense tools (e.g. Routers, Firewalls, IDS/IPS, HBSS) based on directives.
South Carolina Cyber.
TLO 2: Action: Plan operational security. Intermediate-level training.
AFCEA State of Combat Comm Advancing Warfighter Capabilities in, through and from Cyberspace.
C4ISR and Information Warfare
“Many of our adversaries lack the ability to confront our forces physically, choosing instead to employ virtual weapons with potentially devastating effect.
ADP 1 The Army.
Army Doctrine Publication (ADP) 3-37; and Army
Providing Practical Solutions Winning the Talent Wars for Recruiting and Retaining 21 st Century Cyber Engineers Jeff Kubik, PMP, CISSP Sr PM, Praxis Engineering.
United States Army Combined Arms Center
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
JOINT FIRES AND EFFECTS TRAINER SYSTEM (JFETS). We currently rely on service component schools to inform on service capabilities, and train component.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force 1 Lt Gen Bill Lord, SAF/CIO A6 Chief of Warfighting Integration and.
STRATEGIC PLAN DEPUTY CHIEF OF STAFF FOR PERSONNEL, INFRASTRUCTURE AND LOGISTICS U.S. ARMY TRAINING AND DOCTRINE COMMAND OCTOBER 2005.
Air Force Doctrine Document 2-5.4: Public Affairs Operations.
Joint Vision Why a New Document n Sustain and build on momentum of Joint Vision process ã Continue evolution of the joint force n Lessons learned.
Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.
C4ISR and Information Warfare Naval Weapons Systems.
Air Force Strategy to Resources
Mr. Tom Matthews OUSD(I) The overall classification of this brief is UNCLASSIFIED Discussion with the Intelligence Community Officer Course 10 April 2006.
Defense Information Systems Agency A Combat Support Agency E3 Engineering Division 13 December 2011 Defense Information Systems Agency A Combat Support.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Maneuver Center of Excellence
MPE – Enabling ALL to securely SEE, DECIDE, ACT MPE - Highlights  Establish Core Implementation Working Group  Build Joining, Membership, and Exiting.
Visit us at usacac.army.mil AMERICA’S ARMY: OUR PROFESSION – LIVING THE ARMY ETHIC Challenges and Opportunities BG John Kem.
Defense Daily Cyber Summit
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
JNTC Joint Management Office
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
1 Innovation & Transformation: Enabling Information Superiority for the Warfighter Mr. Arthur R. Friedman OASD(NII)/DoD CIO 4 October 2006.
Protecting Against Cyber Challenges Pacific Operational Science & Technology Conference 15 March 2011 Rob Wolborsky Chief Technology Officer Space and.
This Briefing is Unclassified Space Situation Awareness (SSA) for the Warfighter 25 August 2005 HQ AFSPC/DRC Lt Col Troy Pannebecker.
JFCC Space and Global Strike Lt Col David Adler, USAF Special Assistant to the Commander 19 Oct 2005 UNCLASSIFIED This Briefing is UNCLASSIFIED Brief to.
Coast Guard Cyber Command
Employment Considerations: Considerations at the Outset of Combat
Imagine, Create, and Secure a Stronger Peace… National Defense University Col Kris Bauman, USAF, PhD Senior Military Fellow, Institute for National Strategic.
Army Cyber Command 2nd U.S. Army
GORT Planning/Guidance Session with LTG Barclay
“Existing world order is being redefined.” Henry Kissinger Jan 2015
Current Event Brief!.
US Marine Corps
Mentor Expectations & Framework
CIO G-6 Signal Conference
College of Information and Cyberspace (CIC)
CIO G-6 Signal Conference
National Defense Industrial Association
Cyber Center of Excellence
Mission Command Conference 2013
Defense Health Agency Industry Exchange J-6 I&O’s Enterprise Approach by COL Beverly Beavers November 08, 2018 Authorized Use Only Authorized Use Only.
DISN Evolution Mr. Charles Osborn
Character, Trust, and Mission Command
LREC Management Office (LRECMO)
Joint Planning and Development Office “Where new ideas are welcome”
Field Manual (FM 3-36) What is it?
Presentation transcript:

ARCYBER The Next Battlefield UNCLASSIFIED UNCLASSIFIED 10 December 2013

Constant presence – evolves at the speed of code! Cyberspace as a Domain UNCLASSIFIED CYBERSPACE: A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. (JP 1-02) Man-made domain – ever changing Interdependent w/ traditional war-fighting domains. Not special or separate – part of every unit’s Operating Environment Physical, logical (virtual), and social characteristics Instantaneous operational reach – global battlefield. Constant presence – evolves at the speed of code! 2 UNCLASSIFIED

Classical – AirLand Battle Classical–Network Enabled UNCLASSIFIED Evolution of the Operational Environment (Emergence of Cyberspace) Past Classical – AirLand Battle Today Classical–Network Enabled Future Land Cyber CYBER CYBER Mass and Velocity of Change in OE OPTEMPO Increasing Convergence has taken place between land-human-cyber; so successful Unified Land Operations will require integrated and successful cyberspace operations 3 UNCLASSIFIED

Threat…Contested Environment UNCLASSIFIED Sophisticated, Growing and Evolving Exploiting daily, Increasing disruption, Developing destruction capabilities Current approach is not defendable or affordable Limited Situation Awareness Disparate Networks Reactive Defense (Signature-based) Compliance is our first line of defense Threats Developing Faster Than We Can Protect Against Them 4 UNCLASSIFIED

U.S. Joint Cyberspace Doctrine is Emerging and Evolving United States Cyber Strategy UNCLASSIFIED U.S. International Strategy for Cyberspace: “…combine Diplomacy, Defense & Development to enhance prosperity, security & openness…” Dissuading and Deterring Strengthening Partnerships Building Prosperity and Security Our strategic approach is always grounded by our unshakable commitments to fundamental freedoms of expression, privacy, and the free flow of information Department of Defense Strategy for Cyberspace Treat cyberspace as an operational domain Employ new defense operating concepts Enable a whole of government cybersecurity strategy Build relationships with U.S. allies and International partners Leverage the Nation’s ingenuity U.S. Joint Cyberspace Doctrine is Emerging and Evolving 5 UNCLASSIFIED

U.S. Cyber Command UNCLASSIFIED On June 23, 2009, the Secretary of Defense directed the Commander of U.S. Strategic Command (USSTRATCOM) to establish a sub-unified command, United States Cyber Command (USCYBERCOM). Full Operational Capability (FOC) was achieved October 31, 2010. The command is located at Fort Meade, MD. Service elements include: Army Cyber Command (ARCYBER); Air Forces Cyber (AFCYBER); Fleet Cyber Command (FLTCYBERCOM); and Marine Forces Cyber Command (MARFORCYBER). The Command is also standing up dedicated Cyber Mission Teams to accomplish the three elements of our mission. 6 UNCLASSIFIED

DoD Information Networks (DODIN) U.S. Cyber Command UNCLASSIFIED USCYBERCOM Mission: plan, coordinate, integrate, synchronize and conduct activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. Defend the Nation DoD Information Networks (DODIN) Combatant Command Support Mission Areas Cyber Forces Cyber National Mission Forces DISA/Services Cyber Protection Forces Cyber Combat Mission Forces (CCMD Aligned) DODIN Operations Defensive Cyber Operations (DCO) Offensive Cyber Operations (OCO) 3 Lines of Operations - Running Throughout the Mission Areas Lines of Operation 7 UNCLASSIFIED

Cyberspace Operations = Build + Operate + Defend + Exploit + Attack UNCLASSIFIED Army Cyber Command Our Mission Army Cyber Command/2nd Army plans, coordinates, integrates, synchronizes, directs, and conducts network operations and defense of all Army networks; when directed, conducts cyberspace operations in support of full spectrum operations to ensure U.S./Allied freedom of action in cyberspace, and to deny the same to our adversaries. Serve as Cyber Proponent Conduct Information Operations 2nd Army / Army Cyber Command Cyberspace Operations = Build + Operate + Defend + Exploit + Attack 8 UNCLASSIFIED

Command & Control…Evolving UNCLASSIFIED Command & Control…Evolving ARCYBER/ 2nd Army Army PROPONENT Army Cyber Operations and Integration Center (ACOIC) ARNG Cyber Units USAR Cyber Units NETCOM/9th SC 1ST IO CMD (L) INSCOM CYBERCOM STRATCOM CYBER BDE (780th MI) Organize to Support Combatant Commands Train, Organize, Equip to Meet Requirements Army Cyber Center (USMA) Cyber Center of Excellence (TRADOC) C2 is evolving Army Cyber that exist today is not what we activated almost 3 years ago Will continue to evolve with the operating environment Unity of Effort for Cyberspace Operations 9 UNCLASSIFIED

Army Cyber Command Roles Event: YYYY-MM-DDTHH:MM:SSZ UNCLASSIFIED Army Cyber Command Roles Defense of All Army Networks Serves as Service Component to U.S. Cyber Command Train, Organize and Equip Provide Trained & Ready Forces Build Joint Force Headquarters-Cyber capability Integrate Cyberspace into Planning and Exercises Cyber Education, Training and Leader Development Build Partner Capacity Conduct Information Ops for the Army Support to Institutional Cyber Force Development 10 UNCLASSIFIED Briefer:

Defending All Army Networks UNCLASSIFIED Collapse to a defendable enterprise network Provide all-source indications and warnings Maintain cyber situational awareness Ensure Intel-Ops-Signal (“2-3-6”) integration Train and equip all Army HQs, units, and users to defend their networks Recognize and understand the importance of trusted and disciplined system and network administrators Monitor and enforce compliance Conduct forensics of all attacks Obtain required tools and capabilities Identify and defend cyber key terrain Ensure future integration into the Joint Information Environment framework Army Networks 400+ Network Connections 700+ Circuits Over 800,000 Workstations Over 35,000 Servers Over 90,000 Mobile Devices Over 1,200,000 Users A Global footprint Must Defend to Maintain the Freedom to Operate 11 UNCLASSIFIED

Cyber “In Stride” Initiatives UNCLASSIFIED Strategic Landpower LandCyber White Paper Cybersecurity Awareness Week Education, Training, & Leader Development Cyber Home Station Training Pilot FORSCOM Cyber Summit Cyber Security Assessment Teams Commanders Program on Cyberspace Risk FY14 FORSCOM Training Guidance Mission Command Assessment Teams TRADOC Plan for Cyber Center of Excellence Cyber-Electromagnetic Activities (CEMA) Elements World Class Cyber Opposing Force Do What We Can Now While More Develops UNCLASSIFIED

Evolving Doctrine JP 3-12 (Cyberspace Operations): UNCLASSIFIED JP 3-12 (Cyberspace Operations): Cyberspace Operations are the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace Most aspects of Joint Operations rely in part on cyberspace Commanders conduct cyberspace ops to retain freedom of maneuver in cyberspace and deny freedom of action to adversaries FM 3-38 (Cyber-Electromagnetic Activities): Activities leveraged to seize, retain, and exploit an advantage over adversaries and enemies in both cyberspace and the electromagnetic spectrum, while simultaneously denying and degrading adversary and enemy use of the same and protecting mission command systems 13 UNCLASSIFIED

Army Cyber Training Making the US Army “Second to None” in Cyberspace… UNCLASSIFIED Army Cyber Training Vision: A team of elite, trusted and disciplined cyber warriors trained to operate and defend Army networks Individual Level Increase individual cyber awareness (passwords, software updates, suspicious attachments); Begin with Initial Military Training Certification is a first step…Every user has training requirements Ensure leaders understand and are capable of planning Cyber ops Unit Level Train units for a degraded cyber environment Seek opportunities to integrate and evaluate Cyber ops into planning, training, and exercises at all levels Synchronization of Cyber ops with all other operations is imperative Establish cyber OPFOR capability Service/Joint Establish and meet Joint cyber training standards Making the US Army “Second to None” in Cyberspace… Training and Leader Development is the Key 14 UNCLASSIFIED

Establish New Systems Engineering FA26 DRAFT Establish New Systems Engineering FA26 4/15/2017 LTC COL MAJ LT/CPT Operations This slide illustrates the proposed professional development and utilization of officers for both Branch 25 and Functional Area 26 officers. Both branch and functional area officers will continue to be recruited, accessed and trained objectively through the Signal Captains Career Course—some fundamentals of cyberspace operations will be incorporated into the SBOLC and SCCC. AOC 25 officers will serve as platoon leaders, operations officers, XO, commanders, etc at LT to LTC level. Selected officers may attend 25G training in conjunction with the SCCC or TDY enroute to assignment as a BCT/MfSB NetOps officer or S6, division or corps NetOps officer or G6, Signal battalion or brigade NetOps officer, etc. 25G training will be assignment driven and it will include advanced leadership and technical training. Goal will be for all Signal officers to attend 25G training as a CPT, MAJ or LTC and develop in both AOC via alternating assignments. After completing a 25G assignment, officers will serve in a 25A assignment and vice-versa. After SCCC, all FA 26 designated officers will attend either the 26A or 26B AOC qualification training. All must possess Science, Technical, Engineering or Math (STEM) undergraduate degrees and TS-SCI clearance. All will attend common core consisting of systems engineering, best business planning, and intermediate cyberspace principles; and then, track into their respective areas of specialization, and follow-on assignment. AOC 26A and B officers will continue to develop in thir sp[ecific AOC CPT through LTC with limited migration between AOC. AOC 26C will be smallest AOC. Officers will be competitively selected out of AOC 25G, AOC 26A and AOC 26B for 26C based upon training, education, experience, certifications and preference. Officers with experience or MS/PhD degrees may access directly into AOC 26C by exception. Officers may migrate in or out of 26C but this would be exception rather than the norm. Again, at the executive level—COL—officers will be hand-managed. As we mature the MOCS action, we may establish selected 26Z positions at the LTC level to broad opportunity and enhance assignment flexibility. DRAFT

25D - Cyber Network Defender HQDA Approved 25D MOS Nov 2013 Five CND Specialties JAN 2014: Recruiting Target MOS 25B predominate pool Qualifying Scores. A minimum score of 105 in aptitude areas GT and ST on Armed Services Vocational Aptitude Battery (ASVAB) tests administered on and after 1 July 2004 Possess a security clearance of TOP SECRET (TS) sensitive compartmented information (SCI) U.S. citizen Meet service remaining requirement per AR 614-200 (36 months) A physical demands rating of medium A physical profile of 212221 Normal color vision Candidates for MOS, as follows: MOS Immaterial A SSG ALC graduate with at least 8 years TIS At least 4 years of experience in IA and IT. This experience must be verified IA Certification: Must hold a current certification under either IAT Level II or IAM Level I IAW DoD 8570.01-M 811

DRAFT 4/15/2017 Ongoing Initiatives Science, Technology, Engineer, Math (STEM) 50% SC Accession Targets Additional Point on OML for STEM Cadets Voluntary Transfer Incentive Program (VTIP) for FA and BR MOCS Action approved requiring STEM and TS-SCI for FA53 Increased Throughput FA53 ISMC Submitted request to document Civilian Certifications on ORB Cyberspace Operations and Security Training With Industry (TWI) Zero-based update of all ACS/TWI Requirements Documented CPT officer positions as Cyber related ACS utilization assignments CMF KD positions in DA Pam 600-3 for AOC 24A, 25A, 53A & Signal WO 40 Seats USAF Cyber 200 Course and 45 at 300 Course for FY 14 (CW4 instructor assignment @ AFIT) 8 annual ACS seats for AFIT Cyber related MS Degree Programs (PhD instructor assignment @ AFIT) Implemented TS-SCI Cyber Threat briefing for all Signal PCC Piloting ECOPS for all Signal PCC Signal Regimental Officer Transformation MOCS Action (AOC 25G and FA 26) Increased SC WO accessions to meet CMF build requirements HQDA approved 25D MOCS Action / 25D Pilot course 25D In-Service Screening Test (ISST) CIO/G6 provided DoDD 8570 annual IA/Cybersecurity recertification vouchers   DRAFT

Developing Initiatives DRAFT 4/15/2017 Developing Initiatives Incorporate SANS MS Degree into FA 26 education program Organic ACOPC instructor capability in the Cyber Leader College Cyberspace Technological Enrichment Program (CTEP) (HIA) Non-MEL4 Fellowship @ NCCIC and FCC for field grade and warrant officers USCC/NSA CMF equivalency for SC AOC/MOS qualification training course SIGCoE Course Emphasis on Blended Education vice Training Army Career Tracker Pilot for all Signal Regiment Officers, WO, Enlisted Select SC 2LT to USAF Undergraduate Cyber Training @ Keesler AFB Army Cyber Assessment (ACA) transfer of responsibility from ARCYBER   DRAFT

Strong partnerships are critical to success What We Must Do UNCLASSIFIED Embrace cyberspace as a contested domain Know the threat….It is not random Treat the Network as a weapon system Enforce Compliance with Basic Standards and Discipline Cyber security is not a given and remediation is expensive This is leader’s business Conduct Training and Leader Development Make people the Centerpiece, not Technology Strong partnerships are critical to success 19 UNCLASSIFIED

The Key to Cyberspace Operations is People, not Technology Cyber Warriors UNCLASSIFIED Vision: Professional team Elite, trusted, precise, disciplined warriors Culture of trust, respect, and dignity Who Defend and operate all military networks Provide dominant effects in cyberspace Ensure Mission Command Enable Unified Land Operations Ensure a decisive advantage—Land and Cyber The Key to Cyberspace Operations is People, not Technology UNCLASSIFIED

“Transforming Cyberspace While at War… Questions UNCLASSIFIED “Transforming Cyberspace While at War… Can’t Afford Not To!” 21 UNCLASSIFIED

The Cyber-Enabled Commander Expects UNCLASSIFIED Freedom to Operate Defend and Secure Critical Information Understand Operational Impact, Risk and Mitigation Common Operational Picture See Yourself, the Threat & the Cyberspace Terrain Integrated Cyber Planning and Execution Cyber Effects tied to Commander’s Objectives Synchronize Lethal & Non-Lethal Network as an Operational Platform Single, Secure Network Enable Cyberspace Operations Trained and Ready Forces Leader Development, Training, and Education is Key 22 UNCLASSIFIED