Brian Connett, LCDR, USN US NAVAL ACADEMY

Slides:



Advertisements
Similar presentations
The U.S. Merchant Marine and America’s Maritime Security
Advertisements

Department of Homeland Security Site Assistance Visit (SAV)
C H A P T E R 15 Government at Work: The Bureaucracy
Mark Carey, CPA, CISA President Toll free: x101 International: x101 Enterprise Risk Management:
Sensors and location technologies – the front end of ISR
Introduction to Information Operations Attaché Corps- SEP 09
Applications in Acquisition Changing Defense Environment.
Civilian Intelligence Organizations
The Department of Defense Intelligence Oversight Program
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
DHS, National Cyber Security Division Overview
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
South Carolina Cyber.
Information Warfare Theory of Information Warfare
Business Crisis and Continuity Management (BCCM) Class Session
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
1 Intelligence Community and Classified Information.
Intelligence Oversight U.S. Army Inspector General School 1
IDC Program INFORMATION DOMINANCE CORPS.  BACKGROUND  PURPOSE  STATEGY  MISSION STATEMENT  GOALS  IDC CAREERS  IDC PROFESSIONAL PROFILE  NAVY.
Section 4 I can explain the presidential advisors I can describe the executive agencies.
CTTSO Overview John Morgan, Deputy Director for Science and Technology, CTTSO September 2010.
The Federal Bureaucracy Chapter 15. What is a bureaucracy?
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
1 Corporate Overview CIC Luncheon Feb 15, Industry Leader Lockheed Martin #1 Aerospace and Defense Company with Revenue Greater than $20 Billion.
THE FEDERAL BUREACRACY Examining the “Fourth Branch.
1 As a public interest company, MITRE works in partnership with the government to address issues of critical national
United States Department of Defense
BELLRINGER:.
© 2001 by Prentice Hall, Inc. C H A P T E R 15 Government at Work: The Bureaucracy.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Information Warfare Playgrounds to Battlegrounds.
Presidential Power PERIOD The Constitutional Indeterminacy of the Presidency Congress powers are set in stone Due to vague explanation of duties.
0 Peter F. Verga U.S. Department of Defense 2 Definitions Homeland Security – A concerted national effort to prevent terrorist attacks within the United.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
The National Security Bureaucracy. Key Agencies The State Department.
Balance Between Audit/Compliance and Risk Management- Best Practices FIRMA 21 st National Training Conference Julia Fredricks, U.S. Chief Compliance Officer.
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
Information Warfare Playgrounds to Battlegrounds.
BAE Systems Small Business Program
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
The Department of Defense Intelligence Oversight Program
The IC Today Chapter 3 ©2013, Taylor & Francis. Introduction The IC is a work in progress It has undergone a major reorganization – Adversaries that possess.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Protecting Against Cyber Challenges Pacific Operational Science & Technology Conference 15 March 2011 Rob Wolborsky Chief Technology Officer Space and.
ADMINISTRATIVE AGENCIES Crystal Wahlstrom-Kauffman April 1 st, 2008 MGT 335.
Chapter 15 Government at Work: The Bureaucracy. Section 1: The Federal Bureaucracy Bureaucracy is an efficient and effective way to organize people to.
CHAPTER 15 Government at Work: The Bureaucracy. What Is a Bureaucracy? Hierarchical authority. Bureaucracies are based on a pyramid structure with a chain.
The Executive Branch The Cabinet, Executive Agencies and Beyond…..
The President President’s Purpose What did you put on your job description?
Presidential Cabinet What is the Cabinet The Job of president is so big that it must be divided out into 15 different departments The combined heads.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
THE FEDERAL BUREACRACY Examining the “Fourth Branch”
Federal Agencies. What Is a Bureaucracy? Hierarchical authority. Pyramid structure with a chain of command running from top to bottom. Job specialization.
DoD Cyberspace Workforce Definitions
DoD Cyberspace Workforce Definitions
Civilian Control of the Military
Federal Protective Service
The University of Adelaide, School of Computer Science
Intelligence Oversight U.S. Army Inspector General School 1
Electronic Surveillance, Post 9/11
Role of US Security and Intelligence Agencies
NPHS 1510 Federal and International
NDIA DoD CIO Vision.
Presentation transcript:

Brian Connett, LCDR, USN US NAVAL ACADEMY Cyber Warfare Brian Connett, LCDR, USN US NAVAL ACADEMY

-2011 International Strategy for Cyberspace “A failure by the Department to secure its systems in cyberspace would pose a fundamental risk to our ability to accomplish defense missions today and in the future.” - 2010 Quadrennial Defense Review “… four key characteristics of cyber space: open to innovation, secure enough to earn people’s trust, globally interoperable, and reliable.” -2011 International Strategy for Cyberspace US Strategic Command US Cyber Command US Fleet Cyber Command US 10th Fleet …

Cyberspace Defined Ubiquitous, overlapping domains “A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems, and embedded processors and controllers …” “… common usage of the term also refers to the virtual environment of information and interactions between people.” National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD-23)

Signals Intelligence Collection of foreign intelligence from communications and information systems Use the information to help protect our troops, support our allies, fight terrorism, combat international crime and narcotics, support diplomatic negotiations, and advance many other important national objectives SIGINT comes from various sources, including foreign communications, radar and other electronic systems This information is frequently in foreign languages and dialects, is protected by codes and other security measures, and involves complex technical characteristics The goal is to collect and understand the information, interpret it, and get it to our customers in time for them to take action.

Oversight The U.S. Constitution, federal law, executive order, and regulations of the Executive Branch govern our activities WE operate under the authority of the Department of Defense (US Code 10) Our activities are subject to strict scrutiny and oversight both from the outside the DoD and from within. External bodies provide oversight to ensure adherence to U.S. laws and regulations House Permanent Select Committee on Intelligence (HPSCI) Senate Select Committee on Intelligence (SSCI) President's Intelligence Oversight Board Foreign Intelligence Surveillance Court Department of Justice The Office of the Inspector General conducts inspections, audits, and investigations to make certain that we operate with integrity, efficiency, and effectiveness, while the Office of the General Counsel provides legal advice You will be given powerful tools which require that you know, understand, and obey to the fullest, the laws of the nation.

POTUS EO Executive Order 12333 (EO 12333) authorizes agencies of the Intelligence Community to obtain reliable intelligence information, consistent with applicable Federal law and EO 12333, with full consideration of the rights of U.S. persons Pursuant to EO 12333, NSA is authorized to collect, process, analyze, produce, and disseminate signals intelligence information and data for foreign intelligence and counterintelligence purposes to support national and departmental missions, and to provide signals intelligence support for the conduct of military operations Most importantly this EO prohibits the collection, retention, or dissemination of information about U.S. persons except pursuant to procedures specifically established by branch leadership and approved by the Attorney General.

C5I is the COP Command & Control Computers Communication Digital Control Systems Optimal Control and Estimation Autonomous Vehicles Robotics Computer Vision Computers Embedded Microcontroller Systems Integration Embedded Microcontroller System Applications Cyber Physical Systems Communication Combat Systems Robotics Mobile Robot Design Cyber Physical Systems Weapons Intelligence Engineering Economics Emerging Technologies

EM and Cyber Environments Failing to use these effectively will be the difference between victory and defeat Environments are merging Commanding the new environment Monitor and be aware of the environment Manage our emissions Discretely communicate Find, track and defeat threats Conduct attacks Surface and Subsurface, Air and Space Dominance -ADM Greenert remarks Jul 2012 J.W. Greenert, ADM, USN

Cyber Conflict v. Cyber War Sun Tzu and Plato Philosophical imperative Self knowledge Cyber Warfare Not about how the cyber system works, its more about how it fails Productive failure will only provide strategic success

Stuxnet and Shamoon Oil and Energy sector Exploits shared hard drives Supervisory Control and Data Acquisition Man-in-the-middle attack STUXNET 1st publicly known malicious cyber weapon from bytes to physical sabotage Cyber Conflict Era begins Fire and Forget Children of Stuxnet – tailored DNA swarm

Cyber Physical Systems