Cyber Force 2025 & Beyond - AFCEA International · Cyber Force 2025 & Beyond (Department of Defense...
Transcript of Cyber Force 2025 & Beyond - AFCEA International · Cyber Force 2025 & Beyond (Department of Defense...
1
UNCLASSIFIED
UNCLASSIFIED 9/2/2014
Cyber Force 2025 & Beyond
(Department of Defense Information Network, Defensive
Cyber Operations, and Offensive Cyber Operations)
2
UNCLASSIFIED
UNCLASSIFIED
• The Army relies heavily upon Networks, electronic
systems, and the electromagnetic spectrum to execute
Warfighting Functions: Maneuver, Intel, Fires, etc…
• It is said that if you know your enemies and know
yourself, you will not be imperiled in a hundred battles; if
you do not know your enemies but do know yourself, you
will win one and lose one; if you do not know your
enemies nor yourself, you will be imperiled in every
single battle.
Sun Tzu, The Art of War
BLUF
Force 2025 and Beyond will present greater challenges to
Know Cyberspace
3
UNCLASSIFIED
UNCLASSIFIED
Agenda
• BLUF
• Force 2025 & Beyond
• Cyber 2025 & Beyond
• Summary
4
UNCLASSIFIED
UNCLASSIFIED
Force 2025 & Beyond Draft CSA Intent: Force 2025 & BeyondPurpose: Initiate intellectual and physical change enabling the Army to be:
• More regionally engaged, globally responsive and capable of decisive action across the ROMO in the near-term
• Leaner, more lethal, expeditionary, and agile in the mid-term
• Postured (set the conditions) for fundamental change that enables the Army to conduct expeditionary maneuver with operationally significant forces in the far-term
Method: Force 2025 and Beyond is a comprehensive campaign conducted by and affecting the Total Army to achieve Strategic Landpower. Through a deliberate governance structure synchronized with existing Army procedures, and using Force 2025 Maneuvers to unify the operational and institutional force, the Army will holistically develop, evaluate, and field integrated concepts and capabilities to produce a leaner, more capable, and more expeditionary force. Next to maintaining readiness, Force 2025 and Beyond is the Army's most important initiative over the next 15-20 years and requires continuity in execution.
Key Tasks:
• Prioritize resources and identify divestment opportunities across the program (POM thru EPP) to enable this effort
• Develop requisite concepts and capabilities to enable required changes in the Force
• Integrate institutional processes and operational activities through deliberate, synchronized governance.
• Evaluate intellectual and physical outcomes through a unified lens to produce relevant candidate solutions
• Communicate progress of activities and results both within the Total Army and to the Joint Force
• Integrate, acquire, and field validated DOTMLPF solutions
Endstate: In the near-term, a more globally responsive and capable, enabled by an improved, resilient network, Army 2020 sets the foundation for the mid-term. Force 2025, a leaner, more lethal, expeditionary, and agile Army retains overmatch against increasingly capable opponents, while setting conditions for the period beyond 2025. The far-term force is a fundamentally changed, uniquely enabled Army that leverages new operational concepts, technologies, and force designs to conduct expeditionary maneuver with operationally significant forces, influencing events at the speed they unfold to achieve strategic objectives.
31
Driving the Army forward in support of Combatant Commanders to defend the
Nation today and against emerging threats
Army 2020
Force 2025
Beyond Force 2025
5
UNCLASSIFIED
UNCLASSIFIED
Operate Differently – Force Employment
Enable Differently – Science and Technology
Organize Differently – Force Design
Components of the Solution
6
UNCLASSIFIED
UNCLASSIFIED
Force Employment
Operate Differently – Force Employment
Enable Differently – Science and Technology
Organize Differently – Force Design
• Decentralized – regulate
operational and tactical
tempo
• Distributed – strength and
flexibility through
collaboration
• Integrated with Unified
Action Partners
• Joint Team and a Strategic
Whole of Government
Approach
• Influence or compel human
behavior in peacetime and
in war
7
UNCLASSIFIED
UNCLASSIFIED
Cyberspace 2025 & Beyond
The Military Problem
How does the Army employ cyber capabilities with other elements of
combat power in and through cyberspace to support ULO?
The Army will use and depend upon:
• Mobile, Protected, and Networked Platforms.
• Robotics that enable and augment humans
and mitigate risk.
• Information to Decision.
The future Army network must be
• Secure
• Resilient
• Standards-based
• Cloud-based enterprises fully integrated with JIE and IC
• Accessible at the point of need.
• Joint
• Interoperable
• Agile
• Flexible
8
UNCLASSIFIED
UNCLASSIFIED
Cyberspace 2025 & Beyond
The Operating Environment
Cyberspace Required Capabilities
• Network capabilities must enable commanders (CDRs) to integrate cyberspace operations, spectrum management operations (SMO), and intelligence operations to accomplish their missions. The future LWN will enable U.S. formations to achieve operational adaptability while operating in/through all phases of operations and in any operational environment.
• Joint offensive cyberspace operations will employ nonlethal capabilities as a means to cause malfunction or destruction of enemy equipment that can also lead to personnel injury or loss of life to the adversary.
9
UNCLASSIFIED
UNCLASSIFIED
Cyberspace 2025 & Beyond
The Operating Environment
Eight Aspects of Convergence Nine Guiding Principles
1. Time and space 1. Unified cyberspace operations
2. Threat and technology 2. Integration
3. Land and cyber domains 3. Localized cyberspace effects to the tactical edge
4. Cyberspace and electromagnetic spectrum 4. Enhanced understanding
5. Defensive and offensive cyber operations 5. All networks are operational warfighting platforms and
functions
6. Information environment and cyberspace domain 6. Combined arms approach
7. Information management and knowledge
management 7. Achieve cyberspace domain superiority
8. Operational and institutional 8. Ensure mission command
9. Empowered LandCyber units and Soldiers
10
UNCLASSIFIED
UNCLASSIFIED
Cyberspace 2025 & Beyond
The Threat
• Operations in cyberspace will continue to grow more contested, congested, and competitive and will represent one of the most direct approaches for adversaries to attack the US and US national interests.
• LWN is not designed to counter a specific threat.
• System specific threats to LWN include OCO, CNE and physical threats.
11
UNCLASSIFIED
UNCLASSIFIED
Science and Technology
Operate Differently – Force Employment
Enable Differently – Science and Technology
Organize Differently – Force Design
LandCyber Situational Awareness and Understanding
Threat-driven Cyber Terrain of the battlefield. Integrated view of mission space and cyberspace showing
dependencies, enhanced red/blue picture based on cyber effects, adversary cyber intelligence integrated with
red picture land strength.
LandCyber Operations at the Tactical Edge
Advanced sensors capable of providing early warning of intrusions, automated battle damage assessment,
counter-reconnaissance (hunting), high assurance cross domain technologies, assured operation of robotics and
intelligent array grids.
Moving from Conventional to Active Defense / Cyber Operations
Actionable intelligence feeding defensive operations, predictive analysis to enhance effective responses,
integrated adaptive sensor grids, proactive hunting, malware analysis at speed and scale, big data analytics to
derive adversary intelligence.
Defensible Architecture
A secure, agile, resilient, managed, and defensible architecture upon which to execute Army cyber operations.
Self-healing networks and protocols, operational C2 agility, SCRM for critical assets, Leverage TPMs.
Advanced training for the Future Force
New and advanced training capabilities that include live, virtual, constructive and gaming training models as well
as realistic integrated land cyber and joint exercises for all areas of interest (with APT specific threats). Training
needs to address emerging doctrine of cyber operations, e.g. cyber fire/maneuver/knowledge.
Identification and Integration of Emerging Technologies
Behavior analytics/distributed cloud-based analytics, modeling and simulation of offensive cyberspace
operations, 3-D printing, etc.
12
UNCLASSIFIED
UNCLASSIFIED
Cyberspace 2025 & Beyond
Investing in Our Future
FM 3-38
Cyberspace S&T Priorities
1. Hardware and Software Convergence
2. Future Waveforms
3. Defensive Cyber Operations-Tactical
4. Assured Position Navigation and Timing
5. Cyberspace Situational Awareness
13
UNCLASSIFIED
UNCLASSIFIED
How can the Army:
1) Plan, build and operate an operationally focused network that supports global warfighting and generating force functions
2) Dramatically improve network defense posture
3) Realize efficiencies with improved effectiveness
4) Provide Joint system integration, intelligence connectivity and interoperability for collaboration with unified action partners
5) Recruit, retain, equip, sustain and train an agile work force that supports an expeditionary Army
The LandWarNet ICD*
Key Questions
*ICD: Integrated Capabilities Document
14
UNCLASSIFIED
UNCLASSIFIED
Cyber CoE Campaign of Learning
Questions Architecture
Top Three Questions Explored in 2014-2015 Objective
Study Issue 1: Advance Network Capability. How can the Army advance the tactical network
infrastructure in order to: reduce user complexity, improve robustness and resiliency,
maximize bandwidth efficiency, enable dynamic reconfiguration, improve cyber-security, and
reduce the size, weight, and number of assets required to be deployed in order to support the
individual Soldier, whether mounted, dismounted, or aloft, to the sustaining base in a spectrum
contested environment?
Determine how to
maximize network
capacity and
performance.
Study Issue 2: Organize Cyber. What is the optimal way for the Army to organize the activities
associated with Cyberspace Operations (OCO, DCO, DoDIN/LandWarNet), Electronic Warfare (EA,
EP, EWS), and Spectrum Management Operations (SMO) to maximize these capabilities across the
Army Warfighting Functions while minimizing required resources?
Identify the most
effective force
structure to increase
Cyber capabilities.
Study Issue 3: Employ Cyber. What is the optimal way to employ the capabilities of Cyberspace
Operations (OCO, DCO, DoDIN/LandWarNet), Electronic Warfare (EA, EP, EWS), and Spectrum
Management Operations (SMO) with the elements of traditional combat power to support Unified
Land Operations (ULO) and deliver the Cyberspace effects required by Commanders from the
Strategic to Tactical echelons?
Determine how to
integrate Cyber
capabilities to the
tactical edge.
Information Requiring External Coordination Organization
What emerging technologies will be available to enhance cyberspace/network capabilities? DARPA/RDECOM,
DISA, CIO G6
What does the Future Force Structure look like? DA, TRADOC,
COEs
What emerging technologies or capabilities will be available to enhance electronic warfare spectrum
management and integration?
DARPA/RDECOM,
DISA, CIO G6
15
UNCLASSIFIED
UNCLASSIFIED
Summary
• The Army must adapt, evolve, and innovate the LandWarNet in order to
achieve Force 2025 & Beyond objectives
• The LandWarNet faces adaptable threats that place the security of
soldiers, systems, and information at risk
• Near term: Adapt what we have from now to 2020
• Mid term: Evolve and Plan for transition to realistically
• Far Term: Innovate and explore network concepts to fundamentally
change the Army
• Use and improve the Cyber CoEs Campaign of Learning Study Plan and
Questions Architecture to answer relevant questions for the Warfighter
Cyberspace: Know Thyself
16
UNCLASSIFIED
UNCLASSIFIED
Questions
BACK-UP Slides
17
UNCLASSIFIED
UNCLASSIFIED
FM 6-02
Signal
Operatio
ns
FM 3-38
Cyber
Electro-
magnetic
Activities
National/DoD Publications
• USC Title 50 War and National Defense
• National Strategy to Secure Cyberspace
• National Military Strategy for Cyberspace
Operations
• DoD Strategy for Operating in Cyberspace
• DoD 8500 Series (e.g. 8570.01, 8500.02)
Joint Publications
• CCJO Capstone Concept for Joint
Operations
• CJCS 6510 Series IA and CND
• JP 3-12 Cyberspace Operations- Classified
• JP 6-0 Joint Communications System
• JP 6-01 Electro-Magnetic Spectrum
Operations
Army Publications
• ADP 3-0 Unified Land Operations
• ADP 6-0 Mission Command
• FM 6-02 Signal Operations
• FM 3-38 Cyber Electro-Magnetic Activities
• AR 25-1 Army Knowledge Management and IT
• AR 25-2 Information Assurance
• TP 525-7-8 Cyberspace Operations CCP
• TP 525-3-0 Army Capstone Concept
• LandCyber Whitepaper
Joint Publication 3-12
Cyberspace
Operations
Strategy/Concept Operational Policy/Law
Relevant Publications
18
UNCLASSIFIED
UNCLASSIFIED
DA G3/5/7 Proposed SoS Level
MOPs/ Technical Indicators
Measure of
Effectiveness
Relevant MCECs High Level Metrics
(MOP Framework v1.04)
Utility (OperationalValue) • Robust Transport Network
• Display/Share Information• Create/Communicate Orders• Multi-Form Collaboration
• Number of platforms equipped• When power, spectrum, and supporting elements are
available, fraction of time the system is “on”• Aggregate Offered Load• Range; throughput• Accuracy of the PLI on the COP
Availability • Robust Transport Network• Display/Share Information• Create/Communicate Orders• Multi-Form Collaboration
• Percentage of “up time” for the BCT network• Fraction of time with a path to superiors and subordinates
(“one up” and “one down”)• Fraction of time a node’s PLI shows up at the NOC
User SatisfactionAll
• Fraction of users that are satisfied with capability/performance
Simplicity
• Execute Tactical Netops
• Percentage of devices (e.g. routers, radios, …) that the BdeS6 can see a status of
• Labor hours to plan and configure the network• Number of FSRs required• Time to perform an ad hoc task reorg• Number of tools/configurations to manage• Labor hours required for Security (keying, re-keying, etc.)
Robustness • Robust Transport Network• Display/Share Information• Create/Communicate Orders• Multi-Form Collaboration• Cyber Security
• Message Completion Rate (w/wo threats, harsh terrain, …)• Number of alternative paths through the Network• Resilience to attack (jamming, denial of service, LPI/LPD/LPE,
intrusion detection and recovery)• Number of safety issues associated with the Network
Efficiency
All
• Total Cost of Ownership (procurement, sustainment, training, FSRs, disposal…)
• Aggregate Spectrum Utilized• Aggregate Size and Weight• Fuel/Batteries Required to support a BCT• Transport Required to Deploy (CONUS & OCONUS)
Ease to Train • Training Support • Number of hours to train and to maintain proficiency