Cyber Operations in the Canadian Armed Forces

Slides:



Advertisements
Similar presentations
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
Advertisements

Special Operations Center of Excellence
Defense Daily Open Architecture Summit EMS Panel
2010 UBO/UBU Conference Title: Civilian Force Development Session: W
Applications in Acquisition Changing Defense Environment.
Army 2020: Rationale for the Redesign Major General K D Abraham IISS 20 November 2012.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Speaker: Tamar Shapatava
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Chief Information Officer Group
Cyber Support to CJOC / CAF Operations Brief to AFCEA 3 March 2015
New Army Terms Table D-1. New Army terms Army positive control Army procedural control civil support1 combat power (Army) command and controlwarfare command.
“Many of our adversaries lack the ability to confront our forces physically, choosing instead to employ virtual weapons with potentially devastating effect.
Imran Ghaznavi Course Code: MGT557 COMSATS Strategic Human Resource Management.
Army Doctrine Publication (ADP) 3-37; and Army
Providing Practical Solutions Winning the Talent Wars for Recruiting and Retaining 21 st Century Cyber Engineers Jeff Kubik, PMP, CISSP Sr PM, Praxis Engineering.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Deliberative Working Document - Predecisional FOUO Supporting the Secretary’s Top Priorities Eric Coulter, Deputy Director OSD Program Analysis and Evaluation.
Lt-Col. Dipl. Eng. Pavel OTŘÍSAL, Ph.D., MBA NBC Defence Institute of University of Defence THE MEMBER OF EDITORIAL BOARD´S RESEARCH INTEREST This Presentation.
Workshop on Programming in support of Anti-Corruption Agencies Bratislava, 30 June - 1 July 2009 A methodology for capacity assessment of AC agencies:
Force Packaging. Overview Principles of War Process of Force Packaging Developing Packages.
The Community Welfare Pathway Roseanne Fearon Head Of Service, Adult Services Social Work Service.
“Serving those who serve” “À votre service” PRESENTATION TO THE NON-PUBLIC PROPERTY BOARD OF DIRECTORS 14 OCTOBER 2003, OTTAWA.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Personnel Requirements for Implementing the New Triad Robert B. Barker December 15, 2005.
“Alberta - A Province Prepared” Alberta Emergency Management Agency The “Agency”
EU military crisis management capabilities
1 Joint Doctrine: The Authoritative Vocabulary For and Explanation of Joint Warfare and Joint Operations October 16, 2015 Representing Reality\Big Data\Big.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
OMICS International welcomes submissions that are original and technically so as to serve both the developing world and developed countries in the best.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
USJFCOM 27 Jul EXECUTIVE OVERVIEW Col David Brown, USAF JFIIT Commander UNCLASSIFIED Joint Fires Integration and Interoperability Team (JFIIT)
CAREER PATHWAYS THE NEW WAY OF DOING BUSINESS. Agenda for our Discussion Today we’ll discuss: Career Pathways Systems and Programs Where we’ve been and.
The Department of National Defence and the Canadian Armed Forces: An Introduction.
© PeopleAdvantage 2013 All Rights Reserved We will Show You How to Easily Conduct Effective Performance Appraisals LCSA Conference 2013.
Employment Considerations: Considerations at the Outset of Combat
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
UNCLASSIFIED GENERAL STAFF OF THE BULGARIAN ARMED FORCES BULGARIAN ARMED FORCES IN TRANSFORMATION SOFIA October, 2004 Lieutenant General Atanas ZAPRIANOV.
GORT Planning/Guidance Session with LTG Barclay
MANAGEMENT DEVELOPMENT TALENT MANAGEMENT. What is Talent Management?  It is a process of managing aptitude, abilities & skills of a person or an employee.
Business Briefing Security Service Providers
Principles of Good Governance
Title: Civilian Force Development Speaker: Vince Lewis
Megacities: Rebuilding A Roadmap for Sustained Collaboration, Learning, and Training Kevin M. Felix COL(R), US Army.
Crisis management related research at
Making Strategy.
SNOMED CT Education SIG: Strategic Plan Review
Mentoring and Coaching for an Enduring Primary Career
Name of the idea Description and Military Application Maturity
OF2 Emanuele BARBIERI – ITA par. Carabinieri
NHN member organizations
Name of the idea Description and Military Application Maturity
Cyber Security coordination in Europe CERT-EU’s perspective
Fires Conceptual Framework Supporting Multi-Domain Battle
Multi-Domain Battle: Achieving Cross-Domain Synergy
Strong. Secure. Engaged: Canada’s New Defence Policy
Chief, ARSTAF Cyberspace Task Force
Bush/Rumsfeld Defense Priorities/Objectives A Mandate For Change
Public Health Department Fakultas Kedokteran Universitas Padjadjaran
Continuity Guidance Circular Webinar
IS-700.A: National Incident Management System, An Introduction
Defence Procurement in Finland
Introduction to: National Response Plan (NRP)
Joint Program Executive Office for Chemical and Biological Defense
Prevention, Intelligence
Talent Management Attract, Retain and Develop Talent
Defence Strategic Support Management
Presentation transcript:

Cyber Operations in the Canadian Armed Forces Master Warrant Officer Alex Arndt Canadian Forces Network Operations Centre

Agenda Problem Space Definition of Cyber Warfare Key Terminology Defence Policy Review: Overview of Cyber-related Initiatives Realities versus Expectations Challenges Cyber Operator Occupation

MWO Alex Arndt MOSID 00378 – Cyber Operator 27 years in the CAF Experience includes Infantry, SIGINT, EW and Cyber Graduate of the Army Technical Warrant Officer Programme Expertise in Capability Development, Project Management, Trials Management and Procurement Nearly 15 years of Cyber Operations experience Several Industry Certifications CISSP, SANS GCIA and GCIH, EC-Council ECIH

Problem Space Canada through its new Defence Policy, has announced its intention to develop active cyber capabilities Up until recently,Canada lacked dedicated Cyber Forces to conduct Cyber Operations Legal, Policy and Authority challenges required Legislative and Procedural review

Problem Space Clear direction and resource management required to ensure the appropriate personnel and budget are available Expectations need to be managed

Problem Space

Definition of Cyber Warfare “The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic military purposes.” Reference: NATO AJP-3.20

Key Terminology Cyber operational preparation of the Environment (Cyber OPE) Cyber activities conducted to prepare and enable cyber intelligence, surveillance, and reconnaissance in support of cyber operations. Reference: Joint Doctrine Note – Cyber Operations 8

Key Terminology Defensive cyber operation (DCO) A defensive operation conducted in or through cyberspace to detect, defeat and/or mitigate offensive and exploitive actions to maintain freedom of action. A DCO may include internal defensive measures and response actions. Reference: Joint Doctrine Note – Cyber Operations 9

Key Terminology Defensive cyber operation - Internal defensive measures (DCO-IDM) In DCOs, measures and activities conducted within one’s own cyberspace to ensure freedom of action. Reference: Joint Doctrine Note – Cyber Operations 10

Key Terminology Defensive cyber operation - response action (DCO-RA) In DCOs, measures and activities conducted in or through cyberspace, outside of one’s own cyberspace, against ongoing or imminent threats to preserve freedom of action. Reference: Joint Doctrine Note – Cyber Operations

Key Terminology Key Cyber Terrain Key terrain in the cyber context still needs to be defined. It is currently defined as “Any locality, or area, the seizure or retention of which affords a marked advantage to either combatant. Reference: Joint Doctrine Note – Cyber Operations

Key Terminology Support cyber operation (SCO) A network operation tasked by, or under direct control of, a commander to support offensive and defensive cyber operations. Reference: Joint Doctrine Note – Cyber Operations

Key Terminology Offensive cyber operation (OCO) An active operation intended to project power in or through cyberspace to achieve effects in support of military objectives. Reference: Joint Doctrine Note – Cyber Operations

Key Terminology – So what? Terminology is derived from Doctrine Provides the basis upon which Operational Planning Process is undertaken to define Cyber Operations and synchronize them with other Forces conducting Operations (e.g. coordinating DoS attack of adversary C2 network with the advance of ground forces into a given area)

Defence Policy Review – Cyber Related Initiatives The Canadian Government has laid out 7 initiatives that are related to Cyber in the new defence policy Strong, Secure, Engaged All initiatives provide the strategic direction necessary to realign resources and define, in broad terms, what is required to meet declared objectives

Defence Policy Review – Cyber Related Initiatives Represents the basis upon which future Doctrine, and Tactics, Training and Procedures (TTPs) for Cyber Operations will be developed

Defence Policy Review – Cyber Related Initiatives Improve cryptographic capabilities, information operations capabilities, and cyber capabilities to include: cyber security and situational awareness projects, cyber threat identification and response, and the development of military-specific information operations and offensive cyber operations capabilities able to target, exploit, influence, and attack in support of military operations. Reference: “Enhancing Defence Intelligence” in Strong, Secure, Engaged. Canada’s Defence Policy

Defence Policy Review – Cyber Related Initiatives Build CFINTCOM’s capacity to provide more advanced intelligence support to operations, including through an enhanced ability to forecast flashpoints and emerging threats, better support next generation platforms, and understand rapid developments in space, cyber, information and other emerging domains. Reference: “Enhancing Defence Intelligence” in Strong, Secure, Engaged. Canada’s Defence Policy 20

Defence Policy Review – Cyber Related Initiatives Assign Reserve Force units and formations new roles that provide full-time capability to the Canadian Armed Forces through part-time service, including: Light Urban Search and Rescue; Chemical, Biological, Radiological and Nuclear Defence; Combat capabilities such as direct fire, mortar and pioneer platoons; Cyber Operators; Intelligence Operators; Naval Security Teams; and Linguists. Reference: “A New Vision for the Reserve Force” in Strong, Secure, Engaged. Canada’s Defence Policy 21

Defence Policy Review – Cyber Related Initiatives Protect critical military networks and equipment from cyber attack by establishing a new Cyber Mission Assurance Program that will incorporate cyber security requirements into the procurement process. Reference: “Cyber Capabilities” in Strong, Secure, Engaged. Canada’s Defence Policy 22

Defence Policy Review – Cyber Related Initiatives Develop active cyber capabilities and employ them against potential adversaries in support of government-authorized military missions. Reference: “Cyber Capabilities” in Strong, Secure, Engaged. Canada’s Defence Policy 23

Defence Policy Review – Cyber Related Initiatives Grow and enhance the cyber force by creating a new Canadian Armed Forces Cyber Operator occupation to attract Canada’s best and brightest talent and significantly increasing the number of military personnel dedicated to cyber functions. Reference: “Cyber Capabilities” in Strong, Secure, Engaged. Canada’s Defence Policy 24

Defence Policy Review – Cyber Related Initiatives Use Reservists with specialized skill-sets to fill elements of the Canadian Armed Forces cyber force. Reference: “Cyber Capabilities” in Strong, Secure, Engaged. Canada’s Defence Policy 25

Realities versus Expectations Active Cyber Capabilities In Strong, Secure, Engaged, it states that the CAF will assume a more assertive posture in the cyber domain by hardening our defences, and by conducting active cyber operations… - Rules of Engagement will need to be clarified - Investments will be required to explore and develop appropriate capabilities

Realities versus Expectations Availability of Cyber Operators Recruiting will take place in a ‘competitive environment’ to attract Canada’s best and brightest talent Significant training will be required to develop specialists in this domain It will be challenging to meet all current and future demands.

Challenges National and International Laws Cyber operations will be subject to all applicable domestic law, international law with proven checks and balances.

Challenges National Security Policy and Legislation They are constantly being reviewed to ensure that the CAF have the appropriate framework to conduct its operations as mandated by the Government.

Challenges Recruitment, Training and Retention The Canadian Government and CAF recognize that the pool of talent is shared with Industry Salary considerations are only a small part of the problem

Cyber Operator Occupation Authorized in 2016 Created on 31 January 2017 First round of Regular Force selection occurred in summer 2017 First Regular Force Cyber Operators selected and converted in October 2017

Cyber Operator Occupation Second round of Cyber Operator selection for Reg F and Reserves is currently underway; completion expected in Feb 2018 Direct Entry with CAF-endorsed programs by Summer 2018. Direct Entry with minimum entry standards by Summer 2019. Minimum entry standards to be promulgated by Jan 2018 Opportunity for Reservists with unique set of skills and knowledge to be part of the CAF Cyber Force either as Cyber Operators or in other capacities

Cyber Operator Occupation Primary Reserve The Primary Reserve provides an opportunity for the CAF to identify and harness Cyber talents Information Systems Security Professionals working in the Private or Public Sector across the country have an opportunity to support the Canadian Armed Forces (CAF) Cyber Force through part-time employment

Cyber Operator Occupation Primary Reserve Please contact your local Recruiting Centre to get information about the Regular Force and Reserve Force opportunities in the new Cyber Operator (MOSID 00378) occupation Rewrote Slide 34. Comment: It is not that the CAF don’t have these skills sets but more a function of augmenting and contribution to the overall CAF

Questions?