CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.

Slides:



Advertisements
Similar presentations
Air Force Doctrine Document 2-5.1: Electronic Warfare
Advertisements

Air Force Core Functions
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Future Command and Control The Interoperability Imperative 29 Oct 07 Maj Gen Bill Rajczak USJFCOM J8A.
Navy’s Operational Authority for Naval Networks, Information Operations, and FORCEnet 2004 Strike, Land Attack & Air Defense Annual Symposium Vice Admiral.
Sensors and location technologies – the front end of ISR
Department of The Air Force. To fly, flight, and win in Air, Space, and CyberspaceMission.
Defense Daily Open Architecture Summit EMS Panel
Introduction to Information Operations Attaché Corps- SEP 09
United States Air Force: Air Doctrine – Air and Space Superiority Objective: Comprehend how the United States Air Force is structured in terms of missions.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Brian Connett, LCDR, USN US NAVAL ACADEMY
The U.S. Coast Guard’s Role in Cybersecurity
This Briefing is:UNCLASSIFIED Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e 3-Jan-071 Air Force Cyber Operations.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
COMPLEXITY AND CYBER DEFENSE TTI/VANGUARD TAMING COMPLEXITY October 5, 2011 Michael A. Wertheimer, DoD.
South Carolina Cyber.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
I n t e g r i t y - S e r v i c e - E x c e l l e n c e 1 Supporting Expeditionary Aerospace Force (EAF) Getting lighter, leaner, and more responsive Col.
Global Integrated ISR in the Information Age
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
ADP 1 The Army.
CYBER CRIME AND SECURITY TRENDS
The Department of the Navy
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Cyber crime & Security Prepared by : Rughani Zarana.
Overview Understand the evolution and change to American aviation strategy between Vietnam and Operation Desert Storm Know how military aviation and national.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force 1 Lt Gen Bill Lord, SAF/CIO A6 Chief of Warfighting Integration and.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Warfare Playgrounds to Battlegrounds.
Force Packaging. Overview Principles of War Process of Force Packaging Developing Packages.
“Collaborating On Cyberspace in San Diego” CAPT Mark Kohlheim, Commanding Officer 06 OCT 09 Information.. a weapon and a target! Distribution A: Approved.
0 Peter F. Verga U.S. Department of Defense 2 Definitions Homeland Security – A concerted national effort to prevent terrorist attacks within the United.
Air Force Doctrine Document 2-5.4: Public Affairs Operations.
FLTC Perspective Focused Long Term Challenges (FLTCs) are an innovative approach to match user requirements with relevant technology development, while.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
1. 2 USAF CONOPS & AIR AND SPACE POWER REVIEW Chap 23 & 24.
Air Force Strategy to Resources
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force Strategic Challenges of Defense Planning Presentation to the Association.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
United States Air Force: Air Doctrine – Provide Global Capability
WELCOME CyberSecurity and Global Affairs Workshop Enhancing Situational Awareness Through Cyber Intelligence Henry Horton, CISM Partner, CyberSecurity.
Topic 5: Basic Security.
Headquarters U.S. Air Force Fly – Fight – Win APEX Orientation Arthur J. Lichte Assistant Vice Chief of Staff.
Information Warfare Playgrounds to Battlegrounds.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
UNCLASSIFIED 2/6/2016 7:56:41 PM UNCLASSIFIED Page 1 of 7 Pages Space Policy Issues - Space Warfare Definitions - 15 June, 2010.
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
This Briefing is Unclassified Space Situation Awareness (SSA) for the Warfighter 25 August 2005 HQ AFSPC/DRC Lt Col Troy Pannebecker.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
TRADITIONAL OFFICER VACANCY ANNOUNCEMENT NEW YORK AIR NATIONAL GUARD 174th ATTACK WING 6001 EAST MOLLOY ROAD SYRACUSE, NY ANNOUNCEMENT#: FY.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Air Force Operations.
“Existing world order is being redefined.” Henry Kissinger Jan 2015
AF NL Force Integration
Fires Conceptual Framework Supporting Multi-Domain Battle
Multi-Domain Battle: Achieving Cross-Domain Synergy
Air Force Operations.
Air Force Cyber Operations Command Mission: Warfighting
DISN Evolution Mr. Charles Osborn
Space as a Warfighting Domain
California Cadet Corps Curriculum on Military Knowledge
Presentation transcript:

CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace

Right Now… Cyber Attack

Right Now… Cyber Theft

Right Now… Cyber Defense

Right Now… Cyber Offense

Right Now… Cyber Espionage

The Battle for Information Superiority is being fought in Cyberspace… Right Now! Right Now…

Cyberspace Defined The Air Force Cyber Mission Cyberspace Superiority The Airman’s Perspective Threats and Vulnerabilities Roles and Responsibilities of all Cyber Wingmen Guided DiscussionOverview

National Security Presidential Directive 54 “the interdependent network of information technology infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries.” Cyberspace Defined

Department of Defense “A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.” Cyberspace Defined

Cyberspace Defined (global domain)

Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.

Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.

Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.

Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.

Cyberspace – Land – Air – Sea - Space

SPACECYBERSPACE AIR …but how do we accomplish that cyberspace part? The Air Force Mission

AF Cyber Mission 24 AF Mission “…to extend, operate and defend the Air Force portion of the Department of Defense network while providing the full spectrum of cyber capabilities for the joint war fighter”

Cyberspace Superiority Global Integrated ISR Personnel Recovery Nuclear Deterrence Operations Command and Control Global Precision Attack Building Partnerships Special Operations Air Superiority Rapid Global Mobility Agile Combat Support Space Superiority Cyberspace Superiority Global Integrated ISR Personnel Recovery Nuclear Deterrence Operations Command and Control Global Precision Attack Building Partnerships Special Operations Air Superiority Rapid Global Mobility Agile Combat Support Cyberspace Superiority Space Superiority Air Force Core Functions

Space Superiority Air Superiority Cyberspace Superiority Air Force Core Functions

The operational advantage in, through, and from cyberspace to conduct operations at a given time and in a given domain without prohibitive interference Cyber Superiority

Mission assurance = operational success AF Cyber Mission

Mission Assurance Example Range = 0.5 mile

Mission Assurance ? ? ? ? ?

Airman’s Perspective Airmen think of airpower & the application of force from a functional rather than geographical perspective. Airmen leverage speed, range, flexibility, precision, time, and lethality to create effects from and within all domains. Cyberspace operations are intrinsic to the conduct of modern airpower. Airmen conduct greatest percentage of global operations. Operations should be tightly integrated with capabilities of the air and space domains and should be commanded by an Airman who takes a broader view of war

Airman’s Perspective and Threats

Threats and Vulnerabilities Threat = Capability + Intent

Military Critical Technology Annual Report to Congress Countries Targeting The U.S. Number Reported Incidents FY10 FY 09 FY08 FY 2010 FY 2009 Information Systems Sensors & Lasers Electronics Armaments/ Energetic Material Aeronautics Marine Systems Guidance / Navigation Technologies Space Systems Technologies

Threat = Capability + IntentThreats

Vulnerability = Weakness Operating Systems Poor Practices Applications OperatorVulnerabilities

Did You Know… Social NetworkingSPAM USB ThumbdrivesCell Phones Wireless DevicesDiscussion

Nuclear Weapons Facility Locating Cyber Weapons

Where’s the Cyber Threat? Locating Cyber Weapons

What do you think you can do to prevent adverse impacts on DOD and AF networks? Where You Fit Into the Fight

Become a cyber defender. Don’t open attachments or click on links unless the is digitally signed. Don’t connect any hardware or download any software, applications, music or information onto our network without approval. Encrypting sensitive but unclassified and/or mission critical information. Have a general understanding of the cyberspace domain as well as basic threats, vulnerabilities, and common countermeasures that any Airman can employ. Where You Fit Into the Fight

1.The United States is vulnerable to cyberspace attacks by relentless adversaries attempting to infiltrate our networks at work and at home – millions of times a day, 24/7. Ten Things a Cyber Wingman Should Know 2. Our enemies plant malicious code, worms, botnets, and hooks in common websites, software, and hardware such as thumb drives, printers, etc. 3. Once implanted, this code begins to distort, destroy, and manipulate information, or “phone” it home. Code allows our adversaries to obtain higher levels of credentials to access highly sensitive information. 4. The enemy attacks your computers at work and at home knowing you communicate with the Air Force network by , or transfer information from one system to another. 5. As cyber wingmen, you have a critical role in defending your networks, your information, your security, your teammates, and your country. 6. You significantly decrease our enemies’ access to our networks, critical USAF information and even your personal identity by taking simple action. 7. Don’t open attachments or click on links unless the is digitally signed or you can directly verify the source, even if it appears to be from someone you know. 8. Do not connect any hardware or download any software applications, music, or information onto our networks without approval. 9. Encrypt sensitive but unclassified and/or critical information. Ask your computer systems administrator (CSA) for more information. 10. Install the free Department of Defense anti-virus software on your home computer. Your CSA can provide you with your free copy.

Cyberspace Defined The Air Force Cyber Mission Cyberspace Superiority The Airman’s Perspective Threats and Vulnerabilities Roles and Responsibilities of all Cyber Wingmen Guided DiscussionSummary