CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace
Right Now… Cyber Attack
Right Now… Cyber Theft
Right Now… Cyber Defense
Right Now… Cyber Offense
Right Now… Cyber Espionage
The Battle for Information Superiority is being fought in Cyberspace… Right Now! Right Now…
Cyberspace Defined The Air Force Cyber Mission Cyberspace Superiority The Airman’s Perspective Threats and Vulnerabilities Roles and Responsibilities of all Cyber Wingmen Guided DiscussionOverview
National Security Presidential Directive 54 “the interdependent network of information technology infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries.” Cyberspace Defined
Department of Defense “A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.” Cyberspace Defined
Cyberspace Defined (global domain)
Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
Cyberspace Defined Cyberspace Domain A man-made, interconnected operational realm characterized by use of the electromagnetic spectrum to manipulate information.
Cyberspace – Land – Air – Sea - Space
SPACECYBERSPACE AIR …but how do we accomplish that cyberspace part? The Air Force Mission
AF Cyber Mission 24 AF Mission “…to extend, operate and defend the Air Force portion of the Department of Defense network while providing the full spectrum of cyber capabilities for the joint war fighter”
Cyberspace Superiority Global Integrated ISR Personnel Recovery Nuclear Deterrence Operations Command and Control Global Precision Attack Building Partnerships Special Operations Air Superiority Rapid Global Mobility Agile Combat Support Space Superiority Cyberspace Superiority Global Integrated ISR Personnel Recovery Nuclear Deterrence Operations Command and Control Global Precision Attack Building Partnerships Special Operations Air Superiority Rapid Global Mobility Agile Combat Support Cyberspace Superiority Space Superiority Air Force Core Functions
Space Superiority Air Superiority Cyberspace Superiority Air Force Core Functions
The operational advantage in, through, and from cyberspace to conduct operations at a given time and in a given domain without prohibitive interference Cyber Superiority
Mission assurance = operational success AF Cyber Mission
Mission Assurance Example Range = 0.5 mile
Mission Assurance ? ? ? ? ?
Airman’s Perspective Airmen think of airpower & the application of force from a functional rather than geographical perspective. Airmen leverage speed, range, flexibility, precision, time, and lethality to create effects from and within all domains. Cyberspace operations are intrinsic to the conduct of modern airpower. Airmen conduct greatest percentage of global operations. Operations should be tightly integrated with capabilities of the air and space domains and should be commanded by an Airman who takes a broader view of war
Airman’s Perspective and Threats
Threats and Vulnerabilities Threat = Capability + Intent
Military Critical Technology Annual Report to Congress Countries Targeting The U.S. Number Reported Incidents FY10 FY 09 FY08 FY 2010 FY 2009 Information Systems Sensors & Lasers Electronics Armaments/ Energetic Material Aeronautics Marine Systems Guidance / Navigation Technologies Space Systems Technologies
Threat = Capability + IntentThreats
Vulnerability = Weakness Operating Systems Poor Practices Applications OperatorVulnerabilities
Did You Know… Social NetworkingSPAM USB ThumbdrivesCell Phones Wireless DevicesDiscussion
Nuclear Weapons Facility Locating Cyber Weapons
Where’s the Cyber Threat? Locating Cyber Weapons
What do you think you can do to prevent adverse impacts on DOD and AF networks? Where You Fit Into the Fight
Become a cyber defender. Don’t open attachments or click on links unless the is digitally signed. Don’t connect any hardware or download any software, applications, music or information onto our network without approval. Encrypting sensitive but unclassified and/or mission critical information. Have a general understanding of the cyberspace domain as well as basic threats, vulnerabilities, and common countermeasures that any Airman can employ. Where You Fit Into the Fight
1.The United States is vulnerable to cyberspace attacks by relentless adversaries attempting to infiltrate our networks at work and at home – millions of times a day, 24/7. Ten Things a Cyber Wingman Should Know 2. Our enemies plant malicious code, worms, botnets, and hooks in common websites, software, and hardware such as thumb drives, printers, etc. 3. Once implanted, this code begins to distort, destroy, and manipulate information, or “phone” it home. Code allows our adversaries to obtain higher levels of credentials to access highly sensitive information. 4. The enemy attacks your computers at work and at home knowing you communicate with the Air Force network by , or transfer information from one system to another. 5. As cyber wingmen, you have a critical role in defending your networks, your information, your security, your teammates, and your country. 6. You significantly decrease our enemies’ access to our networks, critical USAF information and even your personal identity by taking simple action. 7. Don’t open attachments or click on links unless the is digitally signed or you can directly verify the source, even if it appears to be from someone you know. 8. Do not connect any hardware or download any software applications, music, or information onto our networks without approval. 9. Encrypt sensitive but unclassified and/or critical information. Ask your computer systems administrator (CSA) for more information. 10. Install the free Department of Defense anti-virus software on your home computer. Your CSA can provide you with your free copy.
Cyberspace Defined The Air Force Cyber Mission Cyberspace Superiority The Airman’s Perspective Threats and Vulnerabilities Roles and Responsibilities of all Cyber Wingmen Guided DiscussionSummary