Cyber Support to CJOC / CAF Operations Brief to AFCEA 3 March 2015

Slides:



Advertisements
Similar presentations
ENTITIES FOR A UN SYSTEM EVALUATION FRAMEWORK 17th MEETING OF SENIOR FELLOWSHIP OFFICERS OF THE UNITED NATIONS SYSTEM AND HOST COUNTRY AGENCIES BY DAVIDE.
Advertisements

CDCs 21 Goals. CDC Strategic Imperatives 1. Health impact focus: Align CDCs people, strategies, goals, investments & performance to maximize our impact.
Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
Navy Mission Essential Task Lists (NMETLs) and METOC MEASURES
UN UNCLASSIFIED 1 DOD Participation Challenges in the National Exercise Program Issue : DOD Participation Challenges in the National Exercise Program.
Institutional Insurance: Creating a Comprehensive Campus-wide IT Security Risk Management Program Brian Davis IT Security & Policy Office of Information.
FP7 Preparations ISTC meeting 31 March Content FP7 preparation approach and timetable Context for FP7 and for ICT in FP7 Research in New Financial.
INPO Update CMBG Meeting June 2013
Enterprise Security A Framework For Tomorrow Christopher P. Buse, CPA, CISA, CISSP Chief Information Security Officer State of Minnesota.
The U.S. Coast Guard’s Role in Cybersecurity
DHS, National Cyber Security Division Overview
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
The role of the NYSCB. a)to coordinate what is done by each person or body represented on the Board for the purposes of safeguarding and promoting the.
The topics addressed in this briefing include:
Army Doctrine Publication (ADP) 3-37; and Army
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
Commander’s Intent & Guidance
STRENGTHENING the AFRICA ENVIRONMENT INFORMATION NETWORK An AMCEN initiative A framework to support development planning processes and increase access.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Campaign Planning Process Step 3B – System Center of Gravity Analysis
9/11/ SUPPORT THE WARFIGHTER DoD CIO 1 Sample Template Community of Interest (COI) Steering Committee Kick-off Date: POC: V1.0.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
UNCLASSIFIED Joint and Coalition Warfighting Mr. John Vinett March 2012 Technical Baseline Capability.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Campaign Planning Process 29 March 2006 Step 7 – Prepare Operations Plan (OPLAN) / Operations Order (OPORD) & Assess UNCLASSIFIED.
Toolkit for Mainstreaming HIV and AIDS in the Education Sector Guidelines for Development Cooperation Agencies.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
© GEO Secretariat GEO Work Plan 2nd GEOSS Science and Technology Stakeholder Workshop "GEOSS: Supporting Science for the Millennium Development.
Homeland Security Grant Program 2015 Process Michelle Hanneken Illinois Emergency Management Agency.
The Community Welfare Pathway Roseanne Fearon Head Of Service, Adult Services Social Work Service.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
OVERALL CLASSIFICATION OF THIS BRIEFING IS UNCLASSIFIED United States Southern Command SOUTHCOM’s Role and Responsibilities in Foreign Humanitarian Assistance.
Chapter 13 The Incident Command System. Introduction Incidents come in all types and sizes As you become more skilled in size-up and applying strategic.
Chapter 3 Strategic Information Systems Planning.
Tracking national portfolios and assessing results Sub-regional Workshop for GEF Focal Points in West and Central Africa June 2008, Douala, Cameroon.
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
MPE – Enabling ALL to securely SEE, DECIDE, ACT MPE - Highlights  Establish Core Implementation Working Group  Build Joining, Membership, and Exiting.
Haiti Earthquake Earthquake in Haiti. Haiti Earthquake – After Action Review Search and rescue operations Overall safety and law enforcement Sustainment.
Defense Daily Cyber Summit
USACE Flood Risk Management and Silver Jackets Workshop Sandra K. Knight, PhD, PE, D.WRE Deputy Associate Administrator for Mitigation, FEMA August.
THE SECURITY SECTOR REVIEW PROCESS. ISSUES Understanding: -Scope: What are the elements of a SS Review? -Need: Why review the Security Sector? -Process:
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Campaign Planning Process 29 March 2006 Step 4E – Determine Prioritized Supporting Effects UNCLASSIFIED.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
This Briefing is Unclassified Space Situation Awareness (SSA) for the Warfighter 25 August 2005 HQ AFSPC/DRC Lt Col Troy Pannebecker.
JFCC Space and Global Strike Lt Col David Adler, USAF Special Assistant to the Commander 19 Oct 2005 UNCLASSIFIED This Briefing is UNCLASSIFIED Brief to.
A Framework for Evaluating Coalitions Engaged in Collaboration ADRC National Meeting October 2, 2008 Glenn M. Landers.
The Department of National Defence and the Canadian Armed Forces: An Introduction.
Center of Excellence PEACE OPERATIONS COMMAND & CONTROL AND COMMAND & CONTROL AND TRANSITION ISSUES Lt Col (R) John Derick Osman Center of Excellence in.
ILP model- Montenegro OSCE Annual Police Experts Meeting
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Steps in development of action plans ITC-ILO/ACTRAV Course A3 – Trade Union Training on Information Management for Trade Union Organization, Research.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
State Coordinator Intervention
Disaster and Emergency Planning
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Discussion of CRVS strategies
AUTL concept of Unit Ministry Team Religious Support Training Model
Mentor Expectations & Framework
The MDMP Process MDMP Inputs MDMP Outputs Step 1 MDMP Inputs Step 5
2017 Health care Preparedness and Response Draft Capabilities
Joint Staff J8, Deputy Director for C4
Mission Command Conference 2013
In Young Suh Division of Nuclear Security
Operations Security (OPSEC)
Cybersecurity ATD technical
Prevention, Intelligence
Presentation transcript:

Cyber Support to CJOC / CAF Operations Brief to AFCEA 3 March 2015 LCol Nick Torrington-Smith Team Lead Joint Cyber Operations Team

CAF Cyber Operations Cyber Operations: The application of coordinated cyber capabilities to achieve an objective A clear objective: Defending our networks! This slide is intended to distinguish between what some may know as Cyber Support Operations – or Network operations, and that which I will refer to throughout the presentation as Cyber Operations. Cyber Operations is not network provisioning. It is also not, security and protection. Cyber operations is a deliberate action taken against an adversary. I will elaborate a little on this distinction on the next slide.

Security vs Defence Security is primarily concerned with protection from attacks that may occur proactive and sets conditions for Defence practices, policies, and guidelines that describe ideal operating conditions for a network may additionally prescribe technical controls to enforce these conditions Defence is the deliberate response to an attack that has occurred or is ongoing exists to address a Security condition that has been overcome aim is to return to the operating condition prescribed by Security Defence takes over where Security has been overcome! Across the cyber domain, our actions involve aspects of both security and defence. DND/CAF is responsible under the Financial Administration Act (FAA) to secure its own networks. In close collaboration with other Government Agencies and Departments such as Public Safety and Shared Services Canada, DND/CAF works to ensure its networks are both protected and defended. Cyber Security includes practices, policies, procedural controls, and guidelines that describe the necessary operating conditions for the cyber domain. It also includes the organizing, delivering, and maintaining of secure network architectures; monitoring the health of our networks; and investigating and addressing security infractions. The overall aim of the security effort is to safeguard system availability, integrity, authentication, confidentiality, and mission assurance of DND/CAF networks. Security is primarily concerned with protection from incidents that may occur. Security sets the conditions for operational command and control using Information Technology Systems (ITS). Where security establishes the necessary conditions for mission success, defence is a deliberate activity undertaken to counter a threat or attack by an adversary(ies). The aim of cyber defence is therefore to stop an adversary’s action and return our ITS to a secure operating condition. Our defensive activity can also occur as a precursor to an attack on our command and control systems. In other words, defence is the action of our Forces leading to, during and after an attack to prevent or restore the reliability and availability of the system. This implies that cyber operational effects require a capability for proactive actions if we are to support effectively CAF operational objectives. Security and defense complement one another in the Cyber domain. However, each are different in function, time sensitivity, and response, and each require degrees of specialization. Despite different orientations, both share a common objective, and must synchronize their actions in execution to assure DND/CAF operational and enterprise requirements.

Where does the JCOT fit in?

JCOT C2 Relationships CJOC COS Ops CFIOG D Cyber FD BGen Brennan Col Moritsugu D Cyber FD Col Sabourin Operationally responsive To Comd CJOC OPCON Administrative support JCOT work informs FD efforts Works across all functional areas (CJOC Cyber Champion) Champion for CFIOG mission set within CJOC Positions belong to DG Cyber JCOT Team Lead LCol Torrington-Smith As an evolving organization, the JCOT reporting relationships are still convoluted. The JCOT is OPCON to CFIOG and receives their administrative support and over-arching task lists from the Comd CFIOG. As CFIOG currently owns all the cyber capabilities within the CAF, this relationship is logical. The JCOT also has a dotted line relationship back to DG Cyber and the Force Development activities being conducted within D Cyber FD. This “learn by doing” approach will enable the JCOT to inform the force development of CAF cyber capabilities by providing concrete examples of what does and does not work within the CAF operational context. However, the main focus of the JCOT will be to support the Commander CJOC by supporting CAF operations. By integrating with CJOC staff across all functional areas, the JCOT will be able to provide cyber input into the planning and support of CAF operations worldwide. Because of the cross domain nature of cyber, the JCOT reports through the Chief of Staff Operations in the current CJOC HQ structure. We have very strong connections with the J2, J3, J5 and J6 staff. JCOT Deputy Team Lead Maj Caron JCOT Plans Maj Deschenes JCOT Operations Capt Amberley CSD CJOC SIGINT Analysts Team JCOT Int PO1 Spenst

Cyber Planning In coordination with key functional staffs, participate in various planning groups to provide cyber inputs into the Operational Planning Process within the CJOC Ensure CAF cyber capabilities are represented in the mission planning process Assist in identifying current and future cyber capability gaps in support of CAF operations Provide situational awareness on EW, SIGINT and CNO developments and impacts on CAF operations and CJOC priorities Within the planning cycle, the JCOT Plans officer can help bring cyber knowledge to CJOC planning staffs (J2, J3, J5, J6, J7, J9…). With this input, the planning staffs can gain a better understanding of the CAF cyber capabilities that are available to support a CAF mission, and know the right questions to ask. Additionally, during the planning cycle, specific capabilities may be requested that are not yet available. This will assist the force development teams to help steer capital projects and capability development areas to address shortfalls and provide the cyber capabilities requested by the force employer for future operations. The JCOT will also maintain situational awareness on the developments within the cyber realm both within the CAF and by our Allies and partners. This will allow the JCOT to advise on any impacts (beneficial and detrimental) to CAF operations as a result of these developments.

OP LADON Mission CDS Intent. DND/CAF will develop a comprehensive operational framework for the conduct of DCO to maintain DND/CAF freedom of manoeuvre in the cyber domain. CDS Intent. My intent is to maintain freedom of manoeuvre across all domains including the cyber domain. This will be achieved by operationalizing the conduct of DCO to defend , on a continuous basis, DND/CAF CIS, data, and associated infrastructure critical to the deployment, conduct and sustainment of DND/CAF missions, and to the command and control of military forces at home and abroad. Words are taken from the CDS Initiating Directive – signed 2 Feb 2015. This is a deliberate planning effort to attempt to fix the convoluted way DND/CAF performs network defence now. Authorities, Responsibilities and Accountabilities are spread among a number of different organizations with no clear focus, and a perceived lack of operational priority. CJOC will lead the deliberate planning effort to operationalize cyber defensive operations through a framework of a standing named operation – OP LADON.

OP LADON MA brief to Comd CJOC: 9 Mar 2015 COA development: Feb – Apr 2015.  Decision brief to Comd CJOC early May 2015 BB to CDS NLT end May 2015 (implies prior socialization with other L1 stakeholders by this date) Plan development Jun – Jul 2015. Approval of plan by Comd CJOC NLT Sept 2015 Execution order signed by CDS NLT Nov 2015. Although the CDS Initiating Directive was only recently signed, work has been ongoing since September 2014. In the CAF Operational Planning Process, the first two stages (Initiation and Orientation) are complete and will conclude with a mission analysis briefing to the Comd CJOC in the coming weeks. The development of courses of action has now commenced with an anticipated decision brief for the Comd to decide on the course of action he would like to pursue in early May 2015. This will be followed up in depth plan development, with a proposed date for the CDS to sign an execution order by the end of the calendar year. Coupled with this effort is the Cyber Force Development work ongoing to formalize a cyber command and control structure for the DND/CAF. These two efforts are independent, but complimentary. Where OP LADON will likely use a cyber component commander construct for assigning cyber defensive tasks, who that component commander is, or which organization they belong to is the work Cyber FD will complete with their C2 analysis. In Greek mythology, LADON was the serpent-like dragon that twined and twisted around the tree in the Garden of the Hesperides and guarded the golden apples.

Cyber Operations Maintain awareness of developments in current CAF operations that have a cyber nexus or which could be better supported by existing cyber capabilities, and inform and advise appropriate CJOC staff and external agencies as appropriate Provide cyber situational awareness to Comd CJOC and key staff Evaluate lessons learned from CAF operations which have a cyber relevance to ensure capability development efforts are initiated as appropriate Cyber capabilities are constantly changing. By maintaining a knowledge base about what is in the realm of the possible, the JCOT operations officer can advise key CJOC staff on how Cyber capabilities can assist in CAF operations. Conversely, any changes in CAF operations can then be fed back to supporting agencies to ensure they are better aligned to assist in providing cyber capabilities should the need arise. Providing the Comd CJOC with Cyber situational awareness is becoming more important as reliance on Cyber capabilities across CAF operations continues to grow. As the DND representative on the Assistant Deputy Minister Emergency Management Committee (ADM EMC) – typically represented by the D Comd Continental – any Cyber incident affecting the Government of Canada will need visibility at the highest levels of command within the CJOC. The primary responsibility to provide this SA rests with the JCOT. Presently the JCOT briefs the Command team of CJOC on items of interest as they arise during the Commander’s Update Brief each morning. Additionally, periodic written updates are provided at higher classification levels to provide a snapshot of global cyber activity that is of interest to CJOC. Capturing lessons learned from CAF operations will be important to ensure that cyber capabilities are responding to the needs of the operators.

Cyber Intelligence Link into CFINTCOM intelligence capability supporting cyber operations from strategic to tactical Provide SA on adversarial cyber activities Coordinate cyber related CCIRs Propose cyber intelligence collection tasks to satisfy CJOC operational requirements (cyber IPB) Advise on potential cyber threat / risks for CAF operations With an intelligence analyst in the team, the JCOT can maintain a close linkage with J2 staffs and CFINTCOM to provide the all source intelligence needed to develop a robust cyber situational awareness products. Providing information on potential adversarial capabilities will also inform CJOC staff on potential risks and threats for CAF operations.

Intelligence Assessments The JCOT provides cyber specific threat assessments to assist with current operational planning. This map is a snapshot in time illustrating areas where the JCOT intelligence assessments have been focused. It is not surprising that the coloured countries have a direct correlation to areas where CAF operations are currently being conducted. Complete In progress Contribution to other products

Summary - Current Activities Operations CJOC CUB – Situational Awareness Products OP CHAMPION (Improved defensive posture) Support to Allies / Collaborative efforts Intelligence Threat Assessments Support to planning Planning OP LADON – Deliberate planning effort for DCO Cyber inputs to CONPLANS / OPLANS / SOODOs Other support Cyber play in exercises and joint training events Other CJOC committees and boards

Questions / Discussion