Defense Environmental Data Control Environmental Monitoring OFCM Strategy for Providing Atmospheric Information Workshop December 3-5, 2001 Defense Environmental.

Slides:



Advertisements
Similar presentations
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Advertisements

Political Science, Unit 7. TAXING & SPENDING HOW DOES THE GOVERNMENT RAISE MONEY? 1) TAXES a. Progressive Individual Income Tax b. Corporate Income Tax.
Joint Contingency Contracting
To What Extent Should We Embrace Internationalism?
Introduction to Information Operations Attaché Corps- SEP 09
Space Power Delivering Space & Missile capabilities to America and its warfighting commands.
Applications in Acquisition Changing Defense Environment.
MCIEAST-MCB CAMP LEJEUNE REGIONAL EMERGENCY MANAGEMENT
The American Military Experience The Principles of War Wayne E. Sirmon, M.A.Ed., M.A. Military Science & History Departments University of South Alabama.
1 American Society of Military Comptrollers Theodore J. Williams Air Force Auditor General 3 June 2010 Auditing: It’s Not Just About the Dollars.
Systems Engineering in a System of Systems Context
Department of Defense Legacy Resource Management Program Project Commander’s Guide To Archaeological Curation - Presentation US Army Corps of Engineers,
Chief Information Officer Group
1 COPC Shared-Network Infrastructure Brief Prepared for: COPC Working Group for Cooperative Support and Backup (WG/CSAB) October 21 and 22, 2008 Meetings.
2011 ADC WINTER FORUM | PAGE 2 Cross-Boundary Partnerships The Next Generation of the Readiness and Environmental Protection Initiative (REPI) and Sustainable.
NATURE OF WAR Major Carlos Rascon.
Department of the Army. Overview Role of the Army Organization of the Army The Army Modular Force.
U.S. PERSPECTIVES ON SPACE SECURITY* Joan Johnson-Freese Naval War College Newport, RI April 23, 2007 * The views expressed in this article are the author’s.
HOLT, RINEHART AND WINSTON A MERICAN GOVERNMENT HOLT 1 Foreign Policy and National Security Section 1:Goals and Principles of U.S. Foreign Policy Section.
Making Strategy.
Army Doctrine Publication (ADP) 3-37; and Army
Naval Organization Chapter 6 BMR
China and space security National Defense University, PLA, China National Defense University, PLA, China Zhong Jing.
U.S. Space-Based Positioning, Navigation, and Timing Policy and Program Update The Third Annual European Defence Geospatial Intelligence Conference (DGI.
Evolution of US National Security Strategy. US Strategies National Security Strategy (Pres) National Security Strategy National Defense Strategy (SecDef)
IF I WERE PRESIDENT SIMULATION Background and National Interests.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Air Force Weather Agency DoD TRANFORMATION: NET-CENTRIC OPERATIONS & WARFARE Mr. Michael Howland.
Stepped Up ERM Teresa McKay Director, Defense Finance and Accounting Service ASMC Washington Chapter September 17, 2008.
Maj Richard “Krash” Krasner Directorate of Requirements Headquarters Air Force Space Command Air Force Space Command's Environmental Monitoring Requirements.
Foreign Policy and National Defense Chapter 17 Notes
Air Force Doctrine Document 2-5.4: Public Affairs Operations.
Anticipate - Exploit The Weather Headquarters U.S. Air Force Strategy for Providing Atmospheric Information: Air Force Perspective 3 Dec 01 Brigadier General.
Joint Training Challenges of Irregular Warfare/COIN and Full Spectrum Training Requirements Brief for WJTSC LtCol John Merna, J7/9-TJ 23 September.
Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.
1. 2 USAF CONOPS & AIR AND SPACE POWER REVIEW Chap 23 & 24.
Defense Information Systems Agency A Combat Support Agency E3 Engineering Division 13 December 2011 Defense Information Systems Agency A Combat Support.
UNCLASSIFIED A Chief Information Officer’s Perspective on Service-Oriented Architecture Presented to Service-Oriented Architectures for E-Government Conference.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
Defense Communication Strategy & Communication Infrastructure Hilmi Sanusi Institut Sains Angkasa Universiti Kebangsaan Malaysia.
The President stands as the single strong leader of the executive branch Americans have looked to the President for leadership on complex issues As commander.
UNCLASSIFIED//FOR OFFICIAL USE ONLY National Reconnaissance Office Overview UNCLASSIFIED//FOR OFFICIAL USE ONLY.
GRAND STRATEGY. WHAT IS GRAND STRATEGY? This is the choices a government makes to apply economic, military, diplomatic, and other resources to preserve.
NOAA Plenary Agenda Item th CEOS Plenary Kyoto International Conference Center Kyoto, Japan 5 – 6 November 2015 NOAA Satellite and Information Service.
Joint Concept Development and Experimentation (JCD&E)
Copyright, 2000 © Prentice Hall Magruder’s American Government C H A P T E R 17 Foreign Policy and National Defense.
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
1 James Claxton December 15, 2006 This briefing is classified UNCLASSIFIED DIA Declassification Program Overview.
NESDIS Activities for Homeland Security Jane D’Aguanno Presentation for COPC November 28, 2001.
Take Charge of a Platoon PURPOSE Lead the platoon with a clear understanding of your duties,your superior’s expectations, an assessment of the current.
Copyright © 2014 Cengage Learning FOREIGN POLICY AND NATIONAL SECURITY Chapter Seventeen.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Overview of Network Security. Network Security2 New Challenges 1.Security does not focus on a “product” only; it is a process and focuses on the whole.
 The benefits of interior lines could be gained either by central position or superior lateral communications.
This Briefing is Unclassified Space Situation Awareness (SSA) for the Warfighter 25 August 2005 HQ AFSPC/DRC Lt Col Troy Pannebecker.
Unclassified MG. L. HOXHA Skopje, 21 st of June 2005 REPUBLIC OF ALBANIA MINISTRY OF DEFENCE GENERAL STAFF OF THE ARMED FORCES.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
UNCLASSIFIED The overall classification of this briefing is UNCLASSIFIED Mr. Jeff Andrews J4 Logistics Operations & Engineering 05 July 2016 USAFRICOM.
What are the consequences of SES for the Air Force
International Security and Peace
“Existing world order is being redefined.” Henry Kissinger Jan 2015
Making Strategy.
“Exploring New Solutions” The Joint Non-Lethal Weapons Program
EOC Review Policies.
DISN Evolution Mr. Charles Osborn
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Foreign Policy and National Defense Chapter 17 Notes
NPHS 1510 Federal and International
Presentation transcript:

Defense Environmental Data Control Environmental Monitoring OFCM Strategy for Providing Atmospheric Information Workshop December 3-5, 2001 Defense Environmental Data Control Col Michael Jamilkowski, Military Asst. for Environmental Monitoring Office of the Asst Secretary of Defense for Command, Control, Communications & Intelligence

Defense Environmental Data Control Environmental Monitoring 12/3/01UNCLASSIFIED2 Background/Basic Principles Age-Old Dilemma History/Evolution Law/Policy/Directives Since September 11, Summary and Way Ahead OVERVIEW

Defense Environmental Data Control Environmental Monitoring 12/3/01UNCLASSIFIED3 BACKGROUND/BASIC PRINCIPLES Basic/Historical National Security Principles: – During times of war or other contingencies, National Security intelligence information must be: -- Denied - Protected - Controlled – Intelligence Information control allows for: -- Information Superiority & Battlefield Dominance – Intelligence Information Includes Environmental Data – US/Allied Warfighter’s must have Environmental Intelligence (data) to gain advantage over adversaries Spectrum of Data Control: Complete DenialLimited DenialFree Access

Defense Environmental Data Control Environmental Monitoring 12/3/01UNCLASSIFIED4 Secure Info. Vs. Warfighter Access – How secure to make Information before Warfighter: – Access is effected? – Looses information advantage? – Utility is rendered ineffective? Solutions – More secure communications options – More secure bandwidth – State-of-the-Art communications timeliness – Encryption technology breakthroughs – Avoid over-classification of data/products AGE-OLD MILITARY DILEMMA

Defense Environmental Data Control Environmental Monitoring 12/3/01UNCLASSIFIED5 HISTORY/EVOLUTION Historically, many examples of environmental data control and denial exist Over the last 60 years some examples are: – World War II D-Day Invasion, Allied Theatre-wide Weather Data & Forecasts tightly controlled – Falklands War, Argentina denied Environmental Satellite Data – Persian Gulf War, Iraq denied all US/Allied environmental & some commercial regional data – Operations Noble Eagle/Enduring Freedom, Normal control of US/Allied environmental & some regional commercial data Illustrates tendency towards regional/selective control/denial

Defense Environmental Data Control Environmental Monitoring 12/3/01UNCLASSIFIED ACCESSACCESS Evolution of Access to DoD Polar-orbiting MetSat Data Early DMSP Shared DMSP 3-Hour DMSP 72-Hour DMSP Open* NPOESS HISTORY/EVOLUTION

Defense Environmental Data Control Environmental Monitoring 12/3/01UNCLASSIFIED7 LAW/POLICY/DIRECTIVES Public Law... DoD & NATO Procedures… DMSP Security Guide... PDD/NSTC-2, May 1994, NPOESS… DoD Space Policy, DoD Instructions... US Shutter Control Policy… Etc...

Defense Environmental Data Control Environmental Monitoring 12/3/01UNCLASSIFIED8 SINCE SEPTEMBER 11, Since 9/11/01 the U.S. Government has been preparing for and engaging in a long-term "war on terrorism” – May involve covert and counter-insurgent military operations in various parts of the world. Implication: Flexible "data denial" may be necessary – Accommodate periodic site-specific data denials – Associated with asymmetric war – Especially, w.r.t. International agreements

Defense Environmental Data Control Environmental Monitoring 12/3/01UNCLASSIFIED9 SUMMARY & WAY AHEAD Data Denial for National Security purposes still necessary – Perhaps more so since September 11th DoD will continue to maintain options for Data Denial – While striving to ensure data access to US/Allied forces Long-Term US Environmental Data Control evolving to: – Overall Greater Availability, esp. during peacetime – Selective Denial for limited/regional contingencies