APPROVED FOR PUBLIC RELEASE

Army Cyber Command/2nd ARMY Second to None! Fires & Targeting in Cyberspace LTC Jason M. Bender Chief of Fires 16 August 2012 “Transforming Cybersp...
0 downloads 0 Views 2MB Size
Army Cyber Command/2nd ARMY

Second to None!

Fires & Targeting in Cyberspace LTC Jason M. Bender Chief of Fires 16 August 2012

“Transforming Cyberspace While at War… Can’t Afford Not To!” Overall Classification of this Brief: UNCLASSIFIED/APPROVED FOR PUBLIC RELEASE

“Second to None!”

Army Cyber Command/2nd ARMY

Cyberspace Domain

CYBERSPACE: A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers (JP 1-02). Characteristics: • Manmade domain…ever changing • Physical, functional, cognitive, logical/virtual and social • Programming code and protocols define rules of the domain • Environment and TTPs evolve at speed of code • Constant presence – Phase 0 on-going • Unlimited, instantaneous (operational) reach

Success in this domain means being smarter, more creative, faster, and stealthier than your opponent “Second to None!”

Army Cyber Command/2nd ARMY

ARCYBER Mission

MISSION: ARCYBER/2nd Army plans, coordinates, integrates, synchronizes, directs, and conducts network operations and defense of all Army networks; when directed, conducts cyberspace operations in support of full spectrum operations to ensure U.S./Allied freedom of action in cyberspace, and to deny the same to our adversaries. • Serve as Cyber Proponent • Conduct Information Operations

Cyberspace Opns – The employment of cyber capabilities where the primary purpose is to achieve objectives in and through cyberspace.

Build + Operate + Defend + Exploit + Attack “Second to None!”

Army Cyber Command/2nd ARMY

Layers of Cyberspace

-TRADOC 525-7-8 “Second to None!”

Army Cyber Command/2nd ARMY

Operating Environment

• Despite being a man-made domain, Cyberspace Domain is operational and interdependent w/ traditional war fighting domains (air, land, sea, space).

• Can not treat cyberspace as distinct (unique) – it is part of the operating environment and needs to be accounted for during IPB/JIPOE. • Many times emerging threats in cyberspace are undetected – either not looking for them or don’t know what to look for.

• Operational variables (PMESII-PT) and mission variables all affected by cyberspace or vice-versa. • Requires early consideration of cyberspace by planners in terms of friendly and adversary avenues of approach as well as operational approaches in conjunction with land operations.

Part of the Operating Environment – Special but Not Unique “Second to None!”

Army Cyber Command/2nd ARMY

2007: Syria – Israel • September 2007 – Israeli Air Force attacks suspected nuclear facility under construction in Syria. • First large-scale example of convergence of cyber and electromagnetic means – believed that Israelis used EW to deliver a cyber attack capability to the Syrian radar which executed the code on receipt. • Prior to attack, Syrian IADS along ingress/egress routes paralyzed, allowing IAF planes to fly undetected by radar into Syria and attack the site unimpeded. • Overall result was disruption of Syrian IADS by cyber attack that enabled kinetic strike of nuclear site. “Second to None!”

2008: Georgia – Russia

Army Cyber Command/2nd ARMY •

August 2008 – Russian troops cross into South Ossetia w/ stated intent to defend their “Russian compatriots”.



Combined Arms assault was led (enabled) by a multi-faceted cyber attack against Georgian gov’t and military infrastructure and defacement of web sites



Distributed denial of service (DDoS) attacks combined with EW jamming disrupted and denied comms simultaneous to an integrated propaganda (MISO and MILDEC) campaign



Overall result can be considered a hybrid combined arms operation (air, land, cyber). “Second to None!”

Army Cyber Command/2nd ARMY

Cyber Support C2 Model COMBAT SUPPORT AGENCIES

DIA, NSA, NGA, etc.

COCOM / JTF JOC JFE

GLOBAL

JCC

THEATER NETOPS CTR

STRATCOM

DISA

CSE CYBERCOM ExCSE JOC

C/JFLCC

ExCSE

C/JFACC

ExCSE

C/JFMCC

ExCSE

C/JFSOC

ExCSE

ARCYBER

MARFOR CYBER

FLTCYBER

AFCYBER

XXX

CEM XX

SVC NOSC

CEM

SERVICES

X

CEM

CSE provides functional & technical expertise while providing reachback to USCYBERCOM and Service Cyber Components. ExCSE supports contingencies.

COCOM DIRECT SUPPORT OPCON CYBER EFFECTS REQUEST COORDINATION SUPPORTING

“Second to None!”

Army Cyber Command/2nd ARMY

JCC and CSE Tasks

COCOM/JTF Joint Cyber Center (JCC) • Serve as the CCDR’s staff component for cyber planning & oversight • Coordinate and synchronize cyberspace ops with other operations

• Communicate CCMD requirements to USCYBERCOM • Leverage theater cyberspace forces and CSE to obtain cyberspace effects • Provide Common Operational Picture • Plan network mission assurance and critical cyberspace infrastructure protection • With CCMD J2/JIOC, conduct cyber threat analysis Cyber Support Element (CSE) and Expeditionary CSE (during contingency) • Provide expertise, reachback, communicate requirements, keep CCMD informed • Conduct OCO, DCO, and DGO ISO maneuver unit objectives

Provide Cyber Support for Cyber Operations to Commanders “Second to None!”

Army Cyber Command/2nd ARMY

CYBER-ELECTROMAGNETIC ELEMENT RECOMMENDATION(S) 1 x O-6 Electronic Warfare Officer (EWO) 1 x O-5 EWO 1 x O-4 EWO 1 x CW-4 EW Warrant Officer (WO) 1 x E-9 EW NCO 2 x E-5/6/7 Current Operations 1 x O-4 Signal Officer 1 x O-4 Military Intelligence (MI) Officer

XXX

XX

1 x O-5 EWO 1 x CW-4 EWO 1 x E-8 EW NCO 2 x E-5/6/7 Current Operations 1 x O-4 Signal Officer 1 x O-4 MI Officer

Integrating Cells Current Operations

Future Operations

Operational Integration, Electronic Warfare (29 Series)

Mission Command

X

Plans

Fires

1 x O-3/4 EWO 1/2 x CW-2/3 EW WO 1 x E-7/8 EW NCO 1 x E-5/6 Current Operations 1 x O-3 Signal Officer 1 x O-3 MI Officer

II 1/2 x E-5/6/7 EW NCO

Maneuver

Cyber Warfare, Intelligence (35 Series)

Cyber NetOps (25 Series)

Intelligence

Doctrinal Composition of EW Element (EW Proponent) Discussion between EW/Cyber Proponents & MI/SIG CoEs Observed Current Operations Need Sustainment

Protection

“Second to None!”

Army Cyber Command/2nd ARMY

Cyber Planning Considerations (1 of 3)

• Cyberspace reaches across geographic and geopolitical boundaries, and is tightly integrated into the operation of critical infrastructures and the conduct of commerce, governance, and national security. • Cyberspace operations are interdependent with the physical domains (i.e., air, land, maritime, and space) electromagnetic spectrum, and should be integrated with other military operations. • Cyber fires can be used as a force multiplier or an enabler across the spectrum of operations. • Cyber fires must be included as early in the planning process as possible, including predeployment training and preparations.

“Second to None!”

Army Cyber Command/2nd ARMY

Cyber Planning Considerations (2 of 3)

Constants • Linked to Commander’s desired end-state and objectives — integrate cyber fires with Joint Fires Process • Target system analysis is essential (objectives-based vs. access-based) • Maximum flexibility and agility to keep up with the dynamic environment Considerations • Target system analysis / OPE dependent on assets and authorities • Target characterization and access — Open vs. Closed Networks • Rapid Capability Development — weaponeered before target list nomination • Deliberate vs. Dynamic targeting capability • Modeling, simulation, and BDA required Capabilities and effects are nearly instantaneous…. Cyber planning is resource and time intensive “Second to None!”

Army Cyber Command/2nd ARMY

Cyber Planning Considerations

• Effects can be described in terms of deceive, degrade, deny, destroy, and disrupt. • Determining a specific desired effect is the most important element in requesting cyber fires on a nominated target. • Planners and end users should focus on effects, not the offensive cyberspace operations means to create these effects.

• Effects should support one or more objectives and do not suggest ways or means.

(3 of 3) • DECEIVE. Mislead the enemy by manipulation, distortion, or falsification of evidence to induce the enemy to react in a manner prejudicial to the enemy's interests. • DEGRADE. Temporarily reduce the effectiveness or efficiency of adversary command and control systems and information collection efforts or means. • DENY. Hinder or prevent the enemy from using terrain, [cyber-]space, personnel, supplies, or facilities. • DESTROY. To damage a [computer] system so badly that it cannot perform any function or be restored to a usable condition without being entirely rebuilt. • DISRUPT. Break and/or interrupt the flow of information between specified or selected entities in cyberspace.

“Second to None!”

Army Cyber Command/2nd ARMY

Target Characteristics

• Targets in cyberspace still have physical, functional and cognitive characteristics (FM 3-60 / JP 3-60) • Have to also consider the logical characteristics – websites, virtual networks, etc. • Logical characteristics are similar to grid coordinates – IP and URL addresses, etc. – unique to the target and tie content or function to the physical domains (e.g., servers, routers)

• Also need to consider the social characteristics – corresponds w/ cyberpersonas and links closely to target’s cognitive characteristics • Important to distinguish between state and non-state targets – different target systems, different perspectives Complete and holistic understanding of a target… have to avoid target development that overlooks any one characteristic “Second to None!”

Target Systems

Army Cyber Command/2nd ARMY Nation-State Target Systems (14) Command, Control, Communications, Computer, Intelligence

Air Forces and Aircrafts

Space Forces

Petroleum Industry

Weapons of Mass Destruction

Integrated Air Defense Forces

Ballistic Missile Forces

Industry

Counterterrorism

2 categories of target systems: Nation-State and Non-State

Ground Forces and Facilities

Non-State Target Systems (9) Leadership

Safe Havens

Finances

Communication

Movement

Intelligence

Weapons

Personnel

Ideology

Naval Forces and Ports

Electric Power

Transportation and Lines of Communications

Counterdrug

- JP 3-60, Appdx H

- JP 3-26, Chapter V

Target significance may be due to its own characteristics – real importance lies in relationship to other targets within an operational system.

“Second to None!”

Army Cyber Command/2nd ARMY

Cyber Effects Request Format (CERF)

• Contained in the new JFIRES MTTP (FM 309.32) Appendix L to be published in FY12. • JFIRES Appendix L designed as guide for tactical and operational-level planners. • Requests are tied to CDR’s OBJs.

FINAL COORD. DRAFT

• Supports Deliberate TGTs, increasing ability to support Dynamic TGTs. • Tactical/operational requests forwarded thru Fires channels to JTF or component Expeditionary Cyber Support Element (ExCSE).

TO BE PUBLISHED FY12

• Expectation management – undeveloped TGTs may need long lead time to develop access and pair with capability. • Available on ALSA’s SIPRNET website.

WILL BE CLASSIFIED

“Second to None!”

Army Cyber Command/2nd ARMY

Leader Development

• Challenges of cyber at operational and tactical echelons a function of organizational (unit) vs. institutional (Army and branches) understanding.  Lack of general-purpose cyber training at officer and NCO PME vs. specific MOS-related training w/in SC/MI branches.  Cyber/Electromagnetic Activities (CEMA) as staff task under Mission Command warfighting function (WFF) in new ADRP 6-0 • Unit training managers often unaware of cyber-related PME or that nonMI/non-SC personnel (e.g., G5/G35 planners, targeters, etc.) can attend PME normally considered only for ‘cyber-related’ MOSs.  Basic Computer Network Operations Planners Course (BCNOPC)  Cyber 200/300 (USAF)  Joint Advanced Cyber Warfare Course (JACWC)  Joint Cyberspace Operations Planners Course MTT • Knowledge of processes/procedures not well-disseminated. • Lack of codified doctrine – still being developed. “Second to None!”

Army Cyber Command/2nd ARMY

Summary

• Embrace cyberspace as an operational domain • Planning for cyber fires follows same doctrinal fires & targeting processes • Effects linked to Commander’s Objectives & Endstate • Target System Analysis is critical to accurate cyber fires • Target Characteristics – physical, functional, cognitive, logical,

and social • Leader Development, Training, & Education (LDT&E) • People are the centerpiece, not technology

Bringing Cyber Fires to the Fight – Prevent, Shape, Win “Second to None!”

Army Cyber Command/2nd ARMY

Questions

“Transforming Cyberspace While at War… Can’t Afford Not To!” “Second to None!”

Suggest Documents