6 - Intro to CWO Flashcards
National Security Strategy (NSS)
– General Info
- Legal foundation in Goldwater-Nichols Act of 1986
- Highest level of strategic planning
- Implementation relies on guidance derived from contents, such as NDS
National Defense Strategy (NDS)
– General Info
- Dev’d by DoD, signed by SecDef
- Establishes set of overarching defense objectives/framework for achieving security
- Provides direction for NMS
NDS
– Main Goals (2)
– Lines of Effort (3)
Goals
- Restore America’s competitive edge by blocking global rivals
- Keep rivals from throwing international order out of balance
LOE
- Build a more lethal force
- Strengthen alliances and find new partners
- Reform the Department
National Military Strategy (NMS)
– General Info
- Prepared by CJCS, JCS, CCMD, Joint staff, and OSD
- Briefly outlines the strategic aims of the armed services
- Chief guidance is NSS
- Supports NSS, implements NDS
- Defines set of interrelated military objectives
- Describes ways and means to achieve mil objectives
NMS
– Five Mission Areas
- Respond to threats
- Deter strategic attack/proliferation of WMD
- Deter conventional attack
- Assure allies/partners
- Compete below the level of armed conflict
National Cyberspace Policy
Prevent or minimize disruptions to critical information infrastructures and protect the people, economy, essential human and government services, and national security of the US.
NMS for Cyberspace Ops (NMS-CO)
- Armed Forces Comprehensive strategic approach for using cyberspace ops to assure strategic superiority in the domain
Joint Publication 3-12, Cyberspace Ops (JP 3-12)
- Governs activities and performance in joint cyberspace ops and guidance for interaction with government and non-governmental agencies, multinational forces, and other inter-org partners
- Provides guidance for the exercise of authority by CCDRs and JFC
Air Force Doctrine Document 3-12, Cyberspace Ops (AFDD 3-12)
- AF’s foundational cyberspace doctrine
- Discusses cyberspace-related topics such as threats, C2, planning/execution, etc
Air Force Policy Directive 17-2, Cyberspace Ops (AFPD 17-2)
- Establishes AF policy for planning/executing AF/joint cyberspace ops
- States cyber responsibilities for MAJCOMs, DRUs, FOAs, etc
Combatant Command (COCOM)
- Non-transferable command authority of a CCDR to organize and employ commands and forces
- Includes assigning tasks, designating objectives, and giving authoritative direction over all aspects of mil ops, joint training, and logistics
- Exercised by CCDRs as directed by President or SecDef
Administrative Control (ADCON)
- Direction or exercise of authority over subordinate/other orgs w/ respect to administration and support
- Normally exercised along service lines to fulfill service admin support
- Typical chain of command; not a warfighting authority
Operational Control (OPCON)
- The authority to organize and employ commands and forces, assign tasks, designate objectives, and give authoritative direction necessary to accomplish the mission
- Can be delegated down from COCOM
- Does not include authoritative direction for logistics or matters of administration, discipline, internal organization, or training
Tactical Control (TACON)
- Authority limited to detailed direction and control of movements or maneuvers within the operational area necessary to accomplish missions or tasks
- Allows for controlling and directing application of force or tactical use of combat support assets
- Can be delegated to and exercised by CC at any echelon
- Does not provide organizational, administrative, or logistical authority
Support (command authority)
– General Info
- Authority that aids, protects, complements, or sustains another force
- Used when neither OPCON or TACON is appropriate
- SecDef specifies support between CCDRs; CCDRs specify lower level support
Support (command authority)
– Four categories
- General Support
– Given to supported force as a whole rather than particular subdivision - Mutual Support
– Support between units, against an enemy, because of their assigned tasks, positions relative to the enemy, and inherent capabilities - Direct Support
– Mission requiring a force to support another force
– Authorizes supporter to directly answer supported’s request for assistance - Close Support
– Action against targets/objectives that are close enough to the supported force to require action integration/coordination
Department of Defense Information Network (DODIN)
- Globally interconnected, end-to-end information capabilities; associated processes; and personnel for collecting/handling information
- Includes comm and computing systems/services; software; data; security services; and other associated services
- Provides interfaces to coalition, allied, and non-DoD users/systems
- The large, overarching network that all other DoD networks travere
- Renamed from GIG in 2013
Cyber Mission Force
– What does it include
– Timeline
- 133 Cyber Mission Teams, Joint Forces Headquarters-Cyber, and Cyber National Mission Force
- USCYBERCOM’s action arm
- Timeline
– 2013 - Started Buildup
– 2016 - All teams Initial Operational Capability
– 2018 - All teams Full Operational Capability
Cyber Mission Force (CMF)
– Purpose (Cyberspace mission areas and Lines of Operation)
- Carry out DoD’s cyberspace mission areas:
– Secure, Operate, and Defend DODIN (Cyber Protection Force)
– Defend Nation against cyberspace attack (Cyber National Mission Force)
– Provide CCMD support (Cyber Combat Mission Force) - Mission areas carried out through the following LOOs:
– DODIN Operations
– Defensive Cyberspace Operations (DCO)
– Offensive Cyberspace Operations (OCO)
Cyber Mission Force (CMF)
– Sub-commands (3)
– Teams (8)
– Directed By
- Cyber National Mission Force (CNMF)
– National Mission Teams (NMTs) (CNMF Headquarters)
– National Support Teams (NSTs) (CNMF Headquarters) - Cyber Protection Force (CPF)
– National Cyber Protection Teams (National CPTs) (CNMF Headquarters)
– DODIN Cyber Protection Teams (DODIN CPTs) (Joint Force Headquarters DODIN)
– Combatant Command Cyber Protection Teams (CCMD CPTs) (CCDRs)
– Service Cyber Protection Teams (Service CPTs) (Service Cyberspace) - Cyber Combat Mission Force (CCMF)
– Combat Mission Teams (CMTs) (Joint Force Headquarters - Cyberspace)
– Combat Support Teams (CSTs) (Joint Force Headquarters - Cyberspace)
Cyber National Mission Force (CNMF)
– Aligned cyberspace mission area
– Role
- Aligns with Defend the US and its interests against cyberspace attacks
- Plans, directs, and synchronizes full-spectrum cyber ops to defend against cyber attacks
- Relies on establishing partnerships with other agencies (NSA, DoD, IC, etc.) to widen awareness
Cyber National Mission Force Headquarters (CNMF-HQ)
– Mission
– Responsibilities
- Direct and synchronize full spectrum cyber ops to deter, disrupt, and defeat adversary cyberspace actors in order to defend DODIN, critical infrastructure, and the nation
- Exercise OPCON for NMTs, NSTs, and national CPTs
- Conduct joint tactical planning/direct tactical ops ISO CNMF missions
- Synchronize CNMF maneuvers and conduct mission deconfliction
- Synchronize CNMF intel ops ISO cyber ISR
- Coordinate CNMF-HQ support functions (personnel, logistics, budget, etc.)
- Direct CNMF training, exercises, and readiness requirements
National Mission Teams (NMT)
- Each aligned against specific cyberspace threat
- Tactical units
- Include Defensive Cyberspace Operations Response Actions (DCO-RA)
National Support Teams (NSTs)
- Provide specialized technical, analytic, and planning support to NMTs
Cyber Protection Force (CPF)
- Largest part of CMF
- 68 CPTs
- Mission is to enable supported CC’s mission capabilities by conducting survey, secure, protect, and recover missions to prepare local defenders to defend critical assets and Cyberspace Key Terrain (C-KT)
- Conduct hunt missions for suspected compromise
Joint Force Headquarters-DoDIN (JFHQ-DODIN)
- Provides unity of command and unity of effort to secure, operate, and defend DODIN
- C2 HQ
- Employs operational-level C2; no single HQ can effectively exercise all C2 for DODIN
- CDRUSSTRATCOM delegated directive authority for cyberspace ops over all DoD agencies to the CC of JFHQ-DODIN
Cyber Protection Teams (CPTs)
– Core Capability
– Types
- Real-time DCO
- DODIN CPTs
– DODIN systems/networks ISO DISA/DODIN customers
– Directed by JFHQ-DODIN - CCMD/MAJCOM CPTs
– Assigned specific MAJCOMs
– Directed by aligned MAJCOM - National CPTs
– Report directly to CNMF-HQ
– Perform CPT mission on US critical infrastructure/key terrain (CI/KR) and national interests (AOR of CNMF) - Service CPTs
– Aligned to particular military branch
– ex: hunt mission for NAOC
Cyberspace Combat Mission Force (CCMF)
- Cyberspace Mission Area
- Role
- Directed by
- Aligns with CCMD Support
- Provide integrated cyberspace capes ISO mil ops/contingencies
- Where OCOs are carried out
- Directed by JFHQ-C
Joint Force Headquarters - Cyber (JFHQ-C)
- What makes up JFHQ-C
- Role
- Comprised of the four service cyber HQs
– Army Cyber Command (ARCYBER)
– U.S. Fleet Cyber Command (FLTCYBER)
– Marine Corps Forces Cyberspace Command (MARFORCYBER)
– Air Forces Cyber (AFCYBER) - Also includes CGCYBER (under DHS)
- Supports CCMDs; execute OPCON over CMTs and CSTs
Army Cyber Command (ARCYBER)
– AOR
- USCENTCOM
- USAFRICOM
- USNORTHCOM
U.S. Fleet Cyber Command (FLTCYBER)
– AOR
- USINDOPACOM
- USSOUTHCOM
Marine Corps Forces Cyberspace Command (MARFORCYBER)
- AOR
- USSOCOM
Air Forces Cyber (AFCYBER)
- AOR
- USEUCOM
- USSTRATCOM
- USTRANSCOM
Combat Mission Teams (CMTs)
– level
– number of teams
– Role
– Team members
- Tactical units operating at tactical level of authority, designated by USCYBERCOM CC
- 27 CMTs within CMF
- Conduct ops ISO CCMD contingency plans, crisis action plans, etc.
- Operators, analysts, targeteers, linguists
Combat Support Teams (CSTs)
- capability devs, OCO analysts/planners, DCO analysts/planners
- Develop and employ offensive cyber capes ISO CCMD objectives while being integrated, synchronized, and/or deconflicted w/ ops in other domains
Defend the Nation Against Cyberspace Attack (Cyberspace mission area)
- Defend the U.S. and interests against cyber attacks of significant consequence
-
Conduct cyber ops to counter imminent or ongoing cyber attack on U.S. or interests
– When directed by president or SecDef
– Prevent loss of life/destruction of property - Private sector is first line of defense
Secure, Operate, and Defend the DODIN (Cyberspace mission area)
- Secure DoD network and recovery quickly if security measures fail
- Conduct ongoing network defense ops
-
Quick response to hostile activity within networks
– Mitigate or close vulnerabilities
Provide CCMD Support (Cyberspace mission area)
- Ensure internet remains open, secure, and prosperous
-
Provide cyber capes ISO mil ops/contingencies
– OCO
– Ops support rule of law, respect freedom of expression, privacy, ideas, etc.
– follow LOAC
Categories of Cyberspace Operations
- DODIN Ops
- Offensive Cyberspace Operations (OCO)
- Defensive Cyberspace Operations (DCO)
- Cyber Operational Preparation of the Environment (OPE)
- Cyber ISR
DODIN Ops (Cyber Operation Category)
- Designing, building, configuring, securing, operating, maintaining, and sustaining the ops information environment
- Proactive
Offensive Cyberspace Operations (OCO)
- Project power by application of force in Cyberspace
- must be authorized just like physical domain ops
Defensive Cyberspace Ops (DCO)
- Passive and active cyber defense activities to outmaneuver adversaries
- Change current paradigm where attacker has advantage
- Discover, detect, analyze, and mitigate threats, including insider
DCO Subcategories
- DCO-Internal Defensive Measures (IDM)
– Hunting on friendly terrain, internal responses
– Detect, defend, analyze, and stop threats/vulnerabilities - DCO-Responsive Actions (RA)
– Going after the threat (including in red space)
– Best defense is a good offense
– Only conducted by NMTs
Operational Preparation of the Environment (OPE)
- Non-intelligence activities related to planning and preparing for follow-on cyber ops
- testing a way into a box, pre-staging tools, creating accounts, setting up beacons, etc
Cyber ISR
- Cyber intel gathering activities to support future ops
- Synchronize and integrate planning and operation of cyber systems ISO current/future ops
- Focuses on tactical and operational intel and mapping adversary cyberspace
Information Operations (IO)
- Integrated employment of information-related capabilities in concert with other Lines of Operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries during military operations
- Ultimately, affect adversary behaviour in ways that help achieve friendly objectives
- Not the same as integrating non-lethal capes/activities w/ behaviour-related objectives as primary purpose
Information Environment (Information Operations)
- Definition
- 3 Dimensions
- Aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information
- Physical Dimension
- Information Dimension
- Cognitive Dimension
Physical Dimension (Information Operations)
- C2 systems, key decision makers, and supporting infrastructure
- People, C2 facilities, newspapers, books, microwave towers, laptops, objects subject to empirical measurement, etc.
- Not confined to military or nation-based; crosses national, economic, and geographical boundaries