Course Assistants and staff

Size: px
Start display at page:

Download "Course Assistants and staff"

Transcription

1 IGA-240: CYBER AND INFORMATION OPERATIONS: TECHNOLOGY, POLICY AND THE LAW Fall 2017/18, T/Th 8:45 10:00am L230 Instructor Eric Rosenbach L-362 Course Assistants and staff Corinna Fehst (Course Assistant) Caitlin Conley (Course Assistant) Melissa Kappotis (Faculty Assistant) Description: Today s leading democracies are digital: they depend on the internet and information technology for vital functions of the economy, infrastructure, media and government. Democracies rapid adoption of information technology has improved citizens lives and nations overall prosperity. But digital democracies are also increasingly vulnerable to interference from hostile actors who may use cyberattacks, information operations, or a sophisticated hybrid of both, to disrupt these societies. Russia s recent interference in elections in the United States and Europe highlight one aspect of the threat to digital democracies. Several other cases illustrate the emergence of attacks on other key sectors of digital democracies, such as the successful Russian attack on the Ukrainian power grid in 2016, the Islamic State s use of social media for radicalization, the 2014 North Korean hack of Sony Pictures and the Iranian cyberattacks on the US financial sector. The perceived success of these attacks will encourage increased malicious activity in the future. In parallel, the international community has seen an increasing weaponization of data and information obtained through cyber means, as well as the increasing use of offensive cyber tools by nation states to further national interests. Unfortunately, the leaders of most democratic nations are unprepared to address the complex technical, political, policy and legal issues associated with these types of malicious activities. The need for a new generation of technically-savvy policymakers is clear. This course will introduce students to the policy, technical and legal challenges faced by digital societies and push them to develop policy proposals to mitigate risk in the future. The course will assess the digitalization of today s leading democracies and the vulnerabilities that this creates, discuss the intent and foreign policy goals of hostile actors who seek to exploit these vulnerabilities, and review the features of intrusive attacks on digital democracies (including but not limited to the cases mentioned above). In addition sharpening students policy formulation skills, students will also learn to provide basic legal, technical and political analysis for each of the cases covered in the course. Understanding the technology of cybersecurity and big-data analysis is particular important; thus, the instructor will ensure all students have a basic understanding of the technical underpinnings of each case (e.g. how does ransomware work, how was the US DNC hacked, how do bots spread fake news).

2 The instructor recently served as the Pentagon Chief of Staff, and previously served as the Department of Defense Cyber Czar and Assistant Secretary of Defense for Global Security. As such, he personally worked on many of the cases that will be discussed in class. Instruction method: This class will be highly interactive and will rely heavily on the case method, supported by the Socratic Method/cold calling. Students should therefore come to class prepared to participate and contribute. Audience: This course is designed for future practitioners of cybersecurity and cyber policy, as well as for those who plan to work in national security and international affairs more broadly. Although parts of the course focus on the United States, information and cyber operations are global issues. International students are therefore highly encouraged to enroll. Initial classes in the course provide students with a solid foundation on networking, software and data, so no technical background is required for the course. Learning Objectives: By the end of the course, students will have: (1) the ability to think strategically about managing offensive and defense cyberattacks and information operations, taking into account policy, legal, technical and political considerations; (2) professional skills that allow them to effectively communicate through crisp policy recommendation memos and oral briefings; (3) a solid foundation of knowledge about specific recent cases of cyberattacks and cyber operations, and; (4) a more thorough understanding about how the US and other international governments, as well as the international community can work together to shape and address cyber threats. Expectations: This is a graduate-level course for future professionals. Thus, the instructor has high expectations of all students. Basic expectations are that students will: (1) attend all scheduled classes and show up on time; (2) complete assignments on time; (3) read all assigned materials in advance of class and come to class prepared to discuss them; and (4) contribute to the team assignments. Course Requirements: Each student will be required to: Complete two quizzes/assignments on the technology of cybersecurity and information operations Write two individual policy recommendation memos Write one short surprise memo (giving students 48 hours to complete this assignment after a significant real-world event) Complete two in-class simulation exercises Prepare for and participate in all class discussions Quizzes: There will be two quizzes/assignments on the technological foundations of cybersecurity and information operations. These will test students understanding of basic aspects of cybersecurity and information operations, as well as of the technical functioning of different types of cyberattacks. Individual Recommendation Memos: Each student will submit two three-page policy recommendation memos. The memos should provide a senior-level decision maker with analysis and recommendations on a cybersecurity / information operation issue covered in class. Students have the option to write on any two of the 8-10 assigned memo topics (full details will be posted at the start of term). Students must complete at least

3 one memo prior to the first simulation exercise. Policy recommendation memos should include: policy objectives, basic legal analysis, identification of various policy options and a final recommendation. The instructor will provide more details about the memo format in class. Surprise Memo: There will be a two page surprise memo assigned at some point during the semester. Students will assess a current event cybersecurity or information operations issue and present recommendations to a senior leader, such as the UN Secretary General, National Security Advisor, Secretary of Defense, or Minister of Foreign Affairs. Students have 48 hours to complete this assignment. Simulation Exercises: The class will participate in two (fun!) simulation exercises focusing on cyberattacks and/or information operations. These team-based exercises will simulate a national security environment, such as e.g. a Senate Intelligence Committee meeting or a Principles Committee meeting of the National Security Council. Preceding the exercise, students will be assigned a role, such as a Senator or Secretary of State. Each student will be expected to familiarize him/herself with all aspects of the role. Students will be evaluated on their professionalism, decision-making and ability to communicate. The class will jointly derive lessons learned from each simulation. Class Participation: The quality (not quantity!) of class participation will determine a significant part of a student s overall grade. The instructor expects students to complete the readings for each class; each student should come to class prepared to debate the issue of the day. The instructor will use the Socratic Method to ensure that all students prepare for class and participate in the discussion. Because of the importance of class participation, students are required to bring their name placards to every class. The use of laptops and phones in class is prohibited. Attendance is mandatory unless excused. Standard Operating Procedures (SOPs) for Assignments: All written assignments must be uploaded to the course Canvas site to receive full credit. Students are required to upload their assignment by 08:00 of the due date. Additionally, students must hand in a hardcopy of their assignment at the beginning of class. All assignments must follow the formatting guidelines distributed in class. Grading: The instructor will follow HKS guidance regarding the curved distribution of grades. Final grades will be determined according to the following: Technical quizzes: 10% Policy Recommendation Memos: 40% Surprise Memo: 10% Simulations and Class Participation: 40% Office Hours: The instructor will hold office hours by appointment. You should schedule an appointment within these hours with Melissa Kappotis (melissa_kappotis@hks.harvard.edu). Readings and Required Books: This class will not rely on a single book instead specific readings are assigned for each class. In addition, the beginning of this course familiarizes students with the technical fundamentals of cybersecurity and cyber/ information operations. Students without a technical background will be expected to build up their technical knowledge quickly. To help them get started, the instructor strongly

4 recommends that students complete technical readings ahead of the start of term. Potential readings that students might wish to consider as a starting point are: Lawrence C. Miller, Cybersecurity for Dummies, 2014 (available online) Peter W. Singer and Allan Friedman, Cybersecurity and Cyberwar: what everyone needs to know, 2014 (available online).

5 Class Date Topic Objectives 1 31 st Aug A Cyber 9/11: Assess the risk of a catastrophic cyberattack to the US or other nations. Inevitable or Identify key issues of analysis necessary to determine whether a cyber 9/11 is possible. Hysterical? Preview of course structure and key features. Overview of the course s framework of analysis: 2 5 th Sept Technology Basics and Cyber Defense (part I) 3 7 th Sept Cyber Defense (part II) and Cyber Attacks 4 12 th Sept Cyber Actors: Russia, China and Cyber Criminals 5 14 th Sept Cyber Actors: Iran, North Korea and Cyber Terrorism 6 19 th Sept Organizing for Cyber: USG, Private Sector and International Organizations technology, policy and the law. Understand the functioning and basic components of the internet, networks, software, and hardware. Understand the inherent technical vulnerabilities of the internet, networks, software, hardware. Learn key concepts and strategies for identifying and defending an organization s key assets. Understand key technologies associated with defending networks, systems and information against cyberattacks and information operations. Technical Quiz 1 (to be completed within 24 hours of the class) Define information and cyber operations, and distinguish between the two. Understand how attackers exploit vulnerabilities in the internet, networks, software, hardware to conduct different types of information and cyberattacks. Technical Quiz 2 (to be completed within 24 hours of the class) Assess the strategies employed by Russia and China to advance their national interests via cyber and information operations. Review historic examples of Russian and Chinese cyber and information operations. Understand the organizational set-up supporting cyber/information operations in Russia and China. Understand motivations of cyber criminals, and key means by which they exploit networks and sensitive information. Understand different means of monetizing cyber and information attacks (e.g. sale of financial information, ransomware). Understand why cyber operations are a key tool for nations like Iran and North Korea. Review historic examples of Iranian and North Korean cyber and information operations. Understand the organizational set-up supporting cyber/information operations in Iran, North Korea. Understand motivations of cyber terrorist and asses how large the threat of cyber terrorism really is. Understand how the US government is organized to address challenges of cyber and information operations. Who are key actors and their responsibilities, how do they interact, what challenges exist in their operations and interactions? Understand the crucial role that the private sector plays in addressing cyber threats to national interests. Understand the crucial role that international organizations play in defining, deterring, and managing cyber and information operations (esp. NATO, UN, EU) st Sept Cyber Strategy Learn to evaluate, prioritize, and articulate cyber policy goals and objectives within the framework

6 and Policy 8 26 th Sept The Law and Politics of Cyber 9 28 th Sept Chinese Theft of Intellectual Property 10 3 rd Oct Defending Networks: The OPM Case 11 5 th Oct Defending Services: Dyn DDoS, Iranian DDoS of Financial Sector of national interests. Apply the national interest framework to articulate a prioritized list of US policy objectives in cyberspace. Use this framework in future sessions to evaluate resource allocations and prioritization in actual US cyber policy. Outline key U.S. cyber strategy and policy documents. Consider the policy trade-offs generated by an emphasis on cybersecurity on other domestic and international US objectives (e.g. in terms of resources, relationships, intellectual focus). Review the key foreign policy considerations and frameworks that apply to information and cyber operations (e.g. deterrence, attribution challenges, arms race, applicability of law, advantages of cyber/info ops vs. traditional warfare). Understand the important role that the law plays in the formulation of cyber policy. Understand how the U.S. constitution, codes and caselaw influence US cyber policy. Understand how Congress is structured, its authority/ sources of power, and how this plays out on cyber policy. Understand which key international pieces of law affect US (and other players ) cyber/ information operations. Understand the role of non-binding efforts to establish rules in cyberspace, in particular the NATO CCD COE Tallinn Manual, and UN cyber norms process. Recognize how politics shapes (and sometimes distorts) the national security environment. Recognize the currently occurring fault lines and consider how to manage them. Be able to participate in a discussion on how future political trends will impact cyber security policy. Understand the strategic implications of intellectual property theft and how China uses cyber operations to bolster its overall economic strategy. Explore the U.S.-China 2015 agreement banning commercial cyber espionage. Assess its effectiveness, understand how this agreement was reached, review why it is so difficult to achieve such negotiated settlements in other areas of cyber/ information operations. Understand key events and technology employed in the OPM attack. Understand the intent and impact of the Chinese operation. Assess the US government s response to the attack and constraints on its potential reactions. Understand key events and technology employed in U.S. Financial sector and Dyn DDoSs Understand the significance of a denial of service attack, and how the response to them may differ from other cyberattacks. Assess the decision-making calculus of a private sector leader responding to a large cyberattack against his/her firm. Understand the increasing risk of DDoS from poorly secured Internet of Things devices. Be able to debate the potential need for cybersecurity regulation for IoT devices.

7 12 10 th Oct Defending Operational Networks: TransCom and Iranian attacks on the U.S. Navy th Oct Defending Important Information: Snowden, Insider Attacks and Domestic Surveillance th Oct Simulation I: Senate Hearing on a Cyber Attack (related to Wanna Cry) th Oct Disrupting Terrorist Attacks: ISIS use of social media and San Bernadino th Oct Defending Critical Infrastructure: Attacks on the Financial Sector: NASDAQ, 2015/16 SWIFT Understand the importance of operational networks to large organizations, such as the military or a large multinational corporation. Understand key events and technology employed in the TransCom and Iranian Navy attacks. Assess the intent of China and Iran to penetrate these networks. Assess the US military s response to the attack and the constraints on its potential reactions. Understand key events of the Snowden leaks, and their short- as well as long-term political and national security consequences. Understand the important role of that insiders are known or alleged to have played in other highprofile cyberattacks and information operations. Discuss political, moral, and security considerations surrounding insider leaks in the national security space. Is it ever justified to leak sensitive national security information from inside government? If so, under which conditions? Understand existing measures to prevent and manage insider risk within the U.S. government. Discuss legal/ political measures pursued since Snowden and whether/ how to further expand the use of such measures in the future. In-class simulation focused on key implications of WannaCry ransomware attack (including severity of threat it posed, attribution, retaliation options, vulnerability equities process/ PATCH Act and their implications for future U.S. intelligence gathering capabilities) Students need to have completed Individual Policy Memo 1 by this class Explore terrorists diverse uses of the Internet (e.g. for recruiting, financing/ payments, attack planning, everyday operation and coordination). Specifically, understand ISIS use of social media for recruiting. Assess how the U.S. and ally government, as well as social media/ tech companies seek to disrupt it. Understand FBI-Apple stand-off following the San Bernadino attack, and the resulting national security vs. privacy/civil liberties/ data security debate. Understand key events and technology employed in NASDAQ and SWIFT cyberattacks. Understand scope of disruption for global economic system from financial sector attacks. Understand attribution and political implications/ retaliation.

8 17 26 th Oct Defending Critical Infrastructure: Saudi Aramco and RasGas st Oct Defending Critical Infrastructure: Ukraine Power Grid and US Infrastructure 19 2 nd Nov Defending Digital Democracy: Sony Pictures 20 7 th Nov Defending Digital Democracy: US 2016 Elections (I/II) Define critical infrastructure. Understand implications of CI cyberattacks in general and specifically for the oil/gas sector. Understand key events and technology employed in Saudi Aramco/ RasGas attacks (Shamoon). Understand operational and financial implications of these attacks. Understand attribution challenges and political implications/ retaliation. Understand key events and technology employed in Ukraine 2015 power grid attack, and its significance. Understand attribution and attribution challenges. Assess risk of attacks being similarly effective in the U.S./ European electric grids. Understand reactions by U.S. and international community (e.g. measures to improve security of electricity grids), and discuss what more could be done going forward (e.g. more compulsory cybersecurity and reporting regulation for CI private sector operators?) Understand key events and technology employed in 2014 Sony Pictures attack. Understand the financial, operational and reputational damage suffered by Sony Pictures. Understand attribution (marks formal emergence of the Lazarus Group); alternative attribution theories (e.g. role of insiders, hacktivists not related to DPRK). Discuss the potential of cyberattacks to interfere with the democratic right of free speech. Discuss the U.S. political reaction and response, and the limits on constraints it faced. Understand key events and info ops/ cyber ops technology employed in U.S Elections, covering cyberattacks with information leaks (DNC and RNC hacks, Podesta mails) and fake news. Understand attribution to RUS: what is vs. is not publicly known, strength of evidence? Understand domestic political implications of the election interference (in particular: what do we know about the effect that this intervention may of may not have had on election outcomes. Understand foreign policy implications (sanctions, escalating tensions in US/RUS relations, raised the ongoing questions regarding the Trump administration s links to Russia). Distinguish between different level of attacks on elections (from fake news, to cyberattacks coupled with information leaks, to hacking of core election infrastructure such as voter registration systems). Understand how each attack type is executed and their respective likelihood and impact. Highlight key case of RUS election interference beyond the 2016 US elections (e.g. Macron campaign, Estonian and Ukrainian elections).

9 21 9 th Nov Defending Digital Democracy: US 2016 Elections (II/II) th Nov Offensive Cyber Ops: Stuxnet th Nov Offensive Cyber Ops: Counterterrorism st Nov Offensive Cyber Ops: Military th Nov Simulation II: National Security Council th Nov Simulation II debrief & class wrap-up Discuss increasing weaponization of information (cyberattacks coupled with information leaks, and fake news). Understand what is already being done to prevent the weaponization of information, esp. fake news. Understand efforts to secure the different levels of election infrastructure going forward (e.g. paper audit trails at voting machines, increased pressure on social media companies) Understand key events and technology employed in Stuxnet attack. Understand the operational and foreign policy framework for analysis of offensive cyber operations. Assess the short and longer impacts of conducting offensive cyber operations. Review US CYBERCOM s offensive cyber campaign against ISIS: key components, legal status, effectiveness. Understand the potential for using offensive cyber and information operations during combat. Students simulate an NSC meeting dealing with an imminent, severe cyber attack. Debrief on Simulation II. Review of key concepts and lessons learnt in the class.

CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM

CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM 1 CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM The overall classification of this briefing is: Classified By: jhgrady Derived From: USCYBERCOM SCG Dated: 20150415 2 3 4 Organizational Structure Commander

More information

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD

More information

Cyber Strategy & Policy: International Law Dimensions. Written Testimony Before the Senate Armed Services Committee

Cyber Strategy & Policy: International Law Dimensions. Written Testimony Before the Senate Armed Services Committee Cyber Strategy & Policy: International Law Dimensions Written Testimony Before the Senate Armed Services Committee Matthew C. Waxman Liviu Librescu Professor of Law, Columbia Law School Co-Chair, Columbia

More information

LAB4-W12: Nation Under Attack: Live Cyber- Exercise

LAB4-W12: Nation Under Attack: Live Cyber- Exercise LAB4-W12: Nation Under Attack: Live Cyber- Exercise A sophisticated cyberattack is in progress against the United States. Multiple industries are impacted and things are about to get much worse. How will

More information

Revising the National Strategy for Homeland Security

Revising the National Strategy for Homeland Security Revising the National Strategy for Homeland Security September 2007 The Need for a Revised Strategy Reflect the evolution of the homeland security enterprise since the National Strategy for Homeland Security

More information

THE MILITARY STRATEGY OF THE REPUBLIC OF LITHUANIA

THE MILITARY STRATEGY OF THE REPUBLIC OF LITHUANIA APPROVED by the order No. V-252 of the Minister of National Defence of the Republic of Lithuania, 17 March 2016 THE MILITARY STRATEGY OF THE REPUBLIC OF LITHUANIA 2 TABLE OF CONTENTS I CHAPTER. General

More information

Senate Select Committee on Intelligence. July 3, 2018

Senate Select Committee on Intelligence. July 3, 2018 Senate Select Committee on Intelligence July 3, 2018 The Senate Select Committee on Intelligence (SSCI) is conducting a bipartisan investigation into a wide range of Russian activities relating to the

More information

Chapter Nineteen Reading Guide American Foreign & Defense Policy. Answer each question as completely as possible and in blue or black ink only

Chapter Nineteen Reading Guide American Foreign & Defense Policy. Answer each question as completely as possible and in blue or black ink only Chapter Nineteen Reading Guide American Foreign & Defense Policy Answer each question as completely as possible and in blue or black ink only 1. What are the roots of U.S. Foreign and Defense Policy? 1.

More information

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018 NORTH ATLANTIC TREATY ORGANIZATION SUPREME ALLIED COMMANDER TRANSFORMATION SACT s remarks to UN ambassadors and military advisors from NATO countries New York City, 18 Apr 2018 Général d armée aérienne

More information

NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION

NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION Executive Summary Proliferation of WMD NATO s 2009 Comprehensive

More information

United States General Accounting Office. DISTRIBUTION STATEMENT A Approved for Public Release Distribution Unlimited GAP

United States General Accounting Office. DISTRIBUTION STATEMENT A Approved for Public Release Distribution Unlimited GAP GAO United States General Accounting Office Testimony Before the Committee on Armed Services, U.S. Senate For Release on Delivery Expected at 4:00 p.m. Monday, February 28, 2000 EXPORT CONTROLS: National

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014 THE WHITE HOUSE Office of the Press Secretary For Immediate Release January 17, 2014 January 17, 2014 PRESIDENTIAL POLICY DIRECTIVE/PPD-28 SUBJECT: Signals Intelligence Activities The United States, like

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 OPNAVINST 3900.30 N4 OPNAV INSTRUCTION 3900.30 From: Chief of Naval Operations Subj: NAVY CAPABILITY

More information

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES (Federal Register Vol. 40, No. 235 (December 8, 1981), amended by EO 13284 (2003), EO 13355 (2004), and EO 13470 (2008)) PREAMBLE Timely, accurate,

More information

President Obama and National Security

President Obama and National Security May 19, 2009 President Obama and National Security Democracy Corps The Survey Democracy Corps survey of 1,000 2008 voters 840 landline, 160 cell phone weighted Conducted May 10-12, 2009 Data shown reflects

More information

This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the

This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the February, 2017 This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions,

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.02 March 17, 2015 USD(I) SUBJECT: Counterintelligence (CI) References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) O-5240.02

More information

SPRING 2018 DSS CLASS SCHEDULE

SPRING 2018 DSS CLASS SCHEDULE SPRING 2018 DSS CLASS SCHEDULE January 16 - May 17, 2018 TIME MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY 6-9 DSS 630-301 International Law and Global Security Berman CRN 27971 6-9 DSS 632-301 Survey and

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction [National Security Presidential Directives -17] HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4 Unclassified version December 2002 Subject: National Strategy to Combat Weapons of Mass Destruction "The gravest

More information

Ⅰ Introduction Ⅱ Positioning of cyber domain in cross-domain operation. Ⅲ Cyber domain seen in China's strategy. Ⅳ Approach to Cyber Domain in Japan

Ⅰ Introduction Ⅱ Positioning of cyber domain in cross-domain operation. Ⅲ Cyber domain seen in China's strategy. Ⅳ Approach to Cyber Domain in Japan 1 DISCLAIMER The views, opinions, and proposals provided in this presentation are solely of the briefer s own and thus shall not be construed as official positions of either the Stimson Center or the Government

More information

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544

More information

Prepared Statement of GEN (Ret) Keith B. Alexander*

Prepared Statement of GEN (Ret) Keith B. Alexander* Prepared Statement of GEN (Ret) Keith B. Alexander * on Cyber Warfare Today: Preparing for 21st Century Challenges in an Information-Enabled Society before the House Armed Services Committee April 11,

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198 Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Air Force : February 2015 3600: Research, Development, Test & Evaluation, Air Force / BA 7: Operational Systems Development COST ($ in Millions) FY

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199 COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 0.343 0.195 0.498-0.498 0.475 0.412 0.421

More information

Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction

Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction A 349829 Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction Defending the U.S. Homeland ANTHONY H. CORDESMAN Published in cooperation with the Center for Strategic and International Studies,

More information

Foreign Policy and National Defense. Chapter 22

Foreign Policy and National Defense. Chapter 22 Foreign Policy and National Defense Chapter 22 Historical Perspective 1 st 150 years of U.S. existence Emphasis on Domestic Affairs vs. Foreign Affairs Foreign Policy The strategies and goals that guide

More information

In order to cross the walls of the city, not a single act of violence was needed. All that was needed was the good faith and naivety of the enemy.

In order to cross the walls of the city, not a single act of violence was needed. All that was needed was the good faith and naivety of the enemy. Speech by the Chief of Defence of the Armed Forces of the Netherlands, Admiral Rob Bauer, at the International Operational Cyber Symposium on October 26 th 2017, Amsterdam Note: check against delivery!

More information

Bridging the Security Divide

Bridging the Security Divide Bridging the Security Divide Jody R. Westby, Esq. World Federation of Scientists 43 nd Session August 21, 2010 The Security Divide 1.97 billion people Internet users and 233 countries & territories Systems

More information

National Security & Public Affairs

National Security & Public Affairs You are in the process of becoming a spokesperson for the Department of Defense. To be successful in this field you need to understand the Department s philosophy concerning release of information, and

More information

December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13

December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13 8591 December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13 MEMORANDUM FOR THE VICE PRESIDENT THE SECRETARY OF STATE THE SECRETARY OF THE TREASURY

More information

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord.

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord. Introduction to Homeland Security Chapter 5 Safety & Security: The Intelligence Community The Intelligence Community (IC) Director of National Intelligence (DNI) DDNI National Intelligence Coord. Center

More information

1. Purpose. To implement the guidance set forth in references (a) through (e) by:

1. Purpose. To implement the guidance set forth in references (a) through (e) by: DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON, D.C. 20350-1000 SECNAVINST 3300.2C DUSN SECNAV INSTRUCTION 3300.2C From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

An Interview with Gen John E. Hyten

An Interview with Gen John E. Hyten Commander, USSTRATCOM Conducted 27 July 2017 General John E. Hyten is Commander of US Strategic Command (USSTRATCOM), one of nine Unified Commands under the Department of Defense. USSTRATCOM is responsible

More information

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF AU/ACSC/MILLER/AY10 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN by Kenneth J. Miller, Major, USAF A Short Research Paper Submitted to the Faculty

More information

Chapter 17: Foreign Policy and National Defense Section 3

Chapter 17: Foreign Policy and National Defense Section 3 Chapter 17: Foreign Policy and National Defense Section 3 Objectives 1. Summarize American foreign policy from independence through World War I. 2. Show how the two World Wars affected America s traditional

More information

Preventing Weapons of Mass Destruction Proliferation

Preventing Weapons of Mass Destruction Proliferation Preventing Weapons of Mass Destruction Proliferation Leveraging Special Operations Forces to Shape the Environment Colonel Lonnie Carlson, Ph.D. U.S. Army Nuclear and Counterproliferation Officer U.S.

More information

COE-DAT Course Catalog. Introduction

COE-DAT Course Catalog. Introduction Introduction The Centre of Excellence Defence Against Terrorism (COE-DAT) is pleased to present the Course Catalog, containing a complete listing of courses and educational programs conducted by COE-DAT.

More information

We Produce the Future

We Produce the Future We Produce the Future Think Tank Presentation Space Weaponization A Blended Approach to Nuclear Deterrence Capt Joey Aguilo Space Acquisitions Program Manager Capt Samuel Backes Cyberspace Operations Officer

More information

National Defense University. Institute for National Strategic Studies

National Defense University. Institute for National Strategic Studies National Defense University Institute for National Strategic Studies Interim Research Work Plan National Defense University Institute for National Strategic Studies Interim Research Work Plan Contents

More information

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003 Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces J.D. Crouch II March 5, 2003 Current and Future Security Environment Weapons of Mass Destruction Missile Proliferation?

More information

Advance Questions for Vice Admiral Michael S. Rogers, USN Nominee for Commander, United States Cyber Command

Advance Questions for Vice Admiral Michael S. Rogers, USN Nominee for Commander, United States Cyber Command Advance Questions for Vice Admiral Michael S. Rogers, USN Nominee for Commander, United States Cyber Command Defense Reforms The Goldwater-Nichols Department of Defense Reorganization Act of 1986 and the

More information

The Iran Nuclear Deal: Where we are and our options going forward

The Iran Nuclear Deal: Where we are and our options going forward The Iran Nuclear Deal: Where we are and our options going forward Frank von Hippel, Senior Research Physicist and Professor of Public and International Affairs emeritus Program on Science and Global Security,

More information

Foreign Policy and National Defense. Chapter 22

Foreign Policy and National Defense. Chapter 22 Foreign Policy and National Defense Chapter 22 Historical Perspective 1 st 150 years of U.S. existence Emphasis on Domestic Affairs vs. Foreign Affairs Foreign Policy The strategies and goals that guide

More information

On 21 November, Ukraine

On 21 November, Ukraine Reforming Ukraine s Armed Forces while Facing Russia s Aggression: the Triple Five Strategy Stepan Poltorak Four years after Ukraine s Euromaidan Revolution and Russia s subsequent invasion, Minister of

More information

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, Marines, and Civilians who serve each day and are either involved in war, preparing for war, or executing

More information

National Security Cyber Trends ALAMO ACE Presentation

National Security Cyber Trends ALAMO ACE Presentation National Security Cyber Trends ALAMO ACE Presentation Lt Gen (ret) Kevin McLaughlin November 16, 2016 Context Operational Perspective USCYBERCOM directs an overall enterprise of 12,000 personnel and a

More information

Issue Briefs. The UN Sanctions' Impact on Iran's Military

Issue Briefs. The UN Sanctions' Impact on Iran's Military Issue Briefs Issue Brief - Volume 1, Number 7, June 11, 2010 Note chart below on Russian and Chinese Equipment Subject to U.N. Sanctions One of the most significant aspects of the latest round of UN Security

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3100.10 October 18, 2012 USD(P) SUBJECT: Space Policy References: See Enclosure 1 1. PURPOSE. This Directive reissues DoD Directive (DoDD) 3100.10 (Reference (a))

More information

Cyber operations poised to take centre stage in US

Cyber operations poised to take centre stage in US Cyber operations poised to take centre stage in US [Content preview Subscribe to Jane s Intelligence Review for full article] US President Donald Trump announced on 18 August the elevation of the United

More information

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning Subject Area DOD EWS 2006 CYBER ATTACK: THE DEPARTMENT OF DEFENSE S INABILITY TO PROVIDE CYBER INDICATIONS AND

More information

Intelligence Operations (HMSY 1340) Online. Credit: 3 semester credit hours (3 hours lecture)

Intelligence Operations (HMSY 1340) Online. Credit: 3 semester credit hours (3 hours lecture) Operations (HMSY 1340) Online Credit: 3 semester credit hours (3 hours lecture) Prerequisite/Co-requisite: Complete the Online Orientation and answer yes to 7+ questions on the Online Learner Self-Assessment:

More information

Chapter 4 The Iranian Threat

Chapter 4 The Iranian Threat Chapter 4 The Iranian Threat From supporting terrorism and the Assad regime in Syria to its pursuit of nuclear arms, Iran poses the greatest threat to American interests in the Middle East. Through a policy

More information

Overview of Safeguards, Security, and Treaty Verification

Overview of Safeguards, Security, and Treaty Verification Photos placed in horizontal position with even amount of white space between photos and header Overview of Safeguards, Security, and Treaty Verification Matthew R. Sternat, Ph.D. Sandia National Laboratories

More information

Fiscal Year 2017 President s Budget Request for the DoD Science & Technology Program April 12, 2016

Fiscal Year 2017 President s Budget Request for the DoD Science & Technology Program April 12, 2016 Distribution Statement A: Approved for public release; distribution is unlimited; SR Case #16-S-1675 Fiscal Year 2017 President s Budget Request for the DoD Science & Technology Program April 12, 2016

More information

1 Nuclear Weapons. Chapter 1 Issues in the International Community. Part I Security Environment Surrounding Japan

1 Nuclear Weapons. Chapter 1 Issues in the International Community. Part I Security Environment Surrounding Japan 1 Nuclear Weapons 1 The United States, the former Soviet Union, the United Kingdom, France, and China. France and China signed the NPT in 1992. 2 Article 6 of the NPT sets out the obligation of signatory

More information

Chapter 16: National Security Policymaking

Chapter 16: National Security Policymaking 1. With the fall of the Berlin Wall, the U.S. (A) was the only superpower. (B) saw Communism as the principal threat. (C) knew it was invulnerable. (D) saw the world as a more threatening place. Chapter

More information

The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects

The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects Power Projection through Cyberspace Capt Jason M. Gargan, USAF Disclaimer: The views and opinions expressed or

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3000.07 August 28, 2014 Incorporating Change 1, May 12, 2017 USD(P) SUBJECT: Irregular Warfare (IW) References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues

More information

9. Guidance to the NATO Military Authorities from the Defence Planning Committee 1967

9. Guidance to the NATO Military Authorities from the Defence Planning Committee 1967 DOCTRINES AND STRATEGIES OF THE ALLIANCE 79 9. Guidance to the NATO Military Authorities from the Defence Planning Committee 1967 GUIDANCE TO THE NATO MILITARY AUTHORITIES In the preparation of force proposals

More information

March 10, Sincerely,

March 10, Sincerely, March 10, 2017 The Honorable James Mattis Secretary of Defense Department of Defense 1000 Defense Pentagon Washington, DC 20301-1000 Dear Secretary Mattis: We, the undersigned, are former government officials

More information

The State Defence Concept Executive Summary

The State Defence Concept Executive Summary The State Defence Concept Executive Summary 1 The State Defence Concept outlines the fundamental strategic principles of national defence, mid-term and long-term priorities and measures both in peacetime

More information

2018 NASS IDEAS Award Application State of Colorado

2018 NASS IDEAS Award Application State of Colorado 2018 NASS IDEAS Award Application State of Colorado Nominating State Office: Secretary of State Wayne W. Williams 1700 Broadway, Suite 200 Denver, CO 80290 303-894-2200 Project Lead and Staff Contact for

More information

STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE

STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE COMMITTEE ON THE JUDICIARY SUBCOMMITTEE ON CRIME AND TERRORISM UNITED STATES SENATE CONCERNING RUSSIAN INTERFERENCE IN

More information

United States Army War College. Strategic Cyberspace Operations Guide

United States Army War College. Strategic Cyberspace Operations Guide United States Army War College Strategic Cyberspace Operations Guide 1 July 2017 Middle States Accreditation The U.S. Army War College is accredited by the Commission on Higher Education of the Middle

More information

MINISTRY OF DEFENCE REPUBLIC OF LATVIA. The State Defence Concept

MINISTRY OF DEFENCE REPUBLIC OF LATVIA. The State Defence Concept MINISTRY OF DEFENCE REPUBLIC OF LATVIA The State Defence Concept Confirmed by the Cabinet of Ministers of the Republic of Latvia on 20 April 2012 Approved by the Saeima (Parliament) on 10 May 2012 The

More information

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Mr. Brian D. Hughes Office of the Deputy Assistant Secretary of Defense for

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.16 August 27, 2012 USD(I) SUBJECT: Counterintelligence Functional Services (CIFS) References: See Enclosure 1 1. PURPOSE. In accordance with the authority

More information

Student Guide: Introduction to Army Foreign Disclosure and Contact Officers

Student Guide: Introduction to Army Foreign Disclosure and Contact Officers Length 30 Minutes Description This introduction introduces the basic concepts of foreign disclosure in the international security environment, specifically in international programs and activities that

More information

Cybersecurity of Voting Machines

Cybersecurity of Voting Machines Statement from the Honorable Tom Schedler Louisiana Secretary of State Former President, National Association of Secretaries of State (NASS), Co-Chair, NASS Elections Committee Member, NASS Election Cybersecurity

More information

Intelligence Preparation of the Information and Communications Environment

Intelligence Preparation of the Information and Communications Environment Intelligence Preparation of the Information and Communications Environment By Jeffrey Carr While the Joint Intelligence Preparation of the Operational Environment (JIPOE) is for offensive purposes, this

More information

BIODEFENSE FOR THE 21 ST CENTURY

BIODEFENSE FOR THE 21 ST CENTURY BIODEFENSE FOR THE 21 ST CENTURY Bioterrorism is a real threat to our country. It s a threat to every nation that loves freedom. Terrorist groups seek biological weapons; we know some rogue states already

More information

Towards a European Non-Proliferation Strategy. May 23, 2003, Paris

Towards a European Non-Proliferation Strategy. May 23, 2003, Paris Gustav LINDSTRÖM Burkard SCHMITT IINSTITUTE NOTE Towards a European Non-Proliferation Strategy May 23, 2003, Paris The seminar focused on three proliferation dimensions: missile technology proliferation,

More information

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD CDR Cameron Chen CWMD Action Officer Deputy Director for Global Operations J-3 Operations Directorate 1 2 Agenda Review of DoD CWMD Strategy WMD Challenge,

More information

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE SECNAV INSTRUCTION 3850.2E DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1 000 NAVY PENTAGON WASHINGTON DC 20350 1000 SECNAVINST 3850.2E DUSN (P) January 3, 2017 From: Subj: Secretary of the Navy DEPARTMENT

More information

2. Deterring the use of nuclear. 4. Maintaining information superiority. 5. Anticipating intelligent systems

2. Deterring the use of nuclear. 4. Maintaining information superiority. 5. Anticipating intelligent systems SEVEN DEFENSE PRIORITIES FOR THE NEW ADMINISTRATION Report of the Defense Science Board DECEMBER 2016 This report summarizes the main findings and recommendations of reports published by the Defense Science

More information

RECORD VERSION STATEMENT BY LIEUTENANT GENERAL JOHN M. MURRAY DEPUTY CHIEF OF STAFF OF THE ARMY, G-8 AND

RECORD VERSION STATEMENT BY LIEUTENANT GENERAL JOHN M. MURRAY DEPUTY CHIEF OF STAFF OF THE ARMY, G-8 AND RECORD VERSION STATEMENT BY LIEUTENANT GENERAL JOHN M. MURRAY DEPUTY CHIEF OF STAFF OF THE ARMY, G-8 AND LIEUTENANT GENERAL JOSEPH ANDERSON DEPUTY CHIEF OF STAFF OF THE ARMY, G-3/5/7 AND LIEUTENANT GENERAL

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE SUBJECT: The Defense Warning Network References: See Enclosure 1 NUMBER 3115.16 December 5, 2013 Incorporating Change 1, Effective April 18, 2018 USD(I) 1. PURPOSE. This

More information

LESSON ONE FUNDAMENTALS OF MILITARY OPERATIONS OTHER THAN WAR. MQS Manual Tasks: OVERVIEW

LESSON ONE FUNDAMENTALS OF MILITARY OPERATIONS OTHER THAN WAR. MQS Manual Tasks: OVERVIEW LESSON ONE FUNDAMENTALS OF MILITARY OPERATIONS OTHER THAN WAR MQS Manual Tasks: 01-9019.00-0001 TASK DESCRIPTION: OVERVIEW In this lesson you will learn the considerations and imperatives, as well as the

More information

THINKING DIFFERENTLY ABOUT NETWORK RESILIENCE

THINKING DIFFERENTLY ABOUT NETWORK RESILIENCE THINKING DIFFERENTLY ABOUT NETWORK RESILIENCE Felix Yao Distinguished Engineer yao_felix@bah.com Patrick Ward Chief Technologist ward_patrick@bah.com THINKING DIFFERENTLY ABOUT NETWORK RESILIENCE THE CHALLENGE:

More information

Appendix II: U.S. Israel Science and Technology Collaboration 2028

Appendix II: U.S. Israel Science and Technology Collaboration 2028 Appendix II: U.S. Israel Science and Technology Collaboration 2028 "Israel 2028: Vision and Strategy for Economy and Society in a Global World, initiated and sponsored by the U.S.-Israel Science and Technology

More information

Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage

Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage Brian Hughes Office of the Deputy Assistant Secretary of Defense for Systems Engineering 19th Annual NDIA Systems Engineering Conference

More information

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress Statement by Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3 Joint Staff Before the 109 th Congress Committee on Armed Services Subcommittee on Terrorism, Unconventional

More information

Iran Nuclear Deal: The Limits of Diplomatic Niceties

Iran Nuclear Deal: The Limits of Diplomatic Niceties Iran Nuclear Deal: The Limits of Diplomatic Niceties Nov. 1, 2017 Public statements don t guarantee a change in policy. By Jacob L. Shapiro Though the rhetoric around the Iran nuclear deal has at times

More information

Electronic Warfare and Satellites Challenges in Assuring Space Capabilities

Electronic Warfare and Satellites Challenges in Assuring Space Capabilities Electronic Warfare and Satellites Challenges in Assuring Space Capabilities Brian Weeden Technical Advisor Secure World Foundation Takeaways Space capabilities play an increasingly important role in national

More information

Postwar America ( ) Lesson 3 The Cold War Intensifies

Postwar America ( ) Lesson 3 The Cold War Intensifies Postwar America (1945-1960) Lesson 3 The Cold War Intensifies Postwar America (1945-1960) Lesson 3 The Cold War Intensifies Learning Objectives Describe how Cold War tensions were intensified by the arms

More information

Programme Curriculum for Master Programme in Entrepreneurship and Innovation

Programme Curriculum for Master Programme in Entrepreneurship and Innovation Programme Curriculum for Master Programme in Entrepreneurship and Innovation 1. Identification Name of programme Master Programme in Entrepreneurship and Innovation Scope of programme 60 ECTS Level Master

More information

Chapter 17: Foreign Policy and National Defense Section 2

Chapter 17: Foreign Policy and National Defense Section 2 Chapter 17: Foreign Policy and National Defense Section 2 Objectives 1. Summarize the functions, components, and organization of the Department of Defense and the military departments. 2. Explain how the

More information

USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings

USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings Preface US Cyber Command hosted its inaugural Cyberspace Strategy Symposium at National Defense University on February 15, 2018. This day-long

More information

Preserving Investigative and Operational Viability in Insider Threat

Preserving Investigative and Operational Viability in Insider Threat Preserving Investigative and Operational Viability in Insider Threat September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Overview Welcome Your Insider Threat Program

More information

USASMDC/ARSTRAT & JFCC IMD Update. Space and Missile Defense Capabilities for the Warfighter

USASMDC/ARSTRAT & JFCC IMD Update. Space and Missile Defense Capabilities for the Warfighter USASMDC/ARSTRAT & JFCC IMD Update Space and Missile Defense Capabilities for the Warfighter LTG Richard P. Formica Space and Missile Defense Conference 16 August 2012 1 Our Reporting Chain Our Mission

More information

INTELLIGENCE AND US NATIONAL SECURITY POLICYMAKING (RPAD 558)

INTELLIGENCE AND US NATIONAL SECURITY POLICYMAKING (RPAD 558) INTELLIGENCE AND US NATIONAL SECURITY POLICYMAKING (RPAD 558) Instructor: James E. Steiner, PhD Public Service Professor Rockefeller College SUNY Albany 313A Milne 518 708 4183 Office hours: by appointment

More information

GAO ECONOMIC ESPIONAGE. Information on Threat From U.S. Allies. Testimony Before the Select Committee on Intelligence United States Senate.

GAO ECONOMIC ESPIONAGE. Information on Threat From U.S. Allies. Testimony Before the Select Committee on Intelligence United States Senate. GAO United States General Accounting Office Testimony Before the Select Committee on Intelligence United States Senate For Release on Delivery Expected at 10:30 a.m., EST Wednesday, February 28, 1996 ECONOMIC

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Exam Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The realm of policy decisions concerned primarily with relations between the United States

More information

Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski. Before the House Permanent Select Committee on Intelligence

Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski. Before the House Permanent Select Committee on Intelligence Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski Before the House Permanent Select Committee on Intelligence August 4, 2004 Introduction Good afternoon, Mr. Chairman and

More information

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity THE UNDER SECRETARY OF DEFENSE 2000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-2000 POLICY October 1, 2010 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Directive-Type Memorandum (DTM) 10-018 Law Enforcement

More information

Programme Curriculum for Master Programme in Entrepreneurship

Programme Curriculum for Master Programme in Entrepreneurship Programme Curriculum for Master Programme in Entrepreneurship 1. Identification Name of programme Master Programme in Entrepreneurship Scope of programme 60 ECTS Level Master level Programme code Decision

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE COST ($ in Millions) Years FY 2012 FY 2013 # ## FY 2015 FY 2016 FY 2017 FY 2018 Air Force Page 1 of 11 R-1 Line #36 To Program Element - 7.074 10.429 28.764-28.764 21.717 22.687 20.902 20.383 Continuing

More information

Cooperative Cyber Defence Centre of Excellence

Cooperative Cyber Defence Centre of Excellence Cooperative Cyber Defence Centre of Excellence Col Ilmar Tamm Director 02 November 2010 Disclaimer This briefing is a product of the CCD COE. It does not represent the opinions or policies of NATO and

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.16 August 27, 2012 Incorporating Change 2, July 28, 2017 USD(I) SUBJECT: Counterintelligence Functional Services (CIFS) References: See Enclosure 1 1. PURPOSE.

More information

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force Air Force Science & Technology Strategy 2010 F AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff ~~~ Secretary of the Air Force REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188

More information