Cyber operations poised to take centre stage in US

Size: px
Start display at page:

Download "Cyber operations poised to take centre stage in US"

Transcription

1 Cyber operations poised to take centre stage in US [Content preview Subscribe to Jane s Intelligence Review for full article] US President Donald Trump announced on 18 August the elevation of the United States Cyber Command to a full combatant command. Tanner Johnson examines the implications of the elevation for the US intelligence community, and the opportunities and challenges that the new status will bring US Cyber Command (USCYBERCOM), the nexus of the burgeoning arsenal of cyber capabilities of the United States, is set to be elevated to a unified combatant command (COCOM) after an 18 August order from President Donald Trump. The move will place the organisation on the same level as the existing six geographical and three functional unified COCOMs, and will set in motion its eventual separation from the National Security Agency (NSA) and the maturation of its role as the provider of military cyber options. However, six years after the command began operations, the question that is still occupying policy-makers is how military cyber operations and espionage will be divided. NSA director and USCYBERCOM commander Admiral Michael Rogers takes questions during his keynote address to the Armed Forces Communications and Electronics Association's sixth annual Cybersecurity Technology Summit at the Capitol Hilton on 2 April 2015 in Washington, DC. USCYBERCOM is set to be elevated to a unified COCOM, with Adm Rogers possibly a candidate for re-nomination. (Chip Somodevilla/Getty Images) Since its creation as a sub-unified COCOM in 2009, USCYBERCOM has been jointly housed and commanded with the NSA, first by General Keith Alexander, and since 2014 by Admiral Michael Rogers. The dual-hat role was intended to take advantage of the NSA's existing expertise in cyber Page 1 of 6

2 while enabling USCYBERCOM to rapidly develop its own abilities. Although the two organisations have shared space at Fort Meade, Maryland, their legal authorities are starkly divided. Espionage is largely omitted from international law, whereas the laws for military operations are much more specifically delineated. In the US, this division exists between two sections of the US Code, Title 10 (which covers the roles of the armed forces) and Title 50 (which includes chapters on espionage and similar activities). These provide differing legal justifications for the intelligence community and the military. The NSA got its start in cyber because of its responsibilities for signals intelligence, a role that inevitably led to an emphasis on cyber capacity given the development of computer technology. However, beyond intercepting communications, how the intelligence community will operate in the cyber domain, whether in offensive actions or more passive collection techniques, is still being mapped out. "The intelligence community is disproportionately in the business of collecting intelligence," Sue Gordon, the principal deputy director of national intelligence told Jane's in September "It's a blurry domain where we have to deconflict our activities, but what governs those activities is pretty clear." USCYBERCOM and the NSA: Vital statistics (IHS Markit/US government) Details about the elevation of USCYBERCOM to a unified COCOM are still being determined, and no candidate has been formally nominated yet to run the command, although Adm Rogers could be re-nominated. Trump's decision also did not specifically require that the NSA and USCYBERCOM split, although officials appear to acknowledge that a split will follow soon after USCYBERCOM achieves its new heightened position. Several sources familiar with thinking within Page 2 of 6

3 the NSA described in early September to Jane's a sense of relief and excitement that the agency was going to have the opportunity to return to its position in the intelligence community and would not be encumbered by its responsibilities to help a military command. Still, separating military from intelligence cyber operations will likely require years of work. Roots of USCYBERCOM USCYBERCOM was created on 23 June 2009 as a subordinate unified COCOM under the authority of the US Strategic Command (USSTRATCOM). The command was ultimately conceived in an effort to consolidate cyberspace operations, unify the direction of cyberspace operations, strengthen US Department of Defense (DoD) cyberspace capabilities, and integrate and bolster the DoD's cyber expertise. The newly created subordinate COCOM grew rapidly. USCYBERCOM achieved full operational capability on 31 October 2010, and outlined three primary areas of focus as part of its overall organisational effort: to provide defence for the DoD Information Network, to provide support to combatant commanders for execution of their missions around the world, and to strengthen the nation's ability to withstand and respond to cyber attacks. Command structure: Glossary of terms (IHS Markit) The mission statement for USCYBERCOM is contained within the emblem of the command itself, as the text string '9ec4c12949a4f31474f299058ce2b22a' can be found on the inner ring of the emblem. Pressure to promote Since its inception, there has been substantial pressure within the national security and defence communities to elevate USCYBERCOM to a unified COCOM. Gen Alexander, the first commander of USCYBERCOM, began to publicly discuss the possibility of elevation almost immediately after the command's creation. The ultimate decision to classify USCYBERCOM as a subordinate Page 3 of 6

4 command was originally based on several concerns, including the nature of the perceived threat at the time of the command's inception and the expectation that a more thorough understanding of the various risks to the DoD's cyber infrastructure would be needed, which was a substantial task. The demand for a substantive response capability had grown increasingly urgent, given the escalating frequency of attempted or actual penetrations of US government and military networks by foreign powers. Exact figures are not available, but many millions of cyber attacks have been mounted against the Pentagon leading it even to sponsor a 'Hack the Pentagon' programme of penetration testing against its own networks and thousands of automated but easily blocked cyber attacks occur every hour. The development and deployment of a subordinate COCOM under USSTRATCOM was intended to alleviate some of the more immediate and crucial cyber-capability demands across the DoD. This intermediate step was intended to give the newly established command the time needed to gestate and mature while under USSTRATCOM, eventually developing a unified strategy towards the synchronisation of all cyber efforts and capabilities across the DoD under its own COCOM. Official elevation The overall goal of a unified military cyber COCOM officially materialised during a White House press conference on 18 August During this announcement, Trump declared that the status of USCYBERCOM would finally be elevated to that of a fully fledged and independent unified COCOM for the country's cyberspace operations. Trump said that the "United States Cyber Command's elevation will also help streamline command and control of time-sensitive cyberspace operations by consolidating them under a single commander with authorities commensurate with the importance of such operations". He added, "Elevation will also ensure that critical cyberspace operations are adequately funded." Trump also acknowledged that such an effort would ultimately require USCYBERCOM to be effectively separated from the NSA. The decision to elevate USCYBERCOM to its own COCOM places all US military cyber operations on the same level as the military's more traditional combat environments. However, such a move is likely to be costly, in both time and financial resources. For instance, during congressional testimony in May, Adm Rogers requested a budget of roughly USD647 million for USCYBERCOM for fiscal year (FY) This is nearly a 16% increase from FY 2017 funding for its efforts as a subcommand. Adm Rogers went on to argue that cyber security was a national security issue, not limited to just the private or public sectors. This thinking was echoed in a May article published in Defense Media Activity by Cheryl Pellerin, a reporter for the DoD, which argued that such a classification demanded a 'whole-of-nation' approach in order to effectively address future threats. In a special report available on its website, the DoD specifically recognised that "state and nonstate actors threaten disruptive and destructive attacks against the United States and conduct cyber-enabled theft of intellectual property to undercut the United States' technological and military advantage. DoD must develop its cyber forces and strengthen its cyber defense and cyber deterrence posture". In order to accomplish its missions, one of the primary objectives of the new COCOM is to build up a comprehensive Cyber Mission Force. Page 4 of 6

5 The seals of USCYBERCOM, the NSA, and the Central Security Service greet employees and visitors at the campus that the three organisations share, 13 March 2015, Fort Meade, Maryland. USCYBERCOM's elevation to a unified COCOM will lead to its split from the NSA. (Chip Somodevilla/Getty Images) Opposition Despite Trump's announcement, Jane's judges that based on the execution timeline of similar congressional initiatives the status elevation of USCYBERCOM is likely to take more than a year to generate tangible results. For example, although there appears to be a shared consensus among all divisions of the DoD regarding the fundamental requirement for a properly unified cyber authority, as well as a common understanding and respect for the risks posed by potential cyber threats, there is likely to be a considerable amount of internal opposition to this effort. Although the incubation of USCYBERCOM as a subordinate command provided a stopgap for the most imperative cyber requirements across the DoD, it simultaneously created an environment that could hinder its own future development. In the absence of a previously established and independent cyber COCOM, each military operational command and defence agency has had to develop an individual and customised cyber-security capability to effectively meet their own unique security demands. However, such an effort is no simple task. Due to the amount of time it takes such specialised cyber-security efforts to become fully established, let alone effective, it is likely that these divisions would prefer to maintain their independence in this domain. The desire to retain this hard-fought autonomy could provide substantial resistance to any effort that requires such authority to be relinquished to that of another COCOM. Additional opposition stems from a concern that the current DoD cyber requirement does not warrant an elevation to a unified COCOM. For example, former chair of the Joint Chiefs of Staff General Martin Dempsey told the Senate Armed Services Committee in 2013 that an independent USCYBERCOM would make sense down the road but served little current purpose. Another risk is that if the current substantial public and media focus on cyber security fades, a senior-level cyber COCOM could lose momentum akin to US Space Command (USSPACECOM). Page 5 of 6

6 Created as a full-fledged COCOM in 1985 amid the fervour over the Strategic Defense Initiative, USSPACECOM ultimately merged with USSTRATCOM in 2002 as part of a new Unified Command Plan intended to transform and consolidate military command operations. Furthermore, this change comes in the context of ongoing uncertainty surrounding the Trump administration's commitment to cyber-security-related programmes and their respective efforts. Eight of the 27 members of the US government's National Infrastructure Advisory Council (NIAC) resigned en masse in August. The group, with various tasks that also include overseeing national cyber-security concerns, cited apprehension about the Trump administration's attention to and respect for the severity of the various cyber threats facing the infrastructure of the nation as a whole. On the web Joint UK-US cyber exercise tests preparednesseu and NATO design response to cyber-attacks Author Tanner Johnson is a Senior Research Analyst for Intelligence, Cyber Operations, and Services at Jane's Markets Forecast. Additional reporting by Zachary Fryer-Biggs, senior Pentagon reporter for Jane's. For the full version and more content: Jane's Military & Security Assessments Intelligence Centre This analysis is taken from Jane s Military & Security Assessments Intelligence Centre, which delivers comprehensive and reliable country risk and military capabilities information, analysis and daily insight. IHS country risk and military capabilities news and analysis is also available within Jane s Intelligence Review. To learn more and to subscribe to Jane s Intelligence Review online, offline or print visit: For advertising solutions visit Jane s Advertising Page 6 of 6

National Security Cyber Trends ALAMO ACE Presentation

National Security Cyber Trends ALAMO ACE Presentation National Security Cyber Trends ALAMO ACE Presentation Lt Gen (ret) Kevin McLaughlin November 16, 2016 Context Operational Perspective USCYBERCOM directs an overall enterprise of 12,000 personnel and a

More information

Evolutionary Acquisition and Spiral Development in DOD Programs: Policy Issues for Congress

Evolutionary Acquisition and Spiral Development in DOD Programs: Policy Issues for Congress Order Code RS21195 Updated December 11, 2006 Summary Evolutionary Acquisition and Spiral Development in DOD Programs: Policy Issues for Congress Gary J. Pagliano and Ronald O Rourke Specialists in National

More information

Evolutionary Acquisition an Spiral Development in Programs : Policy Issues for Congress

Evolutionary Acquisition an Spiral Development in Programs : Policy Issues for Congress Order Code RS21195 Updated April 8, 2004 Summary Evolutionary Acquisition an Spiral Development in Programs : Policy Issues for Congress Gary J. Pagliano and Ronald O'Rourke Specialists in National Defense

More information

CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM

CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM 1 CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM The overall classification of this briefing is: Classified By: jhgrady Derived From: USCYBERCOM SCG Dated: 20150415 2 3 4 Organizational Structure Commander

More information

Fact Sheet: FY2017 National Defense Authorization Act (NDAA) DOD Reform Proposals

Fact Sheet: FY2017 National Defense Authorization Act (NDAA) DOD Reform Proposals Fact Sheet: FY2017 National Defense Authorization Act (NDAA) DOD Reform Proposals Kathleen J. McInnis Analyst in International Security May 25, 2016 Congressional Research Service 7-5700 www.crs.gov R44508

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #169

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #169 COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 59.342 38.099 67.057-67.057 73.790 71.702

More information

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES (Federal Register Vol. 40, No. 235 (December 8, 1981), amended by EO 13284 (2003), EO 13355 (2004), and EO 13470 (2008)) PREAMBLE Timely, accurate,

More information

Advance Questions for Vice Admiral Michael S. Rogers, USN Nominee for Commander, United States Cyber Command

Advance Questions for Vice Admiral Michael S. Rogers, USN Nominee for Commander, United States Cyber Command Advance Questions for Vice Admiral Michael S. Rogers, USN Nominee for Commander, United States Cyber Command Defense Reforms The Goldwater-Nichols Department of Defense Reorganization Act of 1986 and the

More information

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD

More information

Cyber Strategy & Policy: International Law Dimensions. Written Testimony Before the Senate Armed Services Committee

Cyber Strategy & Policy: International Law Dimensions. Written Testimony Before the Senate Armed Services Committee Cyber Strategy & Policy: International Law Dimensions Written Testimony Before the Senate Armed Services Committee Matthew C. Waxman Liviu Librescu Professor of Law, Columbia Law School Co-Chair, Columbia

More information

THINKING DIFFERENTLY ABOUT NETWORK RESILIENCE

THINKING DIFFERENTLY ABOUT NETWORK RESILIENCE THINKING DIFFERENTLY ABOUT NETWORK RESILIENCE Felix Yao Distinguished Engineer yao_felix@bah.com Patrick Ward Chief Technologist ward_patrick@bah.com THINKING DIFFERENTLY ABOUT NETWORK RESILIENCE THE CHALLENGE:

More information

Joint Information Environment. White Paper. 22 January 2013

Joint Information Environment. White Paper. 22 January 2013 White Paper "To fight and conquer in all bottles is not supreme excellence; supreme excellence consists in breaking the enemy's resistance without fighting." -Sun Tzu "Some people think design means how

More information

UNCLASSIFIED/ AFCEA Alamo Chapter. MG Garrett S. Yee. Acting Cybersecurity Director Army Chief Information Officer/G-6. June 2017 UNCLASSIFIED

UNCLASSIFIED/ AFCEA Alamo Chapter. MG Garrett S. Yee. Acting Cybersecurity Director Army Chief Information Officer/G-6. June 2017 UNCLASSIFIED AFCEA Alamo Chapter MG Garrett S. Yee Acting Cybersecurity Director Army Chief Information Officer/G-6 June 2017 1 We ve come a LONG way.. In 157 years. Tomorrow, July 21 st is a very important date for

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE COMMANDER THRID AIR FORCE THIRD AIR FORCE INSTRUCTION 31-209 15 FEBRUARY 2004 Incorporating Change 1, 2 December 2014 Certified Current on 20 February 2015 Security INSTALLATION SECURITY

More information

WEST POINT CYBER INITIATIVES

WEST POINT CYBER INITIATIVES CYBER INITIATIVES A PRESSING NEED Our nation and our military are at a critical juncture. Cyberspace operations are a critical part of war fighting, and cyber warriors seek direct engagement with humans

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 7 R-1 Line #73

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 7 R-1 Line #73 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.02 March 17, 2015 USD(I) SUBJECT: Counterintelligence (CI) References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) O-5240.02

More information

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI) Federal Bureau of Investigation (FBI) FY 2010 Budget Request At A Glance FY 2009 Enacted: Current Services Adjustments: Program Changes: FY 2010 Budget Request: Change from FY 2009 Enacted: $7,301.2 million

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: Counterintelligence (CI) Analysis and Production References: See Enclosure 1 NUMBER 5240.18 November 17, 2009 Incorporating Change 2, Effective April 25, 2018

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE SUBJECT: The Defense Warning Network References: See Enclosure 1 NUMBER 3115.16 December 5, 2013 Incorporating Change 1, Effective April 18, 2018 USD(I) 1. PURPOSE. This

More information

Thanks, Ray, for your introduction and for the invitation to be here today.

Thanks, Ray, for your introduction and for the invitation to be here today. Reinvigorating the Air Force Nuclear Enterprise Center for Strategic and International Studies The Honorable Michael B. Donley Secretary of the Air Force November 12, 2008 As prepared for delivery Thanks,

More information

USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings

USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings Preface US Cyber Command hosted its inaugural Cyberspace Strategy Symposium at National Defense University on February 15, 2018. This day-long

More information

Strengthening partnerships: Nordic defence collaboration amid regional security concerns

Strengthening partnerships: Nordic defence collaboration amid regional security concerns Strengthening partnerships: Nordic defence collaboration amid regional security concerns [Content preview Subscribe to IHS Jane s Defence Weekly for full article] While still nascent, Nordic defence co-operation

More information

In order to cross the walls of the city, not a single act of violence was needed. All that was needed was the good faith and naivety of the enemy.

In order to cross the walls of the city, not a single act of violence was needed. All that was needed was the good faith and naivety of the enemy. Speech by the Chief of Defence of the Armed Forces of the Netherlands, Admiral Rob Bauer, at the International Operational Cyber Symposium on October 26 th 2017, Amsterdam Note: check against delivery!

More information

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350-3000 MCO 3100.4 PLI MARINE CORPS ORDER 3100.4 From: To: Subj: Commandant of the Marine Corps

More information

FOLLOW-UP AUDIT OF THE FEDERAL BUREAU OF INVESTIGATION S EFFORTS TO HIRE, TRAIN, AND RETAIN INTELLIGENCE ANALYSTS

FOLLOW-UP AUDIT OF THE FEDERAL BUREAU OF INVESTIGATION S EFFORTS TO HIRE, TRAIN, AND RETAIN INTELLIGENCE ANALYSTS FOLLOW-UP AUDIT OF THE FEDERAL BUREAU OF INVESTIGATION S EFFORTS TO HIRE, TRAIN, AND RETAIN INTELLIGENCE ANALYSTS U.S. Department of Justice Office of the Inspector General Audit Division Audit Report

More information

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, Marines, and Civilians who serve each day and are either involved in war, preparing for war, or executing

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 16-607 25 MARCH 2016 Operations Support SUPPORT TO THE PROLIFERATION SECURITY INITIATIVE AND COUNTERPROLIFERATION INTERDICTION OPERATIONS

More information

To be prepared for war is one of the most effectual means of preserving peace.

To be prepared for war is one of the most effectual means of preserving peace. The missions of US Strategic Command are diverse, but have one important thing in common with each other: they are all critical to the security of our nation and our allies. The threats we face today are

More information

JFHQ DODIN Update. The overall classification of this briefing is: UNCLASSIFIED Lt Col Patrick Daniel JFHQ-DODIN J5 As of: 21 April 2016 UNCLASSIFIED

JFHQ DODIN Update. The overall classification of this briefing is: UNCLASSIFIED Lt Col Patrick Daniel JFHQ-DODIN J5 As of: 21 April 2016 UNCLASSIFIED JFHQ DODIN Update The overall classification of this briefing is: Lt Col Patrick Daniel JFHQ-DODIN J5 As of: 21 April 2016 1 Presentation Disclaimer "The information provided in this briefing is for general

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 NUMBER 5205.02-M November 3, 2008 Incorporating Change 1, Effective April 26, 2018 USD(I)

More information

Information System Security

Information System Security July 19, 2002 Information System Security DoD Web Site Administration, Policies, and Practices (D-2002-129) Department of Defense Office of the Inspector General Quality Integrity Accountability Additional

More information

THE MILITARY STRATEGY OF THE REPUBLIC OF LITHUANIA

THE MILITARY STRATEGY OF THE REPUBLIC OF LITHUANIA APPROVED by the order No. V-252 of the Minister of National Defence of the Republic of Lithuania, 17 March 2016 THE MILITARY STRATEGY OF THE REPUBLIC OF LITHUANIA 2 TABLE OF CONTENTS I CHAPTER. General

More information

DEPARTMENT OF THE NAVY CONTINUITY OF OPERATIONS (DON COOP) PROGRAM

DEPARTMENT OF THE NAVY CONTINUITY OF OPERATIONS (DON COOP) PROGRAM DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON, DC 20350-1000 SECNAVINST 3030.4A N3/N5 SECNAV INSTRUCTION 3030.4A To: Subj: Ref: Chief of Naval Operations Commandant of the

More information

A fresh start for registration. Improving how we register providers of all health and adult social care services

A fresh start for registration. Improving how we register providers of all health and adult social care services A fresh start for registration Improving how we register providers of all health and adult social care services The Care Quality Commission is the independent regulator of health and adult social care

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5200.27 January 7, 1980 SUBJECT: Acquisition of Information Concerning Persons and Organizations not Affiliated with the Department of Defense References: (a) DoD

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.16 August 27, 2012 USD(I) SUBJECT: Counterintelligence Functional Services (CIFS) References: See Enclosure 1 1. PURPOSE. In accordance with the authority

More information

TECHNIQUES, AND PROCEDURES, AND OF MILITARY RULES OF ENGAGEMENT, FROM RELEASE UNDER FREEDOM OF

TECHNIQUES, AND PROCEDURES, AND OF MILITARY RULES OF ENGAGEMENT, FROM RELEASE UNDER FREEDOM OF 1 9 10 11 1 1 1 1 1 1 1 19 0 1 SEC.. EXEMPTION OF INFORMATION ON MILITARY TACTICS, TECHNIQUES, AND PROCEDURES, AND OF MILITARY RULES OF ENGAGEMENT, FROM RELEASE UNDER FREEDOM OF INFORMATION ACT. (a) EXEMPTION.

More information

Department of Defense DIRECTIVE. SUBJECT: Under Secretary of Defense for Policy (USD(P))

Department of Defense DIRECTIVE. SUBJECT: Under Secretary of Defense for Policy (USD(P)) Department of Defense DIRECTIVE NUMBER 5111.1 December 8, 1999 DA&M SUBJECT: Under Secretary of Defense for Policy (USD(P)) References: (a) Title 10, United States Code (b) DoD Directive 5111.1, "Under

More information

The 19th edition of the Army s capstone operational doctrine

The 19th edition of the Army s capstone operational doctrine 1923 1939 1941 1944 1949 1954 1962 1968 1976 1905 1910 1913 1914 The 19th edition of the Army s capstone operational doctrine 1982 1986 1993 2001 2008 2011 1905-1938: Field Service Regulations 1939-2000:

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete

More information

DOD DIRECTIVE DOD CONTINUITY POLICY

DOD DIRECTIVE DOD CONTINUITY POLICY DOD DIRECTIVE 3020.26 DOD CONTINUITY POLICY Originating Component: Office of the Under Secretary of Defense for Policy Effective: February 14, 2018 Releasability: Reissues and Cancels: Approved by: Cleared

More information

Bridging the Security Divide

Bridging the Security Divide Bridging the Security Divide Jody R. Westby, Esq. World Federation of Scientists 43 nd Session August 21, 2010 The Security Divide 1.97 billion people Internet users and 233 countries & territories Systems

More information

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning Subject Area DOD EWS 2006 CYBER ATTACK: THE DEPARTMENT OF DEFENSE S INABILITY TO PROVIDE CYBER INDICATIONS AND

More information

Donald Mancuso Deputy Inspector General Department of Defense

Donald Mancuso Deputy Inspector General Department of Defense Statement by Donald Mancuso Deputy Inspector General Department of Defense before the Senate Committee on Armed Services on Issues Facing the Department of Defense Regarding Personnel Security Clearance

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5510.165A DNS OPNAV INSTRUCTION 5510.165A From: Chief of Naval Operations Subj: NAVY

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5205.02-M November 3, 2008 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 1. PURPOSE. In accordance with the authority in

More information

Senate Select Committee on Intelligence. July 3, 2018

Senate Select Committee on Intelligence. July 3, 2018 Senate Select Committee on Intelligence July 3, 2018 The Senate Select Committee on Intelligence (SSCI) is conducting a bipartisan investigation into a wide range of Russian activities relating to the

More information

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC SUBJECT: Implementation of Microsoft Windows 10 Secure Host Baseline

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC SUBJECT: Implementation of Microsoft Windows 10 Secure Host Baseline DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC 20301 1010 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Implementation of Microsoft Windows 10 Secure Host Baseline FEB Z 6 2016 After consultation

More information

The current Army operating concept is to Win in a complex

The current Army operating concept is to Win in a complex Army Expansibility Mobilization: The State of the Field Ken S. Gilliam and Barrett K. Parker ABSTRACT: This article provides an overview of key definitions and themes related to mobilization, especially

More information

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force Air Force Science & Technology Strategy 2010 F AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff ~~~ Secretary of the Air Force REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships balance between our need for security and preserving those freedoms that make us who

More information

Office of the Inspector General Department of Defense

Office of the Inspector General Department of Defense o0t DISTRIBUTION STATEMENT A Approved for Public Release Distribution Unlimited FOREIGN COMPARATIVE TESTING PROGRAM Report No. 98-133 May 13, 1998 Office of the Inspector General Department of Defense

More information

Behind the Scenes of Intelligence Resourcing

Behind the Scenes of Intelligence Resourcing TOP SECRET//SI//TK//NOFORN Behind the Scenes of Intelligence Resourcing ASMC PDI Workshop 38 1 June 2017 TOP SECRET//SI//TK//NOFORN What is Intelligence? Intelligence is information gathered within or

More information

Space as a War-fighting Domain

Space as a War-fighting Domain Space as a War-fighting Domain Lt Gen David D. T. Thompson, USAF Col Gregory J. Gagnon, USAF Maj Christopher W. McLeod, USAF Disclaimer: The views and opinions expressed or implied in the Journal are those

More information

It is now commonplace to hear or read about the urgent need for fresh thinking

It is now commonplace to hear or read about the urgent need for fresh thinking Deterrence in Professional Military Education Paul I. Bernstein * It is now commonplace to hear or read about the urgent need for fresh thinking on deterrence and for rebuilding the intellectual and analytic

More information

WHO s response, and role as the health cluster lead, in meeting the growing demands of health in humanitarian emergencies

WHO s response, and role as the health cluster lead, in meeting the growing demands of health in humanitarian emergencies SIXTY-FIFTH WORLD HEALTH ASSEMBLY A65/25 Provisional agenda item 13.15 16 March 2012 WHO s response, and role as the health cluster lead, in meeting the growing demands of health in humanitarian emergencies

More information

DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND POLICIES. Support Agreements

DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND POLICIES. Support Agreements DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 DISA INSTRUCTION 640-50-6* POLICIES Support Agreements 1. Purpose. This Instruction prescribes policy, assigns responsibility,

More information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information GAO United States General Accounting Office Report to the Committee on Armed Services, U.S. Senate March 2004 INDUSTRIAL SECURITY DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection

More information

PART III NATO S CIVILIAN AND MILITARY STRUCTURES CHAPTER 12

PART III NATO S CIVILIAN AND MILITARY STRUCTURES CHAPTER 12 PART III NATO S CIVILIAN AND MILITARY STRUCTURES CHAPTER 7 CHAPTER 8 CHAPTER 9 CHAPTER 10 CHAPTER 11 CHAPTER 12 Civilian organisation and structures The Staff s key functions Military organisation and

More information

Specialised Commissioning Oversight Group. Terms of Reference

Specialised Commissioning Oversight Group. Terms of Reference Specialised Commissioning Oversight Group Terms of Reference Specialised commissioning oversight group terms of reference 1 1.1 Purpose NHS England is responsible for commissioning specialised services

More information

The FBI s Field Intelligence Groups and Police

The FBI s Field Intelligence Groups and Police The FBI s Field Intelligence Groups and Police Joining Forces By an analyst with the FBI's Directorate of Intelligence ince the terrorist attacks of September 11, 2001, managing and sharing Stimely threat

More information

An Interview with Gen John E. Hyten

An Interview with Gen John E. Hyten Commander, USSTRATCOM Conducted 27 July 2017 General John E. Hyten is Commander of US Strategic Command (USSTRATCOM), one of nine Unified Commands under the Department of Defense. USSTRATCOM is responsible

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.16 August 27, 2012 Incorporating Change 2, July 28, 2017 USD(I) SUBJECT: Counterintelligence Functional Services (CIFS) References: See Enclosure 1 1. PURPOSE.

More information

GAO. Testimony Before the Committee on Government Reform, House of Representatives

GAO. Testimony Before the Committee on Government Reform, House of Representatives GAO United States General Accounting Office Testimony Before the Committee on Government Reform, House of Representatives For Release on Delivery Expected at 10:00 a.m. EDT Thursday, May 6, 2004 DOD PERSONNEL

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate Exhibit R-2, RDT&E Budget Item Justification: PB 2011 Air Force DATE: February 2010 COST ($ in Millions) FY 2009 Actual FY 2010 FY 2012 FY 2013 FY 2014 FY 2015 To Complete Program Element 0.000 35.533

More information

NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION

NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION Executive Summary Proliferation of WMD NATO s 2009 Comprehensive

More information

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-6 CJCSI 5128.02 DISTRIBUTION: A, B, C MISSION PARTNER ENVIRONMENT EXECUTIVE STEERING COMMITTEE; COALITION INTEROPERABILITY ASSURANCE AND VALIDATION WORKING

More information

The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects

The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects Power Projection through Cyberspace Capt Jason M. Gargan, USAF Disclaimer: The views and opinions expressed or

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5000.55 November 1, 1991 SUBJECT: Reporting Management Information on DoD Military and Civilian Acquisition Personnel and Positions ASD(FM&P)/USD(A) References:

More information

Sharing due diligence

Sharing due diligence Sharing due diligence Collaborating to enable more effective due diligence for funders and CSOs In order to provide the most enabling environment for CSOs working in the Global South, funders can take

More information

DEPARTMENT OF THE ARMY PROGRAM ANALYSIS AND EVALUATION 700 ARMY PENTAGON WASHINGTON, DC August 20, 2018

DEPARTMENT OF THE ARMY PROGRAM ANALYSIS AND EVALUATION 700 ARMY PENTAGON WASHINGTON, DC August 20, 2018 DEPARTMENT OF THE ARMY PROGRAM ANALYSIS AND EVALUATION 700 ARMY PENTAGON WASHINGTON, DC 20310-0700 August 20, 2018 To the Army's Functional Area 49 (FA49) officers, Greetings to the Army s Operations Research/Systems

More information

Coalition Command and Control: Peace Operations

Coalition Command and Control: Peace Operations Summary Coalition Command and Control: Peace Operations Strategic Forum Number 10, October 1994 Dr. David S. Alberts Peace operations differ in significant ways from traditional combat missions. As a result

More information

2018 NASS IDEAS Award Application State of Colorado

2018 NASS IDEAS Award Application State of Colorado 2018 NASS IDEAS Award Application State of Colorado Nominating State Office: Secretary of State Wayne W. Williams 1700 Broadway, Suite 200 Denver, CO 80290 303-894-2200 Project Lead and Staff Contact for

More information

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC 20301-1010 June 21, 2017 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Directive-Type Memorandum (DTM) 17-007 Interim Policy and Guidance for

More information

National Defense University. Institute for National Strategic Studies

National Defense University. Institute for National Strategic Studies National Defense University Institute for National Strategic Studies Interim Research Work Plan National Defense University Institute for National Strategic Studies Interim Research Work Plan Contents

More information

24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace

24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace 24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace Maj Gen Chris Wedge Weggeman Commander OVERALL CLASSIFICATION OF THIS BRIEFING IS Our Journey Today Cyber IN War A little bit about Air Forces

More information

STATEMENT OF ADMIRAL MICHAEL S. ROGERS COMMANDER UNITED STATES CYBER COMMAND BEFORE THE SENATE COMMITTEE ON ARMED SERVICES 19 MARCH 2015

STATEMENT OF ADMIRAL MICHAEL S. ROGERS COMMANDER UNITED STATES CYBER COMMAND BEFORE THE SENATE COMMITTEE ON ARMED SERVICES 19 MARCH 2015 STATEMENT OF ADMIRAL MICHAEL S. ROGERS COMMANDER UNITED STATES CYBER COMMAND BEFORE THE SENATE COMMITTEE ON ARMED SERVICES 19 MARCH 2015 Chairman McCain, Senator Reed, and distinguished members of the

More information

NATIONAL DEFENSE PROGRAM GUIDELINES, FY 2005-

NATIONAL DEFENSE PROGRAM GUIDELINES, FY 2005- (Provisional Translation) NATIONAL DEFENSE PROGRAM GUIDELINES, FY 2005- Approved by the Security Council and the Cabinet on December 10, 2004 I. Purpose II. Security Environment Surrounding Japan III.

More information

The Security War. AAPA Security Meeting Jul 18, Jay Grant, Director Port Security Council

The Security War. AAPA Security Meeting Jul 18, Jay Grant, Director Port Security Council The Security War AAPA Security Meeting Jul 18, 2007 Jay Grant, Director Port Security Council Port Security Council Mission + The Council brings public port authorities and commercial partners together

More information

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Mr. Brian D. Hughes Office of the Deputy Assistant Secretary of Defense for

More information

CHAPTER 4 : VALUE SYSTEM AND VALUE CHAIN OVERVIEW 4.1 THE VALUE SYSTEM FOR SOUTH AFRICAN NATIONAL DEFENCE

CHAPTER 4 : VALUE SYSTEM AND VALUE CHAIN OVERVIEW 4.1 THE VALUE SYSTEM FOR SOUTH AFRICAN NATIONAL DEFENCE CHAPTER 4 : VALUE SYSTEM AND VALUE CHAIN OVERVIEW 4.1 THE VALUE SYSTEM FOR SOUTH AFRICAN NATIONAL DEFENCE The top-level value system consists of the DoD, the national and international environments. The

More information

Department of Defense DIRECTIVE. SUBJECT: Assistant Secretary of Defense for International Security Policy (ASD(ISP))

Department of Defense DIRECTIVE. SUBJECT: Assistant Secretary of Defense for International Security Policy (ASD(ISP)) Department of Defense DIRECTIVE NUMBER 5111.14 March 22, 2005 SUBJECT: Assistant Secretary of Defense for International Security Policy (ASD(ISP)) DA&M References: (a) Title 10, United States Code (b)

More information

STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE

STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE COMMITTEE ON THE JUDICIARY SUBCOMMITTEE ON CRIME AND TERRORISM UNITED STATES SENATE CONCERNING RUSSIAN INTERFERENCE IN

More information

Course Assistants and staff

Course Assistants and staff IGA-240: CYBER AND INFORMATION OPERATIONS: TECHNOLOGY, POLICY AND THE LAW Fall 2017/18, T/Th 8:45 10:00am L230 Instructor Eric Rosenbach eric_rosenbach@hks.harvard.edu L-362 Course Assistants and staff

More information

EVERGREEN IV: STRATEGIC NEEDS

EVERGREEN IV: STRATEGIC NEEDS United States Coast Guard Headquarters Office of Strategic Analysis 9/1/ UNITED STATES COAST GUARD Emerging Policy Staff Evergreen Foresight Program The Program The Coast Guard Evergreen Program provides

More information

Fiscal Year (FY) 2011 Budget Estimates

Fiscal Year (FY) 2011 Budget Estimates Fiscal Year (FY) 2011 Budget Estimates Attack the Network Defeat the Device Tr ai n the Force February 2010 JUSTIFICATION OF FISCAL YEAR (FY) 2011 BUDGET ESTIMATES Table of Contents - Joint Improvised

More information

AFOSI CYBER THREAT PURSUIT: THE AIR FORCE S OUTSIDE THE BOX RESPONSE TO CYBER EXPLOITATION

AFOSI CYBER THREAT PURSUIT: THE AIR FORCE S OUTSIDE THE BOX RESPONSE TO CYBER EXPLOITATION AU/ACSC/2017 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY AFOSI CYBER THREAT PURSUIT: THE AIR FORCE S OUTSIDE THE BOX RESPONSE TO CYBER EXPLOITATION by Daron M Hartvigsen, DAFC A Research Report Submitted

More information

Health Law PA News. Governor s Proposed Medicaid Budget for FY A Publication of the Pennsylvania Health Law Project.

Health Law PA News. Governor s Proposed Medicaid Budget for FY A Publication of the Pennsylvania Health Law Project. Health Law PA News A Publication of the Pennsylvania Health Law Project Volume 21, Number 2 Statewide Helpline: 800-274-3258 Website: www.phlp.org In This Issue Community HealthChoices Update Pennsylvania

More information

PUBLIC ORDER MANAGEMENT. Organization of an FPU

PUBLIC ORDER MANAGEMENT. Organization of an FPU PUBLIC ORDER MANAGEMENT UN Peacekeeping PDT Standards for Formed Police Units 1 st edition 2015 1 Background UN Public Order Management is based on 3 principles: Mobility, Adaptability and Protection.

More information

Logbook Navy Perspective on Joint Force Interdependence Navigating Rough Seas Forging a Global Network of Navies

Logbook Navy Perspective on Joint Force Interdependence Navigating Rough Seas Forging a Global Network of Navies Navy Perspective on Joint Force Interdependence Publication: National Defense University Press Date: January 2015 Description: Chief of Naval Operations Adm. Greenert discusses the fiscal and security

More information

Plan Requirements and Assess Collection. August 2014

Plan Requirements and Assess Collection. August 2014 ATP 2-01 Plan Requirements and Assess Collection August 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. Headquarters, Department of the Army This publication is available

More information

Department of Defense INSTRUCTION. Counterintelligence (CI) in the Combatant Commands and Other DoD Components

Department of Defense INSTRUCTION. Counterintelligence (CI) in the Combatant Commands and Other DoD Components Department of Defense INSTRUCTION NUMBER 5240.10 October 5, 2011 Incorporating Change 1, Effective October 15, 2013 USD(I) SUBJECT: Counterintelligence (CI) in the Combatant Commands and Other DoD Components

More information

Prepared Statement of GEN (Ret) Keith B. Alexander*

Prepared Statement of GEN (Ret) Keith B. Alexander* Prepared Statement of GEN (Ret) Keith B. Alexander * on Cyber Warfare Today: Preparing for 21st Century Challenges in an Information-Enabled Society before the House Armed Services Committee April 11,

More information

UNCLASSIFIED. FY 2016 Base

UNCLASSIFIED. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense : February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 4: Advanced Component Development

More information

NATO Moving to Create New Intelligence Chief Post - WSJ

NATO Moving to Create New Intelligence Chief Post - WSJ This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers visit http://www.djreprints.com. http://www.wsj.com/articles/nato-considers-new-intelligence-chief-post-1464968453

More information

Defense Strategies Institute professional educational forum: SOF Symposium. ~ Advancing the Global SOF Network ~

Defense Strategies Institute professional educational forum: SOF Symposium. ~ Advancing the Global SOF Network ~ Defense Strategies Institute professional educational forum: SOF Symposium ~ Advancing the Global SOF Network ~ November 5-6, 2013: Mary M. Gates Learning Center, Alexandria, VA As the role of SOF continues

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction [National Security Presidential Directives -17] HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4 Unclassified version December 2002 Subject: National Strategy to Combat Weapons of Mass Destruction "The gravest

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Missile Defense Agency DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Missile Defense Agency

More information