Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage

Similar documents
Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

Department of Defense DIRECTIVE

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

Department of Defense INSTRUCTION

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION

Annual Automated ISR and Battle Management Symposium

Department of Defense INSTRUCTION

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord.

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

Department of Defense MANUAL

SECRETARY OF THE ARMY WASHINGTON

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

Department of Defense DIRECTIVE

Supply Chain Risk Management

Department of Defense MANUAL

An Enterprise Environment for Information Assurance / Computer Network Defense Testing and Evaluation

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION. Counterintelligence (CI) in the Combatant Commands and Other DoD Components

Agency Mission Assurance

8/11/2015. Navigation in the Meeting Room. Cyber Enabled Threats to Cleared Industry. Host: Rebecca Morgan Counterintelligence Instructor CDSE

Department of Defense INSTRUCTION. Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN)

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD

Rapid Innovation Fund (RIF) Program

Department of Defense INSTRUCTION

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview

This publication is available digitally on the AFDPO WWW site at:

Department of Defense INSTRUCTION

Department of Defense MANUAL

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC

Confrontation or Collaboration?

Department of Defense

Department of Defense INSTRUCTION

U.S. Air Force. AF Cyber Resiliency Office for Weapon Systems (CROWS) I n t e g r i t y - S e r v i c e - E x c e l l e n c e

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

Department of Defense INSTRUCTION

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC

Air Force Cyberspace Command NDIA 2007 DIB Infrastructure Protection Symposium

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION

Student Guide. Course: Integrating Counterintelligence (CI) and Threat Awareness into Your Security Program, v2

Subj: DEPARTMENT OF THE NAVY CRITICAL INFRASTRUCTURE PROTECTION PROGRAM

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

Iowa Air National Guard Cyber Protection Team. Maj Brian Dutcher Director of Operations, 168th Cyber Operations Squadron

Department of Defense INSTRUCTION

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE

Behind the Scenes of Intelligence Resourcing

DOD Insider Threat Management and Analysis Center COUNTERINTELLIGENCE AWARENESS WEBINAR SERIES

Research Opportunities at the NSA. William Klingensmith IAD Trusted Engineering Solutions MARCH 2015

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198

National Insider Threat Special Interest Group (NITSIG)

Department of Defense DIRECTIVE

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199

Department of Defense INSTRUCTION

The Global War on Terrorism Or A Global Insurgency

UNCLASSIFIED. FY 2017 Base FY 2017 OCO

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

Defense Security Service Intelligence Oversight Awareness Training Course Transcript for CI

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION. 1. PURPOSE. This Instruction, issued under the authority of DoD Directive (DoDD) 5144.

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski. Before the House Permanent Select Committee on Intelligence

Department of Defense INSTRUCTION

DoD Joint Federated Assurance Center (JFAC) 2017 Update

Department of Defense DIRECTIVE

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity

Department of Defense INSTRUCTION

Serving as specialists in cyber communications CRYPTOLOGY TECHNICIAN

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501

MCWP Counterintelligence. U.S. Marine Corps. 5 September 2000 PCN

USS COLE Commission Report

24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION

Originating Component: Office of the General Counsel of the Department of Defense. Effective: February 27, Releasability:

Department of Defense DIRECTIVE

Joint Improvised-Threat Defeat Organization - Mission -

DOD INSTRUCTION DEFENSE INTELLIGENCE FOREIGN LANGUAGE AND REGIONAL

United States Special Operations Command. Science and Technology

Department of Defense DIRECTIVE

JRSS Discussion Panel Joint Regional Security Stack

Department of Defense INSTRUCTION

Question Distractors References Linked Competency

Naval Security Enterprise Newsletter

2018 Army Signal Conference

Transcription:

Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage Brian Hughes Office of the Deputy Assistant Secretary of Defense for Systems Engineering 19th Annual NDIA Systems Engineering Conference Springfield, VA October 24, 2016 October 24, 2016 Page-1

Bottom Line Up Front Adversary is targeting our Controlled Technical Information This audience is not only critical to protecting that information but helping DoD identify which information it should protect Significant amount of technical expertise resides in the DIB Partnership between DoD and DIB is vital October 24, 2016 Page-2

Agenda DoD efforts to safeguard Controlled Technical Information (CTI) Tailored engagements Tunable Response Options Defense Industrial Base (DIB) s role in the process October 24, 2016 Page-3

Addressing the Loss of CTI Risk = ƒ ( threat, vulnerabilities, consequences) Goals: Enable information-sharing, collaboration, analysis, and risk management between acquisition, LE, CI, and IC Connect the dots in the risk function (map blue priorities, overlay red threat activities, warn of consequences) Integrate existing acquisition, LE, CI, and IC information to connect the dots in the risk function - linking blue priorities with adversary targeting and activity Many sources and methods are relevant (e.g., HUMINT, joint ventures) Cyber is only one data source Focus precious resources Speed discovery and improve reaction time Ultimately, evolve to a more proactive posture October 24, 2016 Page-4

JAPEC Mission: Integrated Analysis The Joint Acquisition and Protection Cell (JAPEC) integrates and coordinates analysis to enable Controlled Technology Information (CTI) protection efforts across the DoD enterprise to proactively mitigate future losses, and exploit opportunities to deter, deny, and disrupt adversaries that may threaten US military advantage. Concepts, Development, and Management (CDM) October 24, 2016 Page-5

JAPEC: Integrating Analysis done at the Enterprise-Level JAPEC Other Agencies AT&L DoD OSD CI/LE DAMAGE ASSESSMENT MANAGEMENT OFFICE DoD R&D (DAMO) USD(I) Army PEOs Army R&D Army Army CI/LE Army DAMO Army Intel COMBATANT COMMAND National Counterintelligence (CI) / Law Enforcement (LE) (FBI) USAF PEOs USAF R&D USAF AF DAMO Air Force CI/LE AF Intel National Intel (DIA, NSA, CIA) Shared Data Repository and Analytics Navy PEOs Navy R&D Navy Navy DAMO Navy CI/LE Navy Intel October 24, 2016 Page-6

Agenda DoD efforts to safeguard Controlled Technical Information (CTI) Tailored engagements Tunable Response Options Defense Industrial Base (DIB) s role in the process October 24, 2016 Page-7

Tailored Engagements: Dialogue with Protection Stakeholders Compliance with existing rules and regulations is necessary but not sufficient Protection is more than completing a checklist What is crucial to your organization delivering the desired capability? Identify who, what and where at each facility o FSO may not be well positioned to speak to this Are there links with other programs, especially if the programs are in a different Military Department? o Informing all involved parties helps focus IC, CI, and LE resources Are there plans to market the same technology to other Military Departments or Government Agencies? o Government regulations and laws protect business proprietary Adversary is Dynamic and Active October 24, 2016 Page-8

Working an All Source Problem Stolen Media Incidents Known Cyber Incidents 8 7 6 5 4 3 2 1 0 Program A Program B Program C Program D Program E 10 9 8 7 6 5 4 3 2 1 0 Program A Program Program Program Program B C D E SpearPhishing Reconnaissance Web Shell Credential Stealing 4.5 4 3.5 3 2.5 2 1.5 1 0.5 0 Program A Program B CI Activity Program C Program D Program E SCR Foreign Visitor IIR Is a program targeted? By whom? For what reason? Who is putting these pieces together to answer that question? The data does not exist in this format you have to make it usable What actions can be taken? October 24, 2016 Page-9

Agenda DoD efforts to safeguard Controlled Technical Information (CTI) Tailored engagements Tunable Response Options Defense Industrial Base (DIB) s role in the process October 24, 2016 Page-10

Tunable Response Options Acquisition Contract language Threat education Make program adjustments o e.g., accelerate alternative technologies Develop in classified environment Counterintelligence Awareness training for programs (DIB/Government Program Offices) Incident investigations Focused CI support to security programs Intelligence Community Focused collection Research and Development Contract language Threat education Rapid classification CIO / Network Security Tiered IT security controls (e.g. isolated networks, commercial encryption) Requirements Community Revise requirements based on change in threat Warfighter Accept greater mission risk Update Tactics/Techniques/Procedures (TTPs) October 24, 2016 Page-11

Threat Education Engage LE/CI assets with sufficient context to link events STOLEN MEDIA INCIDENTS 1. Laptop stolen - Employee's vehicle was parked in the hardware supply parking lot 2. Laptop and laptop bag were discovered stolen from the trunk of the employees personal parked vehicle 3. Employee reported laptop asset stolen from a vehicle ADDITIONAL DETAIL Employee admitted report was a lie... threw the computer out apartment window where it was swept up and put in compactor and crushed On business travel to South Africa Employee had lunch at approx. 11am PDT. This was last place employee remembers seeing company iphone until prepared for bed at approx. 9pm CI training of work force Foreign threat at work (CONUS and OCONOUS) Insider threat October 24, 2016 Page-12

Agenda DoD efforts to safeguard Controlled Technical Information (CTI) Tailored engagements Tunable Response Options Defense Industrial Base (DIB) s role in the process October 24, 2016 Page-13

DIB Role Identify crucial elements for protection up front Requires coupling technical know how with CI/LE expertise Report Cyber incidents Suspicious contacts Consider joining the DIB CS program: Enables Government to Industry information sharing Apply to the DIB CS program at http://dibnet.dod.mil/ Maintain an open dialogue with all the protection stakeholders Counterintelligence, Law Enforcement, Network Security, etc. The DIB is a critical partner in preventing unauthorized access to precious U.S. intellectual property and manufacturing capability by adversaries October 24, 2016 Page-14

Questions Mr. Brian D. Hughes Director, Joint Acquisition Protection and Exploitation Cell (JAPEC) brian.d.hughes3.civ@mail.mil 571-372-6451 October 24, 2016 Page-15