Intelligence, Information Operations, and Information Assurance

Similar documents
Army Modeling and Simulation Past, Present and Future Executive Forum for Modeling and Simulation

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning

Improving the Quality of Patient Care Utilizing Tracer Methodology

Independent Auditor's Report on the Attestation of the Existence, Completeness, and Rights of the Department of the Navy's Aircraft

The Effects of Multimodal Collaboration Technology on Subjective Workload Profiles of Tactical Air Battle Management Teams

The Military Health System How Might It Be Reorganized?

Defense Health Care Issues and Data

White Space and Other Emerging Issues. Conservation Conference 23 August 2004 Savannah, Georgia

Social Science Research on Sensitive Topics and the Exemptions. Caroline Miner

Panel 12 - Issues In Outsourcing Reuben S. Pitts III, NSWCDL

Dynamic Training Environments of the Future

Perspectives on the Analysis M&S Community

Shadow 200 TUAV Schoolhouse Training

AFCEA TECHNET LAND FORCES EAST

Mission Assurance Analysis Protocol (MAAP)

Staffing Cyber Operations (Presentation)

Afloat Electromagnetic Spectrum Operations Program (AESOP) Spectrum Management Challenges for the 21st Century

Cold Environment Assessment Tool (CEAT) User s Guide

Rapid Reaction Technology Office. Rapid Reaction Technology Office. Overview and Objectives. Mr. Benjamin Riley. Director, (RRTO)

Electronic Attack/GPS EA Process

DDESB Seminar Explosives Safety Training

Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob

Air Education and Training Command

terns Planning and E ik DeBolt ~nts Softwar~ RS) DMSMS Plan Buildt! August 2011 SYSPARS

The Fully-Burdened Cost of Waste in Contingency Operations

USMC Identity Operations Strategy. Major Frank Sanchez, USMC HQ PP&O

Opportunities to Streamline DOD s Milestone Review Process

Cerberus Partnership with Industry. Distribution authorized to Public Release

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

Department of Defense DIRECTIVE

Engineering, Operations & Technology Phantom Works. Mark A. Rivera. Huntington Beach, CA Boeing Phantom Works, SD&A

New Tactics for a New Enemy By John C. Decker

MSG-079 C-BML Workshop Farnborough UK, Feb Coalition Battle Management Language 2009 Experimentation

THE GUARDIA CIVIL AND ETA

Wildland Fire Assistance

Office of Inspector General Department of Defense FY 2012 FY 2017 Strategic Plan

ASAP-X, Automated Safety Assessment Protocol - Explosives. Mark Peterson Department of Defense Explosives Safety Board

Concept Development & Experimentation. COM as Shooter Operational Planning using C2 for Confronting and Collaborating.

Integrated Comprehensive Planning for Range Sustainability

Quadrennial Defense Review

A Military C2 Professional s Thoughts on Visualization

Engineered Resilient Systems - DoD Science and Technology Priority

Fiscal Year 2011 Department of Homeland Security Assistance to States and Localities

User Manual and Source Code for a LAMMPS Implementation of Constant Energy Dissipative Particle Dynamics (DPD-E)

Contemporary Issues Paper EWS Submitted by K. D. Stevenson to

Representability of METT-TC Factors in JC3IEDM

Operational Energy: ENERGY FOR THE WARFIGHTER

ASNE Combat Systems Symposium. Balancing Capability and Capacity

2010 Fall/Winter 2011 Edition A army Space Journal

Tim Haithcoat Deputy Director Center for Geospatial Intelligence Director Geographic Resources Center / MSDIS

USAF TECHNICAL TRAINING NAS Pensacola Florida Develop America's Airmen Today --- for Tomorrow

SPECIAL REPORT Unsurfaced Road Maintenance Management. Robert A. Eaton and Ronald E. Beaucham December 1992

CRS prepared this memorandum for distribution to more than one congressional office.

Unexploded Ordnance Safety on Ranges a Draft DoD Instruction

Military Health System Conference. Putting it All Together: The DoD/VA Integrated Mental Health Strategy (IMHS)

Battle Captain Revisited. Contemporary Issues Paper Submitted by Captain T. E. Mahar to Major S. D. Griffin, CG 11 December 2005

The Coalition Warfare Program (CWP) OUSD(AT&L)/International Cooperation

Defense Acquisition Review Journal

United States Army Aviation Technology Center of Excellence (ATCoE) NASA/Army Systems and Software Engineering Forum

Make or Buy: Cost Impacts of Additive Manufacturing, 3D Laser Scanning Technology, and Collaborative Product Lifecycle Management on Ship Maintenance

Development of a Hover Test Bed at the National Hover Test Facility

Software Intensive Acquisition Programs: Productivity and Policy

Military to Civilian Conversion: Where Effectiveness Meets Efficiency

An Introduction to Wargaming

Department of Defense DIRECTIVE

ALLEGED MISCONDUCT: GENERAL T. MICHAEL MOSELEY FORMER CHIEF OF STAFF, U.S. AIR FORCE

DETENTION OPERATIONS IN A COUNTERINSURGENCY

Joint Warfare System (JWARS)

Presented to: Presented by: February 5, Aviation and Missile Research, Development and Engineering Center

Munitions Response Site Prioritization Protocol (MRSPP) Online Training Overview. Environmental, Energy, and Sustainability Symposium Wednesday, 6 May

A Scalable, Collaborative, Interactive Light-field Display System

Required PME for Promotion to Captain in the Infantry EWS Contemporary Issue Paper Submitted by Captain MC Danner to Major CJ Bronzi, CG 12 19

U.S. ARMY AVIATION AND MISSILE LIFE CYCLE MANAGEMENT COMMAND

711 HPW COUNTERPROLIFERATION BRANCH

Biometrics in US Army Accessions Command

Report No. D May 14, Selected Controls for Information Assurance at the Defense Threat Reduction Agency

United States Joint Forces Command Comprehensive Approach Community of Interest

Capability Planning for Today and Tomorrow Installation Status Report

The Affect of Division-Level Consolidated Administration on Battalion Adjutant Sections

Test and Evaluation of Highly Complex Systems

The Need for a Common Aviation Command and Control System in the Marine Air Command and Control System. Captain Michael Ahlstrom

Research to advance the Development of River Information Services (RIS) Technologies

The Army Executes New Network Modernization Strategy

PEO Missiles and Space Overview Briefing for the 2010 Corrosion Summit February 2010 Huntsville, AL

Report No. DODIG December 5, TRICARE Managed Care Support Contractor Program Integrity Units Met Contract Requirements

Mission Task Analysis for the NATO Defence Requirements Review

Laboratory Accreditation Bureau (L-A-B)

The first EHCC to be deployed to Afghanistan in support

United States Military Casualty Statistics: Operation Iraqi Freedom and Operation Enduring Freedom

Determining and Developing TCM-Live Future Training Requirements. COL Jeffrey Hill TCM-Live Fort Eustis, VA June 2010

DOD Native American Regional Consultations in the Southeastern United States. John Cordray NAVFAC, Southern Division Charleston, SC

Quantifying Munitions Constituents Loading Rates at Operational Ranges

BW Threat & Vulnerability

DOING BUSINESS WITH THE OFFICE OF NAVAL RESEARCH. Ms. Vera M. Carroll Acquisition Branch Head ONR BD 251

Conservation Law Enforcement Program Standardization

MAKING IT HAPPEN: TRAINING MECHANIZED INFANTRY COMPANIES

AFRL-ML-WP-TP

Report Documentation Page

Infections Complicating the Care of Combat Casualties during Operations Iraqi Freedom and Enduring Freedom

DoD Countermine and Improvised Explosive Device Defeat Systems Contracts for the Vehicle Optics Sensor System

Transcription:

PHOENIX CHALLENGE 2002 Intelligence, Information Operations, and Information Assurance Mr. Allen Sowder Deputy Chief of Staff, G-2 IO Team 22 April 2002

REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burder for this collection of information is estibated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burder to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 2. REPORT TYPE 22-04-2002 Briefing 4. TITLE AND SUBTITLE Phoenix Challenge 2002: Intelligence, Information, Operations, and Information Assurance Unclassified 6. AUTHOR(S) Sowder, Allen ; 7. PERFORMING ORGANIZATION NAME AND ADDRESS USA xxxxx, xxxxxxx 9. SPONSORING/MONITORING AGENCY NAME AND ADDRESS USA, 12. DISTRIBUTION/AVAILABILITY STATEMENT APUBLIC RELEASE, 13. SUPPLEMENTARY NOTES 14. ABSTRACT See report. 15. SUBJECT TERMS IATAC Collection 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Public Release a. REPORT Unclassified b. ABSTRACT Unclassified c. THIS PAGE Unclassified 18. NUMBER OF PAGES 11 3. DATES COVERED (FROM - TO) xx-xx-2002 to xx-xx-2002 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 8. PERFORMING ORGANIZATION REPORT NUMBER 10. SPONSOR/MONITOR'S ACRONYM(S) 11. SPONSOR/MONITOR'S REPORT NUMBER(S) 19. NAME OF RESPONSIBLE PERSON Email from Booz, Allen & Hamilton (IATAC), (blank) lfenster@dtic.mil 19b. TELEPHONE NUMBER International Area Code Area Code Telephone Number 703767-9007 DSN 427-9007 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39.18

REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 4/22/2002 4. TITLE AND SUBTITLE Phoenix Challenege 2002: Intelligence, Information Operations, and Information Assurance 3. REPORT TYPE AND DATES COVERED Briefing 4/22/2002 5. FUNDING NUMBERS 6. AUTHOR(S) Sowder, Allen 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER Department of the Army 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING AGENCY REPORT NUMBER Department of the Army 11. SUPPLEMENTARY NOTES 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release; Distribution unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (Maximum 200 Words) This briefing discusses: Policy and Doctrine Foundations, Processes and Players, Understanding the Threat, USA Patriot Act, The Information Dominance Center and Major Challenges. This briefing was given during the Phoenix Challenge Conference and Warfighter Day. 14. SUBJECT TERMS IATAC Collection, information operations, information assurance 15. NUMBER OF PAGES 10 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UNLIMITED NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39-18 298-102

Intelligence, Information Operations, and Information Assurance AGENDA Policy and Doctrine Foundations Processes and Players Understanding the Threat USA PATRIOT ACT The Information Dominance Center Major Challenges UNCLASSIFIED/HQDA 2

Information Operations Doctrine JP 3-13 (Information Operations) Offensive IO OPSEC PSYOP Military Deception Electronic Warfare Physical Attack/Destruction CNA Defensive IO Information Assurance OPSEC Physical Security Counterdeception Counterpropaganda Counterintelligence Electronic Warfare Public Affairs and Civil Affairs are related IO Activities Joint and Army doctrine are mutually supporting Intelligence supports IO FM 3-0 (Operations) Each element may have offensive or defensive applications. OPSEC PSYOP Military Deception Electronic Warfare Physical Destruction (Attack) CNA Information Assurance CND Physical Security Counterdeception Counterpropaganda Counterintelligence Public Affairs and Civil Military Operations are related activities UNCLASSIFIED/HQDA 3

Intelligence, Information Operations, and Information Assurance The Army s approach to IO management is built on the IO TRIAD: The G-2 provides the intelligence support and some operational capabilities. The G-3 is the Army s IO lead, and has OPCON of the Army s full spectrum, IO field deployable force the Land Information Warfare Activity (LIWA). The G-6 is the Army s CIO, and provides the foundation of Information Assurance policies. The Army s Space and Missile Defense Command provides the Joint interface to USSPACECOM. UNCLASSIFIED/HQDA 4

Traditional Processes vs. Information Operations Processes FIRES What or Who to Attack Acquire the Target Attack The Target DECIDE DETECT DELIVER INFO OPNS Who or What to Attack How to Acquire Attack the Target Conduct BDA ASSESS Similar targeting process Conduct BDA UNCLASSIFIED/HQDA 5

Traditional Fires vs. Information Operations Targeting Objectives Describe the Effects of Target Attack on the Enemy FIRES Reduce available options or COAs Preclude effective combat system cohesion Alter time of arrival Tie up critical resources Ruin the target s structure LIMIT DISRUPT DELAY DIVERT DESTROY INFO OPERATIONS Minimize influence Reduce Effectiveness Slow decisionmaking Redirect resources Eliminate influence Inspect/Assess DAMAGE Similar objectives Often Subjective UNCLASSIFIED/HQDA 6

Understanding the Threats Tactics... 99% of Computer Attack is Access. LTG Minihan, DIRNSA March 1998 Relationship between a probe, or an intrusion and a computer network attack (CNA) is often one key-stroke... Without access there can be no external CNA. Access and exploitation are required even in absence of attack. At least 88% of all intrusions to Army networks in CY 00 came from the exploitation of KNOWN vulnerabilities. How we might conduct CNA is a clue to how they might conduct CNA. There is tremendous value from Red Teaming. Must view probes as Intelligence Preparation of the Battlespace, and a precursor to CNA. We must be able to detect, and recognize the activity; this is attack sensing and warning. Effective computer network defense requires cooperation between the network operators, end users, CNA Forces and intelligence assets. UNCLASSIFIED/HQDA 7

USA PARTRIOT ACT of 2001 Helps The Act does not erode Constitutional protections, it does not minimize E.O. 12333, but it does insert technology neutral language to help in the war on international terrorism. Section 217 defines a computer trespasser as a person who accesses a protected computer without authorization and thus has no reasonable expectation of privacy This Section authorizes a computer system owner to consent to the interception of computer intruders communications without a court order, so long as the government conduct is part of a lawfully authorized investigation. Other important Sections include 203, 206, 207, 224, 504, and 905. UNCLASSIFIED/HQDA 8

INFORMATION DOMINANCE CENTER The Army s TOC for IO Social Fabric Mugs Thugs Wackos 24x7 Operations Database Epicenter IDC INTEL Brain Stem One Stop Shopping Asymmetric Threat Complex & Changing Adaptive,Cunning & Learning Asynchronous Commercial Technology Levels Playing Field Social Fabric Threat IDC Mission Balkans CND OSD IOTF UNCLASSIFIED/HQDA 9

Definition and implementations : Legal/Regulatory policies Robust, fault tolerant technologies with built-in security features, configuration management Intelligence support to IO: More, Faster, New Areas (subjects, and locations), languages (human, and technical) IO education and training challenges Skill identifiers and optimal force mix; enlisted, warrant, and officer Personnel turnover The Major Challenges IO funding issues Nothing is more complex, or critical UNCLASSIFIED/HQDA 10