1 / 25

Brigadier General Mark O. Schissler Director, Cyberspace Operations HQ United States Air Force

Brigadier General Mark O. Schissler Director, Cyberspace Operations HQ United States Air Force. AFCEA Northern Virginia. AF Intent in Cyberspace. AF recognizes cyberspace as a warfighting domain in which DoD must maintain dominance for our Nation

clancy
Download Presentation

Brigadier General Mark O. Schissler Director, Cyberspace Operations HQ United States Air Force

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Brigadier General Mark O. Schissler Director, Cyberspace Operations HQ United States Air Force AFCEA Northern Virginia

  2. AF Intent in Cyberspace • AF recognizes cyberspace as a warfighting domain in which DoD must maintain dominance for our Nation • Building new competencies to support joint fight • Cyber Weapon Systems and Cyber operators • Partnerships with stakeholders • Total force opportunity • AFCYBER(P) Command laying foundation for a permanent command focused on global cyberspace operations “No future war will be won without air, space, and cyberspace superiority.” -Gen. Moseley

  3. Converging Future A domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures EMS Electronics As of: 28 Mar 08

  4. By the Numbers • 183B emails a day • 280B gigabytes of data/year • $25-100B per yr commercial espionage cost • Virus count exploding • YouTube uploads 8 hrs of video every minute New York Times Cyberspace connects the world

  5. Growing Dependence on Electromagnetic Spectrum FCC Spectrum Auctions 1975 Frequency Allocation Chart 2007 Frequency Allocation Chart “Right now we get into situations where we jam against improvised explosive devices (IEDs) and it corrupts our radio traffic [and] some line-of-sight UAV operations…It’s tough. “ Gen Ronald E. Keys Aviation Week & Space Technology, Jan 29, 2007

  6. Threat & Risk . . . • December 1998 – January 2003 • Cyber activity from low-moderately skilled individuals • Hackers, Script kiddies, Criminals • Physical destruction • Forces of Nature • Nation States • Non-State Actors • February 2003 – Present • Skilled / organized actors (state & non-state sponsored) • DoD and Federal Networks • Defense Industrial Base • GIG Mission Assurance “Our freedom to use cyberspace is threatened by the actions of criminals, terrorists, and nations alike. Each seeks their own form of unique advantage, be it financial, political, or military, but together they threaten our freedom to embrace the opportunity offered by a globally connected and flattened world.” Gen Cartwright , 21 Mar 07

  7. Cyber brings Cross-Domain Capability • Targets: • IADS • Control Systems • Tactical Comms • Info Systems • SATCOM Global effects at the speed of sound…global effects at the speed of light

  8. AF Objectives in Cyberspace • Provide robust, cyberwarfare capabilities to the Joint Warfighter • Defend AF portion of military cyberspace • Be a lead service for support to JTF-Global Network Operations • Be the service of choice for conducting intelligence and forensic analysis for cyberspace superiority • Have the capacity to extend cyberspace any where the joint warfighter operates Cyber superiority ensures freedom of action in all domains and denies freedom of action to adversaries

  9. The National Imperative “Attacks on Critical Infrastructure could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the targeted sector and physical location of the incident.” • 2007 National Infrastructure Protection Plan

  10. Way Ahead • Stand Up AFCYBER • Establish Career Field • Author Doctrine • Expand Cyber Education • Utilize Cyber Red Teaming • Work with Industry Total Force Commitment to Transformation

  11. AF Cyberspace Operations Directorate HQ United States Air Force

  12. Classified Update on Current Ops

  13. The Cyberspace Domain Current Operations US Air Force in Cyberspace Overview The mission of the United States Air Force is to deliver sovereign options for the defense of the United States of America and its global interests – to fly and fight in Air, Space, and Cyberspace

  14. Take Aways • Roles and Missions Debate On-Going • Potential for new unified command • Potential for the AF to play a leading role • Are we ready to lead the fight or do we want to be a body pool?

  15. AF Intent in Cyberspace • AF recognizes cyberspace as a warfighting domain • Electronic Warfare • Network Warfare • Building new competencies to support joint fight • Cyber Weapon Systems and Cyber operators • Partnerships with stakeholders • Total Force Opportunity • AFCYBER Command (P) laying foundation for a permanent command focused on global cyberspace operations “No future war will be won without air, space, and cyberspace superiority.” -Gen. Moseley

  16. Why the AF? • World class C2 capability • Culture of Innovation and Transformation • AF has fielded capabilities to hold the adversary at risk in and through cyberspace in a diverse manner • AF dependence on Cyberspace for Air and Space Superiority • Cyberspace is a global, strategic commons Speed, Range, and Flexibility

  17. WARFIGHTING “Fly & Fight” in Cyberspace • Hold Adversary At Risk Across All Domains • Airborne-based cyber attack (electronic and all network classes) • Ground-based cyber attack (electronic and network classes) Operational Prep of the Battlespace (OPB) • Influence Operations through cyberspace • Ensure Freedom Of Maneuver • Cyber defensive ops • Electronic protection • Prioritized cyber function defense plan • Threat analysis and OPB (airborne, ground) • Command And Control • Situational awareness across entire cyber domain • Operational risk assessment and mission assurance • C2 cyber combat operations from the AOC • Cyberspace control authority responsibilities • Bandwidth & Spectrum management Cyber Ops Cyberspace is a Warfighting Domain: Requires operations to Attack, Exploit, Defend and Sustain Ref: “The Fifth Dimension: Cyberspace”, Lt Gen Bob Elder (8AF/CC) 16 Jul 2007

  18. Nature of the Threat The Cyber Threat • December 1998 – January 2003 • Most activity from moderately skilled individuals • Hackers, Script kiddies, Criminals • Physical destruction • Forces of Nature • Nation States • Non-State Actors • February 2003 – Present • Skilled / organized actors (possibly state-sponsored) • DoD and Federal Networks • Defense Industrial Base • GIG Mission Assurance • Estonia “Our freedom to use cyberspace is threatened by the actions of criminals, terrorists, and nations alike. Each seeks their own form of unique advantage, be it financial, political, or military, but together they threaten our freedom to embrace the opportunity offered by a globally connected and flattened world.” Gen Cartwright , 21 Mar 07

  19. Cyber / IO Relationship US Air Force in Cyberspace • Cyber is a place, like other physical domains, where many missions occur • Used to “store, modify, exchange” data • Information Operations are missions relating to protecting friendly information and affecting adversary information (regardless of means) • Network Warfare Operations (Net Attack, Net Defense) • Electronic Warfare (EA, EP, ES) • Influence Operations (PSYOP, MILDEC, OPSEC) • Fundamental difference, but direct relationship • IO occurs in/through all three domains: Air, Space, Cyberspace • Many missions necessary for “Cyber Superiority” • Network Warfare Operations • EW (including space EW) • Network Operations (maintenance) • Influence Operations • Intelligence • “Cyber” does not replace “IO”

  20. MAJCOM Phase I USAF SAF/XC AFCYBER AFCYBER/CV xx AF AFNETOPS/CC AFNOC AFIOC 67 NWW xx EW WG xx Cyberspace WG Gaining Cmd ADCON Dual Hatted New/Accelerated AFFMA Spectrum Mgt Dual Hatted 6xx AOC C2

  21. Preparing for Tomorrow’s ChallengesAF Cyberspace Leaders • Complete coordination of Cyberspace Force Development Roadmap Apr 2008 • Submit Cyberspace Force Development ‘Roadmap’ for CSAF/SecAF Sig Apr 2008 • Submit Cyberspace Tech Center of Excellence Charter for SecAF approval, establishment Apr 2008 • Develop, Complete Cyberspace Force Development Roadmap Implementation Plan May 2008 • Early Force Transitions (1B1, 1B2) FY09 • Begin Development of AETC Cyber Courses FY10 • Begin AETC Cyber Course Instruction (new accessions) FY11

  22. Cyberspace Doctrine • AF Doctrine Working Group met 30-31 Oct • Bottomline AFDD 2-x draft release in Jan 2008 • Air University hosting Cyberspace Symposium 31 Mar – 4 Apr • Symposium to review/refine topline draft (release in May) • Decision if AFDD 2-X is to be a keystone or sub publication • Joint Doctrine: formal assessment of JP 3-13 begins May 2008 • First opportunity to influence joint doctrine development • Engaged with development of USSTRATCOM’s Operational Concept for Operations in Cyberspace • Tasked by the NMS-CO Implementation Plan

  23. Flattening the Earth • Wireless and cell phone usage in Africa exploding • 50% of intra-Asian Internet traffic flows through the US • YouTube uploading 8 hours of video every minute New York Times The world is interconnected

  24. 2003 National Strategy to Secure Cyberspace 2004 National Military Strategy 2006 Quadrennial Defense Review 2006 NMS for Cyberspace Operations 2007 National Infrastructure Protection Plan 2007 National Strategy for Homeland Security 2008 National Security Policy Directive 54 National Guidance

More Related