14 July 2011. DoD Strategy for Operating in Cyberspace:
http://cryptome.org/0005/dod-cyberspace.zip
(3.3MB)
13 July 2011. One of the
Eyeball Series.
DoD Prepares for Global Cyberwar
http://www.defense.gov/advisories/advisory.aspx?advisoryid=3367
July 12, 2011
DOD to Announce First Cyberspace Strategy
Deputy Secretary of Defense William J. Lynn III will announce the Department
of Defense Strategy for Operating in Cyberspace (DSOC) on Thursday July 14
at 1 p.m. EDT at the National Defense University, Marshall Hall, (Building
62, Room 155), Fort Lesley J. McNair, Washington, D.C.
He will be joined by Gen. James E. Cartwright, vice chairman of the Joint
Chiefs of Staff. A media availability will immediately follow the DSOC
announcement.
Journalists wishing to attend this event should contact Dave Thomas by e-mail
at thomasd2@ndu.edu or 202-685-3140.
Media must arrive between 11 a.m. and noon to have sufficient time to set
up. Proof of affiliation and drivers license are also required for gate access.
Those driving should enter the gate on 2nd Street S.W. to allow time for
a vehicle security search. Pedestrians should enter at 4th and P Street S.W.
Overview of US Cyber Command:
http://www.defense.gov/home/features/2010/0410_cybersec/
http://www.defense.gov/news/newsarticle.aspx?id=61310
Lynn: Cyberspace is the New Domain of Warfare
By Cheryl Pellerin
American Forces Press Service
WASHINGTON, Oct. 18, 2010 With the creation of the U.S. Cyber Command
in May and last weeks cybersecurity agreement between the departments
of Defense and Homeland Security, DOD is ready to add cyberspace to sea,
land, air and space as the latest domain of warfare, Deputy Defense Secretary
William J. Lynn III said. ...
One element of the strategy - working with Homeland Defense to protect
critical military and civilian IT infrastructure - was put into place
Oct. 13, when Defense Secretary Robert M. Gates and Homeland Security Secretary
Janet Napolitano announced a
new agreement
to work together on cybersecurity. The agreement includes a formal mechanism
for benefiting from the technical expertise of the National Security Agency,
or NSA, which is responsible for protecting national security systems, collecting
related foreign intelligence, and enabling network warfare. ...
Lynn laid out a draft cyberstrategy in the September/October issue of
Foreign Affairs magazine. He said DOD is working to finalize
the strategy. ...
U.S. technological advantages are a critical part of the cyberstrategy and
the Pentagon already is working with industry and with the Defense Advanced
Research Projects Agency to put these to work, Lynn said.
As part of a public-private partnership called the Enduring Security Framework,
Lynn wrote in his Foreign Affairs article, chief executive officers and chief
technology officers of major IT and defense companies meet regularly with
top officials from Defense, Homeland Security and the Office of the Director
of National Intelligence.
DARPA also is working on the National Cyber Range, a simulated model of the
Internet that will enable the military to test its cyberdefenses before deploying
them in the field.
The Pentagons IT acquisition process also has to change, Lynn wrote
in Foreign Affairs. It took Apple Inc. 24 months to develop the iPhone, he
said, and at DOD it takes on average about 81 months to develop and field
a new computer system after it is funded.
The Pentagon is developing a specific acquisition track for information
technology, Lynn wrote in Foreign Affairs, and it also is bolstering
the number of cyberdefense experts who will lead the charge into the new
cyberwar era.
Cryptome: DoD includes in its cyberspace initiative information, media,
intelligence, internet, cellular, radio, television, newspapers and all other
forms of hardcopy and electromagnetic signals, also referred to in milspeak
as "information and/or spectrum dominance." DoD and the 13+ intelligence
agencies (nearly all US government elements now have spy units to work with
their information spin units, interconnected under the Homeland Security
rubric) are intended to be a single unit participating in the initiative
under the titular guidance of the DNI but dominated by the military components'
vast open and secret budgets.
This presentation shows some of the facilites being built for this initiative
at Fort Meade, MD, home of NSA and a number of other information warfare
agencies. Each of the military services has its own cyberwar components and
all operate in coordination with the 13-plus legacy spying and information
management agencies. These are vastly supplemented with commercial and
institutional contractors for intellectual and physical armaments. Nearly
all of their activities are concealed by secrecy. Surrounding Fort Meade
is a region-wide collection of participants from Northern Virginia to Maryland
and thence to the nation and overseas, under the seas and into space.
A curious outgrowth of these new information-warping military facilities
is a move away from Cartesian, right-angle architecture long-mandatory by
the Corps of Engineers to the curvilinear
(NGA), spiral
(GRSOC),
crucifix
(NCTC),
penetrating
(DNI,
DIA,
DISA), historicist retro (902MIG),
historicist-modern hybrid (Adjudication) and
what might be called the crotch where an entrance is located at junction
of two, three or four legs
(NCTC,
DMA, a bevy of
leased
spaces). Some entrances are not easy to find, perhaps on purpose, or merely
because of confused committee oversight of designs presented for approval.
This is partly the result of institution of architectural design panels at
GSA, and later to
the Corps of Engineers, to overcome the dreariness of government buildings
and partly the result of young bureaucrats, engineers and designers coming
into the decisionmaking process. These unusual-looking buildings (cousins
of attention-seeking malls) are neither cost-effective nor the most durable
way to build and in that way represent a parallel to the forever
cost-overrunning, out-of-date-at-birth weapons systems. And all of them are
as bloated in size, occupancy and budgets as armaments systems. That is,
they perfectly fit congressional mandates to squander public resources, the
purpose of the expensive Cyberspace Strategy to succeed the lucrative Global
War on Terrorism.
Fort Meade Transformation video:
http://www.ftmeade.army.mil/pages/growth/growth.html
Already the largest employer in the state of Maryland, Fort Meade continues
to grow. With congressionally-mandated Base Realignment and Closure (BRAC)
moves, the establishment of Cyber Command, and the expansion of partner units
already at Fort Meade, job opportunities continue to increase. Construction
abounds to develop facilities needed to handle the increased workforce.
Fort Meade currently has a workforce of more than 40,000 service members,
civilian employees and contractors. In the next few years, that number is
expected to increase by more than 10,000 people. Fort Meade is partnering
with the State of Maryland and the surrounding counties and communities to
adapt and expand support and infrastructure to meet these challenges.
|