Title: Patrick M' Sullivan
1Cyber Warfare SupportProcurement
- Patrick M. Sullivan
- SPAWAR ISR/IO National Competency Lead
- SSC Pacific ISR/IO Department Head
2The Situation
Ubiquitous Presence
Salient Danger
- Cyberspace intrusions and attacks are a real and
emerging threat - U.S. faces a dangerous mixture of vulnerabilities
and adversaries - Cyberspace situational awareness is not mature
- Information and the information infrastructure
are targets - Exploitation, disruption, or destruction are
adversary goals - Malicious cyberspace activity is increasing in
regularity and severity
- 1.5 billion people on the Internet much of Asia
and Africa still to come - Upwards of 200B e-mails per day
- Critical to commerce, government, business
processes, safety, etc. - Exponential demand 8 hours of YouTube uploaded
every minute - Increasing connections global wireless and
cellular usage
3Cyber Environmental Scan
- POTUS announces results of 60-day review
- To ensure accountability in federal agencies,
cyber security will be designated as one of my
key management priorities - Work with all the key players, including state
and local governments and the private sector - Strengthen the public-private partnerships
- Invest in the cutting-edge research and
development necessary for the innovation and
discovery - Begin a national campaign to promote cyber
security awareness and digital literacy - We will preserve and protect the personal
privacy and civil liberties that we cherish as
Americans.
REMARKS BY THE PRESIDENT ON SECURING OUR
NATION'S CYBER INFRASTRUCTURE May 29, 2009
http//www.whitehouse.gov/the_press_office/Remarks
-by-the-President-on-Securing-Our-Nations-Cyber-In
frastructure/
4Cyber Environmental Scan
- POTUS to designate a Cyber Czar TBD
- DoD announces CYBER COMMAND
- Sub-Unified under STRATCOM
- CYBERCOM CDR dual-hatted as DIRNSA
- IOC OCT 2009 FOC OCT 2010
- Navy poised to jump onboard
- Merge OPNAV N2 and N6
- Stand-up Fleet Cyber Command
- 3? Ech II
- At FT Meade
- NNWC role?
5DoD Cyber Definitions
Cyberspace A global domain within the
information environment consisting of the
interdependent network of information technology
infrastructures, including the Internet,
telecommunications networks, computer systems,
and embedded processors and controllers.
Cyberspace Operations employment of cyber
capabilities where the primary purpose is to
achieve military objectives or effects in or
through cyberspace. Such operations include
computer network operations and activities to
operate and defend the GIG.
6SSC Pacific Cyber Warfare SupportTypes of
Activities
- Computer Network Operations, including Attack,
Defend and Exploit - Understanding aspects of human behavior and
cognitive functions to influence decision making - Electronic Warfare, including Attack, Protect and
Support - Monitoring, analyzing and mitigating Operational
Security vulnerabilities - Command and Control (C2)
- Intelligence, Surveillance and Reconnaissance
(ISR) - Ubiquitous Communications and Computing
Environment - Countermeasures
- Modeling, Simulation and Visualization of the
future environment - Understanding networks as a science and
developing models which can provide clarity into
how networks operate and resist or deter attack - Convergence of physical, biological and social
networks and how this will effect human
interactions - Understanding of Doctrine, Tactics, Techniques
and Procedures
7SSC Pacific Cyber Warfare SupportAnticipated
Tasking
- Perform basic and applied research in Cyber
Warfare, its enabling technologies, techniques,
and theory - Design and develop network, system, services and
application architectures that support the rapid
development and implementation of new
technologies and capabilities that reflect the
rapidly evolving techniques which characterize
cyber attacks - Analyze, design, develop, document, integrate,
test, install and maintain Cyber Warfare and
enabling capabilities - Develop, implement, and integrate solution sets
that enable a holistic command and control
capability, with appropriate underpinning
technologies and capabilities, that provide for
interagency communication and collaboration of
cyber activities - Serve as the test site (via the SSC PAC labs and
other Government facilities) for interoperability
testing among Cyber Warfare systems, tools,
technologies and processes (both existing and
new) prior to their introduction to operational
environments - Participate in Cyber technology forums
- Provide operational support to assist in
technical and programmatic oversight of Cyber
Warfare and enabling systems, programs and
functions - Provide Systems Engineering and Integration
support to improve overall effectiveness of Cyber
Warfare and enabling systems, services and
functions
8SSC Pacific Cyber Warfare SupportAnticipated
Tasking
- Demonstrate and evaluate the application of
advanced software and hardware concepts and
technology to Cyber Warfare and enabling systems
and functions - Associate information posted in cyberspace to a
physical identity and originating location - Conduct analyses and systems engineering to
develop initiatives in support of emerging Cyber
Warfare requirements - Develop capabilities to detect and identify
complex, multi-dimensional attacks of an
adversary, and to be able to correlate disparate
events with their greater implications to the
warfighter - Provide computer and network forensic
capabilities - Perform analysis, algorithm development and
implementation, and display for Cyber Warfare
tools and data fusion drawn from various sources
of information - Provide support for Cyber Warfare experiments,
exercises, and other events - Perform analysis of adversarial cyber threat
capabilities to develop courses-of-action and
response options under a variety of hypothetical
scenarios - Conduct Cyber Warfare Modeling and Simulation,
wargaming and analysis - Perform risk assessment and mitigation planning
9SSC Pacific Cyber Warfare SupportTechnical
Requirements
- Technical and Management Support
- Technology Assessments, Development and
Transition - Requirements Analysis
- Systems Engineering
- Operational and Technical Support
- Exercise and Experimentation Support
- Software Development and Prototyping
- Hardware Development and Prototyping
- Modeling and Simulation
- Training Support
- Security Engineering
10Final Details
- Center Wide Vehicle
- 3 Contract Actions
- BAA (focused on ST)
- Issued 17 Sep 08
- GENSER Contract
- Multiple Award IDIQ CPFF
- 2 Year Base, 3 1-Year Award Terms
- Approx 400K Hours per Year
- RFI - Industry Review of SOW
- Anticipate Synopsis in FedBizOps in Late July
- Classified Contract
Point of Contact Curtis Allen (619)
553-6334 Curtis.allen1_at_navy.mil
Teaming is Highly Encouraged! Consider Small
Businesses
11References
- Joint Doctrine for Information Operations, Joint
Pub 3-13, 9 Oct 1998, Unclassified - Director of Central Intelligence Directive 7/3
Information Operations and Intelligence Community
Related Activities (U) - Comprehensive National Cybersecurity Initiative
(CNCI) - Navy NetOps doctrine
- National Military Strategy Military Operations
Annex C (Cyberspace Operations Annex) - Operational Concept for Cyberspace (OCC)
- National Military Strategy for Cyber Operations
(NMS-CO) - National Strategic Plan for U.S. Offensive Cyber
Operations - National Security Presidential Directive
(NSPD-38) - Navy NWP 3-63 CNO Vol 1 and 2
- NTTP 3.13.x series on Navy IO
- NSPD-54
- HSPD-23
- DODD O-8530.1 (CND)
- DODI O-8530.2 (CND)
- CJCSM 6510.01 (DID CND)
- SECNAVINST 5239.19 (DON Incident
Response/Reporting) - SECNAVINST 5000.2C, Implementation and Operation
of the Defense Acquisition System and the Joint
Capabilities Integration and Development System - NAVSEA Instruction 3900.8A, Human Systems
Integration (HSI) Policy in Acquisition and
Modernization, 20 May 2005