Title: Operating in Cyberspace
1Operating in Cyberspace AFCEA Luncheon - 6
September 2007
Maj Gen Bill Lord, SAF/XCT Director, Cyberspace
Transformation and Strategy Office of Warfighting
Integration and Chief Information Officer
2Air Force Priorities
- Win the Global War on Terror
- Care for Airmen
- Recapitalize and Modernize the Force
We must innovate and integrate to dominate air,
space, and cyberspace
3The Operational Environment
- Risk increases with the prevalence of technology
4The Operational Environment
Cyberspace is a competitive domain
5The Operational Environment
Cyberspace is evolving rapidly
6Vulnerabilities
14.5 Billion suspicious connections
3,824,527 identified as urgent
14.5 Billion 7,279 14.5 Billion
37,329 reports filed
7,279 analyzed
In 2005
87 validated
Analysts on duty 24/7, yet only 1/1000th of 1
of all suspicious connections can be analyzed for
threat
We dont know what we dont knowand hackers
exploit it!
7The Cyber BattlefieldDharan, Saudi Arabia 25
June 1996
Adversary Used Commercial Comms for
coordination, RF Detonation, Handheld wireless
comms
8The Cyber BattlefieldBelgrade, Yugoslavia 27
March 1999
Adversary Used Mobile Communication, Networked
Defense, Electronic Warfare
9The Cyber BattlefieldPentagon 11 September 2001
Adversary Used Internet for recruitment,
International cell comms for coordination,
Training on simulators
10The Cyber BattlefieldThe Internet
- Hundreds of Jihadi Web Sites Internet hosts
- Thousands of individual email accounts
The war is really not about Iraq or Afghanistan
necessarily, its about this broader war that is
really global in nature and has no borders. It
uses things like the Cyber world to operate
in.
- General Lance L. Smith, USJFC Commander
11Cyberspace vs Mission Areas
Info Ops
Cyberspace Domain
Network Warfare
Global Theater Electronic Warfare
Net Ops
Net Centric Operations
ISR
C2
12The Air Forces Challenge
- Only service with Cyberspace in mission statement
- Other Services already organized
- Navy NavNetWarCom12,000 personnel, 3 star
- Army Netcom15,000 personnel, 2 star
- Army 1st IO CommandBrigade, O-6 CC
- AF has preponderance of assets
- Space, C2, ISR, EW, Networks
- Other Services have capabilities at the
collateral-level - Lack of collateral-level capabilities lowers
warfighter confidence and limits employability
13Cyberspace Transformation
- Today 8AF designated as the Operational Command
for Cyberspace - Near Future New MAJCOM
- AF conducts Cyber Ops toENSURE OUR FREEDOM OF
ACTION and DENY FREEDOM OF ACTION TO OUR
ADVERSARIES
148 AF and Cyber Ops
- Global Strike B-2, B-52
- Network Operations AFNOC, I-NOSC, Network
Warfare Wing - Surveillance/Reconnaissance RC-135, U-2, Global
Hawk - C2/Battle Management AWACS, JSTARS, CAOC, ASOG,
E-4 - Electronic Warfare EC-130 Compass Call
- Intelligence Distributed Common Ground Station
(DCGS)
15Your Role
- We need
- Survivable C2 (warfighting) network operations
- Secure, defendable C2 and administrative networks
- Net-centric service and data architectures
- Self-forming, high-capacity, expeditionary IP
networks - Global Air, Space, and Cyberspace C2 Capabilities
- Were focused on
- Cyber Force Training and Career Development
- Systems Design (Resilience, Program/Data
Protection) - Software Design (Applications Assurance)
- Mission/Security Balance (Risk Management)
16Final Thoughts
Air Force is the only Service with Cyber in our
mission statement, but other Services have
already organized
17Ive got no time for new technology Ive got a
battle to fight.
18Questions