Defense Systems Magazine Editorial Webcast USCYBERCOM Brief September 27, 2011
Cyber Agenda • • • • • • • •
The Cyber Environment U.S. Cyber Command (USCC) Mission Organization Authorities The Threats/Actors What it Takes to Secure Cyberspace The Defense Strategy for Operating in Cyberspace Q & As 1
The Cyber Environment • • • • •
In 2010, 107 trillion e-mails sent – 294 billion every day. 600 million on Facebook – 72% of internet users. 2.9 billion – the number of e-mail accounts worldwide Terrorist groups are active on 4,000 websites. 140 Foreign Intelligence organizations are trying to hack into U.S. computers. • DoD is probed on average 250 k times per hour/ six million times a day. 2
Social Media 152 Million - # of Blogs (tracked by BlogPulse) Twitter 25 Billion - # of Tweets 100 Million - # of new accounts added in 2010 175 Million - # of People as of 09/2010 7.7 Million - # of People following @ladygaga Facebook 600 Million - # of People at the end of 2010 250 Million - # of new people in 2010 30 Billion - Pieces of content (links, notes, photos, etc.) shared per month. 20 Million - # of Facebook apps installed daily 70% - Share of user base located outside U.S. 2 Billion+ - # of Videos watched monthly 20 Million - # of Videos uploaded monthly 36 Billion - # of Photos uploaded per year Flickr 5 Billion - # of Photos hosted 3000+ - # of Photos uploaded per minute 130 Million - # of Photos uploaded per month
YouTube 2 Billion - # of Videos watched daily 35 - Hours of video uploaded every minute 186 - # of Online videos the average U.S. Internet user watches in a month
3
Cyber as a Domain 1.8 Billion Internet Users With 10 Internet Access Points
Presence in 88 Nations
Intelligence, Coalition & Federal Networks
Composed of:
Supporting:
• 7,000,000 DoD IT Systems Worldwide • 1,000s of Warfighting & Support Applications • 120,000 Commercial Telecom Circuits • 16 Satellite Communications Gateways
• 3,500+ Base/Post Camp/Stations/Ships Worldwide • 10 Combatant Commands, 4 Services, 31 Others • Joint Task Forces /Worldwide Expeditionary Forces /Strike Groups
“The national security, economic competitiveness, and public safety of American Citizens are now dependent on what happens in cyberspace. This global information and communications infrastructure… are critical to virtually every aspect of modern life.” 4
Cyberspace
Persona Layer
Cyber Persona Layer Logical Network Layer Physical Network Layer Geographic Layer 5
Evolution and Mission MISSION Plan, coordinate, integrate, synchronize, and conduct activities to direct operations and defense of Department of Defense information networks to prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure U.S./Allied freedom of action in cyberspace and deny the same to our adversaries.
6
U.S. Cyber Command
7
Authorities • • • • •
Title 10 Title 50 Title 32 Title 18 Title 42 8
The Threats/ Actors
• • • • •
Garden Variety Hackers Organized Groups/Associations Cyber Criminals Nation States Non-Nation States/Actors
9
What it Takes to Secure Cyberspace I.
Active Defense
II. Collective Defense III. Extending Protection to Critical Infrastructure IV. Leveraging U.S. Technological Dominance
10
Active Defense • • • • • • •
Monitoring of the Grid for situational awareness. Advisories and patches and updates. Anti-virus programs, firewalls. Objective security assessments. Automatic intrusion detection and blocking measures. Active searches for malware Forensic response teams.
11
Collective Defense Whole-of-Government Effort
12
Extending Protection to Critical Infrastructure
“…our digital infrastructure—the networks and computers we depend on every day—will be treated as they should be: as a strategic national asset. Protecting this will be a national security priority…the cyber threat is one of the most serious economic and national security challenges we face as a nation…. We’re not as prepared as we should be, as a government or as a country….” President Barack Obama May 29, 2009
13
Leveraging U.S. Technological Dominance
Success in Securing Cyberspace Requires Partnerships With: • • • •
Private Industry Research and Development Institutions Academia Other Government Departments and Agencies 14
The Defense Strategy for Operating in Cyberspace (DSOC) •
It is the first Defense unified strategy for cyberspace and officially encapsulates a way forward for DoD’s military, intelligence, and business operations in cyberspace.
•
The cyber strategy combines and institutionalizes previous DoD efforts, statements and initiatives into formal Department policy.
•
The cyber strategy provides a framework for future Department priorities for operating in cyberspace and establishes clear guidelines for the Department and its components to comprehensively approach operations in cyberspace.
•
The DSOC is not a plan for responding to hostile actions in cyberspace. The DSOC supports the President’s International Strategy for Cyberspace and other relevant strategic documents. In the President’s International Strategy, the Administration has made it clear that the United States reserves the right to respond – through diplomatic, informational, military, or economic means– to significant national security threats in cyberspace and beyond. 15
The Defense Strategy for Operating in Cyberspace Strategic Initiatives • Treating cyberspace as an operational domain so that DoD can organize, train, and equip. • Employing new defense operating concepts. • Partnering with the interagency and private sector. • Working with allies and international partners to increase cybersecurity. • Leveraging our talent and technological capacity. 16
The Bottom Line
17
Thank You
18
19
20
21