Defence in Depth

Total Page:16

File Type:pdf, Size:1020Kb

Defence in Depth DEFENCE IN DEPTH Defence in depth June 2008 DISCLAIMER: To the extent permitted by law, this document is provided without any liability or warranty. Accordingly it is to be used only for the purposes specified and the reliability of any assessment or evaluation arising from it are matters for the independent judgment of users. This document is intended as a general guide only and users should seek professional advice as to their specific risks and needs. This information is not legal advice and should not be relied upon as legal advice. DEFENCE IN DEPTH FOREWORD In today’s business environment, controlling access to information is critical to long-term competitive advantage. Alongside significant benefits, every new technology introduces new challenges for the protection of this information. As a result, it is vital for owners and operators of critical infrastructure to develop appropriate strategies for mapping and understanding the layers of information that need to be protected. This report has been developed by the IT Security Expert Advisory Group (ITSEAG) which is part of the Trusted Information Sharing Network (TISN) 1 for critical infrastructure protection. TISN has previously released a number of papers to assist CEOs and CIOs in understanding IT security threats and strategic approaches to securing their IT infrastructure. Issues covered in these documents range from managing denial of service risks to information security strategy and governance. These papers are available at: www.tisn.gov.au. This paper is closely related to the Secure Your Information report of June 2007, which was developed to provide strategic guidance for the implementation of information security through seven core principles. The principles reflect the holistic approach required for the management of information security, by consideration for organisational mission, risk factors, internal and external stakeholders and continual improvement. This paper seeks to develop a practical approach for developing enterprise information security through a layered defence in depth approach with particular reference to the principles and recommendations contained in the Secure Your Information report. SIFT (www.sift.com.au) engaged in discussions with members of the ITSEAG and other relevant bodies including key stakeholders from the IT and information security sectors and owners and operators of critical infrastructure to gain an individual industry perspective on the issues. SIFT thanks all participants for their contributions to the project. 1 TISN enables the owners and operators of critical infrastructure to share information on important issues. It is made up of nine sector-specific Infrastructure Assurance Advisory Groups (IAAG), several Expert Advisory Groups (EAG), and the Critical Infrastructure Advisory Council (CIAC - which is the peak body of TISN and oversees the IAAGs and the EAGs). More information on TISN can be sought from www.tisn.gov.au or by contacting [email protected]. The ITSEAG is one of the expert advisory groups within the TISN framework. The ITSEAG provides advice to the CIAC and the sector-based IAAGs on IT security issues as they relate to critical infrastructure protection. It is made up of academic specialists, vendors, consultants and some industry association representatives who are leaders in the information technology/e-security field. The ITSEAG Secretariat can be contacted on (02) 6271 7018. DEFENCE IN DEPTH Contents Foreword..................................................................................................................................... 2 Figures...................................................................................................................................... 4 Tables....................................................................................................................................... 5 Focus area summaries.............................................................................................................. 5 Executive summary.................................................................................................................... 6 Overview ........................................................................................Error! Bookmark not defined. Critical infrastructure............................................................................................................... 9 The defence in depth concept ................................................................................................ 10 Establish context ...................................................................................................................... 11 Enterprise strategy ................................................................................................................. 13 Internal environment.............................................................................................................. 14 Governance ........................................................................................................................ 16 People................................................................................................................................. 16 Process ............................................................................................................................... 17 Technology ........................................................................................................................ 19 Threat environment................................................................................................................ 21 Adversaries and motivations.............................................................................................. 21 Risk analysis ............................................................................................................................. 23 Risk profiling ......................................................................................................................... 23 Risks, threats and vulnerabilities ........................................................................................... 23 Risk Analysis methodology ................................................................................................... 24 Identify risk........................................................................................................................ 25 Analyse risk ....................................................................................................................... 28 Evaluate risk....................................................................................................................... 31 Key success factors............................................................................................................ 32 Assessment methodologies and tools..................................................................................... 33 Assessing governance risks................................................................................................ 33 Assessing people risks ....................................................................................................... 35 Assessing process risks...................................................................................................... 38 Assessing technology risks ................................................................................................ 40 Implementing defence in depth............................................................................................... 44 Core principles....................................................................................................................... 45 Implement measures according to business risks .............................................................. 45 Implement controls using a layered approach ................................................................... 45 Controls should serve to increase the cost of an attack ..................................................... 46 Implement technical, procedural and operational controls................................................ 47 Implementing governance controls........................................................................................ 47 Accountability.................................................................................................................... 48 Policy and compliance management.................................................................................. 48 Control analysis ................................................................................................................. 49 Implementing people controls................................................................................................ 56 Job and role definition ....................................................................................................... 56 Recruitment and selection.................................................................................................. 57 Induction, training and development ................................................................................. 58 DEFENCE IN DEPTH Ongoing operations............................................................................................................ 59 Role change management .................................................................................................. 59 Managing morale ..............................................................................................................
Recommended publications
  • The German Army, Vimy Ridge and the Elastic Defence in Depth in 1917
    Journal of Military and Strategic VOLUME 18, ISSUE 2 Studies “Lessons learned” in WWI: The German Army, Vimy Ridge and the Elastic Defence in Depth in 1917 Christian Stachelbeck The Battle of Arras in the spring of 1917 marked the beginning of the major allied offensives on the western front. The attack by the British 1st Army (Horne) and 3rd Army (Allenby) was intended to divert attention from the French main offensive under General Robert Nivelle at the Chemin des Dames (Nivelle Offensive). 1 The French commander-in-chief wanted to force the decisive breakthrough in the west. Between 9 and 12 April, the British had succeeded in penetrating the front across a width of 18 kilometres and advancing around six kilometres, while the Canadian corps (Byng), deployed for the first time in closed formation, seized the ridge near Vimy, which had been fiercely contested since late 1914.2 The success was paid for with the bloody loss of 1 On the German side, the battles at Arras between 2 April and 20 May 1917 were officially referred to as Schlacht bei Arras (Battle of Arras). In Canada, the term Battle of Vimy Ridge is commonly used for the initial phase of the battle. The seizure of Vimy ridge was a central objective of the offensive and was intended to secure the protection of the northern flank of the 3rd Army. 2 For detailed information on this, see: Jack Sheldon, The German Army on Vimy Ridge 1914-1917 (Barnsley: Pen&Sword Military, 2008), p. 8. Sheldon's book, however, is basically a largely indiscriminate succession of extensive quotes from regimental histories, diaries and force files from the Bavarian War Archive (Kriegsarchiv) in Munich.
    [Show full text]
  • Zero Day Exploits and National Readiness for Cyber-Warfare
    Nigerian Journal of Technology (NIJOTECH) Vol. 36, No. 4, October 2017, pp. 1174 – 1183 Copyright© Faculty of Engineering, University of Nigeria, Nsukka, Print ISSN: 0331-8443, Electronic ISSN: 2467-8821 www.nijotech.com http://dx.doi.org/10.4314/njt.v36i4.26 ZERO DAY EXPLOITS AND NATIONAL READINESS FOR CYBER-WARFARE A. E. Ibor* DEPT. OF COMPUTER SCIENCE, CROSS RIVER UNIVERSITY OF TECHNOLOGY, CALABAR, CROSS RIVER STATE NIGERIA E-mail address: [email protected] ABSTRACT A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly reported or announced. But how should a nation react to a zero day? This question is a concern for most national governments, and one that requires a systematic approach for its resolution. The securities of critical infrastructure of nations and states have been severally violated by cybercriminals. Nation-state espionage and the possible disruption and circumvention of the security of critical networks has been on the increase. Most of these violations are possible through detectable operational bypasses, which are rather ignored by security administrators. One common instance of a detectable operational bypass is the non-application of periodic security updates and upgrades from software and hardware vendors. Every software is not necessarily in its final state, and the application of periodic updates allow for the patching of vulnerable systems, making them to be secure enough to withstand an exploit. To have control over the security of critical national assets, a nation must be “cyber-ready” through the proper management of vulnerabilities and the deployment of the rightful technology in the cyberspace for hunting, detecting and preventing cyber-attacks and espionage.
    [Show full text]
  • Army Medic~Orps
    J R Army Med Corps: first published as 10.1136/jramc-78-02-01 on 1 February 1942. Downloaded from VOL. LXXVIII. FEBRUARY, 1942. No. 2. Authors are alone responsible for the statements _' ("...8<:8. 0 4~~ mad. ODd ... opinioruo ........... in ,'oh "P~ :!t ~({!1gr ~o~'1I)!;$ ~"- .~ ~ ~ 1,/~~~' Journal .~ • ~~40~ ~ of the ~~' O~ _ Royal Army Medic~orps. Original Communications. 2021 by guest. Protected copyright. " BLITZKRIEG." AN APPRECIATION. By BRI(!ADIER E. M. COWELL, C.B., CB.E., D.S.a., T.D. THIS is the title of a small book written by F. O. Miksche and recently published by Faber and Faber Ltd., London. The author, an officer of the Regular Army :of the Czechoslovak Republic for twelve years, served with distinction with the Republican forces in the late War in Spain. The book is described by Tom Wintringham in his introduction as "a Conti­ nental, a European\ essay on Tactics." LieutenantMiksche writes with a sound knowledge of Germal1 tactics and a practical experience of Total War. He is in a position to be able to describe' tJ.()t only the plans for attack' on the new lines exploited by the http://militaryhealth.bmj.com/ Germans with their ,armoured and motorized forces but also the methods to be adopted in defence in depth, as employed so brilliantly by our gallant Russian allies to-day. ' All medical officers in a Field Force will perform their duties with success 'proportional to their knowl~dge'oftactics. Whether it be the Regimental Medical Officer or the Director of Medical Services, m~dical arral~gements wiIH,,\iluilless'the tictical situation be studied, understood and appreciated tram a ptactical angle.
    [Show full text]
  • Implementation of Defence in Depth at Nuclear Power Plants
    Nuclear Regulation 2016 Implementation of Defence in Depth at Nuclear Power Plants Lessons Learnt from the Fukushima Daiichi Accident NEA Nuclear Regulation Implementation of Defence in Depth at Nuclear Power Plants Lessons Learnt from the Fukushima Daiichi Accident © OECD 2016 NEA No. 7248 NUCLEAR ENERGY AGENCY ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of 34 democracies work together to address the economic, social and environmental challenges of globalisation. The OECD is also at the forefront of efforts to understand and to help governments respond to new developments and concerns, such as corporate governance, the information economy and the challenges of an ageing population. The Organisation provides a setting where governments can compare policy experiences, seek answers to common problems, identify good practice and work to co-ordinate domestic and international policies. The OECD member countries are: Australia, Austria, Belgium, Canada, Chile, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Israel, Italy, Japan, Korea, Luxembourg, Mexico, the Netherlands, New Zealand, Norway, Poland, Portugal, the Slovak Republic, Slovenia, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States. The European Commission takes part in the work of the OECD. OECD Publishing disseminates widely the results of the Organisation’s statistics gathering and research on economic, social and environmental issues, as well as the conventions, guidelines and standards agreed by its members. This work is published on the responsibility of the OECD Secretary-General. NUCLEAR ENERGY AGENCY The OECD Nuclear Energy Agency (NEA) was established on 1 February 1958.
    [Show full text]
  • EVOLUTION of the FINNISH MILITARY DOCTRINE 1945-1985 Pekka Visuri
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by National Library of Finland DSpace Services FINNISH DEFENCE STUDIES EVOLUTION OF THE FINNISH MILITARY DOCTRINE 1945-1985 Pekka Visuri OCUMENTATION War College Helsinki 1990 Finnish Defence Studies is published under the auspices of the War College, and the contributions reflect the fields of research and teaching of the College. Finnish Defence Studies will occasionally feature documentation on Finnish Security Policy. Views expressed are those of the authors and do not necessarily imply endorsement by the War College. Editor: Kalevi Ruhala Editorial Assistant: Matti Hongisto Editorial Board: Chairman Prof. Mikko Viitasalo, War College Dr. Pauli Järvenpää, Ministry of Defence Col. Tauno Nieminen, General Headquarters Dr., Lt.Col. (ret.) Pekka Visuri, Finnish Institute of International Affairs Dr. Matti Vuorio, Scientific Committee for National Defence Published by WAR COLLEGE P.O. Box 266 SF - 00171 Helsinki FINLAND FINNISH DEFENCE STUDIES 1 EVOLUTION OF THE FINNISH MILITARY DOCTRINE 1945-1985 Pekka Visuri DOCUMENTATION War College Helsinki 1990 ISBN 951-25-0522-3 ISSN 0788-5571 © Copyright 1990: War College All rights reserved Valtion painatuskeskus Pasilan VALTIMO Helsinki 1990 CONTENTS INTRODUCTION..................................................................................... 3 Purpose and approach ............................................................................. 3 Theoretical framework ............................................................................
    [Show full text]
  • The Wilhelm's Battle
    The Wilhelm’s battle Prologue Paris, France, March 29 th , 1918, district of Saint Gervais, Good Friday. In the church of the district, some people have met for praying. There are men, women, young and old people. Suddenly, a whistle overwhelms the whisper of the prayers. The faithful become silent, they prick up their ears towards that sinister whistle which is closer and closer… Then, only fire and smoke, flames and dust , blood and screams. Vaults and walls collapse, tons of stones and bricks fall on the faithful. Paris is under fire of a monstrous gun made by the Krupp Factories. In the previous days, some other places of the city had been hit by it. Many inhabitants had already left the city. The Germans are almost at one hundred kilometres from Paris. And they are advancing. A nasty situation. After almost four years of war, Germany was exhausted. Bread was lacking, the infant mortality had doubled, the economy was on its knees, Socialists and Pacifists were adding fuel to the flames, the social riots were increasing. Till that time, on the western front, Germany had stood on defensive , intending – and hoping- to convince the Allies about the impossibility of a victory on the field and to force them to negotiate the peace. The attempts had failed; the Chancellor Theobald Bethman-Hollweg-- a moderate-- had resigned and the power, de facto, had passed into the hands of the militaries. Nasty business when the policy is decided by the militaries. They had imposed the indiscriminate submarine warfare, they were about to impose a new offensive on the western front.
    [Show full text]
  • China's Evolving Nuclear Posture Part I - Background and Benchmark
    China’s Evolving Nuclear Posture Part I – Background and Benchmark Donald A. Neill Strategic Analysis Section DRDC CORA TM 2011-148 September 2011 Defence R&D Canada Centre for Operational Research and Analysis China Team Sponsor: Strategic Joint Staff China's evolving nuclear posture Part I - Background and Benchmark D.A. Neill DRDC CORA The reported results, their interpretation, and any opinions expressed herein, remain those of the author and do not represent, or otherwise reflect, any official position of DND or the government of Canada. Defence R&D Canada – CORA Technical Memorandum DRDC CORA TM 2011-148 September 2011 Principal Author Original signed by D.A. Neill, Ph.D. D.A. Neill, Ph.D. Strategic Analyst Approved by Original signed by G. Smolynec G. Smolynec Section Head, Strategic Analysis Approved for release by Original signed by P. Comeau P. Comeau Chief Scientist This paper has been produced under Thrust 10a as part of the China/Asia ARP. Defence R&D Canada – Centre for Operational Research and Analysis (CORA) © Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2011 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2011 Abstract …….. This paper is the first part of a larger study the goal of which is to determine the trajectory of China’s nuclear weapons policy, strategy, capability and doctrine. It discusses the origins, scope and methodology of the proposed study, and provides an overview of the evolution of US nuclear strategy in order to establish a baseline for discussing why, and to what extent, China’s nuclear evolution has differed from US nuclear thinking.
    [Show full text]
  • EU's Institutional Framework Regarding Defence Matters
    IN-DEPTH ANALYSIS Requested by the Sub-Committee on Security and Defence EU’s Institutional Framework regarding Defence Matters Policy Department for External Relations Directorate General for External Policies of the Union PE 603.484 - January 2020 EN DIRECTORATE-GENERAL FOR EXTERNAL POLICIES POLICY DEPARTMENT IN-DEPTH ANALYSIS EU’s Institutional Framework regarding Defence Matters ABSTRACT This policy brief provides a short overview of recent initiatives and developments in the EU’s institutional defence architecture, with a particular focus on changes proposed and implemented since 2016. Specifically, it looks at the new Permanent Structured Cooperation (PESCO) framework, the Coordinated Annual Review on Defence (CARD), the European Defence Fund (EDF), the Military Planning and Conduct Capacity (MPCC), as well as proposals to establish a European Peace Facility (EPF) and to take more Common Foreign and Security Policy (CFSP) decisions through qualified majority voting. It examines the institutional state of play at the end of Federica Mogherini’s mandate as EU High Representative and the implications of EU defence institutional innovation for existing governance structures, internal coherence and effective oversight. Finally, it identifies some of the challenges posed by the recent reforms and initiatives relating to the EU’s existing defence infrastructure, and briefly introduces proposals to address these challenges. EP/EXPO/SEDE/FWC/2019-01/LOT4/1/C/04 EN January 2020 - PE 603.484 © European Union, 2020 Policy Department, Directorate-General for External Policies This paper was requested by the European Parliament's Sub-Committee on Security and Defence. English-language manuscript was completed on 10 January 2020. Printed in Belgium.
    [Show full text]
  • Western Military Capability in Northern Europe 2020 Part I: Collective Defence
    Western Military Capability in Northern Europe 2020 Part I: Collective Defence Eva Hagström Frisell and Krister Pallin (eds) Albin Aronsson, Bengt-Göran Bergstrand, Robert Dalsjö, Johan Engvall, Jakob Gustafsson, Michael Jonsson, Diana Lepp, Viktor Lundquist, Björn Ottosson and Anna Sundberg FOI-R--5012--SE February 2021 Western Military Capability in Northern Europe 2020 Part I: Collective Defence Eva Hagström Frisell and Krister Pallin (eds) Albin Aronsson, Bengt-Göran Bergstrand, Robert Dalsjö, Johan Engvall, Jakob Gustafsson, Michael Jonsson, Diana Lepp, Viktor Lundquist, Björn Ottosson and Anna Sundberg FOI-R--5012--SE Title Western Military Capability in Northern Europe 2020 Part I: Collective Defence Report No. FOI-R--5012--SE Month February Year 2021 Pages 132 ISSN 1650-1942 Customer Ministry of Defence Research Area 8. Security Policy Project No. A 12112 Approved by Malek Finn Khan Division Defence Analysis Cover: Jonathan Nackstrand/AFP. US Marines prepare their M1 Abrams tank before taking part in an exercise to capture an airfield during Trident Juncture 2018, near the town of Oppdal, Norway. This work is protected by the Swedish Act on Copyright in Literary and Artistic Works (1960:729). Citation is permitted in accordance with article 22 in said act. Any form of use that goes beyond what is permitted by Swedish copyright law, requires the written permission of FOI. ii FOI-R--5012--SE Abstract The conclusion of our analysis of Western military capability in Northern Europe in 2017 was that the West had several shortcomings compared to Russia when it came to high-intensity warfighting. Considerable resources and time would be required before the West could change the situation.
    [Show full text]
  • Defence in Depth in Nuclear Safety INSAG-10
    Defence in Depth in Nuclear Safety INSAG-10 NTERNATIOf iROUP DEFENCE IN DEPTH IN NUCLEAR SAFETY INSAG-10 A report by the International Nuclear Safety Advisory Group The following States are Members of the International Atomic Energy Agency: AFGHANISTAN HUNGARY PERU ALBANIA ICELAND PHILIPPINES ALGERIA INDIA POLAND ARGENTINA INDONESIA PORTUGAL ARMENIA IRAN, QATAR AUSTRALIA ISLAMIC REPUBLIC OF ROMANIA AUSTRIA IRAQ RUSSIAN FEDERATION BANGLADESH IRELAND SAUDI ARABIA BELARUS ISRAEL SENEGAL BELGIUM ITALY SIERRA LEONE BOLIVIA JAMAICA SINGAPORE BOSNIA AND JAPAN SLOVAKIA HERZEGOVINA JORDAN SLOVENIA BRAZIL KAZAKHSTAN SOUTH AFRICA BULGARIA KENYA SPAIN CAMBODIA KOREA, REPUBLIC OF SRI LANKA CAMEROON KUWAIT SUDAN CANADA LEBANON SWEDEN CHILE LIBERIA SWITZERLAND CHINA LIBYAN ARAB JAMAHIRIYA SYRIAN ARAB REPUBLIC COLOMBIA LIECHTENSTEIN THAILAND COSTA RICA LITHUANIA THE FORMER YUGOSLAV COTE DTVOIRE LUXEMBOURG REPUBLIC OF MACEDONIA CROATIA MADAGASCAR TUNISIA CUBA MALAYSIA TURKEY CYPRUS MALI UGANDA CZECH REPUBLIC MARSHALL ISLANDS UKRAINE DENMARK MAURITIUS UNITED ARAB EMIRATES DOMINICAN REPUBLIC MEXICO UNITED KINGDOM OF ECUADOR MONACO GREAT BRITAIN AND EGYPT MONGOLIA NORTHERN IRELAND EL SALVADOR MOROCCO UNITED REPUBLIC ESTONIA MYANMAR OF TANZANIA ETHIOPIA NAMIBIA UNITED STATES OF AMERICA FINLAND NETHERLANDS URUGUAY FRANCE NEW ZEALAND UZBEKISTAN GABON NICARAGUA VENEZUELA GERMANY NIGER VIET NAM GHANA NIGERIA YEMEN GREECE NORWAY YUGOSLAVIA GUATEMALA PAKISTAN ZAIRE HAITI PANAMA ZAMBIA HOLY SEE PARAGUAY ZIMBABWE The Agency's Statute was approved on 23 October 1956 by the Conference on the Statute of the IAEA held at United Nations Headquarters, New York; it entered into force on 29 July 1957. The Headquarters of the Agency are situated in Vienna. Its principal objective is "to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world".
    [Show full text]
  • Ministry of Defence Acronyms and Abbreviations
    Acronym Long Title 1ACC No. 1 Air Control Centre 1SL First Sea Lord 200D Second OOD 200W Second 00W 2C Second Customer 2C (CL) Second Customer (Core Leadership) 2C (PM) Second Customer (Pivotal Management) 2CMG Customer 2 Management Group 2IC Second in Command 2Lt Second Lieutenant 2nd PUS Second Permanent Under Secretary of State 2SL Second Sea Lord 2SL/CNH Second Sea Lord Commander in Chief Naval Home Command 3GL Third Generation Language 3IC Third in Command 3PL Third Party Logistics 3PN Third Party Nationals 4C Co‐operation Co‐ordination Communication Control 4GL Fourth Generation Language A&A Alteration & Addition A&A Approval and Authorisation A&AEW Avionics And Air Electronic Warfare A&E Assurance and Evaluations A&ER Ammunition and Explosives Regulations A&F Assessment and Feedback A&RP Activity & Resource Planning A&SD Arms and Service Director A/AS Advanced/Advanced Supplementary A/D conv Analogue/ Digital Conversion A/G Air‐to‐Ground A/G/A Air Ground Air A/R As Required A/S Anti‐Submarine A/S or AS Anti Submarine A/WST Avionic/Weapons, Systems Trainer A3*G Acquisition 3‐Star Group A3I Accelerated Architecture Acquisition Initiative A3P Advanced Avionics Architectures and Packaging AA Acceptance Authority AA Active Adjunct AA Administering Authority AA Administrative Assistant AA Air Adviser AA Air Attache AA Air‐to‐Air AA Alternative Assumption AA Anti‐Aircraft AA Application Administrator AA Area Administrator AA Australian Army AAA Anti‐Aircraft Artillery AAA Automatic Anti‐Aircraft AAAD Airborne Anti‐Armour Defence Acronym
    [Show full text]
  • NORAD Modernization Might Take to Address Them
    Introduction NDIA/CDAI hosted the second of three webinars on 26 August 2020, intended to examine key capability requirements for the modernization of continental defence under auspice of North American Aerospace Defense Command (NORAD). The goal was to allow experts from industry, academia, and government to break down silos and engage in direct conversations about North American continental defence challenges and what form NORAD modernization might take to address them. The forum was created to imagine the art of the possible. More specifically, the goal of these three events were to identify security gaps and brainstorm actionable solutions to the issues identified during the discussions. - 12 August 2020: Domain Awareness/Sensors - 26 August 2020: Defeat Capabilities - 9 September 2020: JADC2/JADO This second webinar focused on defeat mechanisms and brought together experts from government, academia and industry to discuss the rationale and requirements for kinetic and non- kinetic defence capabilities. Military representatives presented a white paper template to industry representatives to structure the submission of short-, medium-, and long-term defeat mechanisms directly to NORAD J8 planners for further consideration, potential future confidential technical discussions, and possible operational endorsement. Given the urgency for enhanced sensing, short-term solutions were a major theme throughout the discussion. NORAD Deputy Commander L. Gen Pelletier and Brig. Gen Pete Fesler provided introductory remarks. A white paper overview
    [Show full text]