Joint Task Force Would Not

Total Page:16

File Type:pdf, Size:1020Kb

Joint Task Force Would Not 1 2 Table of Contents History 5 STRATCOM Commanders 11 JTF-CND/CNO/GNO Commanders 15 JTF Deputy Commanders 21 JMUAs 26 Rowlett Awards 29 Omaha Trophy 30 3 4 JTF-GNO History - The Early Years of Cyber Defense One of the advantages of today’s growing of these solutions had drawbacks that a technology is the ability to use computer Joint Task Force would not. The problem networks to command, coordinate, and with DISA assuming the role of defense of control a majority of the information need- the DoD network was its limited influence ed to conduct military operations. How- over the various commands. As an agency, ever, with the increased use and depen- it did not fit into the chain of command dence on computer technology to access and left the problem of who was in charge this information, it has become essential and responsible for making decisions. The to ensure the security of the information problem with assigning the mission to a stored on these networks. Otherwise, COCOM was determining which COCOM those looking to disrupt public and private could best assume that responsibility. Be- interests would have the power to do so by cause of the time necessary to resolve the invading the systems, affecting their use, many issues, the Secretary of Defense cre- or causing damage by copying, destroying ated a temporary solution. or changing vital information. With this in On 23 July 1998, the Joint Chiefs of mind, the Secretary of Defense sought a Staff’s “tank” directed that a Joint Task way to “…coordinate and direct the defense Force for Computer Network Defense of DoD computer systems and computer (CND) be established. By creating the JTF- networks…in conjunction with the Combat- CND, the Joint Chiefs established an orga- ant Commands, Services, and Agencies nizational structure with principles consis- (CC/S/A).” tent with “Joint” doctrine. Additionally, the The realization of the necessity of such JTF construct provided authorities for uni- an organization came as a result of exercis- fied action as well as an operational chain es and real world events in 1997 and 1998. of command. Most of all, it was an answer Exercise ELIGIBLE RECEIVER simulated an to the question of “Who’s in charge?” As attack on the defense information infra- all JTF’s it would have a specific mission structure by agents from the National Se- with limited objectives. However, it was curity Agency (NSA) in June 1997 pointed clear that sooner or later a more perma- out two key points. First, it demonstrated nent organization would need to be estab- the vulnerabilities in the DoD network, lished and placed under the command of and second, it showed that no one was in one of the COCOM. charge of defending the department’s net- Once the decision was made to create works. Therefore, in October 1997, Presi- the JTF-CND, it was necessary to decide dent Clinton issued Presidential Decision where to establish it and do so as quickly Directive 63, which made infrastructure as possible. On 11 August 1998, it was protection a national security priority and announced the JTF-CND would stand up in tasked DoD to develop a compliance plan. the Washington DC area and be a compo- A second event demonstrating the need nent of DISA. This was done mainly due to for action occurred in February 1998 when the established resources available through a real-world attack was made on DoD sys- DISA, that included its 24/7 Global Opera- tems. This incident not only demonstrated tions and Security Center (GOSC). Ad- the vulnerability of the DoD’s networks, it ditionally, by creating the JTF-CND within further illustrated what had already been the vicinity of Washington DC, it provided demonstrated during Exercise ELIGIBLE access to key leadership and also made it RECEIVER the troubling fact that once easier to coordinate with various agencies, again no one took charge. including the Defense Intelligence Agency The creation of a Joint Task Force was (DIA), National Infrastructure Protec- not the only possible solution; the Defense tion Center (NIPC), and National Security Information Systems Agency (DISA) or one Agency (NSA). Quickly a working group of the Combatant Commands (COCOMs) was formed in order to begin the develop- could assume this mission. However, each ment of a charter, a Concept of Operations 5 (CONOPS), and Program Budget Decision on 30 December 1998, one day ahead (PBD). Once approved, the funding and of the pre-determined IOC date and 30 staffing for the JTF-CND could begin. days after the Charter was signed by the The working group developed 11 mission SECDEF. Its first action was to send a organizational functions and established message throughout the DOD network that the staff would consist of 24 people declaring its mission and goals. From this according to traditional joint staff elements point on, there would always be someone (J1 – J8). in charge of defending the DoD networks. Perhaps the biggest challenge laid out For the next 10 months the fledgling orga- for the working group was to develop an nization went about the tasks of CONOPS approved CONOPS for how the JTF-CND development and establishing its battle would conduct its mission. This was espe- rhythm. On 1 October 1999 the JTF-CND cially difficult because the JTF-CND would attained FOC. Utilizing members from be performing a unique mission to DoD active duty military, reserves, and other which did not fall under any of the tradi- agencies, the JTF-CND became more and tional “Joint” doctrine plans. Additionally, more engaged in defending the Depart- since the JTF-CND would report directly ment’s computer networks. Besides con- to the Joint Chiefs and then the Secretary ducting 24/7 watch operations, the JTF- of Defense, it lacked the structure typical CND had a strong intelligence group, and of organizations underneath COCOMs or led the Department in preparation for any Agencies. Yet despite those difficulties and Year Two Thousand (Y2K) problems that others, both the CONOPS and the JTF-CND might occur at the turn of the millennia. Charter were approved by the Secretary of Also in October 1999, JTF-CND was Defense on 4 December 1998, the infant placed under the command of USSPACE- organization began to take shape. COM. Although SPACECOM is headquar- tered in Colorado Springs, the JTF-CND stayed in Washington, DC where it worked in coordination with DISA monitoring and defending the DOD network. During this period, in addition to monitoring Y2K prep- aration activities, the JTF-CND conducted elevated network defense during U.S. participation in NATO’s Balkan operations and hacking attempts originating within the areas of China, Russia, India, Pakistan, Is- rael, and Palestine. In Mid 2000, command of the JTF-CND passed to MG J. David Bryan, USA, who also became Vice Director of DISA. JTF-CND (COMPUTER NETWORK JTF-CNO (COMPUTER NETWORK DEFENSE) January 1999 – October OPERATIONS) October 2000 – June 2000 2004 Once the charter was signed, Major Gen- In the early months of 2000, SecDef eral John Campbell, USAF, was assigned as decided to combine the Computer Network the first Commander JTF-CND. He im- Attack (CNA) mission with the Computer mediately began staffing with personnel Network Defense (CND) mission and re- from the various Services and agencies name the JTF-CND to JTF-CNO (Computer while establishing Tactics, Techniques, and Network Operations) effective on 1 April, Procedure (TTPs). This was done using the 2001. Under this new mandate, JTF-CNO limited people assigned who were at the immediately began efforts to operational- same time performing the daily mission ize the mission space throughout DoD, of defending the Department’s computer while providing direct support to all the network systems. COCOM Commanders. JTF-CNO became The JTF-CND officially began operations the lead organization for Net Defense and 6 the Federal Computer Incident Response Center (FedCIRC), the National Commu- nication System (NCS), and numerous private sector organizations. Intelligence was recognized as a criti- cal component of the Task Force’s mission success during this period. This rapidly maturing component of the command dra- matically expanded from one of narrowly focused intelligence research that sup- ported computer network defensive opera- tions to a dynamic time-sensitive mission encompassing support to both computer network defense and computer network attack. It was during this period that a 24/7 intelligence watch was added to the watch floor to provide real-time intelligence and threat analysis. These watch-standers assumed new responsibilities for computer network intrusion indicators and attempt warnings as an Associate Member of the developed critical CNA concepts including Defense Intelligence Warning System. This command and control for CNA, authority expanded the JTF’s reporting mission to to execute CNA, and cyber tool weaponiza- include time-sensitive reporting of foreign tion. An early challenge for the JTF-CNO threats to DoD’s computer systems. JTF- dealt with increasing awareness throughout CNO also facilitated the development of DoD of the promises and pitfalls of com- partnerships with the National Intelligence puter network attack. Meanwhile, JTF-CNO Community agencies, enabling unprec- also provided direct support to over 15 ex- edented sharing of computer network ercises and real world operations conduct- technical intelligence, and provided an ed by the various Combatant Commands. integrated intelligence analysis and target JTF-CNO’s proactive leadership and guid- development capability for CNA planning in ance in the CNA warfare area during those support of COCOM Operations. early years resulted in dramatic progress Once again the command grappled with towards DoD’s ability to fully integrate CNA the development of a expanded CONOPS and Information Operations into its overall for Computer Network Operations (CNO).
Recommended publications
  • The United States Government Manual 2009/2010
    The United States Government Manual 2009/2010 Office of the Federal Register National Archives and Records Administration The artwork used in creating this cover are derivatives of two pieces of original artwork created by and copyrighted 2003 by Coordination/Art Director: Errol M. Beard, Artwork by: Craig S. Holmes specifically to commemorate the National Archives Building Rededication celebration held September 15-19, 2003. See Archives Store for prints of these images. VerDate Nov 24 2008 15:39 Oct 26, 2009 Jkt 217558 PO 00000 Frm 00001 Fmt 6996 Sfmt 6996 M:\GOVMAN\217558\217558.000 APPS06 PsN: 217558 dkrause on GSDDPC29 with $$_JOB Revised September 15, 2009 Raymond A. Mosley, Director of the Federal Register. Adrienne C. Thomas, Acting Archivist of the United States. On the cover: This edition of The United States Government Manual marks the 75th anniversary of the National Archives and celebrates its important mission to ensure access to the essential documentation of Americans’ rights and the actions of their Government. The cover displays an image of the Rotunda and the Declaration Mural, one of the 1936 Faulkner Murals in the Rotunda at the National Archives and Records Administration (NARA) Building in Washington, DC. The National Archives Rotunda is the permanent home of the Declaration of Independence, the Constitution of the United States, and the Bill of Rights. These three documents, known collectively as the Charters of Freeedom, have secured the the rights of the American people for more than two and a quarter centuries. In 2003, the National Archives completed a massive restoration effort that included conserving the parchment of the Declaration of Independence, the Constitution, and the Bill of Rights, and re-encasing the documents in state-of-the-art containers.
    [Show full text]
  • 2009 Program
    Alumni Club of Boston Center for Digital Business SIM Boston DEAR SYMPOSIUM ATTENDEES, Welcome to MIT! We are pleased you have joined us for the 6th technology? How will you handle data security? The Cloud Annual MIT Sloan CIO Symposium. We organize this Symposium Computing panel discussion, as well as our sessions on Green IT, each year to bring together thought-leaders and practitioners in Outsourcing, Connected Healthcare Systems, and Governance, discussions that will help you become better business leaders and Risk and Compliance, will help sift through the issues and technologists. We trust you will have a great day today. challenges, with the goal of helping you find the best solution for your company. The Symposium offers the unique opportunity to access the latest thinking and research at MIT, gain practical insight into In the Virtualization track, we will address the hardware and innovative technologies, and build connections to your peers. software technologies that enable CIOs to squeeze more What is different this year? It is more international: countries productivity from their data centers and the impact of distributing across the globe, including the US, Asia, Europe and the Mid applications and data outside of the traditional organizational East, are represented among the CIOs, government officials and structure. The Virtual Organization panel originated with the corporate executives who are speaking and attending. It is more observation of the Obama campaign’s use of technology, which innovative and collaborative: new ways to connect with other enabled mobilization of many more people without diluting the attendees before, during, and after today’s event include LinkedIn, campaign’s focus.
    [Show full text]
  • [email protected]
    www.caseylucius.com [email protected] https://en.wikipedia.org/wiki/Main_Page Naval Postgraduate School The Naval Postgraduate School (NPS) is a fully accredited masters-level university operated by the United States Navy. Located in Monterey, California, it grants master's degrees, engineer's degrees and doctoral degrees. The school also offers research fellowship opportunities at the postdoctoral level through the National Research Council research associateship program.[3] Overview The NPS student population is mostly active-duty officers from all branches of the U.S. military, although U.S. Government civilians and members of foreign militaries can also matriculate under a variety of programs. Most of the faculty are civilians. NPS concentrate on topics traditionally associated with civilian graduate schools, focusing on their application to the navy whereas staff colleges and war colleges concentrate instead on staff functions, civil-military affairs, tactics and strategy. On November 27, 2012, Vice Admiral Daniel Oliver (retired) and provost Dr. Leonard Ferrari were relieved of duty by Secretary of the Navy Ray Mabus.[2][4] [5] A Navy press release cited findings from a Naval Inspector General investigation which included Oliver's misuse of standard contracting procedures to circumvent federal hiring and compensation authorities.[2] The investigation also found that both Oliver and Ferrari "inappropriately accepted gifts from an independent private foundation organized to support the school".[2] Academic structure NPS offers
    [Show full text]
  • 2018 Annual Report
    CASCO, MAINE 2018 ANNUAL REPORT WWW.CAMPSUNSHINE.ORG A RETREAT FOR CHILDREN WITH LIFE-THREATENING ILLNESSES AND THEIR FAMILIES TABLE OF 1 Reflecting on 2018 5 Leading the Way 3 Our Mission 6 First Session CONTENTS 4 Program History 7 Building the Program REFLECTING ON 2018 Another fabulous year is in the books. Thanks to your community service and most importantly was awarded generosity and support our 34th year of serving children Charity Navigator’s coveted top four-star rating for with life-threatening illnesses and their families was a exhibiting fiscal management and transparency. tremendous success! As we look forward to celebrating Each day, into each year we are more astonished by our 35th Anniversary in 2019, we would like to take a the people and organizations that generously share moment and share with you some of the exciting and their time and talent to help insure Camp Sunshine’s amazing highlights of the past year. success. We had people run races, jump in the chilly Camp Sunshine offered 23 programs and served 731 waters, host concerts, produce stage shows, organize families (2,870 family members) from 43 states and 9 golf tournaments, participate in craft fairs and more. countries. We extended our outreach, visiting hospitals Camp hosted our 16th Pumpkin Festival and 2nd annual and clinics in a variety of locations, hosted a pilot Watermelon Festival on the campus of L.L. Bean, program with Boston Children’s Hospital for their Solid Twenty-five brave Navy SEALs paddled 26.2 miles (a Organ Transplant families, partnered with Tropical marathon) atop paddleboards in the open ocean off Smoothie Café to host informational family socials the coast of Coronado Island, CA.
    [Show full text]
  • The United States Government Manual 2011
    The United States Government Manual 2011 Office of the Federal Register National Archives and Records Administration GOVMAN.indb i 7/26/2011 12:55:15 PM Revised March 14, 2011 Raymond A. Mosley, Director of the Federal Register. David S. Ferriero, Archivist of the United States. On the cover: This edition of The United States Government Manual marks the 75th anniversary of the Federal Register and celebrates its role as the official journal of the rules and regulations, notices, and Presidential documents of the Federal government of the United States of America. The cover features the majestic stone eagle from the National Archives Building in Washington, DC, designed by noted architect John Russell Pope. Symbolic of protection, the eagle serves as a reminder of the National Archives and Records Administration’s role as guardian of this Nation’s records, and thus served as the inspiration for NARA’s new agency logo. On the back, the design incorporates text from the very first document published in the Federal Register. Before the advent of the Federal Register, American citizens had no single, authoritative source of information about their legal rights and responsibilities under Federal agency programs. Since, March 14, 1936, the Federal Register has been published, every Federal business day, to provide public notice of the regulatory activities and official documents of the Federal executive branch agencies and the President. Final rules published in the Federal Register are ultimately codified in the Code of Federal Regulations, a related publication of the Office of the Federal Register, which is part of the National Archives.
    [Show full text]