Patrick M' Sullivan - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Patrick M' Sullivan

Description:

Modeling, Simulation and Visualization of the future environment ... systems, tools, technologies and processes (both existing and new) prior to ... – PowerPoint PPT presentation

Number of Views:85
Avg rating:3.0/5.0
Slides: 12
Provided by: ndi1
Category:

less

Transcript and Presenter's Notes

Title: Patrick M' Sullivan


1
Cyber Warfare SupportProcurement
  • Patrick M. Sullivan
  • SPAWAR ISR/IO National Competency Lead
  • SSC Pacific ISR/IO Department Head

2
The Situation
Ubiquitous Presence
Salient Danger
  • Cyberspace intrusions and attacks are a real and
    emerging threat
  • U.S. faces a dangerous mixture of vulnerabilities
    and adversaries
  • Cyberspace situational awareness is not mature
  • Information and the information infrastructure
    are targets
  • Exploitation, disruption, or destruction are
    adversary goals
  • Malicious cyberspace activity is increasing in
    regularity and severity
  • 1.5 billion people on the Internet much of Asia
    and Africa still to come
  • Upwards of 200B e-mails per day
  • Critical to commerce, government, business
    processes, safety, etc.
  • Exponential demand 8 hours of YouTube uploaded
    every minute
  • Increasing connections global wireless and
    cellular usage

3
Cyber Environmental Scan
  • POTUS announces results of 60-day review
  • To ensure accountability in federal agencies,
    cyber security will be designated as one of my
    key management priorities
  • Work with all the key players, including state
    and local governments and the private sector
  • Strengthen the public-private partnerships
  • Invest in the cutting-edge research and
    development necessary for the innovation and
    discovery
  • Begin a national campaign to promote cyber
    security awareness and digital literacy
  • We will preserve and protect the personal
    privacy and civil liberties that we cherish as
    Americans.

REMARKS BY THE PRESIDENT ON SECURING OUR
NATION'S CYBER INFRASTRUCTURE May 29, 2009
http//www.whitehouse.gov/the_press_office/Remarks
-by-the-President-on-Securing-Our-Nations-Cyber-In
frastructure/
4
Cyber Environmental Scan
  • POTUS to designate a Cyber Czar TBD
  • DoD announces CYBER COMMAND
  • Sub-Unified under STRATCOM
  • CYBERCOM CDR dual-hatted as DIRNSA
  • IOC OCT 2009 FOC OCT 2010
  • Navy poised to jump onboard
  • Merge OPNAV N2 and N6
  • Stand-up Fleet Cyber Command
  • 3? Ech II
  • At FT Meade
  • NNWC role?

5
DoD Cyber Definitions
Cyberspace A global domain within the
information environment consisting of the
interdependent network of information technology
infrastructures, including the Internet,
telecommunications networks, computer systems,
and embedded processors and controllers.
Cyberspace Operations employment of cyber
capabilities where the primary purpose is to
achieve military objectives or effects in or
through cyberspace. Such operations include
computer network operations and activities to
operate and defend the GIG.
6
SSC Pacific Cyber Warfare SupportTypes of
Activities
  • Computer Network Operations, including Attack,
    Defend and Exploit
  • Understanding aspects of human behavior and
    cognitive functions to influence decision making
  • Electronic Warfare, including Attack, Protect and
    Support
  • Monitoring, analyzing and mitigating Operational
    Security vulnerabilities
  • Command and Control (C2)
  • Intelligence, Surveillance and Reconnaissance
    (ISR)
  • Ubiquitous Communications and Computing
    Environment
  • Countermeasures
  • Modeling, Simulation and Visualization of the
    future environment
  • Understanding networks as a science and
    developing models which can provide clarity into
    how networks operate and resist or deter attack
  • Convergence of physical, biological and social
    networks and how this will effect human
    interactions
  • Understanding of Doctrine, Tactics, Techniques
    and Procedures

7
SSC Pacific Cyber Warfare SupportAnticipated
Tasking
  • Perform basic and applied research in Cyber
    Warfare, its enabling technologies, techniques,
    and theory
  • Design and develop network, system, services and
    application architectures that support the rapid
    development and implementation of new
    technologies and capabilities that reflect the
    rapidly evolving techniques which characterize
    cyber attacks
  • Analyze, design, develop, document, integrate,
    test, install and maintain Cyber Warfare and
    enabling capabilities
  • Develop, implement, and integrate solution sets
    that enable a holistic command and control
    capability, with appropriate underpinning
    technologies and capabilities, that provide for
    interagency communication and collaboration of
    cyber activities
  • Serve as the test site (via the SSC PAC labs and
    other Government facilities) for interoperability
    testing among Cyber Warfare systems, tools,
    technologies and processes (both existing and
    new) prior to their introduction to operational
    environments
  • Participate in Cyber technology forums
  • Provide operational support to assist in
    technical and programmatic oversight of Cyber
    Warfare and enabling systems, programs and
    functions
  • Provide Systems Engineering and Integration
    support to improve overall effectiveness of Cyber
    Warfare and enabling systems, services and
    functions

8
SSC Pacific Cyber Warfare SupportAnticipated
Tasking
  • Demonstrate and evaluate the application of
    advanced software and hardware concepts and
    technology to Cyber Warfare and enabling systems
    and functions
  • Associate information posted in cyberspace to a
    physical identity and originating location
  • Conduct analyses and systems engineering to
    develop initiatives in support of emerging Cyber
    Warfare requirements
  • Develop capabilities to detect and identify
    complex, multi-dimensional attacks of an
    adversary, and to be able to correlate disparate
    events with their greater implications to the
    warfighter
  • Provide computer and network forensic
    capabilities
  • Perform analysis, algorithm development and
    implementation, and display for Cyber Warfare
    tools and data fusion drawn from various sources
    of information
  • Provide support for Cyber Warfare experiments,
    exercises, and other events
  • Perform analysis of adversarial cyber threat
    capabilities to develop courses-of-action and
    response options under a variety of hypothetical
    scenarios
  • Conduct Cyber Warfare Modeling and Simulation,
    wargaming and analysis
  • Perform risk assessment and mitigation planning

9
SSC Pacific Cyber Warfare SupportTechnical
Requirements
  • Technical and Management Support
  • Technology Assessments, Development and
    Transition
  • Requirements Analysis
  • Systems Engineering
  • Operational and Technical Support
  • Exercise and Experimentation Support
  • Software Development and Prototyping
  • Hardware Development and Prototyping
  • Modeling and Simulation
  • Training Support
  • Security Engineering

10
Final Details
  • Center Wide Vehicle
  • 3 Contract Actions
  • BAA (focused on ST)
  • Issued 17 Sep 08
  • GENSER Contract
  • Multiple Award IDIQ CPFF
  • 2 Year Base, 3 1-Year Award Terms
  • Approx 400K Hours per Year
  • RFI - Industry Review of SOW
  • Anticipate Synopsis in FedBizOps in Late July
  • Classified Contract

Point of Contact Curtis Allen (619)
553-6334 Curtis.allen1_at_navy.mil
Teaming is Highly Encouraged! Consider Small
Businesses
11
References
  • Joint Doctrine for Information Operations, Joint
    Pub 3-13, 9 Oct 1998, Unclassified
  • Director of Central Intelligence Directive 7/3
    Information Operations and Intelligence Community
    Related Activities (U)
  • Comprehensive National Cybersecurity Initiative
    (CNCI)
  • Navy NetOps doctrine
  • National Military Strategy Military Operations
    Annex C (Cyberspace Operations Annex)
  • Operational Concept for Cyberspace (OCC)
  • National Military Strategy for Cyber Operations
    (NMS-CO)
  • National Strategic Plan for U.S. Offensive Cyber
    Operations
  • National Security Presidential Directive
    (NSPD-38)
  • Navy NWP 3-63 CNO Vol 1 and 2
  • NTTP 3.13.x series on Navy IO
  • NSPD-54
  • HSPD-23
  • DODD O-8530.1 (CND)
  • DODI O-8530.2 (CND)
  • CJCSM 6510.01 (DID CND)
  • SECNAVINST 5239.19 (DON Incident
    Response/Reporting)
  • SECNAVINST 5000.2C, Implementation and Operation
    of the Defense Acquisition System and the Joint
    Capabilities Integration and Development System
  • NAVSEA Instruction 3900.8A, Human Systems
    Integration (HSI) Policy in Acquisition and
    Modernization, 20 May 2005
Write a Comment
User Comments (0)
About PowerShow.com