Inside Cyber Warfare - Jeffrey Carr [158]
Develops policy that contributes to military freedom of action in cyberspace.
Establishes joint cyberspace policies for effective strategic planning.
Fosters joint and interagency collaboration regarding cyberspace issues, including national cyber initiatives.
Network Operations, J-63
Develops DOD and Joint Staff strategies and positions for cyberspace and network operations.[212]
Recommends and synchronizes cyberspace and network operations guidance in joint doctrine.
Researches, reviews, and synchronizes DOD and joint network operations policies in DOD directives, instructions, and Joint Staff policies.
Joint Education and Doctrine, J-7
Coordinates with the military services and combatant commands to integrate computer network attack and information operations doctrine into joint doctrine for military operations.
Office of the Secretary of Defense
Assistant Secretary of Defense, Network information, and Integration/DOD CIO
Assists SECDEF on network policies, information technology (IT), network operations, and IA.[213]
Provides strategic-level guidance and oversight for CNO including network operations and IA.
Defense Information Security Agency (DISA)
Handles day-to-day management of DOD’s GIG, communication, and computer-based information systems.
Office of the Under Secretary of Defense for Intelligence
Assists SECDEF in IO.[214]
Develops and oversees DOD IO policy and integration activities.
Establishes and oversees specific policies for the integration of CNO, including computer network attack (CNA).
Leads on IO issues within the intelligence community.
Defense Intelligence Agency (DIA)
Provides all-source intelligence to combatant commanders, defense planners, and national security policymakers.
Manages, operates, and maintains own network and IA program.
National Security Agency (NSA)
Provides IA support to DOD.
Prescribes minimum standards for protecting national security systems.
Provides warning support to other DOD components.
Defense Security Service (DSS)
Secures technology within the Defense Industrial Base (DIB).
Oversees the protection of US and foreign classified information in the hands of industry.
Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics
Incorporates policy and processes into the DOD acquisition process that supports the protection of controlled unclassified information with unclassified DIB networks.
Maintains oversight of the process to conduct damage assessments after unauthorized access to DOD information from an unclassified DIB network.
Office of the Under Secretary of Defense for Policy
Provides strategic-level guidance and oversight for CNO, IA, and IO.
Leads integration of cyber policy for interagency and international coordination.
Leads integration of the planning and employment of IO capabilities outside of the intelligence community.
Office of the Assistant Secretary of Defense for Global Strategic Affairs
Develops policy for SECDEF on countering weapons of mass destruction, nuclear forces and missile defense, cyber security and space issues.
Leads in developing a cyber security strategy for the DOD and for crafting the policy for the standup of USCYBERCOM.
Defense Technology Security Administration (DTSA)
Administers the development and implementation of DOD technology security policies on international transfers of defense-related goods, services, and technologies.
Ensures that critical US military technological advantages are preserved.
US Strategic Command (USSTRATCOM)
Directs DOD’s GIG operations and defense.
Plans against designated cyberspace threats.
Advocates for cyberspace capabilities.
Executes cyberspace operations.
Coordinates with other combatant commands and appropriate US government agencies for matters related to cyberspace.
Joint Information Operations Warfare Center
Plans, integrates, synchronizes, and advocates for IO across DOD,