Inside Cyber Warfare - Jeffrey Carr [160]
Conducts computer network defense to secure each portion of the DOD GIG.
JFCOM is a voting member of the joint doctrine development community.
NORTHCOM is lead in assisting the Department of Homeland Security and other civilian agencies during cyber-related incidents as part of its Defense Support of Civil Authorities missions, or civil support.
Army
(Intentionally blank.)
Navy
(Intentionally blank.)
Air Force
(Intentionally blank.)
Marine Corps
(Intentionally blank.)
Department of Defense Criminal Investigative Services
Conducts cyber-related criminal and counterintelligence investigations.
Army Counter Intelligence and Army Criminal Investigative Command (Army CID/IC)
Investigates and prosecutes cyber-related criminal cases.
Investigates cyber-related counterintelligence cases.
Air Force Office of Special Investigations (AF OSI)
Provides cyber-related criminal and counterintelligence investigative services to commanders throughout the air force.
Identifies, investigates, and neutralizes criminal, terrorist, and espionage threats to personnel and resources of the air force and Department of Defense.
Naval Criminal Investigative Service (NCIS)
Prevents terrorism, protects secrets, reduces major crimes and executes advanced cyber technologies and methodologies to process, identify, and present electronic data of intelligence or evidentiary value.
Defense Criminal Investigative Services (DCIS)
Investigates matters relating to terrorism, prevents the illegal transfer of sensitive defense technology, stops cyber crime and computer intrusions, and investigates cases of fraud, bribery, and corruption.
DOD Cyber Crime Center (DC3)
Provides criminal, counterintelligence, counterterrorism, and fraud-related computer forensics support to the defense criminal investigative organizations.
Delivers cyber technical training.
Processes digital evidence and analyzes electronic media for criminal law enforcement and DOD counterintelligence investigations and activities.
Performs investigations and provides forensic training to DOD members to ensure that information systems are secure from unauthorized use.
* * *
[212] JS J6 has been disestablished as per the DOD Efficiencies Study: Networks and Information Integration (NII) and J6 Disestablishments (FY 2012, $13 million, FYDP, $65 million)—Transfers acquisition program oversight responsibilities from the Assistant Secretary of Defense for Networks and Information Integration (ASD(NII)) to the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD (AT&L)) and all remaining NII responsibilities to the DoD Chief Information Officer (CIO). The Joint Staff will transfer its J6 (Command, Control, Communications, and Computer Systems) funding and manpower to the DoD CIO and the US Cyber Command beginning in FY 2012.
[213] See the note above about disestablishment of the JS J6 and the passing of functions from the ASD/NII to the DOD CIO.
[214] IO responsiblities have passed from Ms. Rosemary Wenchal at OUSD(I) to Mr. Austin Branch at OUSD(P).
Chapter 18. Active Defense for Cyber: A Legal Framework for Covert Countermeasures
[T]he United State reserves the right, under the law of armed conflict, to respond to serious cyberattacks with an appropriate, proportional, and justified military response.
—William J. Lynn, III, “The Pentagon’s Cyberstrategy, One Year Later,” Foreign Affairs, September 28, 2011
By Catherine Lotrionte[215]
During the Cold War, the United States and the Soviet Union constantly maneuvered to achieve superiority and to counter and deter any aggressive moves by each other. When one nation was perceived to overstep its bounds, the other would signal its discontent by moving aircraft carrier groups, conducting military exercises, pursuing diplomatic engagement, seeking sanctions from the United Nations Security Council, enforcing embargoes, and even conducting proxy wars.