2009_13-F-0676_The_DoD_Strategy_for_CI_in_Cyberspace.pdf

(3454 KB) Pobierz
THE DEPARTMENT OF DEFENSE
STRATEGY
FOR
COUNTERINTELLIGENCE
IN CYBERSPACE
.
28 August 2009
PREFACE
I approve this Depamnent of Defense Strategy for
Counterintelligence in
Cyberspace
and
I endorse
the
aussion and enterprise
obJectiVes
set forth in this strategy as the path
forward
for
building
a
comprcnensive counterintelligence
program
that
can engage, exploit.
neutralize, and ultimately defeat
foreign intelligence,
international
terrorist, and
insider
threats
in cyberspace.
This
strategy is cons1stent
with the goals and
objectives of
the
President's
Comprehensive National C'ybersecurity
lmtiative,
the
2006
Quadrennial
Defense Review,
and
other
national
security,
defense,
intelligence,
and
counterintelligence
strategies. Development
of
the
Strategy for
Counterintelligence
in
Cyberspace
was
conducted
tn
collaborahon
with
the
military
departments, defense
agencies,
and combatant commands. ln addition,
it
ernpha.slzes
the importance
of collaboration
between the defense counterintelligence enterpnse
and the
infonnahon operations,
anformation assurance, network defense,
intelligence,
and
law
enforcement communities. Finally, this
strategy
establishes goals
and
objectives
for
counterintelliaence activities
in
the
cyberspace domain, and
is intended
to
justifY
re:sowces
for
this priority effort.
l encourage
the asgressive implementation of the mission and enterprise objectives
laid out in this strategy.
Wben
implemented,
this
strategy
will enhance the effcctJveness
of
the Department of Defense counterintelligence program and
wilt
promote the integration
of
counterintelhgence miss1ons
and
functions
in
cyberspace.
ii
FOREWORD
Land,
sen. air,
and
space
are a11 well-recognized operational environments. The
Department of Defense
(DoD)
military
departments,
defense
agencies,
and
combatant
commands arc strategically organized to accomplish their missions and functions in each of
these
domains
in
order
to
defeat
our
adversaries.
DoD
COWlterintelligmce
(CJ) plays
a
critical
role
in
each
of these
operational
environments and is likewise
organized
in
these areas to
accomplish
its
mission to deter, exploit, and defeat
the
overt, covert, and clandestine
intelligence
activities' of our adversaries.
In recent
decades,
however, a
new
operational environment bas
emerged as evidenced
by the increasing frequency
and
desnuctivcness of attacks and exploits launched against the
United
States through
cyberspace?
In
today's information-rich environment, computers
are
ubiquitous
acres
DoD
entities
and
across
the
U.S.
defense i:ndustnal
base.
Large
numbers
of
these
computers are networked
together to
quickly
transmit
infonnatioo
to
the
warfightcr.
These
computer systems
hold
crucial information, control aitical
systems,
and
are
a
primary
communication
mode
for
DoD, making
them
extremely
attractive targets to
our most
capable
adversaries.
DoD
is
developing
new strategies
to
organize itself for success
in
this emerging
cyberspace battlefield.> DoD
Cl
is
no
exception. In August 2007, DoD established the
Counterintelligence
an
Cyberspace
Program
to
address
the
ongoing
and
ever increasing threat
to
DoD activities and information
in cyberspace.
The creation
of
the
CI
in Cyberspace
Program
was validated
in
the
National
Military Strategy
for
Cyberspace
OperatiofiS
(NMS-
CO)
Implementation Plan,
which called
for
the formation
of
a
"DoD Countcrintelhgencc
Cyber
Program
to
manage the
integration
of
CoWtterintelligence
Cybcr Strategy.',.
The
first
step
in fulfilling this requirement was
to
develop this DoD
Strategy for CI
in
Cyberspace
as
a
roadmap.
It
was
crafted
in
coordination
with
the
military
departments,
combatant commands,
and defense agencies.
all of
which hold a
critical
stake
in the
integration
of
Cl
in
cyberspace.
This strategy aims to facilitate tbe creation of a professional
Cl
force
across DoD that will
SUpPOrt
the warfigbter, protect DoD assets,
safeguard
U.S.
person
civil
liberties,
and
carry
out
the
C
l
mission
to
deter,
exploit,
and
defeat
the
overt,
covert,
and
clandesnne activiues of foreign intelligence and security services
(FlSS),
international terrorists.
and
insider
threats,
m accordance
with
all
applicable
laws
and
presidential directives, thus
ensunng
U.S.
military
superiority
in
cyberspace.
Depanm~nt
of
Defemc,
Tlte
!Hpartme"t of
Defortse
Counterilllelligence
Straugy. Flscol
)'~Ars
1008·101
J
(Wa..~ington.
D.C., l008),
v.
1
The DoD
.l)jctJonary
ofM•hwy
1J1d
Associated Tenns
(12 April2001
,
as amended lhrouah
17
Morell
2009)
def111es
cyberspace
u
:
''A
aJobal
domain wilhin
the
information
environment
coosisrina
of
\Jle
unerdcpendent
network
of infonnation
technology
infrastructures,
iDCiuding
the
Internet,
telecommunlcatioru network$,
computer
system~.
and
embedded
processors
and
controllers."
(pg
141).
3
See
the
Nalional Military
StrutellY for Cyberspace
O~ralioi'IS
()~MS·CO),
the
NMS·
CO
Jmpll'ffftntation
Plan.
Joil'rt
Publia~tion
J-1
J.
"ltiformation
OperatioM
,
"
and
the
Trilateral
Memorandum
ofAgrtcmt
nJ
among
tlte
Deportment
ofDef
ue
cutd
til.
Department
of
Ju.snc.
Ol'fd
tlte
lntelligena
Commufllty
Regordmg
Computer
o
Network
A.tt«k
1111d
Compwter
Ner.orlc
EsploiLation
Actwuies
4
Department
of
Defentc,
11ttt
National
Mililary
Strat~
for
Cyberspa~
Operatwru
lmpl('ffltlftatiOfl
PIIJII
(Washineton.
D.C.,
aipd
October
I,
2007),
A-26.
2
Table of Contents
FOREWORD
......................................................................................................................
ill
MISSION AND VISION
.....................................................................................................
v
EXECUTIVE
SUMMARY
.............................
........................................................................
vi
.
THE STRATEGY
................................................................................................................
1
Mission
Objectives
...........................................................................................................
2
Enterprise Objectll'a
............................................................................
,..........................
S
CQNCLUSION
....................................................................................................................
8
APPENDIX
..........................................................................................................................
9
iv
MISSIO AND
VISION
MISSION
DoD Cl
will
detect,
identify,
assess,
exploit,
penetrate,
degrado,
and
counter
or
neutralize intelligence collection efforts, other intelligence
activities, sabotage,
espionage,
sedition,
subversion,
assassination,
and
terrorist
activities
directed
against
the Department
of
Defense,
its
personnel,
infonnation,
materiel,
facilities, and
activities,
or against
U.S.
national
security
in
the cybftspace domain.
VISION
The integrated application of DoD CI
activities will
neutralize or
exploi~
and
ultimately
defeat
the
intelligence
activities
of
individuals,
orgam.zations,
mternational
terrorists,
and
FISS
opcrattng
against DoD
p~el.
facthtie
programs, infonn1tion.
and
operauons
in
the
cyberspace
domain.
v
Zgłoś jeśli naruszono regulamin