23.10.2014 Views

jp3_12r

jp3_12r

jp3_12r

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter I<br />

c. Private Industry. Many of DOD’s critical functions and operations rely on<br />

commercial assets, including Internet service providers and global supply chains, over which<br />

DOD has no direct authority to mitigate risk effectively. Therefore, DOD will work with the<br />

Department of Homeland Security (DHS), other interagency partners, and the private sector<br />

to improve cybersecurity. One example of such cooperation is the 2010 memorandum of<br />

agreement signed by DOD and DHS to align and enhance cybersecurity collaboration. The<br />

memorandum formalizes joint participation in program planning and improves a shared<br />

understanding of cybersecurity. Under this memorandum USCYBERCOM and DHS<br />

exchange liaison personnel. DOD supports DHS in leading interagency efforts to identify<br />

and mitigate cyberspace vulnerabilities in the nation’s critical infrastructure. DOD has the<br />

lead for the defense industrial base (DIB) sector, but will continue to support the<br />

development of whole-of-government approaches for managing risks associated with the<br />

globalization of the ICT sector. The global technology supply chain affects mission critical<br />

aspects of the DOD enterprise and IT risks must be mitigated through strategic public-private<br />

sector cooperation. DOD is partnering with the DIB to increase the safeguarding of DOD<br />

program information residing or transiting DIB unclassified networks. To increase<br />

protection of DIB networks, DOD launched the DIB Cybersecurity and Information<br />

Assurance Program. The DOD Cyber Crime Center serves as DOD’s operational focal point<br />

for this voluntary cyberspace information sharing and incident reporting program.<br />

d. As the JFC integrates CO capabilities into joint operations, careful consideration<br />

must be given to some of the unique aspects of cyberspace, as well as its commonalities and<br />

synergies with operations in the physical domains: the relationship with IO; legal, political,<br />

and technical drivers and constraints; and the role of non-DOD actors in US CO. The<br />

employment of cyberspace capabilities and their effective integration with other military<br />

operations are discussed in detail in the next chapter.<br />

I-8 JP 3-12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!