jp3_12r
jp3_12r
jp3_12r
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Cyberspace Operations<br />
communications (SATCOM) links, is an example of maintaining freedom of maneuver in<br />
cyberspace. Managing the EMS within the battle space is a key component for the JFC to<br />
consider in developing and executing operations.<br />
(3) Movement and maneuver in cyberspace can occur in all three layers: the<br />
physical network, logical network, and the cyber-persona layer.<br />
f. Sustainment<br />
(1) Sustainment is the provision of logistics and personnel services required to<br />
maintain and prolong operations until successful mission accomplishment. Services and<br />
United States Special Operations Command (USSOCOM) organize, train, equip, and sustain<br />
forces for CO. JFCs must identify required forces and capabilities, critical cyberspace assets,<br />
assess risk, ensure redundancy (including non-cyberspace alternatives), and actively exercise<br />
continuity of operations plans to respond to outages or adversary actions that degrade or<br />
compromise cyberspace access or reliability.<br />
(2) Advancements in IT continue to develop rapidly, which in turn requires the<br />
Services and USSOCOM to develop, field, and sustain cyberspace capabilities adaptable to<br />
the rapid changing OE. For example, new wireless mobile devices may provide greater<br />
Internet access, an adversary might update or change operating systems, or they may<br />
transition to the use of virtual machines in their network architecture. Joint forces need the<br />
capability to rapidly incorporate new cyberspace capabilities into their arsenal. Additionally,<br />
the joint force may need the capability to rapidly upgrade their own networks to leverage<br />
new technologies. Pressure to deploy new technology must be balanced against approved<br />
requirements and increased risks, and implementation must be carefully orchestrated to<br />
prevent divergence among Service-provisioned networks that could create gaps or seams in<br />
DOD’s global architecture.<br />
(3) A key component of sustainment is the maintenance of a well-trained force.<br />
Most successful network intrusions and attacks can be traced to poor operator and/or<br />
administrator security practices. Assets deployed securely only remain secure if they are<br />
maintained accordingly.<br />
(4) Many critical legacy systems are not built to be easily modified or patched. As<br />
a result, many of the risks incurred across DOD are introduced via unpatched (and<br />
effectively unpatchable) systems on the DODIN. This risk can be mitigated through<br />
additional layers of network protection, which must then be sustained. Additionally some<br />
hardware capabilities can also deteriorate over time, requiring component, software, or<br />
firmware upgrades. Replacement due to wear and tear or adversary discovery/compromise<br />
may be necessary to ensure sensors and other forward deployed cyberspace capabilities are<br />
ready when needed. This can be particularly problematic when physically inaccessible<br />
systems (such as those deployed to remote sites or on ships) must be replaced or upgraded.<br />
It is vital that commanders understand the risk created by leaving such vulnerabilities in<br />
place, not just to their operation, but to the future success of DOD missions worldwide.<br />
Finally, contingency software capabilities that are not often accessed may also require<br />
II-11