23.10.2014 Views

jp3_12r

jp3_12r

jp3_12r

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cyberspace Operations<br />

communications (SATCOM) links, is an example of maintaining freedom of maneuver in<br />

cyberspace. Managing the EMS within the battle space is a key component for the JFC to<br />

consider in developing and executing operations.<br />

(3) Movement and maneuver in cyberspace can occur in all three layers: the<br />

physical network, logical network, and the cyber-persona layer.<br />

f. Sustainment<br />

(1) Sustainment is the provision of logistics and personnel services required to<br />

maintain and prolong operations until successful mission accomplishment. Services and<br />

United States Special Operations Command (USSOCOM) organize, train, equip, and sustain<br />

forces for CO. JFCs must identify required forces and capabilities, critical cyberspace assets,<br />

assess risk, ensure redundancy (including non-cyberspace alternatives), and actively exercise<br />

continuity of operations plans to respond to outages or adversary actions that degrade or<br />

compromise cyberspace access or reliability.<br />

(2) Advancements in IT continue to develop rapidly, which in turn requires the<br />

Services and USSOCOM to develop, field, and sustain cyberspace capabilities adaptable to<br />

the rapid changing OE. For example, new wireless mobile devices may provide greater<br />

Internet access, an adversary might update or change operating systems, or they may<br />

transition to the use of virtual machines in their network architecture. Joint forces need the<br />

capability to rapidly incorporate new cyberspace capabilities into their arsenal. Additionally,<br />

the joint force may need the capability to rapidly upgrade their own networks to leverage<br />

new technologies. Pressure to deploy new technology must be balanced against approved<br />

requirements and increased risks, and implementation must be carefully orchestrated to<br />

prevent divergence among Service-provisioned networks that could create gaps or seams in<br />

DOD’s global architecture.<br />

(3) A key component of sustainment is the maintenance of a well-trained force.<br />

Most successful network intrusions and attacks can be traced to poor operator and/or<br />

administrator security practices. Assets deployed securely only remain secure if they are<br />

maintained accordingly.<br />

(4) Many critical legacy systems are not built to be easily modified or patched. As<br />

a result, many of the risks incurred across DOD are introduced via unpatched (and<br />

effectively unpatchable) systems on the DODIN. This risk can be mitigated through<br />

additional layers of network protection, which must then be sustained. Additionally some<br />

hardware capabilities can also deteriorate over time, requiring component, software, or<br />

firmware upgrades. Replacement due to wear and tear or adversary discovery/compromise<br />

may be necessary to ensure sensors and other forward deployed cyberspace capabilities are<br />

ready when needed. This can be particularly problematic when physically inaccessible<br />

systems (such as those deployed to remote sites or on ships) must be replaced or upgraded.<br />

It is vital that commanders understand the risk created by leaving such vulnerabilities in<br />

place, not just to their operation, but to the future success of DOD missions worldwide.<br />

Finally, contingency software capabilities that are not often accessed may also require<br />

II-11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!