TOP af CIHiT NOrnRN FlaA U Opening Statement U Chairman Rounds Ranking Member Nelson and Members of the Sub-committee I would like to thank you for your interest in cyber issues and this opportunity to discuss cyber threats on behalf of U S Cyber Command U ADM Rogers is both the Commander of U S Cyber Command and Director of the National Security Agency However as the Director of Intelligence I am a representative of U S Cyber Command U Established in 2010 U S Cyber Command performs three vital missions Defend the Department of Defense's information networks which is our No 1 priority achieve combatant commander objectives and when directed deter or defeat strategic threats to our Nation's interests and infrastructure U The state and malicious non-state actors of greatest concern to the U S in cyberspace have varying goals from espionage to information control to accessing critical networks for future operations to exploit for commercial scientific or technical gains As their activities evolve they pose an everincreasing risk to Department of Defense systems to the systems of other federal departments and agencies to our national critical infrastructure and to U S companies and interests U We continue to watch Russia China Iran and North Korea closely in cyberspace Russia and China are both very capable full-scope cyber actors with capabilities equivalent to the US Iran and North Korea represent increasingly capable challenges to U S interests ISIS represents a serious and complex threat to the US but not at the level of a state actor j b l Sec 1 7 e j Classified By j b 3 Derived From Mbllti le a9b1H eg Dated 2017 ff Q Declaggjfy OR 20420301 TOP HCRH MOrnR l FlaA TOP SECRET NOfORN flS O l b l Sec 1 7 e S NF l b 1 b l S REL TO USA FVEY FISA l b i b l TS INF FISA l b i b l TOP SE CRE T NOfOR l flSA TOP SECRH NOmRN flSA b l S NF PISA l b l b l U FOUO Terrorist Groups including the self-proclaimed Islamic State of Iraq and ash-Sham ISIS HAMAS and Lebanese Hizballah use cyber for widely varied purposes including to intimidate enemies recruit fighters incite violence conduct or inspire attacks and command and control operations U FOUO To support the U S CYBERCOM mission the Intelligence Directorate is responsible for operationalizing and fusing intelligence gathered by the intelligence community to create an all-source intelligence threat picture in order to support cyber planning and operations Additionally we provide situational awareness collection management human intelligence in cyberspace and counterintelligence deconfliction U FOUO Similar to other combatant command intelligence directorates our dedicated workforce is composed of a cadre of Defense Intelligence Agency professionals as well as military members from all services Given our global responsibility we rely on regional subject matter experts as well as analysts who also possess an understanding of the technology that underpins the rapidly evolving cyber domain In addition to the complex analytical requirements we've also developed specialized recruiting and training programs to support the growth of our non-kinetic cyber targeting TOP StCRtT PWFORN FISA TOP SECRET NOrnRN flSA detailed scientific and technical intelligence capability and cyber ISR collection management necessary to deliver support to operational effects While many of the existing doctrinal tactics techniques and procedures apply to intelligence support to cyber operations our workforce is developing innovative processes to optimize cyber effects U Most recently our dedicated workforce is using these processes and procedures to support the critical counter-ISIS effort For example in the fight against ISIS our teams are conducting cyberspace operations in support of U S Central Command's ongoing efforts to degrade dismantle and ultimately defeat ISIS U In May 2016 USCYBERCOM established a cyber Joint Task Force JTF ARES with a specific mission to accomplish cyberspace objectives in support of counter-ISIS operations This JTF comprising operations and intelligence professionals from each of the military services has created tremendous efficiency and flexibility in mission completion by facilitating unity of command and effort for our cyber resources We have received tremendous support from the intelligence community to include NSA DIA NGA and CIA TS REL TO USA FVEY l b ll b l U Thank you so much for your interest in U S Cyber Command and your support for the men and women in uniform as we continue to achieve positive mission outcomes for our Nation U I look forward to your questions TOP SECRET f JOFORN flS National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994‐7000 Fax 202 994‐7005 nsarchiv@gwu edu
OCR of the Document
View the Document >>