DQUTZSZ NOV 15 FROM USCYBERCOM WW JUN 272015 FOIA review completed on Portions Ul-ll llS document no longer meets the classi cation standards established by Executive Order 13526 Classi ed Notional T0 241 Security Infeu mution Section 1 4 A3 suclLI SSDARCYBER uni downgrading specific porlion-m l ked I COMTEN FLT paragraphs as Partial MARFORCYBERCOM classilicolitm downgrade executive by USCYBERCOM CNMF ROSS A NAVY Rear Admiral US Navy ARMY Iliiefof Stall CDRINSCOM NSACSS FBI ASD GCHQ IN F0 JOINT STAFF sso osncce sso COGARD sso AFRICOM NCR CENTCOM HO USEUCDM 550 NORTHCOM 550 no ussocom 550 SOUTHCOM 550 STRATCOM cso TRANSCOM AFRICDM mo CENTCOM ISR USNORTHCOM Ho USPACOM USSOUTHCOM sso STRATCOM sso DIA USCYBERCOM PASS TO CDR JTF-ARES FT GEORGE MEADE MD AIR FORCE LACKLAND AFB TX Wr SUBJECT UHFBHE USCYBERCOM OPORD 16-0188 OPERATION GLOWING 15-0133 OPERATION GLOWING TO USA FVEWFISAW OPERATION INHERENT RESOLVE - PHASE II W 1 MEMORANDUM OF AGREEMENT AMONG THE DOD 001 AND INTELLIGENCE COMMUNITY REGARDING COMPUTER NETWORK ATTACK CNA AND COMPUTER NETWORK EXPLOITATION REFIDIFRAGOI WWI IND Sec Mia I Sec O1Sec1 4a USCYBERCOM OPORD 15-055 IN SUPPORT OF OPERATION RESOLVE TO USA MAR OF DEFENSE INSTRUCTION 03500 03 TECHNICAL ASSURANCE STANDARD FOR COMPUTER NETWORK ICNAI CAPABILITIES UHFOUOHUSDIIZZ APR JTF-ARES OPOR01 TO USA FRA APPROVAL DFI mm Sec 1 4 3 TO USA OP GLOWING mm Sec 1 4M AGREED OGS NOTIFICATION TO USA AUS OGS IS-JS DDR0 AUTH SAINEITIS IS OPERATION INHERENT RESOLVE - PHASE II MOD 001 REFIMIFRAGOHU FRAGORD 04 TO OPORD SUPPORT TO USCENTCOM OIR PHASE II OGS EXECUTIVE UPDATE TO USA I FRAGDRD 05 TO BOOB-17 DUE TO FISA REQUIREMENTS REF AND ARE LOCATED AT THE FOLLOWING WEBSITE PHonv asgx NARRHW Operation GLOWING isl 1159 31 4m i I Iin support of I50 operations to dismantle and ultimately defeat the hm 53 14m 1 A GENERAL SITUATIDNI bin Sec 1 4 a 1 A 1 To USA FVEWFISAH mm Sec 1 4 a 1 3 AREA OF OPERATIONS The area of operations includes bin Sec 1 4 a I 1 c ENEMY 1 C 1 primary cyberspace initiative uses the Internet as a conduit to target global audiences to recruit and radicalize Specifically creates media to provide legitimacy to their self-proclaimed caliphate and to recruit sympathizers to convert to their ideology and join their cause messages are primarin meant to appeal to however ISIL tailors their messages to attract others globally In addition to its lnternet messaging ISIL provides media to the local populace inl bli1 Sec 1 4m I ICI 1 C 2 U ISIL also uses media to threaten and intimidate For example gruesome videos are meant to intimidate and strike fear into their adversaries and local populace to reduce their will to fight and ensure local populations remain compliant with ISIL rule ISIL messages that threaten foreign governments are meant to deter foreign military intervention or demand ransom for foreign hostages 1 C 3 high quality propaganda has effectively enabled personnel recruitment from susceptible local and foreign Muslim populations In addition to the recruitment of personnel for combat ISIL activelyi I ISIL is struggling to attract a sufficient number of recruits with tmeitpertise needed to provide governing and social services however those current struggles are not likely to deter ISIL from maintaining these aspirations 1 C 4 WISE establishments responsible for the group s strategic media and propaganda productionL I b falsse outlets serve as the group's primary arms for communicating leadership and religious guidance as well as highlighting activities across ISIL-controlled territory Although these establishments I b 1 Seo 1 4 a create specific products In order to make the highest quality media products central media developers have access to multiple media sources This includes raw and finished media files developed by the I hedia establishments access to the Internet to download media files and the ability to record and create their own organic media files 1 C 5 15W ISIL employs cadres of personnel with varying levels of expertise and responsibility to acquire develop administer and maintain information networks utilizing both private and public Internet infrastructure These individuals are responsible for the management of data communications projects such as the creation and establishment of websites and mobile applications in support of ISIL media as well as the creation and management of network projects designed to 1 c s W 1 gm Sec 14 3 upport to ISIL media organizations and supports ability to distribute propaganda and facilitatel bl 1 8ec 1 4 al I To USA FVEWFISAII 1 C 3 hm Sec 1 4m self-declared Caliphate external provinces and globally dispersed supportersl hupport to ISIL media organizations and supports lSlL s abiliti f to distribute propaganda and facilitate I 1 C 9 - - i privileges to establish maintain r and troubleshoot software and deal with terms of service noti cations 1 C 1 l TO USA FVEWFISAH blf1JSeo1 4 a Sec 1 4 a 1 C 11 TO USA FVEWFISAH 1 0 FRIENDLY WSW 1 D 1 USCYBERCDM directs assigned andfor coordinates with supporting forces I IDT support the dismantlement of ISIL in accordance with Ref A USCYBERCDM forces are staffed trained and equipped to collect report intelligence information and when authorized and directed posture to and conduct cyberspace operations againstI mm Sec 1 4 a I I mm Sec 1 4m Ivalid military targets approved by Commander United States Cyber Command IAW Ref BI I I I bil1i5ac1 4 e IJoint Task Force ARES bill Sec 1 4a with Federal Bureau of Investigation National Security Agency and Coalition partner effortsl but Sec 1 4 a land I lbil1lSachal Iapplications that I 1 4 a I Organizations These accounts and infrastructure wereI mm Sec 1 49 him Sec 1 4 ai Imaintain the initiative and continue the conductI I I 1 0 3 The intended cyber effects in this operational order are part of a larger initiativeI Iof more favorableI IThis operation is supporting USCENTCOM and CJTF-DIR operational hm Sec 1 4 a I bil1 i Sec 1 4m I of U5 and worldwideI I I blIt Sec 1 4 aI Icoordinated actions against the U S and worldwide accounts and infrastructure will generateI I I hm Sec 1 4 a _IUnited States Central Command and United States Special Operations Command efforts in Iraq and Syria 1 0 4 JTF-ARES will implement the method described in and coordinate with appropriate interagency IA and coalition partners am See 14 3 of OGS 1 D 5 JTF-ARES in association with USCYBERCOM will coordinate with U S government and coalition partners l him Sec 1 4m mm Sec 1 4 aI 1 D 5 Within this OPORD all references of Operators and will refer to personnel on teams operationally-controlled by unless otherwise spetified 1 D 7 Within this OPORD and per Ref Sec 1 4 a I approved USCYBERCOMI 1 4a I - I tam Sec 1 4 a I while allowing USCYBERCOM operators at will Account hm Sac 1 4 a lor other user accounts 1 5 U CONSTRAINTS 1 E 1 ml amass ma I under the control of ISIL 1 E 2 The intended effects under this order will IAW the definition in Ref 3 1 E 3 There will bel mm Sec 1 4m Within the United States 1 E 4 Actions in this operation will occur within I laccountsare notauthorized 1 F RESTRAINTS 1 F 1 mm Sec 1 4 a US or its territories 1 F 2 Wawons under this may only be takenl IIAW RefJ 1 F 3 I 1 F 4 Upon approvaIJ mo Sec 14 3 i 1 F 5 USCYBERCOM I i am 59 31 4451 lresolve the Department of State GENTEXTIMISSIDNIZ MISSION On or about thi1JSec1-4ia kD-Day Commander Joint Task Force conducts GENTEXTKEXECUTIDNH 3A U COM MAN INTENT 3 A 1 W ISO operationsl him Sec 1 4 ai ito dismantle and ultimately defeat ISIL USCYBERCOM conductsl I mm Sec 1 4 a3 METHOD JTF-AHES actions will I - I him See 1 4 a I mm Sec 1 4 a hm Sec 1 4 a IJTF-ARES will utilizel him 33 14 3 I I min Sec 1 4 3 IJTF- ARES wiill 133 1 Sec 1 4 3 unneec 1 4 a personnel will use 1 1 him Sec 14 3 IJTF-ARES will execute for a duration not toL min Sec 1 4 ai i Sec 1 4 3 3 A 3 ENDSTATE freedom of movement in cyberspace to distribute and him See 1 4 a 3 3 OBJECTIVES AND EFFECTS 3 3 1 JTF-ARES lthe internet 3 3 1 A EFFECT network services and applications is 1 4 a I 3 3 1 A 1 MEASURE OF PERFORMANCE MOP 1 Assigned forces execute Sec WOW MOP 2 ' bliilsa Mia accounts ibii1i3ec1 4iai initiation JTF-ARES OBJECTIVE 3 l bli1iSEC 1 4 31 lmedia I I l 3 3 2 33 WW EFFECT 2A l _lmedia 3 3 2 331 MOP aiscounts 3 3 2 A 1 A Were-Memes MEASURE OF EFFECTIVENESS MOE 1 Observed 1 4 a accounts 3 B Z A 2 MOP 31mains 3 B Z A 2 A MOE Obsewedl names available for use in support of media i 1 31 1 Sec 1 4 a I 3 B Z A 3 A MOE 3 Observed I NPS 3 B Z A 3 B mm Sec 1 43 elsewhere 3 3 2 3 EFFECT 23 lmedia products 3 3 2 3 1 MOP mscounts 3 3 2 3123 Were 35mm MOE 1 Observedl Iemail 3 3 2 3 2 MOPi imains 3 B Z B 2 A MOE 2 Observedl names available for use I50 of media dissemination bungactqa elsewhere I - 3 32 3 1W mommy s 3 3 2 5 3 A MEL-11W MOE 3 Observedl 3 3 2 333 INDICATOR webpagesl elsewhere 3 3 3 wees 19W JTF-ARES OBJECTIVE 4 l 1 4ia pocial media 3 B 3 A EFFECTisz-iaenial medial 3 3 3 A 1 MOP pecounts 3 B S A 1 A MOE 1 Observedl accounts 3 B S A 2 momaapmains 3 B S A 2 A MOE 2 Observed - edia applications 3 B S A 2 B Warm INDICATOR Observedl bli1i56c1 4iai lmedia applications 3 B B A 3 WW Sec t i is 3 3 3 A 3 A signage W MOE 3 Observe-pi 3 B S A 3 B INDICATOR applications him See 1 4m elsewhere 3 C U CONCEPT OF OPERATIONS 3 C 1 OVERVIEW This is al him See 1 4 a functions planned to be utilized 3 C 1 A DATA COLLECTION Information and data collected during this operation lpolicies and procedures 3 c 1 e Upon thel pm Sec 1 4m This Operation will be conducted in six stages him spa mega 1 I I i i A HE bl 1l Sec 1 4 3 3 c 2 STAGE ll operators wiliEm Sec WEB oii1iSoo 1 4 ai trim Sec 1 4 3 IThe operators will I I I bin Sec 1 4 al I operators will utilizeI_ loin Sec I om Sec 1 4 a I om Seo Lilia accounts 3 c s pzs swesirusATsusiL STAGE Ill him Sec Mia IJTF-ARES operators mm Sec Mg I bll1JSeo 1 4 al IJTF-ARES operators These will bel I provider This stage will be accomplished using two techniquesl I The two techniques for this stage will he executed as follows 3 C 3 A 1 4 al operators will utilize the trim Sec 1 4 oi lThE Operators I - IJTF-ARES operators will utilize bll1 Seo 1 4 a I lb 1 Sec 1 4 a JTF-ARES oil i Lora Sec 1 4 a bll1JSeo 1 4 al I 1 4 a 7 will Er A a I i I IJTF-ARES operators I I I operators will utilize I -u m I am Sec 1 4 a I IJTF-ARES operators will utilizerEusg-c 14 35 ItbiI l Sec required JTF-ARES bii1ISEc1-4lal IThese actions will I domains and VPSI I I am Sec 1 4 a 3 c 4 gross er STAGE I I bii l Sec 1 4461 JTF-ARES operators will utilizeI I am Sec 114 3 I I a pm Sec 144 3 IJTF-ARES operators will utilizeI I I him See 1 4m IJTF-ARES operators will accomplishI I 3 C 5 STAGE IV I oI 1 Sec 1 4 a I mm 535 14 3 TF-ARES operators will utilizeI mm 33 14 3 I IThis stage will be accomplished utilizing two techniquesII m Sec 1 4g hm Sec 1 4 aJ IThe two techniques for this stage will be executed as follows bll1JSBc1-4lai IJTF-ARESoperatorswillutilizeI I am Seo 1 4 a IJTF-ARES operators I 3 C 5 B I mm Sec 1 4Ia b 1 Sec 1 4 3 IJTF-ARES operators will utilizeI mm Sec 1 4 a I In will utilizeI 1 4 a I I I 312 5 STAGE VI 1-4I3I I JTF-ARES operators wilII I a s c 7 STAGE VII IStage VI is 3 Be Prepared To task I I I mm Sec 1 4 a I I bli1ISec1 4lal IThese actions fall into three distinct categories 3cm WWI him See 1 4 3 I I I Sec 1 4EJTF-ARES wi utilizeI Set 1 4 a1 I Operators will utilize 1 4 a I bII1 3ec1 4Ia IJTF-ARES will utilizeI I mm willi I I IJTF-ARES TF-ARES operators wilIL 1 4 a I I I bI 1 Sec 1 4 a I 3 C 8 U FIRES SUPPORT COORDINATION MEASURES 3 C 8 A PRE-MISSION Pre-mission requirements are contained in the pre-mission checklist which is maintainedI Iin the USCYBERCOM Joint Operations Center Set ALERT CONDITIONS IAW the Cyber Tasking Order CTO 3 C 3 B FIRES EXECUTION LIST The mission will be executed the CTO and the mission execution checklist The mission execution checklist is maintainedI Iin the USCYBERCOM JOC 3 C 3 C MISSION ABORT CDRUSCYBERCOM may order mission abort USCYEERCUM IOC notify supporting commandsI Sec 1 4 aI headquarters TOP SECRETHSIHREL TD USA or agencies must be verified with CDRUSCYBERCOM via the USCYBERCOM I I I the USCYBERCUM JUC 3 C 3 D ABORT PROCEDURES When CDRUSCYBERCDM issues an abort the USCYBERCOM IOC bitiiSec Mia will immediately contact JTF-ARES and the Mission Commander to relay the order I I I 1 4 a I and JTF-ARES will submit the request with a recommendation to USCYBERCOM JOC for CDRUSCYBERCOM decision 3 C 8 E CEASE FIRE AUTHORITY The USCYBERCOM 13 Director of Operation I IJTF-ARES Commander and Mission Commander may call Cease Fire I for I Ifor situational awareness 3 C 3 F CEASE FIRE the order to cease fire is received and verified by proper authority JTF-ARES will immediately contact the Mission Commander to relay the order The Mission Commander will IThe Mission Commander will I aces RE-ENGAGE AUTHORITY The order to re-engage can be given by the USCYBERCOM JOCI Iheadquarters I I USCYBERCOM J3 3 C 8 H RE-ENGAGE PROCEDURES When the order to re-engage is received or verified the USCYBERCOM JDC Watch Officer will immediately contact JTF-ARES to relay the order The Mission Commander willI IThe Mission Commander willI bll1ISac 1 4m I I 3 C 3 l CONTINUED ENGAGEMENT AND TARGET ELEM ENTS-OF-OPPORTUNITY Sec 1 4iai IITF-ARES I him See 1 4m I I IJTF-ARES will ensure that these target elements are ofthe same type as the initial target elements Ii g ua I coin 1 4m land that they reside within the target locations approved within this operationl- bli1ISec1-4la elm 1 4m JTF-ARESI him Sec 1 4 a I USCYBERCOM JOC willI I I I ir I CA EV 3 C 8 J mega ml mm Sec 1 4 a I I b 1 5eo 1 4Ia IUSCYBERCDM will generate a newfragmentarv order to this operational order and will convene a Joint Targeting Coordination Board to approve the target and validate the new fragmentary order as described in REF N 3 C 9 IUI RISK ANALYSIS 3 C 9 A INFRASTRUCTURE JTF-ARES will useI um Sec 1 405 I am Sac 1 4 a RISK 1 I I during execution 3 09 3 1 MITIGATION 1 JTF-ARES will notiwal for recommendation to CDRUSCYBERCOMI him 3 C 9 B 2 CCIR 1 bII1 5ec1 4IaI mm Seo1 4 a 3 c 9 c Wage amnion RISK 2 I Ioperational concern 3 C 9 C 1 MITIGATION 2 Confirm reporting with responsible agencv Notifv for recommendation to CDRUSCYBERCOMI Sec 14 3 I process 3 09 02 REL TO USA I 3 c 9 o RISK 3 Dperatio 3 C 9 D 1 MITIGATION 3 ConductI I I Ifor mitigation Notifv for recommendation to CDRUSCYBERCOM 3 C 9 D 2 SHREL TO USA FUEYI mm Sec 1 4 a I I I 3 C 9 E RISK 4 I 3 C 9 E 1 MITIGATION 4 Notify recommendation tO CDRUSCYBERCOMI mm Sec 1 4 a I 131 1 Sec 1 4 aJ I 3 C 9 E 2 SHREL TO USA FVEYJI Sec 1 4 a Sec 3 0 TASKS 3 0 1 JTF-ARES Upon receiving authorization from USCYBERCOM 13 establish C2 of all assigned forces and execute 065 as outlined in this order 3 0 1 3 UHJEOUO JTF-ARES JOINT ELEMENT NEE Provide intelligence analysis and planning as required including intelligence assessments estimates and other intelligence products 130 the commander s decision-making process Sec 13 9 I I hm Sec 3 D 1 C JTF-ARES 12 COLLECTION and provide end-to-end collection management support to all-source intelligence with the IC ensuring management of needsfrequirements 3 D 1 D UHEOUO JTF-ARES LOE 2 USCYBERCOM 15 identify partnerships with external organizations to implement method 3 D 1 E JTF-ARES LOE 2 Refine planning with partners for execution of identified method 3 0 1 F WJTF-ARES 13 Assign additional forces mm Secl1 4 a not 330 Mia as required 3 0 1 6 WJTF-ARES JB Assign forces to support this operation 3 0 1 H UHFOUO JTF-ARES FIRES Ensure 065 is integrated and 1mg I I 3 0 1-I Plan and coordinate this operationl him 330 1-4'Iai bin Sec 1 4a I z-xecute oos 3 D I J WW Support assessmentsl hm Sec 1 4 a I I Iprocess improvements or- Forward requests for additional capabilities to USCYBERCOM as required 3 0 1 L mm Sec 13 9 IAW standard procedures 3 D l iv1 UN-F009 Provide mission reports Jto support assessment of operation JTF-ARES CUOPS will disseminate report IAW coordinating instructions and to other organizations as required 3 0 1 N Willa-00 Be prepared to support long-term assessments to operational effectiveness and performance 3 0 1 0 BPT provide mission planning updates 3 0 1 P Coordinate with coalition and interagencv partners to transfer new mm Sec 1 4m 3 0 1 0 Provide defensive overwatcl'l bli1JSeo1 4 ai during the course of this operation 3 0 1 R Provide mm Sec 1 4 3 I loperations 3 0 2 CYBER MISSION FORCES 3 0 2 A JOINT FORCE HEADQUARTERS CYBER ARMY 3 0 2 A 1 Wl i I mm Sec 1 4 a operations are preferred some WE Sec 1 4m 1 Seo1 4 a lof this operation 3 0 2 A 3 BPT provide personnel to fill other mission critical roles 3 0 2 3 urssouo U MARINES MARINE cones FORCES crass COMMAND 3 02 3 1 Ml 1 4m I Iof this operation 3 0 2 3 2 BPT provide personnel to fill other mission critical roles 3 o 2 c um-Que CYBER NATIONAL MISSION FORCE cums bll1lseoi 4lal Sec 1 4 a - I loperations are preferred 3 0 2112 WM I bl 1 5ec 1 4 al bf this operation BPT provide personnel to fill other mission critical roles meme seem operations 150 this operation directed operations ISO this operation 3 0 3 Ul USCYBERCOM 3 D S A WUSCYBERCOM 13 Coordinate with Sec 1 413 0 IEverage individual agech authorities and capabilities to support the objectives and effects as outlined above Ensure all agency-specific actions are and deconflicted with all other participating agency actions 3 D S A 1 USCYBERCOM JDC Coordinate with to maintain current reporting lReport any objections immediately to CDRUSCYBERCOM and IAW Para 3 C 9 C 3 0 3 3 USCYBERCDM J3 Provide to support research rehearsals and execution of this operation 3 0 312 - 3 D S D USCYBERCOM J3 Establish Assessment Working Group ICW USCYBERCOM 15 USCYBERCOM 13 Coordinate and tie-conflict wit 3 D S E U USCYBERCOM STAFFJUDGE ADVOCATE 51A Provide legal support as required ISO 065 3 D 3 F USCYBERCOM J2 Coordinate with the IE to provide necessary comprehensive - 1 mission dictates 3 D 3 G U USCYBERCOM 12 Provide intelligence support to JTF-ARES as requested Battle Damage Assessment BDAH 3 D 3 H USCYBERCOM CDG Coordinate and oversee the min Sec 1 4 a I lanalvsis 3 0 4 U REQUESTED SUPPORT 3 0 4 A INTERAGENCY 3 0 4 A 1 WHOM-SW Support and participate in the process forl I and execution 3 D 4 A 2 U Provide intelligence support prior to and during execution Specific intelligence requirements will be passed by USCYBERCDM 12 prior to eiecution 3 D 4 A 3 U Participate in USCYBERCOM appropriate boards bureaus cells committees and working groups events 50 this operation 3 D 4 A 4 For units involved in thof the operation provide or designate a representative for coordination requests and questions to be routed through 3 0 4 A 5 NSA 3 0 4 A 5 1 WEE-W Partnering and support as authorized and appropriate in identifying mm Sec 1 4 a 3 D 4 A 5 2 Waf es Requesll mm Sec 1 4a 3 0 4 A 5 3 Support and participate in the processl mu San 1 4 a 3 D 4 A 5 4 Designate a reoresentativel om Sec 1 4 aJ operations FBI 3 0 4 A 6 1 SHREL T0 USA - bli1JSEC1-4'lal mm Sec 1 4 ar Designate a representativel 1 4 a Operations NEW 3 0 4 A 6 3 BPT receive additional previousle I 1 4 3 lcourse of this operation 3 0 4 3 GCHQ Request GCHO bun Sec 1 4a Sec 1 4 aj I 3 0 4 3 2 Designate a representative from I - him Sec 1 4 ai Operations 3 0 4 33 BPT receive additional previouslvl mm Sec 14 3 1 b 1 Sec 1 4 e course ofthis operation 3 0 4 c eso 3 0 4 c 1 Request mm Sec 3 D 4 C 2 Designate a representative from ASD tol mm Sec Mia am See 1 4 3 land USCYBERCOM Operations 3 D 4 C 3 WOW Receive additional previouslvl mm Sec 1343 Sec 1 4 Fourse ofthis operation U INTELLIGENCE AND SECURITY COMMAND Staff extra maintenance personnel to support malfunctions 3 E COORDINATING INSTRUCTIONS 3 E 1 USCYBERCOM JOC Serve as the point of contact for cyberspace operations and deconflictiontIEIm Sec Ln partners are requested to provide liaison officer coordInatIon to bus bus NLT three days after receipt ofthis order Please see Ref for other concerns 3-E-2- SEC 14 3 will share 3 E 3 ESCALATION PROCEDURES IAW Para 3 09 3 E 4 UHF-DUO CCIR See Para I E r GENTEXTIADMINISTRATION AND LOGISTICSM 4 A OPERATIONS SECURITY OPSECI Integrate OPSEC throughout the planning effort to protect critical information with emphasis on vulnerabilities associated with internet-based capabilities to include social media and force protection Use JTF-ARES Classi cation Aid to facilitate classification of material associated with this operation The desired overall security classi cation for this planning effort is to be as low and releasable as allowed bv mission requirements to ensure our coalition partners can be informed of our effortsj f GENTEXTICOMMAND AND CONTROLIS 5 A COMMAND Commander United States Strategic Command is the supported combatant commander for activities ISO this operatiqba Sec 1 4a Ito conuscvaencom 5 A 1 All other are designated as supporting commands for this operation 5 A 2 JTF-ARES AND SERVICES 5 A 2 A UPCON to USCYBERCOM 5 A 2 B Provide general support as required to JTF-ARES in execution of this operation 5 A 2 C W ansferl I lfrom the CNM F as-required through the duration of execution of this operation Personnel must be presen I mms c 1 4m Forces OPCON to ITF-ARES will be returned to parent command upon operations completion or based on mission requirements 5 3 DOD COMPONENTS Acknowledge receipt and understanding of this TASKORD within 24 hours via official message traf c email to JOCocansachov or via 5 C U PUBLIC AFFAIRS PA GUIDANCE PA posture is response to query only Release of information regarding this effort shall be IAW REF N 5 C 1 U MEDIA OU ERIES Refer without comment to OSD info Office of CJCS PA USSTRATCOM PA and USCYBERCOM PA 5cm oso osn 312-123-5131 COMM 703-697-5131 5 C 1 B Ul Of ce of CJCS PA DSN 312-227-42 2 COMM 5 C 1 C USSTRATCOM PA COMM 402-294-4130 5 C 1 D USCYBERCOM PA COMM 443-654-4 32 5 C 2 NON-DOD ORGANIZATIONS Any additional PA guidance will be coordinated through the National Security Council NSC Staff as necessary 5D POC 5 D 1 Request for information regarding execution ofthis order amplifying guidance andfor additional details are to be submitted to - USCYBERCOM SIPH RFI portal USCYBERCOM JWICS portal s o 2 Mm PRIMARY USCYBERCOM JOC NSTS SEE-STBOIBWZ I bi-I3 JWICS ioccbc@ nsa ic goy SIPR joccbc@nsa smil mi 5 D 3 SECONDARY JTF-ARES CUOPS NETS 969-4900 COMM hll3l JWICS ares cuops@nsa ic goy THE con l bus USA uscrasncom 13 DIRECTOR OF Classified By hm Derived From Multiple Sources Dated Multiple Declass On 20411106ff This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu
OCR of the Document
View the Document >>