THE DEPARTMENT OF DEFENSE STRATEGY FOR COUNTERIN TELLIGEN CE IN CYBERSPAC 28 'August 2009 PREFACE I approve this Depamnent of Defense Strategy for Counterintelligence in Cyberspace and I endorse the aussion and enterprise obJectiVes set forth in this strategy as the path forward for building a comprcnensive counterintelligence program that can engage exploit neutralize and ultimately defeat foreign intelligence international terrorist and insider threats in cyberspace This strategy is cons1stent with the goals and objectives of the President's Comprehensive National C'ybersecurity lmtiative the 2006 Quadrennial Defense Review and other national security defense intelligence and counterintelligence strategies Development of the Strategy for Counterintelligence in Cyberspace was conducted tn collaborahon with the military departments defense agencies and combatant commands ln addition it ernpha slzes the importance of collaboration between the defense counterintelligence enterpnse and the infonnahon operations anformation assurance network defense intelligence and law enforcement communities Finally this strategy establishes goals and objectives for counterintelliaence activities in the cyberspace domain and is intended to justifY re sowces for this priority effort l encourage the asgressive implementation of the mission and enterprise objectives laid out in this strategy Wben implemented this strategy will enhance the effcctJveness of the Department of Defense counterintelligence program and wilt promote the integration of counterintelhgence miss1ons and functions in cyberspace ii FOREWORD Land sen air and space are a11 well-recognized operational environments The Department of Defense DoD military departments defense agencies and combatant commands arc strategically organized to accomplish their missions and functions in each of these domains in order to defeat our adversaries DoD COWlterintelligmce CJ plays a critical role in each of these operational environments and is likewise organized in these areas to accomplish its mission to deter exploit and defeat the overt covert and clandestine intelligence activities' of our adversaries In recent decades however a new operational environment bas emerged as evidenced by the increasing frequency and desnuctivcness of attacks and exploits launched against the United States through cyberspace In today's information-rich environment computers are ubiquitous acres DoD entities and across the U S defense i ndustnal base Large numbers of these computers are networked together to quickly transmit infonnatioo to the warfightcr These computer systems hold crucial information control aitical systems and are a primary communication mode for DoD making them extremely attractive targets to our most capable adversaries DoD is developing new strategies to organize itself for success in this emerging cyberspace battlefield DoD Cl is no exception In August 2007 DoD established the Counterintelligence an Cyberspace Program to address the ongoing and ever increasing threat to DoD activities and information in cyberspace The creation of the CI in Cyberspace Program was validated in the National Military Strategy for Cyberspace OperatiofiS NMSCO Implementation Plan which called for the formation of a DoD Countcrintelhgencc Cyber Program to manage the integration of CoWtterintelligence Cybcr Strategy ' The first step in fulfilling this requirement was to develop this DoD Strategy for CI in Cyberspace as a roadmap It was crafted in coordination with the military departments combatant commands and defense agencies all of which hold a critical stake in the integration of Cl in cyberspace This strategy aims to facilitate tbe creation of a professional Cl force across DoD that will SUpPOrt the warfigbter protect DoD assets safeguard U S person civil liberties and carry out the C l mission to deter exploit and defeat the overt covert and clandesnne activiues of foreign intelligence and security services FlSS international terrorists and insider threats m accordance with all applicable laws and presidential directives thus ensunng U S military superiority in cyberspace 1 Depanm nt of Defemc Tlte Hpartme t of Defortse Counterilllelligence Straugy Flscol ' Ars 1008·101 J D C l008 v Wa ington 2 The DoD l jctJonary ofM•hwy 1J1d Associated Tenns 12 April2001 as amended lhrouah 17 Morell 2009 def111es cyberspace u ''A aJobal domain wilhin the information environment coosisrina of Jle unerdcpendent network of infonnation technology infrastructures iDCiuding the Internet telecommunlcatioru network$ computer system and embedded processors and controllers pg 141 3 See the Nalional Military StrutellY for Cyberspace O ralioi'IS MS·CO the NMS· CO Jmpll'ffftntation Plan Joil'rt Publia tion J-1 J ltiformation OperatioM and the Trilateral Memorandum ofAgrtcmt nJ among tlte Deportment ofDefo ue cutd til Department ofJu snc Ol'fd tlte lntelligena Commufllty Regordmg Computer Network A tt«k 1111d Compwter Ner orlc EsploiLation Actwuies 4 Department of Defentc 11ttt National Mililary Strat for Cyberspa Operatwru lmpl 'ffltlftatiOfl PIIJII Washineton D C aipd October I 2007 A-26 Table of Contents FOREWORD ill MISSION AND VISION v EXECUTIVE SUMMARY vi THE STRATEGY 1 Mission Objectives 2 Enterprise Objectll'a S CQNCLUSION 8 APPENDIX 9 iv MISSIO AND VISION MISSION DoD Cl will detect identify assess exploit penetrate degrado and counter or neutralize intelligence collection efforts other intelligence activities sabotage espionage sedition subversion assassination and terrorist activities directed against the Department of Defense its personnel infonnation materiel facilities and activities or against U S national security in the cybftspace domain VISION The integrated application of DoD CI activities will neutralize or exploi and ultimately defeat the intelligence activities of individuals orgam zations mternational terrorists and FISS opcrattng against DoD p el facthtie • programs infonn1tion and operauons in the cyberspace domain v EXECUTIVE SUMMARY The DoD Strategy for CI in Cyberspace aligns with the National Military Strategy for Cyberspace Operations the Department of Defense Counterintelligence Strategy 2008-2013 the President's Comprehensive National Cybersecurity lnitJat1ve and the United States Government-Wide Cyber Counterintelligence Plan 2008 While some of these documents define counterintelligence in cyberspace as encompassing a very broad mission set that includes criticaJ infrastructure protection and supply chain risk management this strategy focuses on the conduct of counterintelligence in cyberspace and recognizes that future iterations may expand into these additional areas The DoD Strategy for CI in Cyberspace contains five strategic objectives two mission objectives and three ent rise objectives Mission objectives are outcomes They identify the strategic results DoD CI strives to achieve Enterprise objectives are capabilities They represent organizational goals that will help to achieve desired outcomes Each m ission and enterprise obje tjve contains sub-objectives that describe bow the mission and enterprise objectives will be achieved resources permitting MissloD Objectives Outcomes 1 Deny intelligence activities targeting U S and DoD interests in cyberspace - Deter detect identify assess neutralize or exploit adversaries in cyberspace - Support the protection of information and technology - Protect the integrity of DoD intelligence and CI activities 2 Conduct CI activities in cyberspace in support of DoD efforts to sh apc the choices of countries at strategic crossroads - Dissuade foreign governments from threatening U S interests - Cooperate with foreign partners to achieve DoD CI in Cyberspace objectives Eaterprite Objecttvn CapabWtles 1 Achieve unity of effort in cyberspace - Synchronize and deconflict Cl activities in cyberspace • Standardize DoD CI tactics techniques and procedures ITP in cyberspace 2 Develop increase and improve DoD C l in cyberspace force readiness - Enhance recruitment mentoring and retention of the Cl force - Develop C I in cyberspace professional standards 3 Mold and shape a DoD Cl enterprise for cyberspace - Prioritize resources to combat threats - ExpJojt em ging scic nti fie and research advances vi THE STRATEGY Background The United States is increasingly under attack in cyberspace The National Counterintelligence CJ Strategy states The cyber environment provides unprecedented opportunities for adversarial activities and is particularly vulnerable because of the nation' s reliance on information systems Tile cybeor networks that businesses universtties and ordinary citizens use every day are the object of systematic hostile activities s The Department of Defense DoD is a high-priority target for some of the nation's most capable cyberspace adversaries who not only threaten DoD systems but also critical infrastructure such as the defense industrial base and other private sector and defense contractor entities and organizations Each of these elements is a critical component of the nation's infrastructure that supports the warfighter cyberspace as a means of intelJigcnce collection or as an operational arena The DoD Strategy for CI in Cyberspace establishes strategic mission and enterprise objectives for developing a DoD CI Program and a professional Cl force capable of countering FISS international terrorists and insider threats operating in cyberspace The strategy also establishes objectives for synchronizing and coordinating Cl activities with those of information operations network defense and hwnan intelligence HUMfNT cyber operations The DoD CI in Cyberspace Program focuses the five traditional CI functions investigations operations collections analysis and production and functional services to address the adversary threat in cyberspace Ultimately the purpose of this strategy is to establish a set of strategic mission and enterprise objectives that ensure U S military strategic superiority in cyberspace Networlc defense and information operations are well-established disciplines that play a critical role in DoD cyber strategy The CI mission in c ce complements the overarching missions of the network defense infonnation operations 10 and infonnation assurance lA commWlities by providing unique capabilities that spec1fically target Foreign lntelHgeace and Security Service FISS and international terrorists without encroaclting upon the distinct responsibilities held by IO and IA CI activities in cyberspace provide another level of defense in depth that actively seeks to mitigate exploit and otherwise thwart the ability of FISS to use j National CountcriDtdligcnce ecubve Nalional CoU1tterUti II'6V « Srratqy of tlte Urtiwl Stotn WIIhinctoo D C 2007 7 1 - ·· --· Mission ObjKtives Missloa Objective 1 Dtay intelligcce ac Uvities targeting U S and DoD i ateresb in tyberspeee The DoD CI Strategy states the business of DoD CI is denying intelligence activities that target U S and DoD interests 6 In cyberspace network and computer security alone ue insufficient to keep U S and DoD interests secure and to cnSW'C the warfighter hu the tools needed for sucuss DoD CI ofTen a unique set o capabilities that are an important complement to infonnation assurance and informabon operations prov1ding mother layer o defense in depth that will brought to bear against our adversaries in cyberspace Deter detect identify assess and neutnllze or exploit advenaries in cybenpac e The DoD CJ Strategy states that to deter and defeat intelligence adversaries the DoD Cl Community must sustain its defensive capabilities advance offensive CI and ensure the DoD Cl enterprise is positioned to meet cum nt and future challcnges 7 FISS efforts to access sensitive data from U S cyberspace systems and to spot assess and recruit individuals Wlder the authonty of or associated with the DoD are well documented Adversaries and allies alike look to exploit our vulnerabilities and ' q amnent of Defense The DepartmDrt of IN eliSe COII tulnJCIIIfDI« StrDtegy ·Fuca YeiU'$ 2008 101 J Wuh mgtOn D C 2008 I 1 Ibid ·-·- ·- · - ------ we must be vigilant in our efforts to mitigate or defeat these threats FISS efforts are directed at DoD cyberspace assets the defense industrial base and other critical infrastructure systems that contain science technology and other data critical to support the warfighter International terronsts are also a threat to DoD assets in cyberspace Every international terrorist attack is preceded by intelligence operations and planning Often international terrorists use cyberspace to communicate and may direct and control international terrorist activities through cyberspace Cyberspace can also be a target that international terrorists may exploit or attack directly with potentially devastating effects on our ait1cal Infrastructure Jntcmational terrorists and FISS however are not the only threats Trusted insiders can threaten our cyberspace systems because they have the access necessary to defeat multiple layers of security An insider threat is an individual with access to DoD resources which includes cybcrsystems networks information factlities and operations who are acting for or on behalf of a foreign power or international terrorists 8 To defeat the effon s of our adversaries in cyberspace the DoD CI community will increase its efforts to aggresstvely deter detect identlfy assess and neutraltze or exploit advenary intelhgence activities as described in the 2007 NattonaJ Counterintcmgencc Strategy The counterintelligence com munity will conduct aggressive strategically-directed 'Depanrnrnt ofOefente Deporrm rtl o Df rut IIUider T11rtatlmpJ mentation P 011 Approved on 2 October 2007 by USD l Washington D C 2008 5 2 operations against pnority mtelligence targets around the world using the full range of operational means g The DoD CI in Cyberspace Program established to comply with task CIILE 4 of the National Military Strategy for Cyberspace Operations Implementation Plan will accomphsh this by significantly increasing the number of Cl personnel that make up the profes iooal Ct force and by providing them with the pohcy guidance doctrine technical tools training and tradecraft that enable them to accomplish this mission in the cyber domatn DoD Cl will conduct offensive activities in cyberspace that sedc to tdentify and defeat national securiry threats from FISS mtemationalterrorists and insider threats Cl components will accomplish this by extending traditional methodologies into the cyber domain by leveraging the latest technology and by creating innovative and proactive cyber tactics techniques and procedures Support Information aod Technology Protecdoo and international terrorist collec to in cyberspace Protec t the integrity of DoD iutelUgence and Cl activities The DoD CI Strategy states that DoD decision·makers and war ighters rely on the inte ftY of intelligenc e and Cl activities 0 The integrity of DoD intelligence and CJ sources methods and operations must be rigorously protected DoD decision-makers depend on the reliability of our intelligence sources yet our adv aries usc denial and deception practices to undermine our understanding of their intentions knowledge capabilities actions as wen as the operating environment DoD Cl will penetrate our adversaries' intelligence operations to assess their tradecraft source networks and leadership structures wh ile validating the reliability of our own sourees and methods These activities will help protect the integrity and reliability of DoD intelligence and CJ activities and iofonnabon Jnfonnation regarding U S commercial and government science and technology as wcU as military plans procedures and commurucations is contalncd in open proprietary and secure information systems FISS and international terrorists collect this infonnation in an effort to gain political military and economic advantaac DoD CI will implement measures to support the protection of this infonnatioo and to increase offensive action against FISS 9 NatiooiJ CcunterintclJaa Executiw 171e NatioN I Co nterlruf'lltgeltCe Strategy oftlte United State3 Wastungton D C 2007 I 10 cp ttUDenr of Ol'ferue T1ttt Dqkz 11Mift of Dej'DUe CounteriJttelllgena Stratqy- FiJcal Y n 1008 - 101J Waslul J'On D C 2008 2 3 Missioa Objective l Conduct CI Ktivides in cybenpace iD support of DoD efforts to sbape the choices of countries at strategic crossroads The DoD Cl in Cyberspace Program supports the strategic requirements of the Quadrennial Defense Review Report 11 QDR where Shaping the Choices of Countries at Strategic Crossroads'' is a criticaJ priority identified by senior civilian and military lc ders The QDR further states the choices that major and emerging powers make will affect the future strategic position aod freedom of action of the United States its allies and partners The United States will shape these choices in ways that foster cooperation and mutua J security interests 12 Offensive DoD Clactivitics can iotluence key decisions of U S adversaries help resolve conflicts before they escalate and provide strategic advantage in cyberspace To shape the choices of countries at strategic crossroads DoD CI wiU particularly by sustaining and developing our key military advantages u In order to implement the objectives laid out in the DoD CI Strategy the DoD CI Enterprise will actively engage intelligence organizations international terrorists and insider threats by influencing their risk gain calculations by manipulating their relationships with foreign governments and by distorting their perceptions of the operating environment and the intelligence they coliect Eobaace cooperatioa wltb friendly foreip partners The QDR recognizes that alliances are clearly one of the nation· s greatest sources ofstrength '' 14 CI partnm hips with cooperative foreign intelligence CI services afford access to foreign expertise and infonnation Where possible the DoD CI community will coordinate synchronize and deconflict CI activities with aJiies to build capacity and develop mechanisms to share the risks and responsibilities oftoday's challenges - Conduct CI activities to dissuade foreign governments from threatening U S interests - Enhance cooperation with foreign partners to achieve DoD Cl in Cyberspace Program objectives Dissuade foreign goverameots from threateni mg U S interests The National Defense Strategy assertS We will work to dissuade potential adversaries from adopting threatening capabihties methods and ambitions 11 Department ofDcfeosc Quadrtnnlal De fen se Rmew Repon Wastunaton D C 6 February 2006 27 ll Ibid ll Department of Defense 17te National Dtfense Strategy of tltt United StaJe s ofAmerlccz Waslungton D C 200 5 9 14 Deparonent of Defense Quadrennial fense R t i YW Report W Slu Jlgton D C 6 febl l ary 2006 6 4 Enterprise Objectives Enterprise objectives relate to our capacity to maintain a competitive advantage over states and forces that threaten the security of the nation Objectives are achieved through the coordination colJ aborat•oo and synchronization of efforts across DoD with other cyber disciplines agc nc1es of government and the pnvate sector Entuprue Objec tfve J Acbieve unity of effon La cybenp•ce The National lntelllgenee Strategy stresses transfonnatJon of the Intelligence Community will be driven by the doctrinal principle of integr tion '' 15 To meea these challenges the DoD Cl in Cyberspace Program will focus on greater ooonlination collaboration synchronization and deconfliction of all cyberspace activities throughout the DoD elements tbe lntelligence Community and tlle law enforcement community and with other cyber discapJioes thus ensuring greater umty ofeffort Syncbro•ize c oordloate •nd deeooOJct Cl activities In cybenpace Synchronization and coordination among DoD elements and other members of the Intelligence Community operating in cyberspace wiU greatly fac11itate deoontliction of sow-ces methods tactics and resources and will promote tnformation sharing lC3SOns learned and best practices Coordination with the law enforcement commuruty on computerrelated invesbgabons w1thin the military SCI'Vlces defense agencies and combatant commands wiU faalil4tc tnformattons baring that will significantly enhance the cffe tiveness of such investigations Coordination w1th network operations network security network warfare and joint task force operations will provide valuable infonnation and operational support to CI activities These functions complement one another in helping to accomplishing the DoD cyber mission along with DoD Cl in cyberspace objectives Staodardizt DoD Cl a Cybenpace TrP DoD is expanding and standardiZUtg the Cl in Cyberspace Program and allocating the professional resources to successfully implement the program Developing the Program requires CJCpa ndmg the recn Uting staffing and training of the CI professional work force and developing standardized 16 Guidelinrs for deconf tction are spelled out in docurnenu such a tbe 2 February 2007 USD l 1 ' Office oftbe Director ofNationaJ lntelhgeoce 17t NattoffUI lnrelltgetf CW ShTIIqy oftire Ulfit ti Statt J of AIMnco Trruu onrumon 1 vou11t lffl gTQtlon and l tovotw Wubtngtoo D C October 2005 4 rnemorandurtl Decontliction of DoD CouJltt rintelllgcnce CT Cyber Operations with rhr lntelliacnce Community 1C the May 2007 'Tnlat eral Memorandum of AJreetnent amoag DoD DoJ and tbe lC reg rdulg CNA and CNE activities altd rbc DNl- ad AG pproved The United St k s Government- Wide Cyber Counterun elhae 'Ce Plao 2008 s Tactics Techniques and Procedures ITP across the DoD This standardization will allow the community to communicate in the same operational language and more easily integrate joint operations learning and the national laboratories and expand training courses offered by the Joint Counterintelligence Training Academy JCITA and the DoD Cyber Investigations Training Academy DCITA CI in Cyberspace ITP development is a collaborative project among the members of the DoD CI community At the operational level there will be differences in the specifics ofTTP driven by the differing missions and functions of the individual services defense agencies and combatant comrnands- onsistcot with the need for creativity and innovation Nevertheless standardization based on lessons learned and best practices will facilitate a more effective DoD CI in Cyberspace Program Develop Cl in Cyberspace professional stand ards Eatetprlse Objecdve l Develop iocruse and improve force readiness Cl in cyberspace force development is already underway within DoD The process of optimizing the recruiting training deploymg and retaining a Cl in cyberspace force is a collaborattve effort across DoD To sustain and continuously improve CI in cyberspace force readiness the DoD Cl community will focus on t he following Enhance recruitment and mentoring of the CI in cyberspace foT'Ce - Develop Cl in cyberspace professional standards Enh•uce rtcruitmral meatorma and retention of tbt CllD cybenpa« force Recruiting mentoring and retaining Cl in cyberspace skills and resources is both crucial and challenging To expand tbe professional workforce the DoD Cl in Cyberspace Program will establish relationships with institutions of higher The DoD Cl in Cyberspace Program recognizes that the Cl worlcforc e must master many disciplines to accomplish its mission Accordingly the CI in Cyberspace Program will introduce professional and e ucational standards for CI collectors analysts investigators and operators across the Department The DoD CI community will reach across the U S government to coordinate with centers of cyber and CI training excellence to address deficiencies and to upgrade the availability and Wlifonnity ofCJ in cyberspace training The workforce will be trained to safeguard the civil liberties of U S persons and to operate in accordance with an applicable laws and presidential directives Where appropriate training is lacking training programs and standards will be developed Eoterprls Objective 3 Continue to Mold aad Shape the DoD Cl m Cybenpace Eoterprlse The process of establishing the Cl in Cyberspace Program incl udes developing tltis strategy and a follow-on implementation plan for it along with the development of TIP readiness plans and training requirements and standards Developing the professional Cl force who can operate effectively in cyberspace requires recruiting trajning and retaining Cl professionals In addition DoD must establish research and development 6 requiremeots to create Cl tools that support operattonal cyber needs edge of tedmology and well ahead of our adversaries To eccomplish these objectives the Cl in Cyberspace Program will The Cl in Cyberspace Program will address pressing technology requirements by using commercial off-the-sbel f tools The CI in Cyberspace Program will also draw from the resources of the U S government and industry inclucting emc rgjng capabilities from among the military services the defense agencies the national laboratories and the Defense Advanced Researc_h Projects Agency DARPA • Prioritize resources to combat FISS and international terrorists and their intdligence elements as well u instder threats - Exploit emerging scientific and research advances Prioritize re1ourc es to combat threats The process of obtaining the funding and resources necessary to deploy an effective Cl in cyberspace force has already begun Training requirements are being established and resources are being allocated across DoD Allocation of the initial resources wiU be based on needs analysis that has been conducted in collaboration with stakeholders of the Cl and Intelligence CommunWes In the early stages of implementation resources will be directed at the most senous FJSS international terrorist and insider threats Exploit emergiag sdeatiflc aDd rnearc h advancn The National Intelligence Strategy states globalazation and acce1eratJng scienllfic and technological progress threaten to erode the Intelligence 17 Commuruty's technical coUection muns ' In order to avoid such erosion the DoD Cl in Cyberspace Program will collaborate with the scientific research and technology communities along with commercial vendors to stay at the leadjng 11 Ibid 17 1 CONCLU 10 The NMS-CO directs DoD to develop a cyberspace force The objective of this force is to ensure U S military strategic supcnority in cyberspace ''11 To address the Cl functions and missJons in cyberspace lhe NMS-CO requires the DoD CI communHy to form a DoD Counterintelligence Cyber Program •' 9 To meet this requirement the DoD Cl community is working to establish fonnabzed policy planmng and guuiance to increase resources to provide training and tools and to standardlze tradecraft and profess1onal standards that will SUpPOrt the Cl foroe operating in cyberspace The first step m this management planning process is to estabhsh this strategy for CI in Cyberspace in collaboration with the entire DoD CI enterprise to set the major themes that will guide future planning A DoD Clm Cyberspace Implementation Plan will expand on these themes and establish roles and responsibilities task assignments milestones and perfonnancc measures to implement the objectives of this strategy The Defense Intelligence Agency Defense Counterintelligence and HUMINT Center Cl in Cyberspace Program Management Team will oversee the implementation of tbe strategy across DoD Further guidance documents will be issued to expand on the doctrine tactics techniques and procedures to be implemented in the field that address the indi iduaJ operational needs and requirements of the military services defense agencies o nd combatant commands The DoD CI mission in cyberspace is to deter detect identtfy assess and neutrahzc or explott and ultimately defeat adversary activtties in cyberspace This is accomplished through CI mvestigations operations collectton analysts and production and functional services in cyberspace Fulfilling tlus mission is a significant challenge constdcring the breadth and scope of adversary activities in cybersl ace and the speed with whic h technology in cyberspace advances The DoD CI components in the military services defense agencies and combatant commands will take action to fully implement a CI in Cyberspace Program and deveJop a profcujonal DoD Ct force that will acxomplish the nussion and enterprise objectives set-forth in this strategy 11 Joint Chiefs of Staff M m01YJ11dllM for DutribwtiOfl Guidon for NtHfottOI Military Slrot'gy for C b#rspace Operacwns mpltmenwtion Planning Wasbinacon D C I 5 February 2007 A hment - Temu of Reference for the NatioB l Milnary Strate Y for Cybenpacc Operations I 19 Department of Defense T1tt NatJoruJl M1lilary Slrottf Y for Cybcrsp 1ce Opera nons ' ple e IPtiorr Plan Washinaton o C dated 24 September 2007 signed October 1 2001 A·26 8 IP'ttR 8Jitil@ls Rs Uili Qtll 14 APPENDIX Def 'anitions • CoWlterintelligenee Information gathered and activities conducted to identify deceive exploit disrupt or protect against espionage other intelligence activities sabotage or assassinations conducted for or on behalf of foreign powers organizations or persons or their agents or international terrorist organizations or activities 20 • CI Fuoctlons Investigations operations collection analysis and production and functional services 21 • CI Missioa Areas CI support to Research and Technology Protection RTP Critical Infrastructure Protection CIP Force Protection and Combating Terrorism and support 22 to Infonnation and Capabilities Protection • Cybenpace A global domain within the information environment consisting of the interdependent network of information technology infrastructures including the lntemet telecommunications networks computer systems and embedded processors and controllers NSPD-54 23 • Counterintelligence in Cyberspace Measures to identify penetrate or neutralize foreign operations that use cyber means as the primary tradecraft methodology as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions 24 White House Executive Order I 2333 Ul'tikd Stares lntelligtttce Acnviti Washln ton D C 4 December 1981 as amended by Executive Order 13470 2008 36 11 Depa rtm ent of Defense Directive 0-5240 02 Counterintelligence December 20 2007 22 Department of Defense Tlrt Deportment ofDeferr se Counterintelligence Strategy- Fiscal Yeurs 1omi - 1013 Washinaton D C 2008 n Department of Defense Joint Publication 1-OZ Dictionary ofMilitary and Associated Tums Washington D C 12 April2001 as amended through 30 May 2008 141 24 Ibid 20 The 9
OCR of the Document
View the Document >>