Army Cyber Command/2nd US Army

6
ARCC-CG UNCLASSIFIED DEPARTMENT OF THE ARMY U.S. ARMY CYBER COMMAND/2ND U.S. ARMY 8825 BEULAH STREET FORT BELVOIR, VIRGINIA 22060-5246 MEMORANDUM FOR Headquarters, U.S. Army Cyber Command Personnel SUBJECT: Army Cyber Command/2nd U.S. Army's Cyber Professional Development (CPD) Program 1. PURPOSE/SCOPE. This memorandum provides the framework for implementing a formal Cyber Professional Development (CPD) program within this command. This program encompasses both civilian and military (officer and enlisted) leadership. 2. PROFESSION OF ARMS AND THE CYBERSPACE DOMAIN. Studying our profession and attaining proficiency in our field are important characteristics of a professional. Learning in the Army is a career long process. The Army describes leader development as comprising three overlapping, but separate domains (operational, institutional, and self-development) that must be synchronized to achieve the goal of trained Soldiers, Army civilians, leaders, and ready units. Army Cyber Command has a relative advantage over other career fields in that cyberspace operations are continuous and global, providing ample operational development opportunities. However, our challenge is that the cyberspace domain is neither well matured nor adequately supported by current institutional training and leader development systems. Additionally, the Cyber workforce identity is not well defined, thus developing cyber leaders is more complex than in other career fields. Realizing these challenges and given the importance that the Cyberspace domain will have in our future Army, we must implement a quality leadership development program that will help grow the first Army generation of Cyber leaders and help cultivate an enduring Cyber professional workforce. 3. PROGRAM. Army Cyber Command will establish a formal Cyber Professional Development (CPD) program using a three-tiered approach that includes a Commander's Recommended Cyber Professional Reading list, periodic CPD sessions, and a self-development program. a. Commander's Recommended Cyber Professional Reading List - The attached enclosure contains an initial list of books and articles relevant to our craft as Cyber leaders. This list is a seminal effort that I consider a "living" product and fully expect to grow it into a we ll - rounded reference tool for our leaders. I challenge officers of this command not only to read these publications, but also to contribute to the growing cyber discipline through professional reading and individual writing efforts. b. Periodic CPDs/Guest Speakers - This command will conduct formal, quarterly CPD sessions with my guidance on rotating themes. As part of this requirement, we will initiate a quarterly guest lecture series focused on Cyberspace issues to enhance and enrich our Cyber UNCLASSIFIED

Transcript of Army Cyber Command/2nd US Army

ARCC-CG

UNCLASSIFIED

DEPARTMENT OF THE ARMY U.S. ARMY CYBER COMMAND/2ND U.S. ARMY

8825 BEULAH STREET FORT BELVOIR, VIRGINIA 22060-5246

MEMORANDUM FOR Headquarters, U.S . Army Cyber Command Personnel

SUBJECT: Army Cyber Command/2nd U.S. Army's Cyber Professional Development (CPD) Program

1. PURPOSE/SCOPE. This memorandum provides the framework for implementing a formal Cyber Professional Development (CPD) program within this command. This program encompasses both civilian and military (officer and enlisted) leadership.

2. PROFESSION OF ARMS AND THE CYBERSPACE DOMAIN. Studying our profession and attaining proficiency in our field are important characteristics of a professional. Learning in the Army is a career long process. The Army describes leader development as comprising three overlapping, but separate domains (operational, institutional, and self-development) that must be synchronized to achieve the goal of trained Soldiers, Army civilians, leaders, and ready units. Army Cyber Command has a relative advantage over other career fields in that cyberspace operations are continuous and global, providing ample operational development opportunities. However, our challenge is that the cyberspace domain is neither well matured nor adequately supported by current institutional training and leader development systems. Additionally, the Cyber workforce identity is not well defined, thus developing cyber leaders is more complex than in other career fields. Realizing these challenges and given the importance that the Cyberspace domain will have in our future Army, we must implement a quality leadership development program that will help grow the first Army generation of Cyber leaders and help cultivate an enduring Cyber professional workforce.

3. PROGRAM. Army Cyber Command will establish a formal Cyber Professional Development (CPD) program using a three-tiered approach that includes a Commander's Recommended Cyber Professional Reading list, periodic CPD sessions, and a self-development program.

a. Commander's Recommended Cyber Professional Reading List - The attached enclosure contains an initial list of books and articles relevant to our craft as Cyber leaders. This list is a seminal effort that I consider a "living" product and fully expect to grow it into a well­rounded reference tool for our leaders. I challenge officers of this command not only to read these publications, but also to contribute to the growing cyber discipline through professional reading and individual writing efforts.

b. Periodic CPDs/Guest Speakers - This command will conduct formal, quarterly CPD sessions with my guidance on rotating themes. As part of this requirement, we will initiate a quarterly guest lecture series focused on Cyberspace issues to enhance and enrich our Cyber

UNCLASSIFIED

UNCLASSIFIED ARCC-CG SUBJECT: Army Cyber Command/2nd U.S. Army's Cyber Professional Development (CPD) Program

leaders' currency and relevant knowledge. Additionally, staff sections and senior leaders are encouraged to implement internal CPD programs within their units/sections to gain and maintain proficiency; however, these programs will not interfere with the command's scheduled CPD events. Finally, the command will conduct an annual Staff Ride. This Staff Ride will focus as closely as possible on our profession and Cyber themes. At a minimum, there will be one Staff Ride preparatory session where Staff Ride groups will provide presentations on assigned topics of responsibility.

c. Cyber Self-development Plan - Leaders in all sections will facilitate self-development opportunities for their leaders by providing recurring access to appropriate training and education courses, creating cross-development strategies to provide maximum exposure to various sections and functions within the command, and encouraging their leaders to write and publish articles focused on Cyberspace. While professional reading sharpens and hones our skills as leaders, we have an obligation to add to the body of scholarship in Cyberspace operations through individual writing efforts. Writing is a critically important form of communication and certainly an art that has slowly eroded over time. The rest of the Army needs to be exposed to our newly-evolving domain and we need leaders capable of adequately describing that domain in vvriting.

4. IMPLEMENTATION. This document serves as the framework for the execution ofCyber leader professional development. The Strategic Initiatives Group (SIG) will receive my guidance on themes/topics for quarterly CPD focus and will assign staff leads for each quarterly session and speaking event. Future adjustments to the program will be included in command Annual Training Guidance. It is my intent that all leaders in this command strive to develop themselves and maintain their relevancy in this new operational domain. I highly encourage all leaders to seek out opportunities to lead our CPD discussions, think critically, and write professionally about our craft. You have a key role in developing our future. Take time to help make a difference.

Encl

Second to None!

RHETT A. HERNANDEZ Lieutenant General, USA Commanding

2

UNCLASSIFIED Encl

Army Cyber Professional Reading List

Cyber War: The Next Threat to National Security and What to Do About It &Y BE R- Richard A. Clarke WAR A ::..~:::1:Jr I On today's battlefields computers play a major role, controlling targeting ~t~~~i~A.· systems, relaying critical intelligence information, and managing logistics.

And, like their civilian counterparts, defense computers are susceptible to computer network attack. Cyber War provides numerous examples. For example it includes a vivid description of a September 2007 operation, where Israeli cyber warriors reportedly "blinded" Syrian anti-aircraft installations, allowing Israeli planes to bomb a suspected nuclear weapons manufacturing facility (Syrian computers were hacked and reprogrammed to display an empty sky). Analysts across the globe are well aware that any future large-scale conflict will include cyber warfare as part of a combined arms effort. Clarke and Knake argue that today's leaders, though more computer savvy than ever, may still be ignorant of the cyber threats facing their national security.

Why: This is an excellent introduction to the cyber domain from one of the most influential policy makers of the cold war era. It provides the real world examples and background on today's most prolific actors in cyberspace. Written for all audiences, this non-technical and easy to read book is sure to educate.

Counterstrike: The Untold Story of America's Secret Campaign Against AI Qaeda

&_OUNUR Eric Schmitt and Thorn Shanker IS RL~ E ~:WmA~ 't When initial efforts by America in the War on Terror failed to yield meaningful t£ ~' T ll Il l-'

:u"'"'·mP results, military analysts and the intelligence community adapted certain Cold diLi:i= ' War Deterrence strategies and found innovative methods to fight terrorism and disrupt terrorist networks in creative ways.

Why: The Cyber domain involves concepts that challenge traditional (or classical) forms of warfare. This book, while not entirely focused on cyber as a domain, certainly offers insight into how cyber effects can impact operations in the other "classical" domains.

Little Brother Cory Doctorow

The novel is about several teenagers in San Francisco who, in the aftermath of a terrorist attack in San Francisco, defend themselves against the Department of Homeland Security's attacks on the Bill of Rights. The novel is also

UNCLASSIFIED

UNCLASSIFIED available free on the author's website under a Creative Commons license. The book debuted at No. 9 on the New York Times Bestseller List and was a finalist for the Hugo Award for Best Novel.

Why: A cultural counter point to Cyber War, this book demonstrates the personalities and qualities ofthe hacker culture, something that is regularly misunderstood in military and government circles. Little Brother also underscores the importance of balancing mission requirements against the civil liberties of our citizens.

The Starfish and the Spider: The Unstoppable Power of Leaderless Organizations

Ori Brafman and Rod Beckstrom

Explores the characteristics of networked organizations (lacking hierarchal C2 ,. ,,.t,/ structures) such as Wikipedia, Alcoholics Anonymous, the Burning Man, and

what sets them apart from more traditional, top-down organizations. Why: The 21 51 Century Cyber domain has certainly seen the advent and predominance of the "starfish" (Flash mob, Arab Spring, Twitter Revolutions, Anonymous) and operating within this domain requires a fundamental understanding of how these networks thrive (and what makes them vulnerable) .

Inside Cyber Warfare: Mapping the Cyber Underworld Jeffrey Carr

This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their

adversaries. Y ou'lllearn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Why: This book is a well-written and easy to understand dossier on the major actors in the cyber domain.

Unrestricted Warfare: China's Master Plan to Destroy America Qiao Liang, Wang Xiangsui

This is a book on military strategy written in 1999 by two colonels in the People's Liberation Army, Qiao Liang and Wang Xiangsui. Its primary concern is how a nation such as China can defeat a technologically superior opponent (such as the United States). Rather than focusing on direct military confrontation, this book instead examines a variety of other means, including

UNCLASSIFIED

UNCLASSIFIED using International Law and economic means to place one's opponent in a bad position and circumvent the need for direct military action.

Why: Despite the shocking title and editors' influence the actual text translated from the Chinese Colonels' text provides remarkable insight into how the cyber domain can give an incredible advantage to a weaker conventional foe. However, you may wish to disregard the conspiracy theory forward inserted by the editor.

Leadership of Cyber Warriors: Enduring Principles and New Directions G. Conti and D. Raymond

This article emphasizes fundamental leadership techniques necessary to succeed as a leader in the cyber field. Many leaders coming from combat arms may attempt to employ tried and true techniques they have used their whole

careers to detrimental effect in this new domain.

Why: This article examines how fundamental leadership principles have not changed but how they must be tailored to the cyber warrior.

Available online: http://smallwarsjournal.com/jrnl/art/leadership-of-cyber-warriors-enduring-principles-and-new­directions

Cyberpower and National Security (National Defense University) Franklin D. Kramer, Stuart H. Starr, and Larry Wentz

The cyber domain is undergoing extraordinary changes that present both exceptional opportunities and major challenges for the military prOfessional. Cyberpower and National Security assembles a

group of experts and discusses pertinent issues in five areas: foundational issues and lexicon, predicted changes over the next fifteen years, impact on inforn1ational and military levers of power, empowerment of criminals, terrorists, and nation-states, and governance.

Why: Cyberpower and National Security frames key policy and strategy issues of concern to the military leader and identifies important questions surrounding building the cyber workforce, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges.

The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America

James Bamford

James Bamford exposed the existence of the top-secret National Security

UNCLASSIFIED

UNCLASSIFIED Agency in the bestselling The Puzzle Palace and continued to probe into its workings in his follow-up bestseller, Body of Secrets. Now Bamford discloses inside, often shocking information about the transformation of the NSA in the aftermath ofthe terrorist attacks of2001. In THE SHADOW FACTORY, Bamford shows how the NSA's failure to detect the presence of two of the 9111 hijackers inside the United States led the NSA to abandon its long-held policy of spying only on enemies outside the country. Instead, after 9/11 it turned its almost limitless ability to listen in on friend and foe alike over to the Bush Administration to use as a weapon in the war on terror. With unrivaled access to sources and documents, Bamford details how the agency has conducted domestic surveillance without court approval, and he frames it in the context of the NSA's ongoing hunt for information about today's elusive enemies.

Why: The Shadow Factory is a riveting read for anyone concerned about America's security, and the social cost of that security, in the post-9/11 world. This is a great unclassified primer on NSA and the bureaucracy of the Intelligence Community.

Self-Development for Cyber Warriors Gregory Conti, James Caroland, Thomas Cook, and Howard Taylor

The books listed above serve as just the beginning of one's self-development ,-- --- in cyber warfare. "Self-Development for Cyber Warriors" was published in

Small Wars Journal and provides extended non-fiction and fiction reading lists, but perhaps more important, the article also suggests technology news sources, magazines, and blogs, must read cyber warfare journal and magazine articles, cornerstone doctrine and policy documents, movies, videos, podcasts, conferences, certification programs and more, all designed to help you professionalize in the cyber domain.

Why: This article provides a comprehensive roadmap for long-term self-development in the cyber domain.

Available online: http:/ I small warsj ournal.com/jrnl/ art/ self-development-for-cyber­warriors

UNCLASSIFIED