Cyberspace as a Domain In which the Air Force Flies and Fights Published Nov. 2, 2006 Thank you, Barry [Barry Rosenberg, Director, Defense News Media Group Conferences], for the introduction and thank you to the Defense News Media GroupI have long worked on Command and Control issues, and watched how the technology has diffused, in the drive for more Jointness. We see how weapons now fly so far that there is ever increasing need to be able to trust the data we use to guide them. This I understand is your Sixth gathering. This annual event has a great future. I want to discuss with you today a subject I regard as extremely critical: the Freedom of Cyberspace. Just last week Deputy Secretary of Defense Gordon England, speaking before a major network warfare audience, listed the attempts of hackers, "Cyber-vigilantes", terrorists, and even hostile nation-states to degrade our Fighting Networks as the single issue that he spends "more time thinking about in the middle of the night, than any other." Before addressing Cyberspace directly, I want to set some context, first as to the Mission of the Air Force, then as to the topics of this Conference, and also as to what we are learning from current combat. I. The Mission of the Air Force is to deliver sovereign options for the defense of the United States of America and its global interests-- to fly and fight in Air, Space and Cyberspace. This was defined a year ago, and then codified a month later, on December 5, 2005. "Delivering Sovereign Options" means operating across the Joint Spectrum so that we provide to the President scalable choices that are unlimited by distance and time, and span the entire range from humanitarian assistance to nuclear strike, kinetic and non-kinetic. In Short: Global Reach, Global Vigilance, Global Power. This includes the powerful option to use timely information to deter and to avoid use of kinetic weaponry. General Curtis LeMay emphasized this when he said, "Peace is our Profession," making it the slogan of the Strategic Air Command. All these options have one common foundation -- persistent, lethal, overwhelming Air, Space and Cyberspace power massed and brought to bear anywhere, anytime. Thus, the Air Force serves by being prepared to set Strategic, and then, if needed, also Tactical, Conditions for deterrence, dissuasion, or defeat, and in this way offer to our Commanders options throughout the spectrum of conflict. Air Force Chief of Staff General Moseley likes to say, "the soul of an Air Force is Range and Payload." I would salt and pepper Persistence in there as well. That is why after 53 years we are again seeking 21st Century parallel Strategic Assets in the form of new tankers and global strike to meet our responsibilities in the Air Domain, emphasizing expeditionary, as well as persistent Strategic options, to ensure the robustness of the Nation's Global Power; and recognizing that the replacement of our Satellite Constellation is at hand, to fulfill our Global Vigilance task. II. Now, consider how Cyberspace stands in relation to the topic of this Conference. The topic is "C4ISR." For many in the military and certainly for others in the daily walk of life, it helps to take a moment and parse the elements of the acronym. There are four "C's" -- "Command", Control"; "Computers", and Communication", then, "Intelligence", "Surveillance" and "Reconnaissance". It started with "Command and Control", an old military studies term. Nowadays the two words are separated as being two individual items, subject to debate. There was even sometimes confusion as to whether the "I" is "Intelligence" or "Information." Here are some things to notice. First, the whole term C4ISR has the mantle of familiarity -- we don't step back and pick it apart. Second, each component is a function -- not a Battle Domain, but a function -- a form of activity or service. Third, the six functions are a grab-bag, bundled over the years. While connected in a sense as functions that move data, they are disparate as to physics. But by common assent, we group them for conversation. This facilitates research in the varied areas of Sensors, Electronic attack, and Access and Compiling of Commander-level Information extracted from gathered data. Finally, the functions all are vital flows within each of the Battle Domains of Land, Sea, Air, Space, and, as we shall see, in Cyberspace. III. I have brought a Video that illustrates the flows of C4ISR functions -- that means, the flow of data -- in battle, today. As you watch the Video I ask you to consider two questions: First, now that we have enhanced the application space for Networked Operations; and really moved communications trust and reliability to a prominent position in our concept of operations; how do we defend the net on which all our capabilities depend? Second, what new Habits of Thought do we need to adopt in order to create the capacity to deter, guard, rescue, strike, and assess in what will probably be the Cyberfight of the 21st Century?SHOW THE VIDEO. [ "How We Fight"] END VIDEO These images, ripped from the battlefield, make these points: The video illustrates the components of what I call the "Information Mosaic" -- the whole data net, analog and digital; pixels and composites images; from all sensors that can be collected and downloaded and crossloaded for use by all in the Fight. By filtering critical data from the "Information Mosaic" to the strategic planner and right out to the weapon system itself, we increase flexibility and lethality. This requires common gateways such as Cursor On Target to maximize data usage. As Assistant Secretary of Defense John Grimes recently put it--it is about the data, and Maximizing Access. All the information flow moves in the Cyber Domain, meaning, the entire flow can be vulnerable to a Cyberspace attack.Let's look at the two questions I asked before the video:First, How shall we defend the communication net on which all our capabilities depend? This question is critical: Our ability to fight in Ground, Sea, Air, and Space depends on communications that could be attacked thru Cyberspace. The capital cost of entry into the Cyberspace Domain is low. The threat is, that a foe can mass forces to weaken the network that supports our operations in any Battle Domain. The other side of the coin of Netcentric Operations is CybervulnerabilityThe answer is that defending and fighting in the Cyber Domain is absolutely critical to maintain operations in Ground, Sea, Air and Space. The Second Question is, What new Habits of Thought do we need in order to create and develop technology, and to fight in the 21st Century? The answer is to go back to my comment at the start, and think in terms of Trust. Our operations in each of our Services all rely on Trust. That is, the pilot can trust information that a target is the foe, not innocent inhabitants of a school building or hospital or embassy. The groundfighter with a communication device can trust that the device is not being tracked by a foe, potentially exposing the ground force unnecessarily.This New Way of War is data-dependent. So we need to think in terms of Trust and securing Trust. IV. So, now let us turn to the Imperatives our country confronts in the Cyber Domain and the actions which the Air Force is taking. Here are some scenarios that emphasize the Imperatives: Right now a terrorist lies on his belly in a dusty ditch. He holds a radio transmitter to detonate an improvised explosive device, to kill Americans as they convoy across a stretch of broken asphalt. His use of Cyberspace is currently being contested, but not always. Right now a drug trafficker sits under a tarp in a boat, bobbing off a Caribbean beach, setting up, potentially, a cocaine drop for nightfall. He gets GPS coordinates on a SATCOM phone from a controller a continent away. His use of Cyberspace is practically uncontested. Right now a Finance Technician is moving U.S. dollars via laptop to support terrorist ops, while sipping coffee in an internet cafe. His use of Cyberspace is practically uncontested. Right now a Foreign Government engineer is in the Net using stolen American technology to build radar and navigational jammers to counter American air superiority. His use of Cyberspace is uncontested. Right now a Foreign hacker is crashing an American server that holds a web site with data he does not like. His use of cyberspace is uncontested, though subject to pursuit. Right now rogue securities traders, sex traffickers and data thieves are poised at computers worldwide, reaching into the American net. In a speech just last week, Attorney General Alberto Gonzales voiced his concern about the predators who range through Cyberspace, accosting our children. Their access to Cyberspace is uncontested, though, again, they are subject to some pursuit.Each of these examples is real. I could name many more. What we are seeing is that the Cyberspace Domain contains the same seeds for Criminal, Pirate, Transnational, and Government-Sponsored mischief as we have contended with in the Domains of Land, Sea, Air, and now contemplate as Space continues to mature. This reminds us of the history that it is military capabilities that long ago helped make it possible to free the Barbary Coast of pirates, so that our world of commerce and ideas could enjoy Freedom of the Seas, and that Freedom of the Seas continues to be sustained thanks to the U.S. Navy and Coast Guard partnership with the appropriate authorities in coastal jurisdictions. This refers also to the idea that America's operations in Air and Space set the strategic conditions for world commerce to enjoy Freedom of the Skies. I am told that by far the larger portion of the goods in commerce worldwide, by value, travel by Air. The remainder moves by Sea, mostly bulky commodities. Freedom of the Skies is undergirded by the US Air Force, more than by any other power or force, just as Freedom of the Seas is undergirded by the U.S. Navy and Coast Guard, again in partnership with the right authorities. In sum, in Cyberspace our military, America and indeed all of world commerce face the challenge of modern day pirates, of many stripes and kinds, stealing money, harassing our families, and threatening our ability to fight on ground, air, land and in space.The National Strategy to Secure Cyberspace states: "A spectrum of malicious actors can, and do conduct attacks against our critical information infrastructures. Of primary concern is the threat of organized cyber attacks capable of causing debilitating disruption to our Nation's critical infrastructures, economy, or national security." The Strategy calls upon National Security planners specifically to: "Improve capabilities for attack attribution and response." "Improve coordination for responding to cyber attacks within the U.S. national security community." "Foster the establishment of national and international watch-and-warning networks to detect and prevent cyber attacks as they emerge." V. Now, my duty as the Secretary of the Air Force is to put the nation's most technologically capable force on a path to do our share of the task of presenting to our Combatant Commanders, and so to the President and the Nation, the trained and ready forces they may need to ensure the same security and Freedom of Cyberspace that Americans and indeed many in the world already enjoy in the Oceans, in the Air, and also in Space. This Duty is joint, and, as I have noted, it is Interdependent. The duty is to bring to the Fight what the Air Force has to offer, and to exercise good stewardship of the Air Force personnel and resources that are in some cases already devoted to operations in Cyberspace. This does not mean "control" of Cyberspace, any more than the other domains of Ground or Maritime. It does mean making our contribution to securing the benefits of Cyberspace for our military and, indirectly, for our national and even world commerce. This means recognizing that the idea of Freedom of Cyberspace may in time be the same kind of principle as Freedom of the Seas and Freedom of the Skies . This means that Cyberspace is a Domain on which many rely and in which warfighting can, and, actually by some definitions already, takes place.One rough and ready demonstration that Cyberspace is a true Domain on a par with Land, Air, Space and Sea is to apply the basic questions of the Principles of War. For example, Can one Mass forces in Cyber? Yes. Does Surprise give an advantage in Cyber? Of Course. Simplicity? Economy of Force? Clarity of Objective? Yes, Yes, and Yes. Here is a call for the professional military. The Domain is new, but the trained mind of the uniformed warfighter is needed to wage this Fight. Just as the Air Domain is governed by aerodynamic forces, and the Space domain by orbital mechanics, Cyberspace has mathematical, and electromagnetic principles at work. Due to the size of the global information grid and easy access to the electromagnetic spectrum, effects in Cyberspace can take place nearly simultaneously at many places. Effects can be massive or precise, lasting or transitory, kinetic or non-kinetic, lethal or non-lethal.The definition of Cyberspace must be broad enough to enable us to integrate the vast possibilities that the electromagnetic spectrum offers now and for the future. Last month, the Joint Chiefs of Staff defined Cyberspace as: "A domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures." This definition is being codified in The National Military Strategy for Cyberspace Operations. VI. Today I am announcing the steps the Air Force is taking towards establishing an Air Force Cyberspace Command. The aim is to develop ultimately a Major Command that stands alongside Air Force Space Command and Air Combat Command as the providers of forces on whom the President, Combatant Commanders and the American people can rely for preserving freedom of access and commerce in Air, Space, and, now, Cyberspace. Let me summarize the major developments we've undertaken in the past year and the plans for developing the capability to contribute to do our job in ensuring Freedom of Cyberspace. In December 2005, General Moseley and I restated the Air Force Mission Statement to include Cyberspace as a Domain where the Air Force delivers Sovereign Options. This step simply recognized the existing fact that significant Air Force personnel and technology have long been engaged in fighting in Cyberspace. Good stewardship means attending to the systematic training, organizing, and equipping that is our job. This includes especially attending to the career progression of the Airmen involved in Cyberspace, including our guard, reserve, and civilian professionals. The step included consultation with General James Cartwright, the Commanding General of U.S. Strategic Command, for he is a principal Commander to whom I have the duty to present organized, trained and equipped Cyberspace Forces. We stood up a Cyberspace Task Force in January, led by military strategist Doctor Lani Kass. She is with us today. Lani, could you please stand so we can thank you? The Task Force, composed of officers from across the Air Force, has spent the past ten months gathering data, researching options. We addressed Cyberspace extensively at the Four-Star level during a major Warfighting meeting in July. General Moseley and I have subsequently tasked the Commanders of Air Combat Command and Air Force Space Command to submit a proposal for establishing an Operational Command for Cyberspace. We tasked the Commander of Air Education and Training Command to develop a training plan and the Commander of Materiel Command to analyze the resourcing plans with Air Staff assistance to support an operational Cyberspace command. The new Cyber Command is designated as the 8th Air Force, with a long and strategic deep strike heritage, under the leadership of Lieutenant General Robert Elder. He will develop the force by reaching across all Air Force Commands to draw appropriate leaders and personnel. The 67th Wing, and other elements under 8th Air Force, provides the center of mass for this startup activity. General Elder remains as a force provider to Combatant Commanders.Simultaneously, General Elder has been asked by General Moseley and me to develop a roadmap that could be used to grow the Cyberspace Command "upwards", and has the framework of a full Major Command, a peer with Air Combat Command and Air Force Space Command. We expect that this work will stretch out for the bulk of this next year.The mission of Bombers now within the 8th Air Force will be remaining. It is fitting that this historic step, the elevation of Cyber to Major Command Status, will take place from the heart of the 8th Air Force. The 8th Air Force is a Home of Heroes. In World War II, it was a Breakthrough Force, bringing a new Strategic Dimension to the Fight. It was the vision of such leaders as Hap Arnold, Ira Eaker and Curtis LeMay. In this Century, the Eighth Air Force will be the home of new breakthroughs. This is a noble home for the mission of ensuring Freedom in a whole new Domain. VII. As I close, here are Key Points to Bear in Mind: The focus is to make the Air Force mission complete from an Organize, Train, and Equip basis. Properly presenting trained and ready forces offers the right Sovereign Options in this Domain. This is a Battle Domain in which the Air Force operates with, and supports our sister Services, first responders, and many times Non-Government Organizations and the many non-military authorities who also work to keep Cyberspace secure. There are many partners across this Domain. There will be careers and a strong future for the Airmen whose work is in the Cyberspace Domain. Air Force personnel experts are at work now forming the career and schooling paths that ensure a full career with full opportunities for advancement to the highest ranks of the Air Force, for our military and civilian professionals. When planning and fighting in Cyberspace as a Battle Domain, the task is one for the professional warfighter, that is, the trained military professional who lives, and breathes, and thinks the Principles of War. The Air Force has long had these professionals in uniform, and I honor them for their Service to our Country. As I look across this room, I marvel at the harnessing of technology, the invention of applications, and the representation of the strength that each of you embody. It gives me confidence that Freedom of Cyberspace will be secured. The technological innovations that many of you are directly responsible for, plus the courage and bravery of our networked force, from Missile Defense to Tactical Commanders, and the men and women they command, defend every day the freedoms we enjoy in all five Domains. VIII. And now, I turn to you and conclude with this Question. I hope that each of you can ponder it and help our Services and our Country find the best answers: "In this 21st Century, how shall we best carry out the C4ISR Functions in the Cyberspace Domain?" Thank you for your service, for your continued support; and may God continue to bless the United States of America. Thanks for allowing me the honor to provide the keynote address for this important forum.