SlideShare a Scribd company logo
1 of 7
David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
Experience Summary
• 30 Years military experience and seven years
industry experience
• 23 Years Intelligence, Cyber and Identity
Intelligence Experience
• 17 Years’ experience working and coordinating
policy issues involving Cyber, SIGINT,
Biometrics, Identity Intelligence, Controlled
Technical Services and Clandestine Tradecraft
• Three years’ experience working directly for the
Commanding General of US Army Europe to
conduct Mission Rehearsal Exercises
• 5 Years Comptroller Experience ($2.4B Budget)
• 6 Years working Cyber Issues in Industry
• Managed and worked the fielding of 41 Large IT
Projects
• Previous Owner, Airborne Ranger Construction
(sold DEC 2012)
Security Clearance
TS Clearance until Jan 19 NOV 2017
• Clearance date 19 NOV 2012
• CI Poly 24 Feb 2016
• Spent 5 years providing Focal Point
support and was a focal point officer
• 11 years read on to ACCM
Education
• Visiting Defence Fellow For Queen’s
University Kingston, Ontario, Canada and
completed the U.S. Army War College,
2002
• Masters of Business Administration,
(Boston University), 1991
• Bachelor of Science, Public Management
(University of Arizona), 1979
• PMP Certified, August 2015
• ITIL Version 3 Certified
Additional Info:
• Board of Directors, National Military Intelligence
Association that provides direct interface with
directors of IC Agencies & Services
• Queen’s University Policy Advisory Board to the
Canadian Privy Council Office (Canadian West
Wing)
• Trained as an Army Strategist 6Z
• Trained and Experienced Electronic Warfare
Officer: Worked with Electronic Warfare,
SIGINT and Cyber Operations for 29 years
• Trained in Certified Information Systems
Security Professional (CISSP)
• 15 Years experience in analysis and policy
support; 27 years experience in leading projects
and programs; 13 years experience in facilitating
key leadership and decision making processes; 8
years experience in leading participation of
reports/briefings briefed at the POTUS,
Congressional and SECDEF level
Accomplishments
• Deputy Commander of US Army
Intelligence and Security Command
• Previously on NSA Advisory Board
• Over 34 years lead or participated in 42
large IT projects and programs in/out of
government
• Consultant with DIA Defense Clandestine
Service (DCS) Office of Technical
Operations (OTO), making specialized
systems, training, organization and career
progression and use/employment of Cyber
and Cyber support. This resulted in the
creation of the Technology Intelligence
Officers for DIA
• With three companies as Director of Cyber
and Intelligence Operations
• Joint Staff Officer at JSOC & PACOM
• Distinguished Service Medal
• In charge of several Warfighters and
Mission Rehearsal Exercises as it pertained
to scenario development that included
1
David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
IO/Cyber and Biometrics
• Industry Experience: Provided strategic planning for Computer Sciences Corporation,
SOSi, Sotera, DIA Defense Clandestine Service Office of Technical Operations and NSA.
Created Cyber weapons and tools for use by the USG. Worked with Special Mission Units
that work undisclosed Cyber operations. All of the items described below were based on
warfighter requirements generated in different documents or capabilities the warfighter
recognized as something they needed.
• Sep 2015 – March 2016: Lead Strategic CI Analyst for Supply Chain Risk
Management, Office of Counterintelligence, DIA
Lead a team that produced the most read product of DIA in 2nd
Quarter FY 2016. Provided
input for the Presidential Daily Brief (PDB). Served as the lead for Interagency Cyber
Working Group, created 3 new strategic relationships for DIA.
• Jan 2014 – March 2015: Manager, Intelligence Requirements for SOS International
working Cyber and Intelligence Issues: Created a new language test to support specialized
SIGINT and Cyber Operations. Developed new processes that use social media to provide
situational awareness, force protection, battle damage assessment and source/investigative
lead development.
• July 2012 to 2 Sep 2013: Director, Cyber and Intelligence Operations at Sotera Defense
Solutions. Responsibility and Accomplishments: Oversight of all Cyber and Intel OPS.
Continued to create new capabilities and aid in adjusting policy in support to DIA DCS OTO.
To support Controlled Technical services, help create the career field for Technology
Intelligence Offers that require 83 weeks to train and work with Cyber issues and equipment.
Developed the technical solution to initially win the Electronic Warfare Planning
Management Tool ($97.6 million) contract that was later lost on protest. Won the INSCOM
GISS contract the capture and proposal lead but was working for SOSi when win was
announced. Supported work for INSCOM Red Disk at Fort Gordon, VA that involved Cyber
support. Made recommendations to DIA policy writers how DCS HUMINT all and CI could
support Cyber and vice versa. DIR DIA directed that all policy for Cyber had to be
coordinated with me.
• Additional Experience during this time: Provided classified support to Special Assistant to
the President
• July 2009 – June 2012: Account Executive, Army & Intelligence Operations.
Responsibility and Accomplishments at CSC: Provided strategic guidance and the corporation
level and client support at the business level. CSC operates 6 Security Operations Centers
around the world and provides Cyber Support and Cybersecuirty to the Australian Forces, Banks
in over 50 countries and other wide capabilities. Given bonus and pay raise for increasing CSCs
cyber capabilities and offerings. Provided the mission and threat advice to Eagle Alliance, which
provides all the IT support for NSA. PM in support of DA G2 and USD (I) on classified
2
David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
capabilities. Consultant to DIA Defense Clandestine Service Office of Technical Operations to
help implement a Level III Acquisition Program and the associated policy issues. Worked these
issues with other services, agencies and Combatant Commands. Developed a Level III
Acquisition Program for Controlled Technical Services. Provide DIA Defense Clandestine
Services Office of Technical Operations the exploitation of indigenous sensors. Brought together
multidiscipline intel to support to the government (Cyber, SIGINT, IMINT, OSINT, HUMINT,
GEOINT, and MASINT disciplines; all-source analysis; identity intelligence/biometrics and,
intelligence operations research). Created a cyber weapon/tool that is used by both J5
USCYBERCOMMAND and NSA TAO. Aided CSC employees that were writing policy
documents for Homeland Security, DIA, NSA, NGA and Army Intelligence. Was used by the
corporate headquarters to harmonize and synchronize our policy support so it was more helpful to
the US government.
• 2009 - 2012: Owner, Airborne Ranger Construction in Tucson, Arizona. Learned to
prioritize and manage projects at a more finite level than I did in the military and built a
Cyber range at Canon Air Force Base in Clovis, NM.
Military Experience:
• Summary of Cyber and SIGINT experience: 17 years Cyber experience in policy
formulation, interpretation and employment of Cyber capabilities and 25 years
experience with SIGINT. Beginning at JSOC in 1999, developed and aided in the
formulation of Cyber Policy so that JSOC could use Cyber, then called Information
Operations, to be integrated into exercises and later real world operations. As the
USAEREUR G2 for Architecture, worked to employ SIGINT and Cyber in operations for
support of operations in Bosnia; Kosovo; Afghanistan; Iraq and other locations. As the
Deputy Commander of INSCOM, one of the primary duties became the development and
creation of the US Army Cyber Command, on line counterintelligence, as well as aiding in
the creation and delineation of Cyber Capabilities across the military to include the later
formation of the 780th
Cyber Brigade, expansion and realignment of the 1st
Information
Operations Command to support the Army and SOCOM/JSOC and the later creation of the
JSOC CNO Squadron. In industry, continued to help develop policy to for Human
Intelligence to support Cyber and Cyber to support CI/HUMINT. Also aided in the creation
and fielding of several Cyber Capabilities currently used by J3 and J5 USCYBERCOM as
well as NSA TAO. All of these required knowledge of PPDs, NSDPs, HSPDs, PPD-20,
PPD-28, NSPD 38 as well as well as HSPD 23 and helped to provide input into their
formation over the years.
3
David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
• 2007 – 2009 Deputy Commander US Army Intelligence and Security Command:
Selected by the Army Intelligence Senior Leaders to be the Deputy Commander of INSCOM.
Uniquely qualified due to experience in Cyber policy formulation, force structure,
development of programs and projects. The G2 of the Army directed I was to oversee all
changes to Cyber Policy, USSIDS and other pertinent policies for two years and was in
charge of Congressional liaison for INSCOM. Ensured that INSCOM developed its’ own
robust Cyber policy and planning capability. Often coordinated directly with DIR NSA,
OSD Staff and other IC agencies that included who would be in charge of Cyber in the US
Army, how INSCOM would support and deconflict between US Army Cyber, US Cyber
Command, NSA, Combatant Commands, Army Component Commands, and Special
Mission Units. In charge of a $2.2 billion budget with 16,000 personnel. Provided policy
and/or intelligence analysis as required by the National Command Authority. Coordinated
these issues with other Congress, other agencies and services as well as combatant
commands. Directed to aid in fixes to HUMINT/CI; IT architecture; contracts and moving
enduring missions to based funding. Also had to explain the online CI concept and protect it
from other agencies. This required direct coordination with DIR NSA and explaining how the
documents and policies at the time permitted this kind of operation. Convinced all agencies
involved that the Army Field Support Command, later that Army Operations Group could
support Cyber through CI/HUMINT means that was adopted and currently practiced today.
All of this was based on warfighter requirements.
• June 2002 – June 2007 USAREUR G2 Plans, Ops and Architecture: Tasked to aid in the
development of the Architecture in Afghanistan because of demonstrated expertise in
USAREUR, created a project to improve the architecture in Afghanistan that included how
SIGINT and Cyber could better support operations given the state of policy at that time.
Personally tasked by the CG USAREUR with writing the scenaribecaos for all mission
rehearsal exercises of all deploying units using 95% real world intelligence and to
incorporate real world SIGINT and Cyber/Information Operations into the exercise. One of
the items injected into the exercise was thumb drives being sold locally, everyone laughed
that would not happen but once the unit was in Afghanistan they discovered classified thumb
drives being sold at the local market. Aided in the implementation of certain special access
capabilities for intelligence collection that used both SIGINT and Cyber for ACCM and
Once again, this required careful understanding of policies, as they existed at the time.
Developed theater and Army Service component policy and foreign engagement places,
procedures and regulations for USAREUR G3 for Crisis Action Team and G2 (SIGINT,
Cyber and HUMINT Operations, and Contract Oversight). Directed by the CG USAREUR to
lead the USAREUR G3 Crisis Action Team for 7 months to include mitigation of Cyber
4
David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
threats and performed command and control of the 173rd Abn Bde and its’ hand over to
SOCCENT CG for parachute jump into Iraq. Had to assess and downsize USAREUR
projects constantly. Reduced from 800 contractors down to 200 over a 5 year period. This
was based on operational warfighter requirements and the lessening of those requirements
due to our presence in Kosovo, Bosnia and our ability to be more effective and efficient with
new systems and programs. All of this was based on Warfighter requirements. Member of the
Polo Step Planning Group
• JSOC J2 Plans and OPS June 1999 – June 2001: Aided the JSOC J3 Information
Operations Officer, now MG John Davis, in the planning what is now called Cyber in JSOC
exercises. This required direct coordination with the SECDEF and his staff, NSA and other
Intelligence organizations to include White House Advisors. Initially everything was on
closed systems and PDAS. Aided in the interpretation of policy from the JSOC and SOCOM
perspective, particularly with NSA and OSD. This required work from the law and abstract
policy level to implementation at the same time. The policy documents at that time were
more primitive and it was difficult to explain the national security objectives and how JSOC
could achieve those objectives through various Cyber/Information Operations and SIGINT
capabilities. It truly required reading all USC Title 10, 50, 20 and 18 as well as the other
existing policy documents at that time. Then proving with our exercise applications the
validity and requirement for Cyber/Information Operations. Those operations could be
controlled without collateral damage. This involved briefings to the SECDEF, his staff, NSA
and Congressional Liaison. This required development, assessment and implementation of
several classified projects that were SAP, STO and others. Some slides about these
capabilities and exercises were briefed to POTUS. All of this was based on warfighter
requirements.
• June 2001 – June 2002 Visiting Defence Fellow at Queen’s University, Kingston,
Ontario, Canada and Completion of the US Army War College: Assigned to a think
Tank in Canada that supported the Prime Minister’s Cabinet, the Privy Council Office
(Canada’s West Wing), the Chief of the Canadian Defense Staff, Canada’s NATO
representative, Canada’s Doctrine Command and the Royal Military Academy. Provided
policy advice to several ministers and the prime minister that became classified because the
Canadian government did now want the Canadian public to know they were receiving policy
advice from an American serving officer. Aided in the redesign of the Canadian National
Military Command Center and the Privy Council Office with systems that could aid them in
the Global War On Terrorism and with SIGINT and sanitized Cyber information/intelligence
for the Prime Minister and tactical forces. Often reported directly to DEPSECSTATE
Armitage as well as the NSA front office. Read on to the Canadian Official Secrets act and
5
David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
was often put in awkward situations that required careful coordination with NSA, CIA and
the American Embassy. Made policy recommendations concerning Canadian Foreign and
Intelligence Policy with the United States, China, Iran, Kosovo, NATO and Bosnia. Selected by
Canada and US State Department to be an Elections Supervisor in Kosovo.
• Additional Military Experience: Helped develop national level policies at a Combatant
Command, Army Service Component Command, Joint Special Operations Command, and
two battalions deployed (Haiti and Bosnia)
• Future Technologies: Led intelligence community coordination for several Cyber projects
that included DARPA projects, JCTDs, and developing future architecture for an ASCC and
US Army INSCOM, DIA DCS OTO and included biometrics and identity intelligence
• Training: Army Manpower Management Course, PPBES Course, Financial Management of
Intelligence Training, Contract Officer Representative Course, Collection Management and
Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare
Course (Ft Huachuca), US Army Targeting Course, Collection Manager Course, Military
Intelligence Transition Course, Infantry Officer Basic and Advance Course, Command and
General Staff Course, Armed Forces Staff College, US Army Ranger Course, US Army
Jumpmaster Course, Air Assault School, Army G2 and Commanders Course, IMINT
Familiarization Course, trained through unit MTTs Counterintelligence Force Protection
Source Operations (CFSO), Joint Services Interrogation Operations Course (JSIO) UK, G2
CI/HUMINT Familiarization Course, , Counter Surveillance Training MTT, Reid Deception
Detection Training, US Army Mortar Officer Course; Italian Parachute School; Graduate of
the US Army Strategic Planner’s Course. Managed Quickfix Electronic Warfare helicopters
as S3 for 125th
MI Bn, G2 25th
ID for Cobra Gold 1995 in Thailand.
• Charities:
o President, National Military Intelligence Foundation. NMIF provides
scholarships to individuals interested in a career in the Intelligence Community. The
National Military Intelligence Association (NMIA) is a national association of
intelligence professionals.
o Board Member, National Military Intelligence Association. NMIA is dedicated to
the support of U.S. security. NMIA seeks to stimulate awareness of the need for
effective military intelligence as a critical component of national security.
o Board Member Global Centurion. Provide guidance to Global Centurion that
provides policy and training support to the Secretary of Defense concerning Human
Trafficking.
6
David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
was often put in awkward situations that required careful coordination with NSA, CIA and
the American Embassy. Made policy recommendations concerning Canadian Foreign and
Intelligence Policy with the United States, China, Iran, Kosovo, NATO and Bosnia. Selected by
Canada and US State Department to be an Elections Supervisor in Kosovo.
• Additional Military Experience: Helped develop national level policies at a Combatant
Command, Army Service Component Command, Joint Special Operations Command, and
two battalions deployed (Haiti and Bosnia)
• Future Technologies: Led intelligence community coordination for several Cyber projects
that included DARPA projects, JCTDs, and developing future architecture for an ASCC and
US Army INSCOM, DIA DCS OTO and included biometrics and identity intelligence
• Training: Army Manpower Management Course, PPBES Course, Financial Management of
Intelligence Training, Contract Officer Representative Course, Collection Management and
Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare
Course (Ft Huachuca), US Army Targeting Course, Collection Manager Course, Military
Intelligence Transition Course, Infantry Officer Basic and Advance Course, Command and
General Staff Course, Armed Forces Staff College, US Army Ranger Course, US Army
Jumpmaster Course, Air Assault School, Army G2 and Commanders Course, IMINT
Familiarization Course, trained through unit MTTs Counterintelligence Force Protection
Source Operations (CFSO), Joint Services Interrogation Operations Course (JSIO) UK, G2
CI/HUMINT Familiarization Course, , Counter Surveillance Training MTT, Reid Deception
Detection Training, US Army Mortar Officer Course; Italian Parachute School; Graduate of
the US Army Strategic Planner’s Course. Managed Quickfix Electronic Warfare helicopters
as S3 for 125th
MI Bn, G2 25th
ID for Cobra Gold 1995 in Thailand.
• Charities:
o President, National Military Intelligence Foundation. NMIF provides
scholarships to individuals interested in a career in the Intelligence Community. The
National Military Intelligence Association (NMIA) is a national association of
intelligence professionals.
o Board Member, National Military Intelligence Association. NMIA is dedicated to
the support of U.S. security. NMIA seeks to stimulate awareness of the need for
effective military intelligence as a critical component of national security.
o Board Member Global Centurion. Provide guidance to Global Centurion that
provides policy and training support to the Secretary of Defense concerning Human
Trafficking.
6

More Related Content

What's hot

Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsJack Whitsitt
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?Thomas Malmberg
 
Yours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceYours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceJack Whitsitt
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
ASIS NYC InT Presentation
ASIS NYC InT PresentationASIS NYC InT Presentation
ASIS NYC InT PresentationDaniel McGarvey
 

What's hot (6)

Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication Skills
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?
 
Yours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceYours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem Space
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
ASIS NYC InT Presentation
ASIS NYC InT PresentationASIS NYC InT Presentation
ASIS NYC InT Presentation
 

Similar to HaleResume28June2016

AL+T_Magazine-Faces_of_the_Force-PdM-I3MP_JAN-MAR17
AL+T_Magazine-Faces_of_the_Force-PdM-I3MP_JAN-MAR17AL+T_Magazine-Faces_of_the_Force-PdM-I3MP_JAN-MAR17
AL+T_Magazine-Faces_of_the_Force-PdM-I3MP_JAN-MAR17Scott Sundsvold
 
David pitts executive resume-2016
David pitts executive resume-2016David pitts executive resume-2016
David pitts executive resume-2016David Pitts
 
NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017Bobby L. Sheppard
 
Blue and Gray Berets H4D Final Presentation
Blue and Gray Berets H4D Final PresentationBlue and Gray Berets H4D Final Presentation
Blue and Gray Berets H4D Final PresentationH4Diadmin
 
CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2chris wright
 
John Mullens Resume
John Mullens ResumeJohn Mullens Resume
John Mullens ResumeJohn Mullens
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins ResumePaul Mullins
 
Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson
 
David Raymond Resume 2015
David Raymond Resume 2015David Raymond Resume 2015
David Raymond Resume 2015Dave Raymond
 
Itsm Fusion Final
Itsm Fusion FinalItsm Fusion Final
Itsm Fusion Finaldjaehnig
 
CyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALCyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALdjnonstp
 
Ernest Kyle Oliver Resume Final
Ernest Kyle Oliver Resume FinalErnest Kyle Oliver Resume Final
Ernest Kyle Oliver Resume FinalErnest Oliver
 
Ernest Kyle Oliver Resume Final
Ernest Kyle Oliver Resume FinalErnest Kyle Oliver Resume Final
Ernest Kyle Oliver Resume FinalErnest Oliver
 
Merkle,_William-Professional_Resume
Merkle,_William-Professional_ResumeMerkle,_William-Professional_Resume
Merkle,_William-Professional_ResumeWilliam Merkle
 
Ernest kyle oliver resume final
Ernest kyle oliver resume finalErnest kyle oliver resume final
Ernest kyle oliver resume finalErnest Oliver
 

Similar to HaleResume28June2016 (20)

H4d DOD 101 workshop 040516
H4d DOD 101 workshop 040516H4d DOD 101 workshop 040516
H4d DOD 101 workshop 040516
 
AL+T_Magazine-Faces_of_the_Force-PdM-I3MP_JAN-MAR17
AL+T_Magazine-Faces_of_the_Force-PdM-I3MP_JAN-MAR17AL+T_Magazine-Faces_of_the_Force-PdM-I3MP_JAN-MAR17
AL+T_Magazine-Faces_of_the_Force-PdM-I3MP_JAN-MAR17
 
David pitts executive resume-2016
David pitts executive resume-2016David pitts executive resume-2016
David pitts executive resume-2016
 
NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017
 
Siek 2016v3 (003)
Siek 2016v3 (003)Siek 2016v3 (003)
Siek 2016v3 (003)
 
Gregory C. Witcher Full CV
Gregory C. Witcher Full CV Gregory C. Witcher Full CV
Gregory C. Witcher Full CV
 
Dossier 2008 V3
Dossier 2008 V3Dossier 2008 V3
Dossier 2008 V3
 
Blue and Gray Berets H4D Final Presentation
Blue and Gray Berets H4D Final PresentationBlue and Gray Berets H4D Final Presentation
Blue and Gray Berets H4D Final Presentation
 
CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2
 
John Mullens Resume
John Mullens ResumeJohn Mullens Resume
John Mullens Resume
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
 
Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson Resume 2016
Christina Carson Resume 2016
 
David Raymond Resume 2015
David Raymond Resume 2015David Raymond Resume 2015
David Raymond Resume 2015
 
Itsm Fusion Final
Itsm Fusion FinalItsm Fusion Final
Itsm Fusion Final
 
CyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALCyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINAL
 
Ernest Kyle Oliver Resume Final
Ernest Kyle Oliver Resume FinalErnest Kyle Oliver Resume Final
Ernest Kyle Oliver Resume Final
 
Ernest Kyle Oliver Resume Final
Ernest Kyle Oliver Resume FinalErnest Kyle Oliver Resume Final
Ernest Kyle Oliver Resume Final
 
Merkle,_William-Professional_Resume
Merkle,_William-Professional_ResumeMerkle,_William-Professional_Resume
Merkle,_William-Professional_Resume
 
Cyber Lead
Cyber LeadCyber Lead
Cyber Lead
 
Ernest kyle oliver resume final
Ernest kyle oliver resume finalErnest kyle oliver resume final
Ernest kyle oliver resume final
 

HaleResume28June2016

  • 1. David Hale PMP, ITIL Version 3 certified TS/SCI with CI Poly Tel: (571) 484-6530 dhalejr@hotmail.com Experience Summary • 30 Years military experience and seven years industry experience • 23 Years Intelligence, Cyber and Identity Intelligence Experience • 17 Years’ experience working and coordinating policy issues involving Cyber, SIGINT, Biometrics, Identity Intelligence, Controlled Technical Services and Clandestine Tradecraft • Three years’ experience working directly for the Commanding General of US Army Europe to conduct Mission Rehearsal Exercises • 5 Years Comptroller Experience ($2.4B Budget) • 6 Years working Cyber Issues in Industry • Managed and worked the fielding of 41 Large IT Projects • Previous Owner, Airborne Ranger Construction (sold DEC 2012) Security Clearance TS Clearance until Jan 19 NOV 2017 • Clearance date 19 NOV 2012 • CI Poly 24 Feb 2016 • Spent 5 years providing Focal Point support and was a focal point officer • 11 years read on to ACCM Education • Visiting Defence Fellow For Queen’s University Kingston, Ontario, Canada and completed the U.S. Army War College, 2002 • Masters of Business Administration, (Boston University), 1991 • Bachelor of Science, Public Management (University of Arizona), 1979 • PMP Certified, August 2015 • ITIL Version 3 Certified Additional Info: • Board of Directors, National Military Intelligence Association that provides direct interface with directors of IC Agencies & Services • Queen’s University Policy Advisory Board to the Canadian Privy Council Office (Canadian West Wing) • Trained as an Army Strategist 6Z • Trained and Experienced Electronic Warfare Officer: Worked with Electronic Warfare, SIGINT and Cyber Operations for 29 years • Trained in Certified Information Systems Security Professional (CISSP) • 15 Years experience in analysis and policy support; 27 years experience in leading projects and programs; 13 years experience in facilitating key leadership and decision making processes; 8 years experience in leading participation of reports/briefings briefed at the POTUS, Congressional and SECDEF level Accomplishments • Deputy Commander of US Army Intelligence and Security Command • Previously on NSA Advisory Board • Over 34 years lead or participated in 42 large IT projects and programs in/out of government • Consultant with DIA Defense Clandestine Service (DCS) Office of Technical Operations (OTO), making specialized systems, training, organization and career progression and use/employment of Cyber and Cyber support. This resulted in the creation of the Technology Intelligence Officers for DIA • With three companies as Director of Cyber and Intelligence Operations • Joint Staff Officer at JSOC & PACOM • Distinguished Service Medal • In charge of several Warfighters and Mission Rehearsal Exercises as it pertained to scenario development that included 1
  • 2. David Hale PMP, ITIL Version 3 certified TS/SCI with CI Poly Tel: (571) 484-6530 dhalejr@hotmail.com IO/Cyber and Biometrics • Industry Experience: Provided strategic planning for Computer Sciences Corporation, SOSi, Sotera, DIA Defense Clandestine Service Office of Technical Operations and NSA. Created Cyber weapons and tools for use by the USG. Worked with Special Mission Units that work undisclosed Cyber operations. All of the items described below were based on warfighter requirements generated in different documents or capabilities the warfighter recognized as something they needed. • Sep 2015 – March 2016: Lead Strategic CI Analyst for Supply Chain Risk Management, Office of Counterintelligence, DIA Lead a team that produced the most read product of DIA in 2nd Quarter FY 2016. Provided input for the Presidential Daily Brief (PDB). Served as the lead for Interagency Cyber Working Group, created 3 new strategic relationships for DIA. • Jan 2014 – March 2015: Manager, Intelligence Requirements for SOS International working Cyber and Intelligence Issues: Created a new language test to support specialized SIGINT and Cyber Operations. Developed new processes that use social media to provide situational awareness, force protection, battle damage assessment and source/investigative lead development. • July 2012 to 2 Sep 2013: Director, Cyber and Intelligence Operations at Sotera Defense Solutions. Responsibility and Accomplishments: Oversight of all Cyber and Intel OPS. Continued to create new capabilities and aid in adjusting policy in support to DIA DCS OTO. To support Controlled Technical services, help create the career field for Technology Intelligence Offers that require 83 weeks to train and work with Cyber issues and equipment. Developed the technical solution to initially win the Electronic Warfare Planning Management Tool ($97.6 million) contract that was later lost on protest. Won the INSCOM GISS contract the capture and proposal lead but was working for SOSi when win was announced. Supported work for INSCOM Red Disk at Fort Gordon, VA that involved Cyber support. Made recommendations to DIA policy writers how DCS HUMINT all and CI could support Cyber and vice versa. DIR DIA directed that all policy for Cyber had to be coordinated with me. • Additional Experience during this time: Provided classified support to Special Assistant to the President • July 2009 – June 2012: Account Executive, Army & Intelligence Operations. Responsibility and Accomplishments at CSC: Provided strategic guidance and the corporation level and client support at the business level. CSC operates 6 Security Operations Centers around the world and provides Cyber Support and Cybersecuirty to the Australian Forces, Banks in over 50 countries and other wide capabilities. Given bonus and pay raise for increasing CSCs cyber capabilities and offerings. Provided the mission and threat advice to Eagle Alliance, which provides all the IT support for NSA. PM in support of DA G2 and USD (I) on classified 2
  • 3. David Hale PMP, ITIL Version 3 certified TS/SCI with CI Poly Tel: (571) 484-6530 dhalejr@hotmail.com capabilities. Consultant to DIA Defense Clandestine Service Office of Technical Operations to help implement a Level III Acquisition Program and the associated policy issues. Worked these issues with other services, agencies and Combatant Commands. Developed a Level III Acquisition Program for Controlled Technical Services. Provide DIA Defense Clandestine Services Office of Technical Operations the exploitation of indigenous sensors. Brought together multidiscipline intel to support to the government (Cyber, SIGINT, IMINT, OSINT, HUMINT, GEOINT, and MASINT disciplines; all-source analysis; identity intelligence/biometrics and, intelligence operations research). Created a cyber weapon/tool that is used by both J5 USCYBERCOMMAND and NSA TAO. Aided CSC employees that were writing policy documents for Homeland Security, DIA, NSA, NGA and Army Intelligence. Was used by the corporate headquarters to harmonize and synchronize our policy support so it was more helpful to the US government. • 2009 - 2012: Owner, Airborne Ranger Construction in Tucson, Arizona. Learned to prioritize and manage projects at a more finite level than I did in the military and built a Cyber range at Canon Air Force Base in Clovis, NM. Military Experience: • Summary of Cyber and SIGINT experience: 17 years Cyber experience in policy formulation, interpretation and employment of Cyber capabilities and 25 years experience with SIGINT. Beginning at JSOC in 1999, developed and aided in the formulation of Cyber Policy so that JSOC could use Cyber, then called Information Operations, to be integrated into exercises and later real world operations. As the USAEREUR G2 for Architecture, worked to employ SIGINT and Cyber in operations for support of operations in Bosnia; Kosovo; Afghanistan; Iraq and other locations. As the Deputy Commander of INSCOM, one of the primary duties became the development and creation of the US Army Cyber Command, on line counterintelligence, as well as aiding in the creation and delineation of Cyber Capabilities across the military to include the later formation of the 780th Cyber Brigade, expansion and realignment of the 1st Information Operations Command to support the Army and SOCOM/JSOC and the later creation of the JSOC CNO Squadron. In industry, continued to help develop policy to for Human Intelligence to support Cyber and Cyber to support CI/HUMINT. Also aided in the creation and fielding of several Cyber Capabilities currently used by J3 and J5 USCYBERCOM as well as NSA TAO. All of these required knowledge of PPDs, NSDPs, HSPDs, PPD-20, PPD-28, NSPD 38 as well as well as HSPD 23 and helped to provide input into their formation over the years. 3
  • 4. David Hale PMP, ITIL Version 3 certified TS/SCI with CI Poly Tel: (571) 484-6530 dhalejr@hotmail.com • 2007 – 2009 Deputy Commander US Army Intelligence and Security Command: Selected by the Army Intelligence Senior Leaders to be the Deputy Commander of INSCOM. Uniquely qualified due to experience in Cyber policy formulation, force structure, development of programs and projects. The G2 of the Army directed I was to oversee all changes to Cyber Policy, USSIDS and other pertinent policies for two years and was in charge of Congressional liaison for INSCOM. Ensured that INSCOM developed its’ own robust Cyber policy and planning capability. Often coordinated directly with DIR NSA, OSD Staff and other IC agencies that included who would be in charge of Cyber in the US Army, how INSCOM would support and deconflict between US Army Cyber, US Cyber Command, NSA, Combatant Commands, Army Component Commands, and Special Mission Units. In charge of a $2.2 billion budget with 16,000 personnel. Provided policy and/or intelligence analysis as required by the National Command Authority. Coordinated these issues with other Congress, other agencies and services as well as combatant commands. Directed to aid in fixes to HUMINT/CI; IT architecture; contracts and moving enduring missions to based funding. Also had to explain the online CI concept and protect it from other agencies. This required direct coordination with DIR NSA and explaining how the documents and policies at the time permitted this kind of operation. Convinced all agencies involved that the Army Field Support Command, later that Army Operations Group could support Cyber through CI/HUMINT means that was adopted and currently practiced today. All of this was based on warfighter requirements. • June 2002 – June 2007 USAREUR G2 Plans, Ops and Architecture: Tasked to aid in the development of the Architecture in Afghanistan because of demonstrated expertise in USAREUR, created a project to improve the architecture in Afghanistan that included how SIGINT and Cyber could better support operations given the state of policy at that time. Personally tasked by the CG USAREUR with writing the scenaribecaos for all mission rehearsal exercises of all deploying units using 95% real world intelligence and to incorporate real world SIGINT and Cyber/Information Operations into the exercise. One of the items injected into the exercise was thumb drives being sold locally, everyone laughed that would not happen but once the unit was in Afghanistan they discovered classified thumb drives being sold at the local market. Aided in the implementation of certain special access capabilities for intelligence collection that used both SIGINT and Cyber for ACCM and Once again, this required careful understanding of policies, as they existed at the time. Developed theater and Army Service component policy and foreign engagement places, procedures and regulations for USAREUR G3 for Crisis Action Team and G2 (SIGINT, Cyber and HUMINT Operations, and Contract Oversight). Directed by the CG USAREUR to lead the USAREUR G3 Crisis Action Team for 7 months to include mitigation of Cyber 4
  • 5. David Hale PMP, ITIL Version 3 certified TS/SCI with CI Poly Tel: (571) 484-6530 dhalejr@hotmail.com threats and performed command and control of the 173rd Abn Bde and its’ hand over to SOCCENT CG for parachute jump into Iraq. Had to assess and downsize USAREUR projects constantly. Reduced from 800 contractors down to 200 over a 5 year period. This was based on operational warfighter requirements and the lessening of those requirements due to our presence in Kosovo, Bosnia and our ability to be more effective and efficient with new systems and programs. All of this was based on Warfighter requirements. Member of the Polo Step Planning Group • JSOC J2 Plans and OPS June 1999 – June 2001: Aided the JSOC J3 Information Operations Officer, now MG John Davis, in the planning what is now called Cyber in JSOC exercises. This required direct coordination with the SECDEF and his staff, NSA and other Intelligence organizations to include White House Advisors. Initially everything was on closed systems and PDAS. Aided in the interpretation of policy from the JSOC and SOCOM perspective, particularly with NSA and OSD. This required work from the law and abstract policy level to implementation at the same time. The policy documents at that time were more primitive and it was difficult to explain the national security objectives and how JSOC could achieve those objectives through various Cyber/Information Operations and SIGINT capabilities. It truly required reading all USC Title 10, 50, 20 and 18 as well as the other existing policy documents at that time. Then proving with our exercise applications the validity and requirement for Cyber/Information Operations. Those operations could be controlled without collateral damage. This involved briefings to the SECDEF, his staff, NSA and Congressional Liaison. This required development, assessment and implementation of several classified projects that were SAP, STO and others. Some slides about these capabilities and exercises were briefed to POTUS. All of this was based on warfighter requirements. • June 2001 – June 2002 Visiting Defence Fellow at Queen’s University, Kingston, Ontario, Canada and Completion of the US Army War College: Assigned to a think Tank in Canada that supported the Prime Minister’s Cabinet, the Privy Council Office (Canada’s West Wing), the Chief of the Canadian Defense Staff, Canada’s NATO representative, Canada’s Doctrine Command and the Royal Military Academy. Provided policy advice to several ministers and the prime minister that became classified because the Canadian government did now want the Canadian public to know they were receiving policy advice from an American serving officer. Aided in the redesign of the Canadian National Military Command Center and the Privy Council Office with systems that could aid them in the Global War On Terrorism and with SIGINT and sanitized Cyber information/intelligence for the Prime Minister and tactical forces. Often reported directly to DEPSECSTATE Armitage as well as the NSA front office. Read on to the Canadian Official Secrets act and 5
  • 6. David Hale PMP, ITIL Version 3 certified TS/SCI with CI Poly Tel: (571) 484-6530 dhalejr@hotmail.com was often put in awkward situations that required careful coordination with NSA, CIA and the American Embassy. Made policy recommendations concerning Canadian Foreign and Intelligence Policy with the United States, China, Iran, Kosovo, NATO and Bosnia. Selected by Canada and US State Department to be an Elections Supervisor in Kosovo. • Additional Military Experience: Helped develop national level policies at a Combatant Command, Army Service Component Command, Joint Special Operations Command, and two battalions deployed (Haiti and Bosnia) • Future Technologies: Led intelligence community coordination for several Cyber projects that included DARPA projects, JCTDs, and developing future architecture for an ASCC and US Army INSCOM, DIA DCS OTO and included biometrics and identity intelligence • Training: Army Manpower Management Course, PPBES Course, Financial Management of Intelligence Training, Contract Officer Representative Course, Collection Management and Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare Course (Ft Huachuca), US Army Targeting Course, Collection Manager Course, Military Intelligence Transition Course, Infantry Officer Basic and Advance Course, Command and General Staff Course, Armed Forces Staff College, US Army Ranger Course, US Army Jumpmaster Course, Air Assault School, Army G2 and Commanders Course, IMINT Familiarization Course, trained through unit MTTs Counterintelligence Force Protection Source Operations (CFSO), Joint Services Interrogation Operations Course (JSIO) UK, G2 CI/HUMINT Familiarization Course, , Counter Surveillance Training MTT, Reid Deception Detection Training, US Army Mortar Officer Course; Italian Parachute School; Graduate of the US Army Strategic Planner’s Course. Managed Quickfix Electronic Warfare helicopters as S3 for 125th MI Bn, G2 25th ID for Cobra Gold 1995 in Thailand. • Charities: o President, National Military Intelligence Foundation. NMIF provides scholarships to individuals interested in a career in the Intelligence Community. The National Military Intelligence Association (NMIA) is a national association of intelligence professionals. o Board Member, National Military Intelligence Association. NMIA is dedicated to the support of U.S. security. NMIA seeks to stimulate awareness of the need for effective military intelligence as a critical component of national security. o Board Member Global Centurion. Provide guidance to Global Centurion that provides policy and training support to the Secretary of Defense concerning Human Trafficking. 6
  • 7. David Hale PMP, ITIL Version 3 certified TS/SCI with CI Poly Tel: (571) 484-6530 dhalejr@hotmail.com was often put in awkward situations that required careful coordination with NSA, CIA and the American Embassy. Made policy recommendations concerning Canadian Foreign and Intelligence Policy with the United States, China, Iran, Kosovo, NATO and Bosnia. Selected by Canada and US State Department to be an Elections Supervisor in Kosovo. • Additional Military Experience: Helped develop national level policies at a Combatant Command, Army Service Component Command, Joint Special Operations Command, and two battalions deployed (Haiti and Bosnia) • Future Technologies: Led intelligence community coordination for several Cyber projects that included DARPA projects, JCTDs, and developing future architecture for an ASCC and US Army INSCOM, DIA DCS OTO and included biometrics and identity intelligence • Training: Army Manpower Management Course, PPBES Course, Financial Management of Intelligence Training, Contract Officer Representative Course, Collection Management and Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare Course (Ft Huachuca), US Army Targeting Course, Collection Manager Course, Military Intelligence Transition Course, Infantry Officer Basic and Advance Course, Command and General Staff Course, Armed Forces Staff College, US Army Ranger Course, US Army Jumpmaster Course, Air Assault School, Army G2 and Commanders Course, IMINT Familiarization Course, trained through unit MTTs Counterintelligence Force Protection Source Operations (CFSO), Joint Services Interrogation Operations Course (JSIO) UK, G2 CI/HUMINT Familiarization Course, , Counter Surveillance Training MTT, Reid Deception Detection Training, US Army Mortar Officer Course; Italian Parachute School; Graduate of the US Army Strategic Planner’s Course. Managed Quickfix Electronic Warfare helicopters as S3 for 125th MI Bn, G2 25th ID for Cobra Gold 1995 in Thailand. • Charities: o President, National Military Intelligence Foundation. NMIF provides scholarships to individuals interested in a career in the Intelligence Community. The National Military Intelligence Association (NMIA) is a national association of intelligence professionals. o Board Member, National Military Intelligence Association. NMIA is dedicated to the support of U.S. security. NMIA seeks to stimulate awareness of the need for effective military intelligence as a critical component of national security. o Board Member Global Centurion. Provide guidance to Global Centurion that provides policy and training support to the Secretary of Defense concerning Human Trafficking. 6