Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Pukhraj Singh
In 2012, I led the first joint cyber operations with the Indian Air Force. Seven years too late, we have started talking about cyber jointness.
“Synergy in Joint Cyber Operations” presented at an Indian National Defence University event. The first time ever that jointness was discussed in the Indian context. Not very verbose for obvious reasons – I flagged politics and turf wars. Some shakeups are happening; the Defence Cyber Agency is up. Winds of change…
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Pukhraj Singh
In 2012, I led the first joint cyber operations with the Indian Air Force. Seven years too late, we have started talking about cyber jointness.
“Synergy in Joint Cyber Operations” presented at an Indian National Defence University event. The first time ever that jointness was discussed in the Indian context. Not very verbose for obvious reasons – I flagged politics and turf wars. Some shakeups are happening; the Defence Cyber Agency is up. Winds of change…
Effective Cybersecurity Communication SkillsJack Whitsitt
Presentation describes the problems associated with communication with others - as an information receiver or provider - about cybersecurity and provides insights into how those problems may be overcome through structured communication, the use of positive and negative space, and the setting of perspective and context through lensing.
APT or not - does it make a difference if you are compromised?Thomas Malmberg
This is my presentation from the Cyber Security Summit held in Prague 2015 at the Boscolo Prague Spa Hotel. For the missing slides and further information, contact me directly.
Yours Anecdotally: Developing a Cybersecurity Problem SpaceJack Whitsitt
Almost 70 years since the first computer bug was discovered, there has been decades of research done on Information Security theory and practice. Yet, despite vast amounts of money being spent, innumerable academic papers, mainstream media obsession, and entire industries being formed, we are left with the impression that the risk is growing, not receding. Why? Some argue a lack of data, but data clearly exists. We're likely generating it, in some areas, faster than humans will ever be able to process it. Perhaps, after all of this effort, we've managed to box ourselves into metaphors and first principles that might be inappropriately constraining how we think about "Information Security Risk". In fact, it's worth noting that we can't even agree if there is a space between "Cyber" and "Security" when it's written out. This talk will take an anecdotal look at "Information Security Risk", "Cyber<>Security", and use that perspective to suggest areas of research and data gathering that are either lacking or should be made more accessible to the markets, industries, and individuals driving risk management change. In an industry filled with data, perhaps an examination of empty space might be helpful.
Are we near the point of cyber-armageddon or are we simply engaged in a new reality of information security priorities? Are the attacks being discovered daily against private sector and public federal systems somehow unique and new, or are they simply the new reality of cyberspace? Organizations are regularly forced to make difficult decisions about how best to protect their information systems. Executives daily open the newspaper to find another example of effective cyber attacks and hacking. How do organizations know when security mechanisms are enough to keep their data safe? In an effort to answer this question and respond to mounting cyber incidents worldwide, the US federal government has been engaging in numerous efforts to secure cyberspace. But what are they and will they be enough? In this presentation James Tarala, a Senior Instructor with the SANS Institute and a Principal Consultant at Enclave Security, will describe current efforts and the tools being offered to help citizens and protect cyberspace.
Mr. Pitts is a seasoned executive, author and public speaker. His career includes 30+ years technology and operations experience with over 16 years total management experience including more than 10 in a senior role. Mr. Pitts has experience planning, developing, and implementing large distributed environments, cloud and private cloud computing platforms, utilizing resources, and managing projects and staff in such areas as government, manufacturing, healthcare, higher education, and wireless communications. He is adept at crisis management, trouble shooting, problem solving, and systems architecture. He is a trained educator, published author and an experienced public speaker. The following is a summary of what he can do for you:
• Implement complex mission-critical information technology systems across geographically diverse locations on either private or public cloud computing platforms providing high availability and high reliability, utilizing multiple hardware and software platforms working in large environments with multiple business units and field locations while maintaining a culture of innovation and success;
• Affect the bottom line through profitability improvement, budgeting, cost control, contract negotiations, vendor and supplier management;
• Lead others through training, mentoring, team building, communication, and documentation and positively influencing change for the betterment of the organization;
• Apply a well-rounded background in IT-business strategy, applications development, and systems architecture ensuring projects are successfully completed as anticipated;
• Communicate effectively with technical and business teams, end users, clients, partners and vendors applying a range of experience from hands-on technical work to operational and divisional management;
• Provide standards in information technology practices as evidenced through certifications, such as ITIL Foundation V.3, CISSP, and GSNA;
• Reach high levels of security and system assurance (Confidentiality, Availability, Integrity) through experience with audits and cyber security meeting or exceeding the requirements of Sarbanes Oxley (SOX), PCI-DSS, FISMA, and other regulatory requirements;
Effective Cybersecurity Communication SkillsJack Whitsitt
Presentation describes the problems associated with communication with others - as an information receiver or provider - about cybersecurity and provides insights into how those problems may be overcome through structured communication, the use of positive and negative space, and the setting of perspective and context through lensing.
APT or not - does it make a difference if you are compromised?Thomas Malmberg
This is my presentation from the Cyber Security Summit held in Prague 2015 at the Boscolo Prague Spa Hotel. For the missing slides and further information, contact me directly.
Yours Anecdotally: Developing a Cybersecurity Problem SpaceJack Whitsitt
Almost 70 years since the first computer bug was discovered, there has been decades of research done on Information Security theory and practice. Yet, despite vast amounts of money being spent, innumerable academic papers, mainstream media obsession, and entire industries being formed, we are left with the impression that the risk is growing, not receding. Why? Some argue a lack of data, but data clearly exists. We're likely generating it, in some areas, faster than humans will ever be able to process it. Perhaps, after all of this effort, we've managed to box ourselves into metaphors and first principles that might be inappropriately constraining how we think about "Information Security Risk". In fact, it's worth noting that we can't even agree if there is a space between "Cyber" and "Security" when it's written out. This talk will take an anecdotal look at "Information Security Risk", "Cyber<>Security", and use that perspective to suggest areas of research and data gathering that are either lacking or should be made more accessible to the markets, industries, and individuals driving risk management change. In an industry filled with data, perhaps an examination of empty space might be helpful.
Are we near the point of cyber-armageddon or are we simply engaged in a new reality of information security priorities? Are the attacks being discovered daily against private sector and public federal systems somehow unique and new, or are they simply the new reality of cyberspace? Organizations are regularly forced to make difficult decisions about how best to protect their information systems. Executives daily open the newspaper to find another example of effective cyber attacks and hacking. How do organizations know when security mechanisms are enough to keep their data safe? In an effort to answer this question and respond to mounting cyber incidents worldwide, the US federal government has been engaging in numerous efforts to secure cyberspace. But what are they and will they be enough? In this presentation James Tarala, a Senior Instructor with the SANS Institute and a Principal Consultant at Enclave Security, will describe current efforts and the tools being offered to help citizens and protect cyberspace.
Mr. Pitts is a seasoned executive, author and public speaker. His career includes 30+ years technology and operations experience with over 16 years total management experience including more than 10 in a senior role. Mr. Pitts has experience planning, developing, and implementing large distributed environments, cloud and private cloud computing platforms, utilizing resources, and managing projects and staff in such areas as government, manufacturing, healthcare, higher education, and wireless communications. He is adept at crisis management, trouble shooting, problem solving, and systems architecture. He is a trained educator, published author and an experienced public speaker. The following is a summary of what he can do for you:
• Implement complex mission-critical information technology systems across geographically diverse locations on either private or public cloud computing platforms providing high availability and high reliability, utilizing multiple hardware and software platforms working in large environments with multiple business units and field locations while maintaining a culture of innovation and success;
• Affect the bottom line through profitability improvement, budgeting, cost control, contract negotiations, vendor and supplier management;
• Lead others through training, mentoring, team building, communication, and documentation and positively influencing change for the betterment of the organization;
• Apply a well-rounded background in IT-business strategy, applications development, and systems architecture ensuring projects are successfully completed as anticipated;
• Communicate effectively with technical and business teams, end users, clients, partners and vendors applying a range of experience from hands-on technical work to operational and divisional management;
• Provide standards in information technology practices as evidenced through certifications, such as ITIL Foundation V.3, CISSP, and GSNA;
• Reach high levels of security and system assurance (Confidentiality, Availability, Integrity) through experience with audits and cyber security meeting or exceeding the requirements of Sarbanes Oxley (SOX), PCI-DSS, FISMA, and other regulatory requirements;
Resume as of 21 October 2015. Program Manager, Project Manager, Product Manager, System Engineering, System Integration, System Final Acceptance Testing for contractual requirements, Leadership
1. David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
Experience Summary
• 30 Years military experience and seven years
industry experience
• 23 Years Intelligence, Cyber and Identity
Intelligence Experience
• 17 Years’ experience working and coordinating
policy issues involving Cyber, SIGINT,
Biometrics, Identity Intelligence, Controlled
Technical Services and Clandestine Tradecraft
• Three years’ experience working directly for the
Commanding General of US Army Europe to
conduct Mission Rehearsal Exercises
• 5 Years Comptroller Experience ($2.4B Budget)
• 6 Years working Cyber Issues in Industry
• Managed and worked the fielding of 41 Large IT
Projects
• Previous Owner, Airborne Ranger Construction
(sold DEC 2012)
Security Clearance
TS Clearance until Jan 19 NOV 2017
• Clearance date 19 NOV 2012
• CI Poly 24 Feb 2016
• Spent 5 years providing Focal Point
support and was a focal point officer
• 11 years read on to ACCM
Education
• Visiting Defence Fellow For Queen’s
University Kingston, Ontario, Canada and
completed the U.S. Army War College,
2002
• Masters of Business Administration,
(Boston University), 1991
• Bachelor of Science, Public Management
(University of Arizona), 1979
• PMP Certified, August 2015
• ITIL Version 3 Certified
Additional Info:
• Board of Directors, National Military Intelligence
Association that provides direct interface with
directors of IC Agencies & Services
• Queen’s University Policy Advisory Board to the
Canadian Privy Council Office (Canadian West
Wing)
• Trained as an Army Strategist 6Z
• Trained and Experienced Electronic Warfare
Officer: Worked with Electronic Warfare,
SIGINT and Cyber Operations for 29 years
• Trained in Certified Information Systems
Security Professional (CISSP)
• 15 Years experience in analysis and policy
support; 27 years experience in leading projects
and programs; 13 years experience in facilitating
key leadership and decision making processes; 8
years experience in leading participation of
reports/briefings briefed at the POTUS,
Congressional and SECDEF level
Accomplishments
• Deputy Commander of US Army
Intelligence and Security Command
• Previously on NSA Advisory Board
• Over 34 years lead or participated in 42
large IT projects and programs in/out of
government
• Consultant with DIA Defense Clandestine
Service (DCS) Office of Technical
Operations (OTO), making specialized
systems, training, organization and career
progression and use/employment of Cyber
and Cyber support. This resulted in the
creation of the Technology Intelligence
Officers for DIA
• With three companies as Director of Cyber
and Intelligence Operations
• Joint Staff Officer at JSOC & PACOM
• Distinguished Service Medal
• In charge of several Warfighters and
Mission Rehearsal Exercises as it pertained
to scenario development that included
1
2. David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
IO/Cyber and Biometrics
• Industry Experience: Provided strategic planning for Computer Sciences Corporation,
SOSi, Sotera, DIA Defense Clandestine Service Office of Technical Operations and NSA.
Created Cyber weapons and tools for use by the USG. Worked with Special Mission Units
that work undisclosed Cyber operations. All of the items described below were based on
warfighter requirements generated in different documents or capabilities the warfighter
recognized as something they needed.
• Sep 2015 – March 2016: Lead Strategic CI Analyst for Supply Chain Risk
Management, Office of Counterintelligence, DIA
Lead a team that produced the most read product of DIA in 2nd
Quarter FY 2016. Provided
input for the Presidential Daily Brief (PDB). Served as the lead for Interagency Cyber
Working Group, created 3 new strategic relationships for DIA.
• Jan 2014 – March 2015: Manager, Intelligence Requirements for SOS International
working Cyber and Intelligence Issues: Created a new language test to support specialized
SIGINT and Cyber Operations. Developed new processes that use social media to provide
situational awareness, force protection, battle damage assessment and source/investigative
lead development.
• July 2012 to 2 Sep 2013: Director, Cyber and Intelligence Operations at Sotera Defense
Solutions. Responsibility and Accomplishments: Oversight of all Cyber and Intel OPS.
Continued to create new capabilities and aid in adjusting policy in support to DIA DCS OTO.
To support Controlled Technical services, help create the career field for Technology
Intelligence Offers that require 83 weeks to train and work with Cyber issues and equipment.
Developed the technical solution to initially win the Electronic Warfare Planning
Management Tool ($97.6 million) contract that was later lost on protest. Won the INSCOM
GISS contract the capture and proposal lead but was working for SOSi when win was
announced. Supported work for INSCOM Red Disk at Fort Gordon, VA that involved Cyber
support. Made recommendations to DIA policy writers how DCS HUMINT all and CI could
support Cyber and vice versa. DIR DIA directed that all policy for Cyber had to be
coordinated with me.
• Additional Experience during this time: Provided classified support to Special Assistant to
the President
• July 2009 – June 2012: Account Executive, Army & Intelligence Operations.
Responsibility and Accomplishments at CSC: Provided strategic guidance and the corporation
level and client support at the business level. CSC operates 6 Security Operations Centers
around the world and provides Cyber Support and Cybersecuirty to the Australian Forces, Banks
in over 50 countries and other wide capabilities. Given bonus and pay raise for increasing CSCs
cyber capabilities and offerings. Provided the mission and threat advice to Eagle Alliance, which
provides all the IT support for NSA. PM in support of DA G2 and USD (I) on classified
2
3. David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
capabilities. Consultant to DIA Defense Clandestine Service Office of Technical Operations to
help implement a Level III Acquisition Program and the associated policy issues. Worked these
issues with other services, agencies and Combatant Commands. Developed a Level III
Acquisition Program for Controlled Technical Services. Provide DIA Defense Clandestine
Services Office of Technical Operations the exploitation of indigenous sensors. Brought together
multidiscipline intel to support to the government (Cyber, SIGINT, IMINT, OSINT, HUMINT,
GEOINT, and MASINT disciplines; all-source analysis; identity intelligence/biometrics and,
intelligence operations research). Created a cyber weapon/tool that is used by both J5
USCYBERCOMMAND and NSA TAO. Aided CSC employees that were writing policy
documents for Homeland Security, DIA, NSA, NGA and Army Intelligence. Was used by the
corporate headquarters to harmonize and synchronize our policy support so it was more helpful to
the US government.
• 2009 - 2012: Owner, Airborne Ranger Construction in Tucson, Arizona. Learned to
prioritize and manage projects at a more finite level than I did in the military and built a
Cyber range at Canon Air Force Base in Clovis, NM.
Military Experience:
• Summary of Cyber and SIGINT experience: 17 years Cyber experience in policy
formulation, interpretation and employment of Cyber capabilities and 25 years
experience with SIGINT. Beginning at JSOC in 1999, developed and aided in the
formulation of Cyber Policy so that JSOC could use Cyber, then called Information
Operations, to be integrated into exercises and later real world operations. As the
USAEREUR G2 for Architecture, worked to employ SIGINT and Cyber in operations for
support of operations in Bosnia; Kosovo; Afghanistan; Iraq and other locations. As the
Deputy Commander of INSCOM, one of the primary duties became the development and
creation of the US Army Cyber Command, on line counterintelligence, as well as aiding in
the creation and delineation of Cyber Capabilities across the military to include the later
formation of the 780th
Cyber Brigade, expansion and realignment of the 1st
Information
Operations Command to support the Army and SOCOM/JSOC and the later creation of the
JSOC CNO Squadron. In industry, continued to help develop policy to for Human
Intelligence to support Cyber and Cyber to support CI/HUMINT. Also aided in the creation
and fielding of several Cyber Capabilities currently used by J3 and J5 USCYBERCOM as
well as NSA TAO. All of these required knowledge of PPDs, NSDPs, HSPDs, PPD-20,
PPD-28, NSPD 38 as well as well as HSPD 23 and helped to provide input into their
formation over the years.
3
4. David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
• 2007 – 2009 Deputy Commander US Army Intelligence and Security Command:
Selected by the Army Intelligence Senior Leaders to be the Deputy Commander of INSCOM.
Uniquely qualified due to experience in Cyber policy formulation, force structure,
development of programs and projects. The G2 of the Army directed I was to oversee all
changes to Cyber Policy, USSIDS and other pertinent policies for two years and was in
charge of Congressional liaison for INSCOM. Ensured that INSCOM developed its’ own
robust Cyber policy and planning capability. Often coordinated directly with DIR NSA,
OSD Staff and other IC agencies that included who would be in charge of Cyber in the US
Army, how INSCOM would support and deconflict between US Army Cyber, US Cyber
Command, NSA, Combatant Commands, Army Component Commands, and Special
Mission Units. In charge of a $2.2 billion budget with 16,000 personnel. Provided policy
and/or intelligence analysis as required by the National Command Authority. Coordinated
these issues with other Congress, other agencies and services as well as combatant
commands. Directed to aid in fixes to HUMINT/CI; IT architecture; contracts and moving
enduring missions to based funding. Also had to explain the online CI concept and protect it
from other agencies. This required direct coordination with DIR NSA and explaining how the
documents and policies at the time permitted this kind of operation. Convinced all agencies
involved that the Army Field Support Command, later that Army Operations Group could
support Cyber through CI/HUMINT means that was adopted and currently practiced today.
All of this was based on warfighter requirements.
• June 2002 – June 2007 USAREUR G2 Plans, Ops and Architecture: Tasked to aid in the
development of the Architecture in Afghanistan because of demonstrated expertise in
USAREUR, created a project to improve the architecture in Afghanistan that included how
SIGINT and Cyber could better support operations given the state of policy at that time.
Personally tasked by the CG USAREUR with writing the scenaribecaos for all mission
rehearsal exercises of all deploying units using 95% real world intelligence and to
incorporate real world SIGINT and Cyber/Information Operations into the exercise. One of
the items injected into the exercise was thumb drives being sold locally, everyone laughed
that would not happen but once the unit was in Afghanistan they discovered classified thumb
drives being sold at the local market. Aided in the implementation of certain special access
capabilities for intelligence collection that used both SIGINT and Cyber for ACCM and
Once again, this required careful understanding of policies, as they existed at the time.
Developed theater and Army Service component policy and foreign engagement places,
procedures and regulations for USAREUR G3 for Crisis Action Team and G2 (SIGINT,
Cyber and HUMINT Operations, and Contract Oversight). Directed by the CG USAREUR to
lead the USAREUR G3 Crisis Action Team for 7 months to include mitigation of Cyber
4
5. David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
threats and performed command and control of the 173rd Abn Bde and its’ hand over to
SOCCENT CG for parachute jump into Iraq. Had to assess and downsize USAREUR
projects constantly. Reduced from 800 contractors down to 200 over a 5 year period. This
was based on operational warfighter requirements and the lessening of those requirements
due to our presence in Kosovo, Bosnia and our ability to be more effective and efficient with
new systems and programs. All of this was based on Warfighter requirements. Member of the
Polo Step Planning Group
• JSOC J2 Plans and OPS June 1999 – June 2001: Aided the JSOC J3 Information
Operations Officer, now MG John Davis, in the planning what is now called Cyber in JSOC
exercises. This required direct coordination with the SECDEF and his staff, NSA and other
Intelligence organizations to include White House Advisors. Initially everything was on
closed systems and PDAS. Aided in the interpretation of policy from the JSOC and SOCOM
perspective, particularly with NSA and OSD. This required work from the law and abstract
policy level to implementation at the same time. The policy documents at that time were
more primitive and it was difficult to explain the national security objectives and how JSOC
could achieve those objectives through various Cyber/Information Operations and SIGINT
capabilities. It truly required reading all USC Title 10, 50, 20 and 18 as well as the other
existing policy documents at that time. Then proving with our exercise applications the
validity and requirement for Cyber/Information Operations. Those operations could be
controlled without collateral damage. This involved briefings to the SECDEF, his staff, NSA
and Congressional Liaison. This required development, assessment and implementation of
several classified projects that were SAP, STO and others. Some slides about these
capabilities and exercises were briefed to POTUS. All of this was based on warfighter
requirements.
• June 2001 – June 2002 Visiting Defence Fellow at Queen’s University, Kingston,
Ontario, Canada and Completion of the US Army War College: Assigned to a think
Tank in Canada that supported the Prime Minister’s Cabinet, the Privy Council Office
(Canada’s West Wing), the Chief of the Canadian Defense Staff, Canada’s NATO
representative, Canada’s Doctrine Command and the Royal Military Academy. Provided
policy advice to several ministers and the prime minister that became classified because the
Canadian government did now want the Canadian public to know they were receiving policy
advice from an American serving officer. Aided in the redesign of the Canadian National
Military Command Center and the Privy Council Office with systems that could aid them in
the Global War On Terrorism and with SIGINT and sanitized Cyber information/intelligence
for the Prime Minister and tactical forces. Often reported directly to DEPSECSTATE
Armitage as well as the NSA front office. Read on to the Canadian Official Secrets act and
5
6. David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
was often put in awkward situations that required careful coordination with NSA, CIA and
the American Embassy. Made policy recommendations concerning Canadian Foreign and
Intelligence Policy with the United States, China, Iran, Kosovo, NATO and Bosnia. Selected by
Canada and US State Department to be an Elections Supervisor in Kosovo.
• Additional Military Experience: Helped develop national level policies at a Combatant
Command, Army Service Component Command, Joint Special Operations Command, and
two battalions deployed (Haiti and Bosnia)
• Future Technologies: Led intelligence community coordination for several Cyber projects
that included DARPA projects, JCTDs, and developing future architecture for an ASCC and
US Army INSCOM, DIA DCS OTO and included biometrics and identity intelligence
• Training: Army Manpower Management Course, PPBES Course, Financial Management of
Intelligence Training, Contract Officer Representative Course, Collection Management and
Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare
Course (Ft Huachuca), US Army Targeting Course, Collection Manager Course, Military
Intelligence Transition Course, Infantry Officer Basic and Advance Course, Command and
General Staff Course, Armed Forces Staff College, US Army Ranger Course, US Army
Jumpmaster Course, Air Assault School, Army G2 and Commanders Course, IMINT
Familiarization Course, trained through unit MTTs Counterintelligence Force Protection
Source Operations (CFSO), Joint Services Interrogation Operations Course (JSIO) UK, G2
CI/HUMINT Familiarization Course, , Counter Surveillance Training MTT, Reid Deception
Detection Training, US Army Mortar Officer Course; Italian Parachute School; Graduate of
the US Army Strategic Planner’s Course. Managed Quickfix Electronic Warfare helicopters
as S3 for 125th
MI Bn, G2 25th
ID for Cobra Gold 1995 in Thailand.
• Charities:
o President, National Military Intelligence Foundation. NMIF provides
scholarships to individuals interested in a career in the Intelligence Community. The
National Military Intelligence Association (NMIA) is a national association of
intelligence professionals.
o Board Member, National Military Intelligence Association. NMIA is dedicated to
the support of U.S. security. NMIA seeks to stimulate awareness of the need for
effective military intelligence as a critical component of national security.
o Board Member Global Centurion. Provide guidance to Global Centurion that
provides policy and training support to the Secretary of Defense concerning Human
Trafficking.
6
7. David Hale
PMP, ITIL Version 3 certified
TS/SCI with CI Poly
Tel: (571) 484-6530
dhalejr@hotmail.com
was often put in awkward situations that required careful coordination with NSA, CIA and
the American Embassy. Made policy recommendations concerning Canadian Foreign and
Intelligence Policy with the United States, China, Iran, Kosovo, NATO and Bosnia. Selected by
Canada and US State Department to be an Elections Supervisor in Kosovo.
• Additional Military Experience: Helped develop national level policies at a Combatant
Command, Army Service Component Command, Joint Special Operations Command, and
two battalions deployed (Haiti and Bosnia)
• Future Technologies: Led intelligence community coordination for several Cyber projects
that included DARPA projects, JCTDs, and developing future architecture for an ASCC and
US Army INSCOM, DIA DCS OTO and included biometrics and identity intelligence
• Training: Army Manpower Management Course, PPBES Course, Financial Management of
Intelligence Training, Contract Officer Representative Course, Collection Management and
Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare
Course (Ft Huachuca), US Army Targeting Course, Collection Manager Course, Military
Intelligence Transition Course, Infantry Officer Basic and Advance Course, Command and
General Staff Course, Armed Forces Staff College, US Army Ranger Course, US Army
Jumpmaster Course, Air Assault School, Army G2 and Commanders Course, IMINT
Familiarization Course, trained through unit MTTs Counterintelligence Force Protection
Source Operations (CFSO), Joint Services Interrogation Operations Course (JSIO) UK, G2
CI/HUMINT Familiarization Course, , Counter Surveillance Training MTT, Reid Deception
Detection Training, US Army Mortar Officer Course; Italian Parachute School; Graduate of
the US Army Strategic Planner’s Course. Managed Quickfix Electronic Warfare helicopters
as S3 for 125th
MI Bn, G2 25th
ID for Cobra Gold 1995 in Thailand.
• Charities:
o President, National Military Intelligence Foundation. NMIF provides
scholarships to individuals interested in a career in the Intelligence Community. The
National Military Intelligence Association (NMIA) is a national association of
intelligence professionals.
o Board Member, National Military Intelligence Association. NMIA is dedicated to
the support of U.S. security. NMIA seeks to stimulate awareness of the need for
effective military intelligence as a critical component of national security.
o Board Member Global Centurion. Provide guidance to Global Centurion that
provides policy and training support to the Secretary of Defense concerning Human
Trafficking.
6