A brief to describe the NORAD and NORTHCOM missions and challenge High School students to continue pursuing Science, Technology, Engineering and Mathematics degrees in continuing education.
This is the workshop that accompanies the overview. Words are in planned format.
I am very interested in any invitations to speak and energize, visit www.phibetaiota.net for more information.
acquisition, ash carter, Technology, Innovation and Modern War, department of defense, dod, hacking for defense, intlpol 340, joe felter, kill chain, max boot, military innovation, ms&e296, raj shah, requirements, stanford, Steve blank, China
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” ChiesaHackito Ergo Sum
This talk will analyze those mistakes commonly done by MoD when trying to deal with the so-called “Cyberwar”. The speaker will empass through cultural, practical, logistics and narrow-minds issues he’s been able to observe while training various military staff in different countries.
https://www.hackitoergosum.org
This is my presentation to the AFCEA Course in Fairfax, VA. This course is put on by AFCEA to give insight into where the GCCS system is going in regard to transitioning to Joint Command and Control Capabilities (JC2C).
This is the workshop that accompanies the overview. Words are in planned format.
I am very interested in any invitations to speak and energize, visit www.phibetaiota.net for more information.
acquisition, ash carter, Technology, Innovation and Modern War, department of defense, dod, hacking for defense, intlpol 340, joe felter, kill chain, max boot, military innovation, ms&e296, raj shah, requirements, stanford, Steve blank, China
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” ChiesaHackito Ergo Sum
This talk will analyze those mistakes commonly done by MoD when trying to deal with the so-called “Cyberwar”. The speaker will empass through cultural, practical, logistics and narrow-minds issues he’s been able to observe while training various military staff in different countries.
https://www.hackitoergosum.org
This is my presentation to the AFCEA Course in Fairfax, VA. This course is put on by AFCEA to give insight into where the GCCS system is going in regard to transitioning to Joint Command and Control Capabilities (JC2C).
Brief provided to Project Lead the Way Teachers at University of Colorado, Colorado Springs for information and brainstorming on operational Science, Technology, Engineering and Mathematics ideas on how to motivate students to apply their current knowledge of their environment to make a difference now!
My resume reflects a career of working at every level of the US Air Force (Squadron, Group, Wing, Numbered Air Force Staff) and capacity (Fighter Squadron, US Eastern Air Defense Sector, Rescue Group, Combined Air Operations Center, Joint Inter-agency Air Task Force, Joint Special Operations Command).
Dynamis, Inc. has 15 years’ experience providing solutions to support homeland security and national defense. Dynamis specializes in program management, acquisition support, training, technology integration, enterprise risk management, and security planning
mission model, mission model canvas, customer development, Hacking for Defense, lean startup, stanford, startup, steve blank, Pete Newell, Joe Felter, minimum viable product
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Brief provided to Project Lead the Way Teachers at University of Colorado, Colorado Springs for information and brainstorming on operational Science, Technology, Engineering and Mathematics ideas on how to motivate students to apply their current knowledge of their environment to make a difference now!
My resume reflects a career of working at every level of the US Air Force (Squadron, Group, Wing, Numbered Air Force Staff) and capacity (Fighter Squadron, US Eastern Air Defense Sector, Rescue Group, Combined Air Operations Center, Joint Inter-agency Air Task Force, Joint Special Operations Command).
Dynamis, Inc. has 15 years’ experience providing solutions to support homeland security and national defense. Dynamis specializes in program management, acquisition support, training, technology integration, enterprise risk management, and security planning
mission model, mission model canvas, customer development, Hacking for Defense, lean startup, stanford, startup, steve blank, Pete Newell, Joe Felter, minimum viable product
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Vista Ridge STEM Brief 20130509
1. Building the Unclassified
User Defined Operational Picture (UDOP)
Leveraging the internet and social networks
1
This Briefing is
UNCLASSIFIED
UNCLASSIFIED
NORAD-USNORTHCOM
Brief for Vista Ridge High School (VRHS)
– Science, Technology, Engineering, and Mathematics
(STEM)
Gary Koch
NORAD-USNORTHCOM J643
09 May 2013
2. … Purpose …
• Provide the VRHS students with an introduction
to NORAD and USNORTHCOM and the concept
of operations that leverages the use of the
geospatial data and the internet for Situational
Awareness in Homeland Defense (HD) and
Defense Support of Civil Authorities (DSCA)
Mission Sets.
• Discuss concepts such as mobile, social
networking, cloud, intelligent composeability and
internet of everything to stimulate further
research, collaboration, crowdsourcing and
STEM opportunities for the future.
UNCLASSIFIED
3. …Two Commands with One Vision…
With our trusted partners,
we will defend North America
by outpacing all threats,
maintaining faith with our people and
supporting them in their times
of greatest need.
“WE HAVE THE WATCH”
UNCLASSIFIED
4. …Performing Complementary Missions…
The NORAD Mission:
The North American Aerospace Defense
Command conducts aerospace warning,
aerospace control, and maritime warning in
the defense of North America.
UNCLASSIFIED
The USNORTHCOM Mission:
The United States Northern Command partners
to conduct homeland defense, civil support,
and security cooperation to defend and secure
the United States and its interests.
6. 6
…In a Vital Region of the Globe…
But We Monitor the Global
Pulse to be Prepared…
Terrorism/Asymmetric
Threats
Symmetric Threats
Transnational Criminal
Organizations
Violent Extremist
Organizations
Nuclear Proliferation
Missile Defense
The Arctic
Cyber Threats
UNCLASSIFIED
Intimate Relationship Between Home and Away Game
7. …Working Together…
CHIEF OF DEFENCE STAFF
MINISTER OF NATIONAL DEFENCESECRETARY OF DEFENSE
CJCS
General Jacoby
COMMANDER, USNORTHCOM
General Jacoby
COMMANDER, NORAD
ALASKAN NORAD REGION (ANR)
CANADIAN NORAD REGION (CANR)
CONTINENTAL U.S. NORAD
REGION (CONR)
Service Component Commands
Supporting Command
Subordinate Commands
U.S. ARMY NORTH (Fifth Army)
AIR FORCES NORTHERN (1st Air Force)
U.S. MARINE FORCES NORTH (MARFORCES)
• Joint Task Force North
• Joint Task Force Civil Support
NAVAL FLEET FORCES NORTH COMMAND
JOINT TASK FORCE ALASKA
JOINT FORCE HQ NATIONAL CAPITAL REGION
UNCLASSIFIED
8. COMBINED HQ
Commander
Chief of Staff
Personnel
Intelligence
Logistics & Engineering
Strategy, Policy & Plans
C2 Systems
Training & Exercises
Requirements, Analysis & Resources
Interagency Coordination
Science and Technology
…As an Integrated Team…
NORAD
• Deputy Commander
• Operations Director
UNCLASSIFIED
USNORTHCOM
• Deputy Commander
• Operations Director
9. …With a Host of Partners…
9
DHS/Office of
Infrastructure
Protection
DHS/Science &
Technology
DHS/Intelligence &
Analysis
DHS/Transportation
Security Administration
International Department of Defense Interagency
UNCLASSIFIED
Interorganizational
NORAD and USNORTHCOM Center of Gravity =
Trusted Partnerships with Approximately 60 Representatives from 50 Agencies
10. … Focused on the Commander’s Priorities…
• Expand and strengthen our trusted
partnerships
• Advance and sustain the binational military
command
• Gain and maintain all-domain situational
awareness
• Advocate and develop capabilities in our
core mission areas to outpace all threats
• Take care of our people; they are our
foundation
UNCLASSIFIED
11. …To Achieve Strategic End States…
Lines of
Operation
(LOOs)
UNCLASSIFIED
#1 North America is defended from
global aerospace threats through
timely indications, assessment,
warning; and interdiction of air-
breathing attacks.
Aerospace Warning
#2 North America is warned of global
maritime threats through timely
indications, assessment and
dissemination.
Maritime Warning
#3 NORAD achieves significant
operational integration with
U.S. and Canadian military and
civil agencies, through
processing and dissemination
of information and intelligence.
#4 NORAD adapts to meet
emerging strategic and
operational challenges
through modernization
concepts and force
structure requirements.
NORADCross-Cutting LOOs
MissionLOOs
Partnerships
StrategicAgility
Aerospace Control
12. …To Achieve Theater Strategic End States…
UNCLASSIFIED
Homeland Defense
Cooperative Defense
Counter-TCOs
Support of Civil Authorities
Arctic Cooperative Security
#1 The homeland is defended in depth.
#2 Allies & partner nations actively contribute
to the cooperative defense of North America.
#3 Department of Defense has contributed the
necessary capacities and support to disrupt,
degrade or defeat Transnational Criminal
Organizations’ ability to affect U.S. and partner
nations’ security and interests negatively.
#4 Civil authorities are provided support to
mitigate effects of disasters.
#5 U.S. allies & partners in the USNORTHCOM
AOR contribute to the peaceful opening of the
Arctic in a manner that strengthens
international cooperation.
USNORTHCOM
13. CIVIL MILITARY
Border
Security
Local / State
Crisis
Management
Missile
Defense/
Air Control
AlertLaw
Enforcement
Regional
Consequence
Management
Transnational
Criminal
Orgs
Maritime
Warning/
Response
National
Special
Security
Events Critical
Infrastructure
Protection
Theater
Security
Cooperation
Satellite
Tracking
UNCLASSIFIED
… Across a Spectrum of Operations…
Physical
or Cyber
Defense
15. –One Commander Leads Two Closely
Linked, but Separate Commands
–Homeland Defense is Priority #1
–Partnerships are Our Lifeblood
UNCLASSIFIED
… Key Thoughts to Remember…
“WE HAVE THE WATCH”
16. • Ensure systems are founded on a common architecture
comprised of open standards.
• Capability to collect, fuse & share information across DOD &
non-DOD Mission Partner networks.
• Seamlessly integrate GEOINT, terrain and weather effects
into C2 mission tools.
• USNORTHCOM investments in its geospatial C2 tools will
transition and extend to DHS and other mission partners.
… Requirements…
UNCLASSIFIED
18. … Web-based User Defined COP …
Complete GIS
CIP Data
Imagery
Maritime
Land
USCG
Air
Intel/Threats
Accessible anywhere, anytime, any mobile device
UNCLASSIFIED
19. … SAGE Data in GoogleEarth …
All SAGE data is accessible in
one place within GoogleEarth
and is updated daily by SAGE
Team Members. This KMZ is
built using basic HTML5 within
the KML structure. Very simple
to manage and allows for a high
“speed of data” to users.
UNCLASSIFIED
20. … Common NC FFT Iridium Devices …
(Commercial)
TRAKKER
TYPHON
OmniTRAC
PALLAS B1
PALLAS B2 Nano-SHOUT
9602-LP
- Vehicle
- Aircraft (*certification)
- Surface
- Static Location
- Dismounted
4 in.W-8 in. L-2.5 in. H 3.9 lbs.
3.60 in. W – 8.78 in. L – 2.59 in. H
2.6 lbs.
NOTE: These devices are integrated into the MMC
USNORTHCOM is #1 DOD Iridium USER
UNCLASSIFIED
21. … FFT Devices (Non-Iridium) …
Movement Tracking System
(Force XXI Battle Command Brigade and Below)FBCB2
Omni-TRAC
- Vehicle
- Aircraft
- Static Locations (Ops Centers)
Vehicle
Vehicle
NOTE: These devices are integrated into the
MMC however, not all technologies are
integrated due to rigorous integration and
testing by US Army STRATCOM MMC Test
bed.
As of 6 June:
6,694 total devices (NIPR)
7,669 total devices (SIPR)
*USNORTHCOM is J-FFT MMCs # 2 DOD Customer
UNCLASSIFIED
22. … the Geospatial Artisan!!! …
UNCLASSIFIED
Where is Chris Mayfield???
23. • Integration of Open Systems (Crowdsourced development)
– Ushahidi + SwiftRiver + Twitter + Facebook + FourSquare = SA?
• Need to Know, Need to Share, Responsibility to Provide –
Create Incentives (internships, student projects, volunteers,
gaming)
• Cell phone tracking integration – Latitude, Foursquare,
Geochat, Facebook Places, other location based services
• Focused Social Media utilization - Twitter, Facebook, YouTube,
Ustream, Geofeedia
• Lead the E/UDOP effort within Interagency
– DOD and DHS working in parallel to improve collaboration
– Google Earth Enterprise Globe distribution
– N-NC is the Global COP for the unclassified subscriber in DOD, a key
relationship for NGOs and other COCOMs to maintain and foster
… Great Opportunities …
UNCLASSIFIED
24. • Billions of $$$ of R&D each year
– Hard technology - search engines, visualization, mashups, …
– Soft technology - social engineering, user generated content,
people networks, …
• These are the capabilities younger generation expect
to have at work
• Issues:
– Identifying the technologies that make sense for DOD
– Time lag to get into DOD environment
… Take Advantage of the Web …
UNCLASSIFIED
25. … Government will never be the same! …
Session #21/Gary Koch
UNCLASSIFIED
33. … User Defined Collaboration Mashup …
InRelief.org Example
UNCLASSIFIED
34. • Amazon, iTunes
– Suggestions based on what you
and others have bought
– Military potential - The last five folks
who planned a NEO extraction used
this plan as a starting point…
• Digg, YouTube
– The “group” decides what's
interesting
– Military potential – four out of five
action officers found this source of
intelligence data to be most
useful…
… Intelligent Composeability …
UNCLASSIFIED
35. 35
… Geared To Operate As A Single Machine …
UNCLASSIFIED
36. Seven to Three
Ribbon
Shows up for work, does
the absolute minimum
required, and goes home
DUI and Still in the Air
Force Ribbon
Device denotes
number of convictions
Everybody Went to the Middle
East Except Me Ribbon
Numeral denotes number of
years spent instead on
Caribbean „training‟ evolutions
Got Divorced Again
Ribbon
$ device for each divorce
Head Up the
Commanders Butt
Ribbon
Skull device denotes
each additional surgical
extraction
Got My Last Boss Promoted
Ribbon
Numeral denotes number of
superiors promoted by your hard
work who have already forgotten
your name.
Drinking Buddy’s
Commendation Ribbon
Drinking device denotes
consecutive awards.
Close Friend of AFPC Ribbon
Palm tree device for each
really cushy set of orders.
Daddy is a General
Ribbon
Star devices denote
daddy‟s actual rank.
My Wife’s Uncle’s
Roommate's Brother-in-
Law ‘s Son Knew
Somebody Who Served
In WWII
Never PCSed Out of
Same Location During
Entire Career Ribbon
For 20 years of arduous
„homestead‟ service
I’m Not Moving! Ribbon
House device
denotes each successful
threat to not „re-up‟ if
PCSed
Staff Sgt for Life
Ribbon
Device worn to denote
extra privilege and pay
incentives ignored or
bungled
Never Been on
Deployment Ribbon
Missed Every Deployment
Ribbon
Device denotes
number of deployments missed
due to „circumstances‟
… Amendment to US Air Force Awards …
UNCLASSIFIED
This slide and the next one show the Commands’ vision and missions. As you read these slides, you will notice our tremendous focus on partnerships. We couldn’t succeed without our partners.
These are our mission statements. NORAD is a binational command with the U.S. and Canada. NORAD stands for “North American Aerospace Defense Command.” It was established in 1958. The NORAD Agreement is a formal military partnership, based upon a binding international agreement. This agreement is reviewed every four years. United States Northern Command, or “USNORTHCOM,” was established in 2002 as a result of the terrorist attacks on September 11th.(Additional notes: At that time, the United States did not have a single command responsible for defense of the United States. It was split between a number of commanders. So, President Bush, Secretary Rumsfield, and our Congress established USNORTHCOM.)The USNORTHCOM mission statement was recently reworded to add the word “partners.” The intent of this rewording was to emphasize that in everything we do, we work with a host of key partners to ensure unity of effort and effectiveness of response.USNORTHCOM is U.S. only, but our Area of Responsibility (as you will see on slide five) covers all of North America, including The Bahamas and the Caribbean. NORAD’s and USNORTHCOM’s missions complement each other to encompass the entire spectrum of defense, from detection to recovery. By working together, we are able to fully achieve mission success.
Our missions are depicted here in three categories…Homeland Defense, Security Cooperation, and Civil Support. Our mission success is dependent on the strength of our partnerships, as noted in the diagram.NORAD’s missions (Aerospace Warning and Control and Maritime Warning) fall in the Homeland Defense section, which includes defense of the homelands of the United States and Canada, while USNORTHCOM’s operations span everything. In fulfilling the Homeland Defense missions of both NORAD and USNORTHCOM, it makes sense to combine efforts, share information, and work together as one team. USNORTHCOM spends a significant portion of its time on Civil Support, but Homeland Defense remains DOD’s number 1 priority. USNORTHCOM’s Security Cooperation Program strives to improve relationships with Partner Nations in order to share information, promote interoperability, and enhance capabilities that will contribute to a cooperative continental response to defense, security, and disaster assistance.Transition – On the next slide, we will take a closer look at our Area of Responsibility/Area of Operation and Area of Interest.
The USNORTHCOM Area of Responsibility lies inside the blue line. In military terminology, in the U.S. Unified Command Plan (UCP), while this geographic designation is called the Area of Responsibility, this term does not imply that the U.S. controls Canada and the other countries. This Area of Responsibility can be described as our area of focus. In addition to the U.S., our Area of Responsibility includes 3 nations (Canada, Mexico and Bahamas) and 6 dependencies (PR, VI, BVI, Turks and Caicos), Bermuda and St Pierre Miquelon Islands). Alaska is cross-hatched because USNORTHCOM has the Homeland Defense and Civil Support missions, but Pacific Command (PACOM) provides the forces to execute the mission. Hawaii is not part of our area (belongs to USPACOM) however, USNORTHCOM supports USPACOM with its mission of missile defense of Hawaii.NORAD does not have an Area of Responsibility, but rather an Area of Operation, which is North America.To the side of the map, you will notice that there is a listing of global issues, which shows examples of our Area of Interest. We don’t wait for threats to cross our borders. We work with other COCOMs (Combatant Commanders), intelligence agencies, and interagency partners to detect/defeat threats before they arrive at our borders. This list highlights examples of issues or types of events that we monitor and analyze to determine how they may affect our region of the world , so we can prepare accordingly.Transition – Next, we will look at how the Commands are structured to conduct our missions.
NORAD and USNORTHCOM are two separate commands, neither subordinate to the other.Our Commander, General Jacoby, is dual-hatted as Commander of NORAD and Commander of USNORTHCOM. It makes sense to have one commander for these two commands because our missions are so complementary. They require a very close relationship between the two. As Commander for NORAD, he reports to the senior civilian leadership for both nations through our respective defense architectures As the Commander for USNORTHCOM, he reports to the U.S. Secretary of Defense and the President.(Additional Notes: The CDR does not have to be an American. The NORAD agreement says the Commander and Deputy shall not be from the same country, but it does not say the CDR must be American. However, since the beginning of NORAD, the CDR has always been American.)Although it’s not depicted here, the Canadian Joint Operations Command (CJOC) is the Canadian counterpart to USNORTHCOM. It’s significant for Canada to have an established link and relationship with both NORAD and USNORTHCOM.
Right here within our headquarters, we work as an integrated team. Virtually all aspects of the Commands organizations are completely integrated, with the one exception being our operations directorates, which function separately, but liaise closely on matters of complementary concern.Although NORAD and USNORTHCOM have separate operations directors, our command center is a unified arrangement, with personnel working side by side in the NORAD and USNORTHCOM Command Center—the N2C2.Transition – The environment in which we operate is also inclusive of many outside organizations with common interests and goals.
We do our mission with a host of partners…Strong relationships between organizations are especially critical here in the Homeland. NORAD and USNORTHCOM have a strong philosophy of “Cooperation and Collaboration.” This includes both military and non-military organizations.Our military partners consist of Canadian military and U.S. Active, Reserve, and National Guard. We also have Mexican military liaison officers assigned to USNORTHCOM. Our interagency representatives also are extremely important. We have relationships with representatives from both federal and non-government organizations such as the American Red Cross. Some reps work in our building while we have close contact with others. Since we know we will interact with these organizations here in the Homeland, it makes sense to collaborate on a regular basis to build an understanding of processes, resources, etc. It also helps to ensure unity of effort during the planning process. We routinely work with approximately 60 representatives from more than 50 agencies.Interagency coordination is a very important area of growth for both NORAD and USNORTHCOM for improving our situational awareness and decreasing our response time.Transition – Our partners also are a key focus of the Commander’s priorities, which you will see next.
This slide shows GEN Jacoby’s priorities, which he developed to focus the staff’s efforts.Expand and strengthen our trusted partnerships—The strength of USNORTHCOM and NORAD is found in the partnerships that we create and sustain across joint, interagency, and multinational organizations. Accordingly, in the months ahead, we will continue our efforts to integrate across and develop trust among capable mission partners. Advance and sustain the binational military command—Over the last half-century, NORAD has been a mechanism for collaboration between the United States and Canada in the interest of security. As we look ahead to the next half-century of this partnership, NORAD will remain a model for international cooperation in defense planning, execution, training, information management, and technological innovation. Gain and maintain all-domain situational awareness—Ensuring global reach and projection is a function of a secure homeland. Our global reach is being challenged by both symmetric and asymmetric threats in and across space, cyberspace, land, sea, and air. Combining appropriate whole-of-government and whole-of-society efforts, we will keep our homelands safe by giving priority to technologies and collaborative interagency processes for anti-access/area denial against potential adversaries, including those who attack from the inside. Advocate and develop capabilities in our core mission areas to outpace threats—There is no doubt that both long-understood threats and future asymmetric threats will look to exploit seams and vulnerabilities in our technologies and procedures. As Commander of USNORTHCOM and NORAD, I help mission partners advocate for capabilities to close any seams, mitigate any vulnerabilities, and enhance security to meet the evolving challenges of an interconnected world. Take care of people; they are our foundation—We will always remember that the success of USNORTHCOM and NORAD is due to the professionalism, commitment, and tireless service of our people. As we do our part during the next few years to reset the force in the drawdown from two wars, we will do everything we can to ensure our men and women in uniform have the tools they need to keep our nations safe and free.Transition – Next, we will look at how the CDR’s priorities are emphasized in each Command’s strategic end states.
This slide details USNORTHCOM’s Theater Campaign Plan. These end states are directly related to USNORTHCOM’s missions of homeland defense, civil support and security cooperation. It’s no surprise that our first end state is to ensure the homeland is defended. Our second end state is a cooperative defense with our allies and partner nations.Next, we must counter transnational criminal organizations, or TCOs, since they negatively affect our security interests.Our fourth end state is to support civil authorities. The military has unique capabilities that we provide in support of civil authorities to mitigate the effects of disasters.And finally, climate change has opened waterways in the Arctic, which brings with it new challenges, so our fifth strategic end state is Arctic Cooperative Security. Transition – Next we will look at the spectrum of operations that show how we get to these end states…
Our Commander has made a point of saying that we cannot afford to be “hollow in the homeland.” Our world is one of constant change, and we must be ready to challenge assumptions, think creatively, and meet future challenges in defending our homelands. Successful, strong partnerships are our lifeblood. NORAD and USNORTHCOM do not operate in a vacuum; we must work together with our partners.Even during this time of budget review and cuts, the men and women of NORAD and USNORTHCOM and our trusted partners will continue to “have the watch.”Pending any questions, this slide completes the brief.