• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/241

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

241 Cards in this Set

  • Front
  • Back
Who is the Deputy Commander of USCYBERCOM
LtGen Davis (Marine Corps three-star)
Who is the Chief of Staff of USCYBERCOM
RADM Klein (Navy, two-star)
What is USCYBERCOM's Initial Activation Capability (IOC) date?
May 21st 2010
What are the two commands that came together to form USCYBERCOM
JFCC-NW and JTF-GNO
Who is the Director of National Security Agency/Chief
GEN Alexander (Army four-star)
Who is the Secretary of Defense?
Mr. Leon Panetta
Who is the Deputy Chief of Staff of USCYBERCOM?
Ms. Vicki Jordan (Civilian)
Who is the Commander of USCYBERCOM?
GEN Alexander (Army four-star)
What is USCYBERCOM's Full Operational Capability (FOC) date?
October 31st, 2010
Who is the Navy Element Commanding Officer?
CAPT Shaul
Who is the Navy Element Executive Officer?
CDR Barry
Who is the Chief of Naval Operations?
ADM Greenert (Navy four-star)
Who is the Senior Enlisted Leader for USCYBERCOM?
CMSgt Slater (USAF E-9)
Responsibilities of JFCC-NW
Responsible for coordinating offensive computer network operations for the DoD.
Responsibilities of JTF-GNO
Direct the Operation and defense of the GIG across strategic, operational and tactical boundaries in support of DoD.
Who is the Navy Element Senior Enlisted Leader?
ISCS Robbins (Navy E-8)
Who is the Master Chief Petty Officer of the Navy?
MCPON Stevens (Navy E-9)
Who is the President of the United States?
President Barack Obama
What is the Mission Statement of USCYBERCOM
Plans, Coordinates, Integrates, synchronizes and conducts activities to: direct the operations and defense of specified DoD information networks and; prepare to, when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.
The Shield is divided in to how many parts?
Four
What does the lightning bolt symbolize in the shield?
It symbolizes the speed of operations within the cyber domain.
Why are the wings of the eagle, who who sits atop the digital globe, digitized?
To shoe he exists both in the physical and cyber realms.
Why does the digital globe rest upon the cyber threads?
To represent our network infrastructure and depict the universal connectivity of the cyber domain.
What is the meaning of the eagle, our national symbol, on the seal?
it's honored for its keen eyesight that allows it to pierce the darkness and remain vigilant to protect us.
Why is the top of the shield trimmed in gold?
to represent the precious investment of the nation in the personnel and capabilities that enable USCYBERCOM to carry out its mission.
What do the two crossed swords represent on the shield?
they represent the dual nature of the command to defend the nation and, if necessary, engage our enemies through the cyber domain.
What does the key on the shield represent?
it represents the dual nature of the command to secure our nations information in the cyber domain while also unlocking the secrets of those who would seek to do us harm.
What does the USCYBERCOM Seal represent?
It represents both the past and the future.

The Past: Honoring its foundational organizations (JFCC-NW and JTF-GNO)

The Future: Recognizing the new and unique nature of the commands imperative to integrate, synchronize and conduct full spectrum military cyberspace operations.
What two colors does the seal combine to represent our command?
Blue and Gold
What do the stars represent on the USCYBERCOM Seal?
The stars represent the rank of the USCYBERCOM Commander and recognize the critical importance of this command to ensuring the cybersecurity of the Nations military information networks
Why is the disk trimmed in gold?
To represent the illumination of the cyberspace domain.
What is the meaning of the MD5 hash being laid within the golden circle on the blue disk?
It ties the command back to the early days of computer networking.
Where is USCYBERCOM's mission statement encrypted within the seal?
It is encrypted within the code of the MD5 hash.
What does the color blue in the seal signify?
The color of intellect and loyalty, it symbolized the linkage in cyberspace between the physical and the cognitive realms as well as the loyalty of the command to the nation and the sacred principles and liberties upon which it was founded.
Inside the circle, what does the dark background traversed by golden threads represent?
represents the logical layers of cyberspace, where our critical data resides and transits
What does the dark background solely depict?
It depicts the chaotic nature of cyberspace, where knowledge often remains obscure.
What is the meaning behind the shield, upon which the eagle is perched?
It is there to protect and defend the eagle as the Command will protect and defens the Military's Information Networks.
What do the golden threads solely represent?
The ability of cyberspace and bring knowledge to light.
Who is the Director of Personnel, J1?
Col Garbutt (Air Force)
Who is the Deputy Director of J1?
Mr. William Nadolski
Who is the director of Intelligence, J2?
RDML Filipowski (Navy one-star)
Who is the Deputy Director of J2?
Mr. Sansbury
Who is the Director of Operations, J3?
Maj Gen Williams (USAF two-star)
Who is the deputy director of J3?
RDML Hoppa
Who is the Director of Logistics, J4?
Ms. Debra Williquette
Who is the Deputy Director of J4?
LTC Bliss (Army)
Who is the Director of Plans and Policy, J5?
MG Napper (Army two-star)
Who is the Deputy Director of J5?
Brig Gen Huntley (USAF one-star)
Who is the Director of J6?
RDML Lytle (USCG one-star)
Who is the Deputy Director of J6?
Col Hoffman (USAF)
Who is the Director of Joint Exercises/Training, J7?
Col Lamont (USAF)
Who is the Director of Capability and Resource Integration, J8?
Brig Gen Medler (USAF one-star)
Who is the Deputy Director of J8?
Mr. Jeffry Buga
What are some of the key tasks of J12?
1. Provide military personnel mgmt actions for all branches of service.
2. Advise command leadership on all personnel program issues.
3. Manage leave, awards, promotions, decorations, evaluations, fitness and urinalysis.
4. manage all Senior Officer assignments and performance reporting programs.
What are some key tasks of J11?
1. Manage command manpower, organizational and readiness issues in direct support of all joint military and civilian positions.
2. Determine manpower requirements for military/civilians and submit inputs through the Joint Manpower Program.
3. Prepare military/civilian manpower estimates and related justifications.
4. Conduct studies and estimates for the development or modification of joint manpower documents.
What are some key tasks of J1A?
1. Responsible for the day to day interactions with the J1 staff and other CYBERCOM directorates regarding manpower and personnel matters.
2. Maintain and provide up-to-date manpower and personnel reports for all manpower personnel representatives (MPRs) and J-Code Leadership.
3. Monitor and ensure the distribution of all incoming and outgoing correspondence.
4. Responsible for the directorate's support of the web content, publication mgmt, defense travel budget, data mgmt, accountability of equipment and supplies, military urinalysis and other support functions.
Identify some of the major function tasks assigned to the J1.
1. provides CYBERCOM staff with manpower and personnel services.
2. develops and administers command manpower, readiness, personnel policy and personnel assignment programs.
3. formulates plans, policies and procedures for the administration of military/civilian personnel programs.
4. responsible for the command joint duty assignment (JDA) program.
5. Monitors quality of life issues affecting the command and policies of the office of secretary defense (OSD), joint staff, and military departments.
What is the vision of the J1 directorate?
The best manpower and personnel team delivering fully qualified cyber-warriors to the right time ready to execute full-spectrum cyberspace operations for our nation.
What is the mission of the J1 Directorate
Deliver manpower and personnel services for CYBERCOM by developing human resource management strategies and providing organizational solutions in order to enable cyberspace operations for the US and our allies.
J13
Senior Leader Management
What are some key tasks of the J15?
1. Provide guard/reserve operational support to CYBERCOM through the execution of allocated man-days on requirements prioritized by the Commander.
2. Ensure readiness mgmt of assigned reservists and enables members to provide augmentation.
What are some key tasks of J16?
1. Responsible for the planning, development, administration and mgmt of of CYBERCOM military and civilian professional development programs.
2. Command focal point for the implementation and mgmt of active recruiting and retention efforts aimed at growing and sustaining a highly qualified, professional cyber workforce.
3. Manage the command's pre-commissioning summer research programs.
J15
Guard and Reserve Management.
J16
Leadership Development
Senior Leader Mgmt consists of what paygrades?
O-6 and Above
J12
Military Personnel Management
C4
Command, Control, Computers and Communications
J11
Manpower and Readiness
J1A
Business Management
J14
Civilian Personnel Management
What are some key tasks of J14?
1. Manage command civilian personnel program to include NSA personnel assigned/detailed to command.
2. Formulates plans, policies and procedures for the administration of the command civilian personnel program.
3. Develops and implements programs to improve personnel administration and mgmt with the command.
4. Serves as a liaison with host servicing civilian personnel flight.
What are some of the major functional tasks of J2?
1. Performs target development, target material production, capabilities analysis and combat assessments.
2. provide intelligence support to operational and exercise planning, integration and execution.
3. Maintain battlespace awareness and understanding of adversary CNO capabilities.
What is the function of JIOC?
1. Submit collection requirements.
2. Coordinate intelligence efforts of subordinate commands.
3. conduct all-source intelligence analysis and production.
4. Coordinate with J3 and J5 to ensure intelligence is fully synchronized and integrated with operations and plans.
What is target analysis?
An examination of potential targets to determine military importance, priority of attack, and weapons required to obtain a desired level of damage or casualties.
BDA is composed of what three types of assessments?
1. Physical Damage Assessment.
2. Functional Damage Assessment.
3. Target System Assessment.
What is BDA?
The estimate of damage resulting from the application of lethal or non-lethal military force.
What are Intelligence Summaries (INTSUMs)?
J22 analytical comments about significant activity/events and products published by partner organizations.
What is Cyberspace Operations?
Employment of cyber capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace.
What is HUMINT Collection Requirement?
an expression of intelligence information needs which require HUMINT collection and carries at least implicit authorization to commit resources in acquiring the information.
What is Intelligence Preparation of the Battlespace (IPB)?
An analytical methodology employed to reduce uncertainties (concerning the enemy, environment and terrain)
What is Source Directed Requirement (SDR)?
Tailored to a specific source, based on sources placement and access.

*Does not require validation or formal tasking.
What is the mission of the J2 Directorate?
To provide "all-source intelligence support" to the development of network warfare capabilities and to CNO planning, integration, coordination and execution.
J21
Intel Mission Management
J22
Analysis and Production.
J221
Asia Pacific
J222
Russia/Europe
J223
Middle East/CT
J225
Camp Parks
J226
Iran
J23
Intel/Ops Integration
J25
Intel Support to Plans
J2T
Combat Targeting
J2X
CI/HUMINT
HCR
HUMINT Collection Requirement
BDA
Battle Damage Assessment
IPB
Intelligence Preparation of the Battlespace
SDR
Source Directed Requirement
How long is a SDR valid for?
One Year
How long is HUMINT information good for?
Two Years
JIOC
Joint Intelligence Operations Center
INTSUMs
Intelligence Summaries
J2A/R
Human Resources and Support
JIPOE
Joint Intelligence Preparation of the Operational Environment
What are some function of J2T?
1. Coordinate CYBERCOM target validation.
2. Coordinate BDA for CNO.
3. Conduct target system analysis.
4. Coordinate target vetting with the IC.
What are some functions of the J23?
1. Provide Tailored Intelligence for Operations and Exercises.
2. Prepare and present intelligence briefing.
3. Provide overall mgmt of the INTEL needs for the J3-let OPTs (Operational Planning Teams)
What are some functions of the J2X?
1. Provide CI and HUMINT advice and assistance in order to support CYBERCOM efforts.
2. Coordinate, de-conflict and integrate DoD CI and HUMINT activities conducted in the CYBERCOM area of operations.
What are some functions of the J25?
1. Provide accurate and predictive all-source cyberspace intelligence support to deliberate planning and exercises.
What is the major function of J2A/J2R?
Manage military intelligence program (MIP) funding and billets on behalf of CYBERCOM.
What are some function of J21?
1. J2 Collection, Information and Process mgmt team.
2. Provides for the mgmt and dissemination of intelligence requirement in support of planning and intelligence production efforts.
What are some functions of the J22?
1. Employs all-source analysts providing intelligence analysis, threat analysis and development of comprehensive products.
2. Identifies and analyzes current and future threats to the full-spectrum DoD infrastructure.
3. Provides current threat briefings for situational awareness to key decision makers.
What is the vision of the J2 Directorate?
To implement solid, repeatable, and sustainable processes for analysis, collection management, information management and targeting.
What is an Operation Order (OPORD)?
Purpose of effecting the coordinated execution of an operation.
What is the mission of J35?
Conduct mission planning to support near-term operations in order to fit the Commander's strategy.
What are the major functional tasks of J3?
1. Planning
2. Integration
3. Coordination
4. Force Management
5. Execution
What is Alert Order?
Provides essential planning guidance and directs the initiation of execution planning *AFTER* the directing authority approves a COA.
What is Planning Order (PLANORD)?
Provides essential planning guidance and directs the initiation of execution planning *BEFORE* the directing authority approves a COA.
What is an Execute Order (EXORD)?
Order to initiate military operations as directed.
What is a Tasking Order (TASKORD)?
Assigns Tasking.
What are the major functions of J35?
1. Responsible for OPTs.
2. Fill role between J3Fs and Joint Planning Group.
What is a Warning Order (WARNORD)?
Preliminary notice of an order or action that is to follow.
What is the mission of J3A?
Responsible for the coordination and oversight of administrative activities regarding the J3 Directorate.
What is a Fragmentary Order (FRAGO)?
Issued as an amendment/correction to change or modify an order?
What are the major functions of the J3A?
1. Human Resource Management.
2. Knowledge Management (RFIs/SOPs)
3. Operations (DTS, GPC, OPSEC)
J38 (Formerly J3F)
Fires/Targeting.
CND
Computer Network Defense
What are the 5 JOC Leadership positions?
1. JOC Director
2. Cyber Battle Captain
3. Deputy Battle Captain
4. JOC Mission Leads
5. JOC Operations Support Cell
J32
Partner Operations
Define CNE
Gathering data from target or adversary information system or computers (intelligence gathering).
What is the mission of the J3 Directorate
Same as USCYBERCOMs Mission Statement
Define CND
Actions taken to protect, monitor, analyze, detect and respond to unauthorized activity.
PSYOP
Psychological Operations
What are the 5 service cyber component commands?
1. ARCYBER
2. AFCYBER
3. FLTCYBER
4. MARFORCYBER
5. CGCYBER
IO
Information Operations
MILDEC
Military Deception
OPSEC
Operations Security
J3A
Operations Support
EW
Electronic Warfare
CNA
Computer Network Attack
What are the 7 JOC Lines of of Operations
1. DoD Global Information Grid (DGO)
2. Defensive Cyber Operations (DCO)
3. Offensive Cyber Operations (OCO)
4. JOC Intelligence Team
5. DISA Support Element
6. Law Enforcement and Counter Intelligence
7. Service Cyber Component Liasons
What is considered "near-term" planning?
within 120 days
Who is the JOC Director
Col Rinaldi
J34
DCO (Defensive Cyber Operations)
Define CNO
Comprised of CNA, CND, CNE enabling operations
J35
Future Operations
What is tactical planning?
Planning at the warfighter level (lowest level)
Define CNA
Disrupt, Deny, Degrade or Destroy
Information resident in computers and computer networks.
List the 6 Interagency JIATF Cyber Members.
1. CIA
2. FBI
3. Treasury
4. Dept. of State
5. Dept. of Justice
6. Supporters
J33
Current OPs/JOC
J39
STO/SAP
What is Strategic Planning?
Planning at the National Level (Highest)
CNO
Computer Network Operations
COG
Center of Gravity
CNE
Computer Network Exploitation
COA
Course of Action
What are the 7 steps in the Joint Operation Planning Process?
1. Initiation
2. Mission Analysis
3. COA Development
4. COA Analysis and War Gaming
5. COA Comparison
6. COA Approval
7. Plan or Order Development
MOA
Memorandum of Agreement
J43
Logistics
MOU
Memorandum of Understanding
ISSA
Inter-Agency Service Support Agreement
GPC
Government Purchase Card
What is the mission of the J4 Directorate?
Provide responsive, effective, and reliable logistics support to CYBERCOM through superior customer service and innovative processes. J4 will support an enhanced mission readiness through command functional and situational awareness while adding value to internal and external CYBERCOM partners.
What is the vision of the J4 directorate?
To consistently exceed customer requirements through education, evolution and excellence!
What is the role of J4 in contributing to successful CYBERCOM Cyber Operations and Planning?
To serve as the interface between CYBERCOM and the NSA Installation and Logistics (I&L) Directorate on all facility and logistics issues.
What are some of the major function tasks of the J4?
1. Facilitate support for CYBERCOM service component Commander facility requirements at NSA.
2. Manage Command MOUs and ISSAs
3. Manage Govt. property accountability for CYBERCOM.
4. Provide command supply support through the government wide purchase card for CYBERCOM.
What are some of the major functions of J41?
1. Space moves
2. PTN management
3. Requirements (MILCON)
4. Strategic / Tactical Space plan
What are some of the major functions of J42?
1. Knowledge Management
2. MOA/ISA/OIs
3. Procurement
4. Inventory Management
What are some major functions of the J43?
1. Ground Transportation
2. MILAIR Travel
3. Supply Chain Management
J41
Facilities
J42
Operations
What are some key tasks of J5A/J50
1. Update J5 maps, charts and rosters
2. Maintains J5 suspense list
3. Maintains official files, publications and directives
4. Ensures the proper receipt and distribution of all incoming and outgoing correspondences
What is the mission of J5A/J50
Interfaces with the J5 staff and other CYBERCOM staff organizations on matters of facilities, space management, personnel, equipment, supplies, communications, security, foreign disclosure, and other support matters.
What are some of the major functional tasks of J5?
1. Conducts contingency campaign planning; prepares plans as directed and in support of anticipated campaigns or major operations.
2. Supports DoD reviews and studies addressing cyberspace operations.
3. Tracks and participates in the development of cyberspace policy, doctrine and procedures, as directed by HQ USSTRATCOM.
What is the mission of J51?
CYBERCOM's focal point for the implementation of DoDs cyberspace strategy; develops and assesses the implementation of the commands strategy; coordinates and synchronizes plans, themes, messages, and products across the command; and provides strategic context for planning to advance CYBERCOMs lines of operations.
What are some key tasks of J51?
1. Provides CDRUSCYBERCOM with an expanded perspective of strategic and operational joint war fighting concepts.
2. Develops and advocates future cyber strategic concepts for the command.
What is the mission of J53?
Transforms national strategic objectives and strategies into activities by development of operational products that include planning for the mobilization, deployment, employment, sustainment, redeployment and demobilization of joint forces.
What are some key tasks of the J53?
1. Maintains standing USSTRATCOM cyberspace campaign, contingency, and operational plans, as directed.
2. Integrates future concepts or plans developments into combatant command TIER 1 exercises.
3. Prepares the Commander's staff estimate.
What is the mission of the J54?
Focal point for establishing authorities, policies, and processes for the Command's Cyberspace operations-related engagements with other DoD components, the Interagency, Industry, Academia, and foreign partners.
What are some key tasks of the J54?
1. Coordinate engagement program and strategies with higher, lower, adjacent, and multinational HQ and the interagency, as required.
2. Supports CYBERCOM directorates, as required, to operationalize partnership engagements in support of CYBERCOM mission and the national whole-of-government approach to cybersecurity.
What is the mission of the J55?
Focal point for development of CYBERCOM policies across all assigned mission areas. Advocates CYBERCOM cyberspace policy, force management, and doctrine within the Dept of Defense and across the USG.
What are some key tasks of the J55?
1. Provides analysis, recommendations, and guidance on cyberspace policy, force management, and doctrine.
2. Formulates CDRUSCYBERCOM's vission for cyberspace policy, and provides expertise to inform and shape DoD and national-level cyberspace policy development.
What are some of the key tasks of J58?
1. Co-chair the technical assurance standards working group (TASWG) with OUSD.
2. Provide Operational OCO capabilities to J3 in support of urgent and short notice mission.
3. Coordinate development and test activities with J7, J8, and J9 to ensure shared situational awareness.
What is the Cyber Lexicon?
Not official or definitive, but is simply a *collection of cyber terms and definitions gathered from various authoritative and key sources*, allowing community members to easily access it.
J5A/J50
Ops Support
J51
Strategies
J53
Plans/Special Projects
J54
Partnership Development
J55
Policy
J58
Capabilities and Requirements
CCR
Cyber Capabilities Registry
CDPM
Capability Development Portfolio Management
What is the mission of the J5 Directorate?
Develops and advocates cyberspace operational strategies, policies, contingency and theater security cooperation plans, capabilities, and partnerships with COCOMs, key allies and agencies.
What is the mission of the J58?
Advocate for, and coordinate the maturing of DoD offensive Cyber Operations Development, and Test and Evaluation practices in partnership with OUSD and other DoD Stakeholders. Provide guidance to the CYBERCOM service components on OCO capability development, test and evaluation, and deployment.
J613
Command Support Services
J612
Information Assurance
J61
C4 Support
Besides the title of Director of J6, what other title does RDML Lytle hold?
Chief Information Officer (CIO)
What is the mission of the J6 Directorate?
Provides premier command, control, communication, computer and information technology (C4IT) capabilities for CYBERCOM in support of full-spectrum military cyberspace operations. Shape the cyberspace domain to support the Command's lines of operation through enhanced command and control, and enterprise architectures and risk mgmt strategies.
What are the key tasks of J6?
Chief Information Officer and C4 support provides command with:
1. C4 Support
2. Architecture and Engineer
3. C4 Strategy and Guidance
4. Capitol Plans and Resources
What are some of the key tasks of J61?
Provide professional, agile and reliable C4 services and support to CYBERCOM.
What are some of the key tasks of J612?
1. Information Assurance Program Management
2. Vulnerability Assessment
3. IA concepts evaluation of piloting
4. Certification and Accreditation
5. IA Training
6. Incident Handling
What are some of the key tasks of J613?
Provide command with timely, measurable, and reliable *(1)Information Technology Service Level Mgmt*,*(2) Systems Access Mgmt* and *(3)Systems Support*
What are some of the key tasks of J614?
Provide Web Services to Command that include:
1. Web Application Development
2. Database Mgmt
3. Operation and Maintenance of Command Portals (SIPR, NIPR, JWICS)
4. Internal and External Mgmt
5. Requirements Mgmt
6. WBS Project Plans Development
What are some key tasks of the J618?
Provide the knowledge Mgmt and resourcing needed for professional, agile and reliable C4 services and support to CYBERCOM.
What are some of the key tasks of J64?
Shape the cyberspace domain to enable CYBERCOMs Lines of Operations (LOOs) by designing and sustaining the Commands core investments through Enterprise Architecture and System Engineering Services.
What are some of the key tasks of J65?
Responsible for making recommendations and O-6 level decisions on issues that directly and substantively affect the objectives, content and execution of DoD-wide programs, particularly as regards INFOSEC issues.
J65
C4 Strategy and Guidance
(Risk Management / C4 Analysis and Strategy Division)
J64
Architecture and Engineering
J618
Knowledge and Resource Management
J614
Web Design and Project Management
What is USPACOMs #1 priority exercise?
Terminal Fury
Which exercise is a EUCOM directed computer assisted command post exercise?
Austere Challenge
Who runs the Terminal Fury Exercise?
PACOM
Who runs the Global Thunder Exercise?
STRATCOM
Who runs the Austere Challenge Exercise?
EUCOM
J71
Exercises
Who runs the Global Lightning exercise?
STRATCOM
J72
Training and Readiness
J74
Lessons Learned
Who runs the Vigilant Shield?
NORTHCOM
J73
Modeling and Simulation
What is the objective of Terminal Fury?
To provide a certification venue for JTF-519 during even years and operational capability assessment venue for selected JTFs in odd years.
What is the mission of the J7 Directorate?
Develop and prepare world-class fully capable cyber forces for the present and future, ready to conduct military operations, build partner capacity, and promote engagement through doctrine, education, training, exercises, experimentation, war games and readiness.
Identify some of the major responsibilities of J7.
1. Plan, prepare and execute CYBERCOM joint training projram to ensure readiness of all assigned and attaches forces to execute directed cyber missions.
2. Design, plan, implement and coordinate with combatant commands, services and agencies to develop a cyberspace objectives ensuring cyber operational readiness through training and exercises.
3. Ensure developed exercises that target joint mission essential tasks for known and anticipated operational missions capabilities and leverage effective lessons learned to improve command processes/effect.
What is the objective of Bulwark Defender?
A cyber mission training exercise focused on defending / protecting / operating the DoD GIG while countering adversary.
Identify some governance/authorities for J72, training and readiness.
1. CJCSI 3500.01E
2. CJCSI 6245.01
3. CJCSM 3500.04E
4. CJCSM 3500.03B
5. DODD 1322.18
6. DODD 8570.01
7. DODI 3305.13
8. DODI 3608.11
9. DODI 3608.12
Identify some governance/authorities for J71, exercises.
1. CJCS PLANORD (Exercise Callouts)
2. USSTRATCOM I-Plan
3. USCYBERCOM OPLAN
4. USSTRATCOM Exercise Instruction (51508-9)
What is the objective of Austere Challenge?
To train multiple JTFs:
USAFE-led JTF and CNE/C6F-led JTF.

*It is a EUCOM directed computer assisted command post exercise.
- CJSC-funded.
What is the objective of Global Thunder?
To train USSTRATCOM staff and Task forces in nuclear generation and execution procedures and evaluate current procedures and tactics outlined in USSTRATCOM plans.
What is the objective of Global Lightning?
To provide training opportunities to support the requirement of the Joint Strategic Capabilities and the Command's JMETL; as well as, test and validate nuclear C2 procedures.
Identify some governance/authorities for J7 overall.
1. National Security Strategy.
2. National Strategy Secure Cyberspace.
3. Guidance for the Employment of Force
4. Guidance for the Development of Force
5. Joint Strategic Capabilities Plan
6. Unified Command Plan, 2008
Name 5 of the reoccurring J71 exercises.
Global Thunder
Austere Challenge
Bulwark Defender
Terminal Fury
Global Lightning
Who runs the Bulwark Defender exercise?
NORTHCOM
What are some of the major functional tasks of J82?
1. Assist in planning new acquisitions necessary to support CYBERCOM's mission.
2. Manage mission travel program; providing training and assistance.
3. Manage Govt Purchase card program; reconciling and auditing GPC user accts and providing GPC use training.
4. Oversee budget build activities and execution of the Command's current year funds.
J81
Plans and Programs
J82
Business Operations
PPBE
Planning, Programming, Budgeting and Execution.
What is the mission of the J8 directorate?
Guides the planning, programming, budgeting and execution (PPBE) process in acquiring resources to satisfy mission requirements. Provides procurement and financial mgmt services for effective expenditure of funding. Conducts analysis and assessments to ensure investments are balanced to achieve maximum benefit.
What are some of the major functional tasks of the J8?
1. Conduct financial planning, programming,m budgeting and execution.
2. Support STRATCOM PPBE activities
3. Support the development and validation of operational concepts
4. Conduct analysis for investments in cyberspace.
5. Recommend investments and efficiencies to STRATCOM.
What is the mission of the J81, Plans and Programs?
Compile, develop, and defend the USCC program and supports USCC leadership efforts to prioritize and evaluate its investments in people, technology and facilities.
What are some of the major functional tasks of J81?
1. Establish process to identify capability and resource requirements.
2. Conduct financial planning and programming.
3. Support STRATCOM planning and programming
4. Oversee programming of assigned USCC total obligating authority.
5. Identify and resolve capability gaps
6. Lead in development of analyses for investments in cyberspace.
What is the mission of the J82, Business Operations?
To serve as CYBERCOM's contracts management office, by performing acquisition planning, by managing CYBERCOM's mission travel program, and by overseeing the command's budget and execution processes.