206:
The JTF-GNO functions in accordance with
Unified Command Plan 2002 (Change 2) and the Joint Concept of Operations for GIG NetOps, assuring Global Information Superiority by achieving the three assurances outlined in the Joint Concept of Operations for GIG NetOps: Assured System and Network
181:
as the new
Commander of the Joint Task Force-Global Network Operations. With this designation, the new command assumed the responsibility for directing the operation and defense of the
226:
The JTF-GNO was authorized 255 positions at the height of its operations in early 2009. Lieutenant
General Carroll F. Pollett was the Commander of JTF-GNO during its disestablishment.
188:
This transformation enhanced the JTF GNO's mission and objectives was crucial in pushing towards the Joint Vision 2020 Objectives and the evolving concept of Net-Centricity.
331:
321:
166:
CONOPS” provided the common framework and command and control structure to conduct the USSTRATCOM Unified
Command Plan-assigned mission of Global
285:
117:
Identifies emerging technologies and their associated threats in order to integrate migrations and response actions into current CND posture.
138:
111:(CND) and Regions individually and cumulatively for their impact on the "warfighter’s" ability to carry out current and future missions.
89:
Identifies significant threats to the GIG. Develop, disseminate and implement countermeasures to these threats in a timely manner via
211:
90:
326:
170:, combining the disciplines of enterprise systems and network management, network defense, and information decision management.
134:(JTF-CND), which achieved initial operational capability on 30 December 1998 and full operational capability by June 1999.
195:
127:
178:
174:
71:
259:
244:
27:
83:
50:
108:
54:
151:
The JTF-CNO began its largest and most comprehensive transformation in April 2004 when the
Commander of
191:
96:
79:
305:
35:
182:
156:
145:(JTF-CNO). In October 2002, the new Unified Command Plan, Change 2, re-aligned JTF-CNO under the
31:
336:
42:
270:
8:
292:
215:
286:
Keeping ahead of cyberfoes remains the key to protecting information technology assets
104:
67:
177:
signed a delegation of authority letter on 18 June 2004, designating the
Director,
114:
Coordinates the response actions taken by the CC/S/A CND service providers (CNDSP).
100:
248:
207:
Availability, Assured
Information Protection, and Assured Information Delivery.
34:(GIG) across strategic, operational, and tactical boundaries in support of the
315:
210:
The Task Force has a number of associated service components, including the
241:
75:
38:
full spectrum of war fighting, intelligence, and business operations.
137:
In the fall of 2000, the JTF-CND assumed responsibility for the DoD
152:
146:
46:
167:
163:
159:
130:
recognized a growing cyber threat and in response created the
30:
whose mission was to: direct the operation and defense of the
49:, in April 2010 as part of decisions reached under the 2005
53:
process. JTF-GNO was dissolved and incorporated within the
306:
Joint Task Force-Global
Network Operations (JTF-GNO)
332:
Joint task forces of the United States Armed Forces
91:
Information
Assurance Vulnerability Messages (IAVM)
70:anomalies that affect the GIG's ability to support
322:Military units and formations established in 2004
313:
260:Cyber Task Force passes mission to Cyber Command
155:approved the Joint Concept of Operations for
147:United States Strategic Command (USSTRATCOM)
143:Joint Task Force—Computer Network Operations
60:
41:The Task Force's operations were moved to
20:Joint Task Force-Global Network Operations
212:1st Information Operations Command (Land)
132:Joint Task Force-Computer Network Defense
314:
198:networks nearly 75,000 times in 2004.
284:Ackerman, Robert K. (August 2005). “
201:
291:Brooks, Peter. (August 30, 2005). “
196:United States Department of Defense
95:Assesses the incidents reported by
13:
14:
348:
299:
327:United States Strategic Command
278:
139:computer network attack mission
28:United States Strategic Command
26:) was a subordinate command of
264:
253:
235:
1:
229:
221:
51:Base Realignment and Closure
7:
55:United States Cyber Command
10:
353:
295:.” The Heritage Foundation
121:
36:US Department of Defense's
109:computer network defense
66:Identifies and resolves
61:Primary responsibilities
242:Factsheet at USSTRATCOM
32:Global Information Grid
16:Global Information Grid
293:The Art of (Cyber) War
57:on September 7, 2010.
128:Department of Defense
175:Secretary of Defense
153:US Strategic Command
72:Secretary of Defense
308:(restricted access)
194:attempted to enter
74:(SECDEF) elements,
288:.” Signal Magazine
247:2009-05-28 at the
216:United States Army
168:Network Operations
160:Network Operations
80:Combatant Commands
214:, the affiliated
202:Former operations
97:Combatant Command
68:computer security
344:
273:
268:
262:
257:
251:
239:
352:
351:
347:
346:
345:
343:
342:
341:
312:
311:
302:
281:
276:
269:
265:
258:
254:
249:Wayback Machine
240:
236:
232:
224:
204:
141:and became the
124:
63:
17:
12:
11:
5:
350:
340:
339:
334:
329:
324:
310:
309:
301:
300:External links
298:
297:
296:
289:
280:
277:
275:
274:
263:
252:
233:
231:
228:
223:
220:
203:
200:
123:
120:
119:
118:
115:
112:
93:
87:
62:
59:
15:
9:
6:
4:
3:
2:
349:
338:
335:
333:
330:
328:
325:
323:
320:
319:
317:
307:
304:
303:
294:
290:
287:
283:
282:
272:
267:
261:
256:
250:
246:
243:
238:
234:
227:
219:
217:
213:
208:
199:
197:
193:
189:
186:
184:
180:
176:
171:
169:
165:
161:
158:
154:
149:
148:
144:
140:
135:
133:
129:
116:
113:
110:
106:
102:
98:
94:
92:
88:
85:
81:
77:
73:
69:
65:
64:
58:
56:
52:
48:
44:
39:
37:
33:
29:
25:
21:
279:Bibliography
266:
255:
237:
225:
209:
205:
190:
187:
172:
150:
142:
136:
131:
126:In 1998 the
125:
84:"warfighter"
78:, Supported
40:
23:
19:
18:
337:Net-centric
218:formation.
76:Joint Staff
316:Categories
230:References
43:Fort Meade
271:Wired.com
222:Personnel
107:(CC/S/A)
245:Archived
162:. This “
82:and the
47:Maryland
192:Hackers
122:History
101:service
24:JTF-GNO
164:NetOps
105:agency
103:, and
179:DISA
173:The
183:GIG
157:GIG
318::
185:.
99:,
45:,
86:.
22:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.