Transcript Document
20 Countries spanning 4.6M Square Miles 530M People & 4 Major Religions 18 Major Languages & 22 Ethnic Groups IRAQ-SYRIA & GREATER LEVANT • IRQ: ISIL threatens GoI, regional stability • SYR: Grinding civil war, groups vie for power • JOR, LEB, TUR: Risk of spillover violence IRAN • Persistent nuclear ambitions • Growing ITN operational reach, malign influence threatens U.S., allies, region AFGHANISTAN-PAKISTAN Syria Lebanon • AFG political transition fragile • AFG-PAK safe havens enable VEOs, OTOs and threaten regional stability Jordan SUNNI-SHIA ISRAELI-PALESTINIAN • Ideologues/politicians perpetuate an • Contentious, fuels sectarianism and “Us vs. Them” narrative violence • Local/religious affinities trump • Third intifada could spark wider conflict Kazakhstan national identities, secularism • Ongoing diplomatic efforts • VEOs, external actors exploit divisions PAKISTAN-INDIA • Trust deficit between nuclear powers Uzbekistan Kyrgyzstan • Sporadic cross-border violence, militancy persists Turkmenistan Tajikistan Confrontations Afghanistan Iran Iraq Kuwait YEMEN • Potential civil war portends state collapse/ Saudi fracture Arabia • AQAP safe haven; IRN support to Huthis • Turmoil threatens geostrategic choke point Egypt Conflicts Situations Bahrain Qatar U.A.E. Oman DRIVERS OF INSTABILITY • Political/economic grievances persist • Disenfranchisement, economic uncertainty, and humanitarian crises Pakistan • Stalled political transitions and renewed autocracy • Ungoverned /Under-governed spaces PERCEPTIONS OF U.S. ENGAGEMENT • Competition to supplant U.S. influence • U.S. intervention fuels distrust, anger • Security cooperation with regional partners in high demand Yemen USCENTCOM’s strategic environment contains converging and compounding threats, instability, and violence as political transitions, civil wars, and aggressive VEOs threaten global security and stability. • Degrade and ultimately defeat ISIL in order to prevent the further spread of sectarian-fueled radical extremism, and to mitigate the continuing Iraq-Syria crisis. Manage • Continue support to Afghanistan, in partnership with NATO, as a regionally integrated, secure, stable, and developing country. • Defeat Al Qaeda, deny violent extremists safe havens and freedom of movement, and limit the reach of terrorists. • Counter malign Iranian influence, while reducing and mitigating against the negative impacts of surrogates and proxies. • Support a whole of government approach to developments in Yemen, preventing Yemen from becoming an ungoverned space for AQ/VEOs; retain CT capacity in the region. • Maintain credible general and specific deterrent capability and capacity to counter Iran. Prevent • Prevent, and if required counter, the proliferation of weapons of mass destruction; disrupt their development and prevent their use. • Protect lines of communication, ensure free use of the global commons (including the cyber commons), and secure unimpeded global access for legal commerce Shape • Shape, support, and maintain ready, flexible regional Coalitions and partners, as well as cross-CCMD and interagency US whole-of-government teams, to support crisis response; optimize military resources • Develop and execute security cooperation programs, improving bilateral and multilateral partnerships, building partnered “capacities,” and improving information sharing, security, and stability Optimize Theater C5ISR Environment, Capabilities and Mission Command Manage • “Fight-Tonight” Mission Partner Environment CENTCOM Partner Network (CPN-X) • Align Theater Architecture with Joint Information Environment (JIE) • Multi-Protocol Label Switching (MPLS) • Joint Regional Security Stack (JRSS) • Migrate to Defense Enterprise Email (DEE) • DoD Enterprise to the Tactical Edge • Split-base Enterprise Operations Center (EOC) at HQ and CENTCOM Forward HQ (CFH) • Improve User Experience • C2 On-the-Move – Secure Mobile, Zero-client, etc. Mission Partner Environment (MPE) Objective Capabilities Single Cyber Security Architecture (CSA) JIE Enterprise to the Edge Dominate Cyberspace in the CENTCOM Area of Operations Prevent • Mature Joint Cyberspace Center (JCC), Joint Force HQ Cyber (JFHQ-C), EOC, & JFHQ-DODIN • Fully operationalize Cyber Mission Forces (CMF) • Identify and mitigate Adversary Cyber Threat Joint Force Cyber C2 Enduring Construct Build CENTCOM Partner Capacity • C5ISR interoperability and Mission Command • Cybersecurity • Operations, Training, Education and Exercise Shape Govern the CENTCOM C5ISR Enterprise • Ensure Effective, Efficient, and Secure Mission Command Capability aligned with the Theater Campaign Plan and JIE Enduring C5ISR Missions, Functions and Sustainment Fully Enabled Mission Partners JIE / MPE Governance Enduring Construct • The C4 Enterprise Support contract is the largest CCJ6 contract, which ends in FY17 • The re-compete effort starts this year with gaining permission to continue with GSA FEDSIM • CCJ6 is heavily reliant on contingency funding and works diligently to reduce cost and baseline enduring requirements Effective Efficient Secure • Simple Solutions to Complex Problems - Ease of Use • No Six Hump Camels • Mission Command on the Move • Device and Transport Agnostic Secure Solutions • Virtual Desktop, Private Cloud, and Data at Rest • Persistent Access to Mission Command Systems • Cost-effective, Non-proprietary solutions to maximize flexibility to expand and upgrade on demand (Sustainable, Scalable, and Supportable) • Manage your talent – we need the first team to remain on the field • Cybersecurity and Mission Assurance “baked-in” up front – NOT an afterthought • Risk Management Framework • Continuous Monitoring and Analytical Tools