Transcript Document

 20 Countries spanning 4.6M Square Miles
 530M People & 4 Major Religions
 18 Major Languages & 22 Ethnic Groups
IRAQ-SYRIA & GREATER LEVANT
• IRQ: ISIL threatens GoI, regional stability
• SYR: Grinding civil war, groups vie for power
• JOR, LEB, TUR: Risk of spillover violence
IRAN
• Persistent nuclear ambitions
• Growing ITN operational reach, malign
influence threatens U.S., allies, region
AFGHANISTAN-PAKISTAN
Syria
Lebanon
• AFG political transition
fragile
• AFG-PAK safe havens enable VEOs, OTOs
and threaten regional stability
Jordan
SUNNI-SHIA
ISRAELI-PALESTINIAN
• Ideologues/politicians perpetuate an
• Contentious, fuels sectarianism and
“Us vs. Them” narrative
violence
• Local/religious affinities trump
• Third intifada could spark wider conflict
Kazakhstan
national identities, secularism
• Ongoing diplomatic efforts
• VEOs, external actors exploit divisions
PAKISTAN-INDIA
• Trust deficit between nuclear powers
Uzbekistan
Kyrgyzstan
• Sporadic cross-border
violence, militancy
persists
Turkmenistan
Tajikistan
Confrontations
Afghanistan
Iran
Iraq
Kuwait
YEMEN
• Potential civil war portends state collapse/
Saudi
fracture
Arabia
• AQAP safe haven; IRN support to Huthis
• Turmoil threatens geostrategic choke point
Egypt
Conflicts
Situations
Bahrain
Qatar
U.A.E.
Oman
DRIVERS OF INSTABILITY
• Political/economic grievances persist
• Disenfranchisement, economic
uncertainty, and humanitarian crises
Pakistan
• Stalled political transitions and renewed
autocracy
• Ungoverned /Under-governed spaces
PERCEPTIONS OF U.S. ENGAGEMENT
• Competition to supplant U.S. influence
• U.S. intervention fuels distrust, anger
• Security cooperation with regional
partners in high demand
Yemen
USCENTCOM’s strategic environment contains
converging and compounding threats, instability, and
violence as political transitions, civil wars, and aggressive VEOs threaten global security and stability.
• Degrade and ultimately defeat ISIL in order to prevent the further spread of sectarian-fueled radical
extremism, and to mitigate the continuing Iraq-Syria crisis.
Manage
• Continue support to Afghanistan, in partnership with NATO, as a regionally integrated, secure,
stable, and developing country.
• Defeat Al Qaeda, deny violent extremists safe havens and freedom of movement, and limit the reach
of terrorists.
• Counter malign Iranian influence, while reducing and mitigating against the negative impacts of
surrogates and proxies.
• Support a whole of government approach to developments in Yemen, preventing Yemen from
becoming an ungoverned space for AQ/VEOs; retain CT capacity in the region.
• Maintain credible general and specific deterrent capability and capacity to counter Iran.
Prevent
• Prevent, and if required counter, the proliferation of weapons of mass destruction; disrupt their
development and prevent their use.
• Protect lines of communication, ensure free use of the global commons (including the cyber
commons), and secure unimpeded global access for legal commerce
Shape
• Shape, support, and maintain ready, flexible regional Coalitions and partners, as well as cross-CCMD
and interagency US whole-of-government teams, to support crisis response; optimize military
resources
• Develop and execute security cooperation programs, improving bilateral and multilateral
partnerships, building partnered “capacities,” and improving information sharing, security, and
stability
Optimize Theater C5ISR Environment, Capabilities and Mission Command
Manage
• “Fight-Tonight” Mission Partner Environment CENTCOM Partner Network (CPN-X)
• Align Theater Architecture with Joint Information Environment (JIE)
• Multi-Protocol Label Switching (MPLS)
• Joint Regional Security Stack (JRSS)
• Migrate to Defense Enterprise Email (DEE)
• DoD Enterprise to the Tactical Edge
• Split-base Enterprise Operations Center (EOC) at HQ and CENTCOM Forward HQ (CFH)
• Improve User Experience
• C2 On-the-Move – Secure Mobile, Zero-client, etc.
Mission Partner
Environment
(MPE) Objective
Capabilities
Single Cyber
Security
Architecture
(CSA)
JIE Enterprise
to the Edge
Dominate Cyberspace in the CENTCOM Area of Operations
Prevent
• Mature Joint Cyberspace Center (JCC), Joint Force HQ Cyber (JFHQ-C), EOC, & JFHQ-DODIN
• Fully operationalize Cyber Mission Forces (CMF)
• Identify and mitigate Adversary Cyber Threat
Joint Force
Cyber C2
Enduring
Construct
Build CENTCOM Partner Capacity
• C5ISR interoperability and Mission Command
• Cybersecurity
• Operations, Training, Education and Exercise
Shape
Govern the CENTCOM C5ISR Enterprise
• Ensure Effective, Efficient, and Secure Mission Command Capability aligned with the Theater
Campaign Plan and JIE
Enduring C5ISR Missions, Functions and Sustainment
Fully Enabled
Mission
Partners
JIE / MPE
Governance
Enduring
Construct
• The C4 Enterprise Support contract is the largest CCJ6 contract,
which ends in FY17
• The re-compete effort starts this year with gaining permission to
continue with GSA FEDSIM
• CCJ6 is heavily reliant on contingency funding and works
diligently to reduce cost and baseline enduring requirements
Effective
Efficient
Secure
• Simple Solutions to Complex Problems - Ease of Use
• No Six Hump Camels
• Mission Command on the Move
• Device and Transport Agnostic Secure Solutions
• Virtual Desktop, Private Cloud, and Data at Rest
• Persistent Access to Mission Command Systems
• Cost-effective, Non-proprietary solutions to maximize flexibility to
expand and upgrade on demand (Sustainable, Scalable, and
Supportable)
• Manage your talent – we need the first team to remain on the field
• Cybersecurity and Mission Assurance “baked-in” up front – NOT an
afterthought
• Risk Management Framework
• Continuous Monitoring and Analytical Tools