Military Review English Edition July-August 2016 | Page 26

Notes 1. Yogi Berra, The Yogi Book: I Really Didn’t Say Everything I Said! (New York: Workman Publishing Company, 1998). 2. Army Doctrine Publication 5-0, The Operations Process (Washington, DC: U.S. Government Printing Office [GPO], May 2012). Situational understanding is the product of applying analysis and judgment to relevant information to determine the relationship among the operational and mission variables to facilitate decision making. For the purposes of this paper, it equates with situational awareness, which is not defined in joint or Army doctrine. 3. The term cyberspace situational understanding (cyber SU) refers to a notional capability that provides relevant data and information about cyberspace for display on a common operational picture or commander’s dashboard. Cyber SU (the capability) is distinguished from the phrase cyberspace situational awareness (cyber SA), which per Joint Publication ( JP) 3-12(R), Cyberspace Operations (Washington, DC: U.S. GPO, February 2013), refers to the requisite current and predictive knowledge of cyberspace and the operational environment upon which cyberspace operations depend, including all factors affecting friendly and adversary cyberspace forces. 4. Yogi Berra, The Yogi Book. Said on Yogi Berra Appreciation Day, Saint Louis, Missouri, in 1947. 5. Department of Defense, The Joint Concept for Cyberspace ( JCC) (August 2012), 9 (FOUO). 6. Joint Cyber Situational Awareness (Cyber SA) Initial Capabilities Document (ICD), 23 April 2012, approved by the Joint Chiefs of Staff Requirements Oversight Council ( JROC). Available on the JROC Knowledge Management and Decision Support (KM/ DS) System. 7. This statement is the authors’ assessment after comparing the Joint Cyber SA ICD with the Army Cyber Command (ARCYBER)/2nd Army Support Element, Army Cyberspace Operations Capabilities Based Assessment (CBA) Final Report (U.S. Army Training and Doctrine Command [TRADOC], 15 December 2013), 34. See fig. 9, “Functional Needs Analysis Gap Prioritization,” and send document requests to ARCYBER. 8. TRADOC Pamphlet (TP) 525-3-0, The U.S. Army Capstone Concept (Fort Eustis, VA: TRADOC, 2012), 28. 9. Ibid., 33. 10. TP 525-3-1, The U.S. Army Operating Concept: Win in a Complex World 2020-2040 (Fort Eustis, VA: TRADOC, 2014). 11. JP 3-12(R), Cyberspace Operations (Washington, DC: U.S. GPO, February 2013). 12. Army Doctrine Reference Publication 6-0, Mission Command (Washington, DC: U.S. GPO, May 2012). 13. Field Manual (FM) 6-02, Signal Support to Operations (Washington, DC: U.S. GPO, January 2014). 14. Brett T. Williams, “Ten Propositions Regarding Cyberspace Operations,” Joint Force Quarterly 61 (2nd Quarter, 2011): 15. Retired Maj. Gen. Williams is the former J3 of U.S. Cyber Command. 15. Ibid. 16. Yogi Berra and Dave Kaplan, When You Come to a Fork in the Road, Take It!: Inspiration and Wisdom From One of Baseball’s Greatest Heroes (New York: Hyperion Books, 2001). 24 17. Joint Requirements Oversight Council, Manual for the Operation of the Joint Capabilities Integration and Development System ( JCIDS Manual) (12 February 2015). 18. A search of the Capabilities and Army Requirement Oversight Council Management System revealed that, to date, no cyberspace-related documents have been approved by the Army; meanwhile the Air Force and Navy have several approved documents. 19. David G. Perkins, “‘Win in a Complex World’-But How?” Army AL&T Magazine ( January–March 2015). 20. Ibid. 21. Ibid. 22. JCIDS Manual. Information System Capability Development Documents (CDDs) allow sponsors to describe initial minimum values for key performance parameters, key system attributes, and additional performance attributes. Sponsors of software systems, which benefit from continuous technology insertions, may approve follow on documents internally vice through the Joint Requirements Oversight Council. 23. Matthew Maier and Jerry Cook, “Hacking Cyber Stovepipes,” Army AL&T Magazine ( January–March 2015). 24. The three program executive offices (PEO) that have key roles in supporting future cyber technologies are (1) Command, Control, and Communications–Tactical (PEO C3T); (2) Enterprise Information Systems (PEO EIS); and (3) Intel, Electronic Warfare and Sensors (PEO IEW&S). PEO C3T is the lead for defense of the tactical network, PEO EIS is the lead for defense of the enterprise network, and PEO IEW&S is the lead for offensive cyberspace efforts. 25. Maier and Cook, “Hacking Cyber Stovepipes.” 26. Ibid. 27. Yogi Berra and Dave H. Kaplan, You Can Observe a Lot by Watching: What I’ve Learned About Teamwork From the Yankees and Life (Hoboken, NJ: John Wiley & Sons, 2008). 28. FM 6-0, Command and Staff Organization and Operations (Washington, DC: U.S. GPO, May 2014). 29. Department of Defense, Instruction 5000.02, Operation of the Defense Acquisition System, 7 January 2 015, accessed 26 April 2016, http://www.dtic.mil/whs/directives/corres/pdf/500002p. pdf. Several builds and deployments of software will typically be necessary to satisfy approved requirements for an increment of capability. 30. ARCYBER/2nd Army Support Element, Army Cyberspace Operations. 31. Michael J. Pellowski, The Little Giant Book of Baseball Facts (New York: Sterling Publishing Company, 2007). 32. A search of the Capabilities and Army Requirement Oversight Council Management System revealed that, to date, no cyberspace related documents have been approved by the Army; meanwhile the Air Force and Navy have several approved documents. 33. This is a misattributed quote, which Yogi Berra claims he never said. But there are conflicting sources. See Berra and Kaplan, When You Come to a Fork in the Road, Take It. July-August 2016  MILITARY REVIEW