Link Search Menu Expand Document

This is the mobile-friendly web version of the original article.

Jack Voltaic 3.0 Cyber Research Report

Jack Voltaic 3.0 Cyber Research Report

United States Military Academy

USMA Digital Commons

ACI Technical Reports, Army Cyber Institute

March 2021

Erica Mitchell
Army Cyber Institute, [email protected]

Douglas Fletcher
Army Cyber Institute

Erik Korn
Army Cyber Institute

Steven Whitham
Army Cyber Institute

Jason Hillman
Army Cyber Institute

Video: The Army Cyber Institute


Recommended Citation Mitchell, Erica; Fletcher, Douglas; Korn, Erik; Whitham, Steven; Hillman, Jason; Yearwood, Ron; Walker, Clint; Pyke, Aryn; Weaver, Gabriel; Pugh, Brandon; Hutton, Katherine; Platsis, George; Klett, Timothy; and Hruska, Ryan, “Jack Voltaic 3.0 Cyber Research Report” (2021). ACI Technical Reports. 46. https://digitalcommons.usmalibrary.org/aci_rp/46

This Other is brought to you for free and open access by the Army Cyber Institute at USMA Digital Commons. It has been accepted for inclusion in ACI Technical Reports by an authorized administrator of USMA Digital Commons. For more information, please contact [email protected].


Authors Erica Mitchell, Douglas Fletcher, Erik Korn, Steven Whitham, Jason Hillman, Ron Yearwood, Clint Walker, Aryn Pyke, Gabriel Weaver, Brandon Pugh, Katherine Hutton, George Platsis, Timothy Klett, and Ryan Hruska

  1. CONTENTS

JACK VOLTAIC 3.0

Cyber Research Report

Prepare | Prevent | Respond

Increasingly Connected, Ready to Respond

The Jack Voltaic (JV) Cyber Research Project is an innovative, bottom-up approach to critical infrastructure resilience that informs our understanding of existing cybersecurity capabilities and identifies gaps. JV 3.0 contributed to a repeatable framework cities and municipalities Nationwide can use to prepare. This report on JV 3.0 provides findings and recommendations for the military, federal agencies, and policy makers

Lt. Col. Doug Fletcher / Lt. Col. Erica Mitchell / Maj. Erik Korn Maj. Steve Whitham / Maj. Jason Hillman / Ron Yearwood Clint Walker / Dr. Aryn Pyke / Dr. Gabriel Weaver / Brandon Pugh Katherine Hutton / George Platsis / Timothy Klett / Ryan Hruska

CONTENTS

  1. FOREWORD

  2. ACKNOWLEDGMENTS

  3. INTRODUCTION: JACK VOLTAIC 3.0
    • 3.1. Fictional Crisis
    • 3.2. Origin and History of Jack Voltaic
  4. JACK VOLTAIC RESEARCH METHODOLOGY
    • 4.1. Introduction
    • 4.2. Research Objectives
    • 4.3. Components
    • 4.4. Planning Time Line
    • 4.5. Partners
    • 4.6. Participants
    • 4.7. Scenario
    • 4.8. Data Collection and Analysis Plan
  5. EXECUTION
    • 5.1. Coronavirus Disease 2019 (COVID-19) / Jack Pandemus
    • 5.2. Event Design
    • 5.3. Event
    • 5.4. Post-Event
    • 5.5. Executive Out-Brief and Discussion
  6. FINDINGS
    • 6.1. Examine the Impact of a Cyber Event on Army Force Projection
    • 6.2. Exercise the Cities of Charleston and Savannah in Cyber Incident Response
    • 6.3. Reinforce a Whole-of-Community Approach
    • 6.4. Examine the Coordination Process for Providing Cyber Protection Capabilities in Support of DSCA
    • 6.5. Support the Development of an Adaptable and Repeatable Framework
    • 6.6. Recommendations
  7. CONCLUSION
  • APPENDIX A – ACRONYMS

  • APPENDIX B – PARTNERS
    • B.1. Partners
    • B.2. Core Partners
    • B.3. Major Contributors
  • APPENDIX C – SCENARIO
    • C.1. Scenario Design
    • C.2. Scene Setter
    • C.3. Turns 1–3 (ROC Drills and Preplay)
    • C.4. Turns 4–7 (JV 3.0 Exercise Main Play)
  • APPENDIX D – LAW/POLICY TABLETOP EXERCISE (TTX).

  • APPENDIX E – LIVE-FIRE EXERCISE

  • APPENDIX F – MILITARY TESTIMONIALS
    • F.1. 3rd Infantry Division (3ID)
    • F.2. Military Surface Deployment and Distribution Command (SDDC)
  • APPENDIX G – PRIVATE INDUSTRY TESTIMONIALS
    • G1. Intrepid Response
  • APPENDIX H – ALL HAZARDS ANALYSIS (AHA)
    • H.1. Charleston Exercise Findings
    • H.2. Savannah Exercise Findings
    • H.3. Lessons Learned
  • APPENDIX I – CIRI FORT-TO-PORT DISRUPTION

  • APPENDIX J – REQUIRED DELIVERY DATE (RDD) SIMULATION
    • J.1. Results: Remain at Original Port
    • J.2. Results: Shift to a New Port
    • J.3. Conclusions
    • J.4. Source Code
  • APPENDIX K – DSCA/DSCIR

Table of contents