Budget Account
3600F - Research, Development, Test and Evaluation, Air Force
Budget Activity
7 - Operational system development
Description
AF Defensive Cyberspace Operations aims to develop and deploy modernized cyber defenses to protect Air Force networks against advanced cyber threats. The program consists of multiple efforts, including the Firestarter program, which focuses on providing improved capabilities and technical transition opportunities for Cyber Defense and Information Assurance (IA) technologies. The program's objectives include conducting incident response, detection and interception of advanced malware, development of influence capabilities over adversary perceptions of blue cyber assets, and enhancing cyber hardening of infrastructure. Additionally, the program supports the implementation of DoD Enterprise-wide Information Assurance (IA) & Computer Network Defense (CND) Solutions Steering Group (ESSG) solutions.
The AF Defensive Cyberspace Operations program also includes efforts such as the Cyberspace Vulnerability Assessment, Cyber Defense Analysis, and AFCERT. These efforts collectively aim to provide defensive cyberspace capabilities that protect the AFNET and DoD network enclaves against unauthorized intrusion, corruption, and/or destruction. The program's emphasis is on proactive defense, defensive counter cyberspace, cyberspace intelligence, surveillance and reconnaissance, command and control situational awareness, persistent network operations, decision support, recovery, and digital forensics. The program's significant increase in RDT&E funding for FY 2024 reflects the urgency to deploy modernized cyber defenses in the Pacific theater to deter aggression.
Overall, the goals of this budget line item are centered around developing and deploying advanced cyber defense capabilities to safeguard Air Force networks against evolving cyber threats from state actors such as China and Russia. The program aims to enhance incident response capabilities, develop influence over adversary perceptions of blue cyber assets, improve cyber hardening of infrastructure, and support the implementation of enterprise-wide information assurance solutions.