1. David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
Experience Summary
• 30 Years Military experience
• 23 Years Intelligence, Cyber and Identity
Intelligence Experience
• 17 Years’ experience working and coordinating
policy issues involving Cyber, SIGINT,
Biometrics, Identity Intelligence, Controlled
Technical Services and Clandestine Tradecraft
• 5 Years Comptroller Experience
• 6 Years working Cyber Issues in Industry
• Managed and worked the fielding of 41 Large
IT Projects
• Previous Owner, Airborne Ranger Construction
(sold DEC 2012)
Security Clearance
TS Clearance until Jan 19 NOV 2017
• Clearance date 19 NOV 2012
• Scattered Castles TS/SCI
• Life Style Poly 11/23/2010
• Spent 5 years support Focal
Point and was a focal point
officer
• 11 years read on to ACCM
Education
• Visiting Defence Fellow For Queen’s
University Kingston, Ontario, Canada and
completed the U.S. Army War College, 2002
• Masters of Business Administration,
(Boston University), 1991
• Bachelor of Science, Public Management
(University of Arizona), 1978
Additional Info:
• Board of Directors, National Military
Intelligence Association that provides direct
interface with directors of IC Agencies &
Services
• Queen’s University Policy Advisory Board to
the Canadian Privy Council Office (Canadian
West Wing)
• Trained as an Army Strategist 6Z
• ITIL Version 3 Certified
• Trained and Experienced EW Officer:
Worked with Electronic Warfare, SIGINT and
Cyber Operations for 29 years
• Trained in Certified Information Systems
Security Professional and PMP, awaiting
certification
• 15 years experience in analysis and policy
support; 27 years experience in leading
projects and programs; 13 years experience
in facilitating key leadership and decision
making processes; 8 years experience in
leading participation of reports/briefings
briefed at the POTUS, Congressional, or
SECDEF level
Accomplishments
• Deputy Commander of US Army
Intelligence and Security Command
• Previously on NSA Advisory
Board
• Over 34 years lead or participated
in 42 large IT projects and
programs in/out of government
• Consultant with DIA Defense
Clandestine Service (DCS) Office
of Technical Operations (OTO),
making specialized systems,
training, organization and career
progression and use/employment of
Cyber and Cyber support
• With three companies as Director
of Cyber and Intelligence
Operations
• Joint Staff Officer at JSOC &
PACOM
• Distinguished Service Medal
• In charge of several Warfighters
and Mission Rehearsal Exercises
that included IO/Cyber and
Biometrics
1
2. David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
• Summary: 17 years Cyber experience in policy formulation, interpretation and employment of
Cyber capabilities and 25 years experience with SIGINT. Beginning at JSOC in 1999, developed
and aided in the formulation of Cyber Policy so that JSOC could use Cyber, then called Information
Operations, to be integrated into exercises and later real world operations. As the USAEREUR G2 for
Architecture, worked to employ SIGINT and Cyber in operations for support of operations in Bosnia;
Kosovo; Afghanistan; Iraq and other locations. As the Deputy Commander of INSCOM, one of the
primary duties became the development and creation of the US Army Cyber Command, on line
counterintelligence, as well as aiding in the creation and delineation of Cyber Capabilities across the
military to include the later formation of the 780th
Cyber Brigade, expansion and realignment of the
1st
Information Operations Command to support the Army and SOCOM/JSOC and the later creation
of the JSOC CNO Squadron. In industry, continued to help develop policy to for Human Intelligence
to support Cyber and Cyber to support CI/HUMINT. Also aided in the creation and fielding of
several Cyber Capabilities currently used by J3 and J5 USCYBERCOM as well as NSA TAO. All of
these required knowledge of PPDs, NSDPs, HSPDs, PPD-20, PPD-28, NSPD 38 as well as well as
HSPD 23 and helped to provide input into their formation over the years.
• JSOC J2 Plans and OPS June 1999 – June 2001: Aided the JSOC J3 Information Operations
Officer, now MG John Davis, in the planning what is now called Cyber in JSOC exercises. This
required direct coordination with the SECDEF and his staff, NSA and other intelligence organizations
to include White House Advisors. Initially everything was on closed systems and PDAS. Aided in
the interpretation of policy from the JSOC and SOCOM perspective, particularly with NSA and OSD.
This required work from the law and abstract policy level to implementation at the same time. The
policy documents at that time were more primitive and it was difficult to explain the national security
objectives and how JSOC could achieve those objectives through various Cyber/Information
Operations and SIGINT capabilities. It truly required reading all USC Title 10, 50, 20 and 18 as well
as the other existing policy documents at that time. Then proving with our exercise applications the
validity and requirement for Cyber/Information Operations. Those operations could be controlled
without collateral damage. This involved briefings to the SECDEF, his staff, NSA and Congressional
Liaison. This required development, assessment and implementation of several classified projects that
were SAP, STO and others. Some slides about these capabilities and exercises were briefed to
POTUS. All of this was based on warfighter requirements.
• June 2001 – June 2002 Visiting Defence Fellow at Queen’s University, Kingston, Ontario,
Canada and Completion of the US Army War College: Assigned to a think Tank in Canada that
supported the Prime Minister’s Cabinet, the Privy Council Office (Canada’s West Wing), the Chief of
the Canadian Defense Staff, Canada’s NATO representative, Canada’s Doctrine Command and the
Royal Military Academy. Provided policy advice to several ministers and the prime minister that
became classified because the Canadian government did now want the Canadian public to know they
were receiving policy advice from an American serving officer. Aided in the redesign of the
Canadian National Military Command Center and the Privy Council Office with systems that could
aid them in the Global War On Terrorism and with SIGINT and sanitized Cyber
information/intelligence for the Prime Minister and tactical forces. Often reported directly to
DEPSECSTATE Armitage as well as the NSA front office. Read on to the Canadian Official Secrets
act and was often put in awkward situations that required careful coordination with NSA, CIA and the
American Embassy. Made policy recommendations concerning Canadian Foreign and Intelligence
2
3. David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
Policy with the United States, China, Iran, Kosovo, NATO and Bosnia. Selected by Canada and US
State Department to be an Elections Supervisor in Kosovo.
• June 2002 – June 2007 USAREUR G2 Plans, Ops and Architecture: Tasked to aid in the
development of the Architecture in Afghanistan because of demonstrated expertise in USAREUR,
created a project to improve the architecture in Afghanistan that included how SIGINT and Cyber
could better support operations given the state of policy at that time. Personally tasked by the CG
USAREUR with writing the scenarios for all mission rehearsal exercises of all deploying units using
95% real world intelligence and to incorporate real world SIGINT and Cyber/Information Operations
into the exercise. One of the items injected into the exercise was thumb drives being sold on the
economy, everyone laughed that would not happen but once the unit was in Afghanistan they
discovered classified thumb drives being sold at the local market because. Aided in the
implementation of certain special access capabilities for intelligence collection that used both SIGINT
and Cyber for ACCM and Once again, this required careful understanding of policies, as they
existed at the time. Developed theater and Army Service component policy and foreign engagement
places, procedures and regulations for USAREUR G3 for Crisis Action Team and G2 (SIGINT,
Cyber and HUMINT Operations, and Contract Oversight). Directed by the CG USAREUR to lead the
USAREUR G3 Crisis Action Team for 7 months to include mitigation of Cyber threats and
performed command and control of the 173rd
Abn Bde and its’ hand over to SOCCENT CG for
parachute jump into Iraq. Had to assess and downsize USAREUR projects constantly. Reduced from
800 contractors down to 200 over a 5 year period. This was based on operational warfighter
requirements and the lessening of those requirements due to our presence in Kosovo, Bosnia and our
ability to be more effective and efficient with new systems and programs. All of this was based on
Warfighter requirements.
• 2007 – 2009 Deputy Commander US Army Intelligence and Security Command: Selected by the
Army Intelligence Senior Leaders to be the Deputy Commander of INSCOM. Uniquely qualified due
to experience in Cyber policy formulation, force structure, development of programs and projects.
They saw me not just as a manager but a true practitioner that understood Cyber from all of the
aspects of law, policy, establishment of units, and TTPs. Lead recommended changes to Cyber
Policy, USSIDS and other pertinent policies for two years and was in charge of Congressional liaison
for INSCOM. Ensured that INSCOM developed its’ own robust Cyber policy and planning
capability. Often coordinated directly with DIR NSA, OSD Staff and other IC agencies that included
who would be in charge of Cyber in the US Army, how INSCOM would support and deconflict
between US Army Cyber, US Cyber Command, NSA, Combatant Commands, Army Component
Commands, and Special Mission Units. In charge of a $2.2 billion budget with 16,000 personnel.
Provided policy or intelligence analysis as required by the National Command Authority.
Coordinated these issues with other Congress, other agencies and services as well as combatant
commands. Directed to aid in fixes to HUMINT/CI; IT architecture; contracts and moving enduring
missions to based funding. Also had to explain the online CI concept and protect it from other
agencies. This required direct coordination with DIR NSA and explaining how the documents and
policies at the time permitted this kind of operation. Convinced all agencies involved that the Army
Field Support Command, later that Army Operations Group could support Cyber through
CI/HUMINT means that was adopted and currently practiced today. All of this was based on
warfighter requirements.
3
4. David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
• Industry Experience: Provided strategic planning for Computer Sciences Corporation, SOSi,
Sotera, DIA Defense Clandestine Service Office of Technical Operations and NSA. Created Cyber
weapons and tools for use by the USG. Worked with Special Mission Units that work undisclosed
Cyber operations. All of the items described below were based on warfighter requirements generated
in different documents or capabilities the warfighter recognized as something they needed.
• July 2009 – June 2012: Account Executive, Army & Intelligence Operations. Responsibility and
Accomplishments at CSC: Provided strategic guidance and the corporation level and client support at
the business level. CSC mans 6 Security Operations Centers around the world and provides Cyber
Support and Cybersecuirty to the Australian Forces, Banks in over 50 countries and other wide
capabilities. Given bonus and pay raise for increasing CSCs cyber capabilities and offerings. Provided the
mission and threat advice to Eagle Alliance, which provides all the IT support for NSA. PM in support of
DA G2 and USD (I) on classified capabilities. Consultant to DIA Defense Clandestine Service Office of
Technical Operations to help implement a Level III Acquisition Program and the associated policy issues.
Worked these issues with other services, agencies and Combatant Commands. Developed a Level III
Acquisition Program for Controlled Technical Services. Provide DIA Defense Clandestine Services Office
of Technical Operations the exploitation of indigenous sensors. Brought together multidiscipline intel to
support to the government (Cyber, SIGINT, IMINT, OSINT, HUMINT, GEOINT, and MASINT
disciplines; all-source analysis; identity intelligence/biometrics and, intelligence operations research).
Created a cyber weapon/tool that is used by both J5 USCYBERCOMMAND and NSA TAO. Aided CSC
employees that were writing policy documents for Homeland Security, DIA, NSA, NGA and Army
Intelligence. Was used by the corporate headquarters to harmonize and synchronize our policy support so
it was more helpful to the US government.
• July 2012 to 2 Sep 2013: Director, Cyber and Intelligence Operations at Sotera Defense
Solutions. Responsibility and Accomplishments: Oversight of all Cyber and Intel OPS. Continued
to create new capabilities and aid in adjusting policy in support to DIA DCS OTO. To support
Controlled Technical services, help create the career field for Technology Intelligence Offers that
require 83 weeks to train and work with Cyber issues and equipment. Developed the technical
solution to initially win the Electronic Warfare Planning Management Tool ($97.6 million) contract
that was later lost on protest. Won the INSCOM GISS contract the capture and proposal lead but was
working for SOSi when win was announced. Supported work for INSCOM Red Disk at Fort Gordon,
VA that involved Cyber support. Made recommendations to DIA policy writers how DCS HUMINT
all and CI could support Cyber and vice versa. DIR DIA directed that all policy for Cyber had to be
coordinated with me.
• Sep 2012 – Jan 2014: Senior Consultant for Sotera Defense Solutions for Cyber and Intel Ops.
• Jan 2014 – March 2015: Manager, Intelligence Requirements for SOS International working
Cyber and Intelligence Issues: Created a new language test to support specialized SIGINT and
Cyber Operations. Developed new processes that use social media to provide situational awareness,
force protection, battle damage assessment and source/investigative lead development.
• 2009 - 2012: Owner, Airborne Ranger Construction in Tucson, Arizona. Learned to really
prioritize and manage projects at a more finite level than I did in the military and built a Cyber range
at Canon Air Force Base in Clovis, NM.
• Additional Experience: Provided classified support to Special Assistant to the President, Cyber
Security Coordinator at Executive Office of the President, White House
4
5. David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
• Additional Military Experience: Helped develop national level policies at a Combatant Command,
Army Service Component Command, Joint Special Operations Command, and two battalions
deployed (Haiti and Bosnia)
• Future Technologies: Led intelligence community coordination for several Cyber projects that
included DARPA projects, JCTDs, and developing future architecture for an ASCC and US Army
INSCOM, DIA DCS OTO and included biometrics and identity intelligence
• Training: Army Manpower Management Course, PPBES Course, Financial Management of
Intelligence Training, Contract Officer Representative Course, Collection Management and
Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare Course (Ft
Huachuca), US Army Targeting Course, Collection Manager Course, Military Intelligence Transition
Course, Infantry Officer Basic and Advance Course, Command and General Staff Course, Armed
Forces Staff College, US Army Ranger Course, US Army Jumpmaster Course, Air Assault School,
Army G2 and Commanders Course, IMINT Familiarization Course, trained through unit MTTs
Counterintelligence Force Protection Source Operations (CFSO), Joint Services Interrogation
Operations Course (JSIO) UK, G2 CI/HUMINT Familiarization Course, , Counter Surveillance
Training MTT, Reid Deception Detection Training, US Army Mortar Officer Course; Italian
Parachute School; Graduate of the US Army Strategic Planner’s Course. Managed Quickfix
Electronic Warfare helicopters as S3 for 125th
MI Bn, G2 25th
ID for Cobra Gold 1995 in Thailand.
5
6. David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
• Additional Military Experience: Helped develop national level policies at a Combatant Command,
Army Service Component Command, Joint Special Operations Command, and two battalions
deployed (Haiti and Bosnia)
• Future Technologies: Led intelligence community coordination for several Cyber projects that
included DARPA projects, JCTDs, and developing future architecture for an ASCC and US Army
INSCOM, DIA DCS OTO and included biometrics and identity intelligence
• Training: Army Manpower Management Course, PPBES Course, Financial Management of
Intelligence Training, Contract Officer Representative Course, Collection Management and
Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare Course (Ft
Huachuca), US Army Targeting Course, Collection Manager Course, Military Intelligence Transition
Course, Infantry Officer Basic and Advance Course, Command and General Staff Course, Armed
Forces Staff College, US Army Ranger Course, US Army Jumpmaster Course, Air Assault School,
Army G2 and Commanders Course, IMINT Familiarization Course, trained through unit MTTs
Counterintelligence Force Protection Source Operations (CFSO), Joint Services Interrogation
Operations Course (JSIO) UK, G2 CI/HUMINT Familiarization Course, , Counter Surveillance
Training MTT, Reid Deception Detection Training, US Army Mortar Officer Course; Italian
Parachute School; Graduate of the US Army Strategic Planner’s Course. Managed Quickfix
Electronic Warfare helicopters as S3 for 125th
MI Bn, G2 25th
ID for Cobra Gold 1995 in Thailand.
5