SlideShare ist ein Scribd-Unternehmen logo
1 von 6
David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
Experience Summary
• 30 Years Military experience
• 23 Years Intelligence, Cyber and Identity
Intelligence Experience
• 17 Years’ experience working and coordinating
policy issues involving Cyber, SIGINT,
Biometrics, Identity Intelligence, Controlled
Technical Services and Clandestine Tradecraft
• 5 Years Comptroller Experience
• 6 Years working Cyber Issues in Industry
• Managed and worked the fielding of 41 Large
IT Projects
• Previous Owner, Airborne Ranger Construction
(sold DEC 2012)
Security Clearance
TS Clearance until Jan 19 NOV 2017
• Clearance date 19 NOV 2012
• Scattered Castles TS/SCI
• Life Style Poly 11/23/2010
• Spent 5 years support Focal
Point and was a focal point
officer
• 11 years read on to ACCM
Education
• Visiting Defence Fellow For Queen’s
University Kingston, Ontario, Canada and
completed the U.S. Army War College, 2002
• Masters of Business Administration,
(Boston University), 1991
• Bachelor of Science, Public Management
(University of Arizona), 1978
Additional Info:
• Board of Directors, National Military
Intelligence Association that provides direct
interface with directors of IC Agencies &
Services
• Queen’s University Policy Advisory Board to
the Canadian Privy Council Office (Canadian
West Wing)
• Trained as an Army Strategist 6Z
• ITIL Version 3 Certified
• Trained and Experienced EW Officer:
Worked with Electronic Warfare, SIGINT and
Cyber Operations for 29 years
• Trained in Certified Information Systems
Security Professional and PMP, awaiting
certification
• 15 years experience in analysis and policy
support; 27 years experience in leading
projects and programs; 13 years experience
in facilitating key leadership and decision
making processes; 8 years experience in
leading participation of reports/briefings
briefed at the POTUS, Congressional, or
SECDEF level
Accomplishments
• Deputy Commander of US Army
Intelligence and Security Command
• Previously on NSA Advisory
Board
• Over 34 years lead or participated
in 42 large IT projects and
programs in/out of government
• Consultant with DIA Defense
Clandestine Service (DCS) Office
of Technical Operations (OTO),
making specialized systems,
training, organization and career
progression and use/employment of
Cyber and Cyber support
• With three companies as Director
of Cyber and Intelligence
Operations
• Joint Staff Officer at JSOC &
PACOM
• Distinguished Service Medal
• In charge of several Warfighters
and Mission Rehearsal Exercises
that included IO/Cyber and
Biometrics
1
David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
• Summary: 17 years Cyber experience in policy formulation, interpretation and employment of
Cyber capabilities and 25 years experience with SIGINT. Beginning at JSOC in 1999, developed
and aided in the formulation of Cyber Policy so that JSOC could use Cyber, then called Information
Operations, to be integrated into exercises and later real world operations. As the USAEREUR G2 for
Architecture, worked to employ SIGINT and Cyber in operations for support of operations in Bosnia;
Kosovo; Afghanistan; Iraq and other locations. As the Deputy Commander of INSCOM, one of the
primary duties became the development and creation of the US Army Cyber Command, on line
counterintelligence, as well as aiding in the creation and delineation of Cyber Capabilities across the
military to include the later formation of the 780th
Cyber Brigade, expansion and realignment of the
1st
Information Operations Command to support the Army and SOCOM/JSOC and the later creation
of the JSOC CNO Squadron. In industry, continued to help develop policy to for Human Intelligence
to support Cyber and Cyber to support CI/HUMINT. Also aided in the creation and fielding of
several Cyber Capabilities currently used by J3 and J5 USCYBERCOM as well as NSA TAO. All of
these required knowledge of PPDs, NSDPs, HSPDs, PPD-20, PPD-28, NSPD 38 as well as well as
HSPD 23 and helped to provide input into their formation over the years.
• JSOC J2 Plans and OPS June 1999 – June 2001: Aided the JSOC J3 Information Operations
Officer, now MG John Davis, in the planning what is now called Cyber in JSOC exercises. This
required direct coordination with the SECDEF and his staff, NSA and other intelligence organizations
to include White House Advisors. Initially everything was on closed systems and PDAS. Aided in
the interpretation of policy from the JSOC and SOCOM perspective, particularly with NSA and OSD.
This required work from the law and abstract policy level to implementation at the same time. The
policy documents at that time were more primitive and it was difficult to explain the national security
objectives and how JSOC could achieve those objectives through various Cyber/Information
Operations and SIGINT capabilities. It truly required reading all USC Title 10, 50, 20 and 18 as well
as the other existing policy documents at that time. Then proving with our exercise applications the
validity and requirement for Cyber/Information Operations. Those operations could be controlled
without collateral damage. This involved briefings to the SECDEF, his staff, NSA and Congressional
Liaison. This required development, assessment and implementation of several classified projects that
were SAP, STO and others. Some slides about these capabilities and exercises were briefed to
POTUS. All of this was based on warfighter requirements.
• June 2001 – June 2002 Visiting Defence Fellow at Queen’s University, Kingston, Ontario,
Canada and Completion of the US Army War College: Assigned to a think Tank in Canada that
supported the Prime Minister’s Cabinet, the Privy Council Office (Canada’s West Wing), the Chief of
the Canadian Defense Staff, Canada’s NATO representative, Canada’s Doctrine Command and the
Royal Military Academy. Provided policy advice to several ministers and the prime minister that
became classified because the Canadian government did now want the Canadian public to know they
were receiving policy advice from an American serving officer. Aided in the redesign of the
Canadian National Military Command Center and the Privy Council Office with systems that could
aid them in the Global War On Terrorism and with SIGINT and sanitized Cyber
information/intelligence for the Prime Minister and tactical forces. Often reported directly to
DEPSECSTATE Armitage as well as the NSA front office. Read on to the Canadian Official Secrets
act and was often put in awkward situations that required careful coordination with NSA, CIA and the
American Embassy. Made policy recommendations concerning Canadian Foreign and Intelligence
2
David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
Policy with the United States, China, Iran, Kosovo, NATO and Bosnia. Selected by Canada and US
State Department to be an Elections Supervisor in Kosovo.
• June 2002 – June 2007 USAREUR G2 Plans, Ops and Architecture: Tasked to aid in the
development of the Architecture in Afghanistan because of demonstrated expertise in USAREUR,
created a project to improve the architecture in Afghanistan that included how SIGINT and Cyber
could better support operations given the state of policy at that time. Personally tasked by the CG
USAREUR with writing the scenarios for all mission rehearsal exercises of all deploying units using
95% real world intelligence and to incorporate real world SIGINT and Cyber/Information Operations
into the exercise. One of the items injected into the exercise was thumb drives being sold on the
economy, everyone laughed that would not happen but once the unit was in Afghanistan they
discovered classified thumb drives being sold at the local market because. Aided in the
implementation of certain special access capabilities for intelligence collection that used both SIGINT
and Cyber for ACCM and Once again, this required careful understanding of policies, as they
existed at the time. Developed theater and Army Service component policy and foreign engagement
places, procedures and regulations for USAREUR G3 for Crisis Action Team and G2 (SIGINT,
Cyber and HUMINT Operations, and Contract Oversight). Directed by the CG USAREUR to lead the
USAREUR G3 Crisis Action Team for 7 months to include mitigation of Cyber threats and
performed command and control of the 173rd
Abn Bde and its’ hand over to SOCCENT CG for
parachute jump into Iraq. Had to assess and downsize USAREUR projects constantly. Reduced from
800 contractors down to 200 over a 5 year period. This was based on operational warfighter
requirements and the lessening of those requirements due to our presence in Kosovo, Bosnia and our
ability to be more effective and efficient with new systems and programs. All of this was based on
Warfighter requirements.
• 2007 – 2009 Deputy Commander US Army Intelligence and Security Command: Selected by the
Army Intelligence Senior Leaders to be the Deputy Commander of INSCOM. Uniquely qualified due
to experience in Cyber policy formulation, force structure, development of programs and projects.
They saw me not just as a manager but a true practitioner that understood Cyber from all of the
aspects of law, policy, establishment of units, and TTPs. Lead recommended changes to Cyber
Policy, USSIDS and other pertinent policies for two years and was in charge of Congressional liaison
for INSCOM. Ensured that INSCOM developed its’ own robust Cyber policy and planning
capability. Often coordinated directly with DIR NSA, OSD Staff and other IC agencies that included
who would be in charge of Cyber in the US Army, how INSCOM would support and deconflict
between US Army Cyber, US Cyber Command, NSA, Combatant Commands, Army Component
Commands, and Special Mission Units. In charge of a $2.2 billion budget with 16,000 personnel.
Provided policy or intelligence analysis as required by the National Command Authority.
Coordinated these issues with other Congress, other agencies and services as well as combatant
commands. Directed to aid in fixes to HUMINT/CI; IT architecture; contracts and moving enduring
missions to based funding. Also had to explain the online CI concept and protect it from other
agencies. This required direct coordination with DIR NSA and explaining how the documents and
policies at the time permitted this kind of operation. Convinced all agencies involved that the Army
Field Support Command, later that Army Operations Group could support Cyber through
CI/HUMINT means that was adopted and currently practiced today. All of this was based on
warfighter requirements.
3
David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
• Industry Experience: Provided strategic planning for Computer Sciences Corporation, SOSi,
Sotera, DIA Defense Clandestine Service Office of Technical Operations and NSA. Created Cyber
weapons and tools for use by the USG. Worked with Special Mission Units that work undisclosed
Cyber operations. All of the items described below were based on warfighter requirements generated
in different documents or capabilities the warfighter recognized as something they needed.
• July 2009 – June 2012: Account Executive, Army & Intelligence Operations. Responsibility and
Accomplishments at CSC: Provided strategic guidance and the corporation level and client support at
the business level. CSC mans 6 Security Operations Centers around the world and provides Cyber
Support and Cybersecuirty to the Australian Forces, Banks in over 50 countries and other wide
capabilities. Given bonus and pay raise for increasing CSCs cyber capabilities and offerings. Provided the
mission and threat advice to Eagle Alliance, which provides all the IT support for NSA. PM in support of
DA G2 and USD (I) on classified capabilities. Consultant to DIA Defense Clandestine Service Office of
Technical Operations to help implement a Level III Acquisition Program and the associated policy issues.
Worked these issues with other services, agencies and Combatant Commands. Developed a Level III
Acquisition Program for Controlled Technical Services. Provide DIA Defense Clandestine Services Office
of Technical Operations the exploitation of indigenous sensors. Brought together multidiscipline intel to
support to the government (Cyber, SIGINT, IMINT, OSINT, HUMINT, GEOINT, and MASINT
disciplines; all-source analysis; identity intelligence/biometrics and, intelligence operations research).
Created a cyber weapon/tool that is used by both J5 USCYBERCOMMAND and NSA TAO. Aided CSC
employees that were writing policy documents for Homeland Security, DIA, NSA, NGA and Army
Intelligence. Was used by the corporate headquarters to harmonize and synchronize our policy support so
it was more helpful to the US government.
• July 2012 to 2 Sep 2013: Director, Cyber and Intelligence Operations at Sotera Defense
Solutions. Responsibility and Accomplishments: Oversight of all Cyber and Intel OPS. Continued
to create new capabilities and aid in adjusting policy in support to DIA DCS OTO. To support
Controlled Technical services, help create the career field for Technology Intelligence Offers that
require 83 weeks to train and work with Cyber issues and equipment. Developed the technical
solution to initially win the Electronic Warfare Planning Management Tool ($97.6 million) contract
that was later lost on protest. Won the INSCOM GISS contract the capture and proposal lead but was
working for SOSi when win was announced. Supported work for INSCOM Red Disk at Fort Gordon,
VA that involved Cyber support. Made recommendations to DIA policy writers how DCS HUMINT
all and CI could support Cyber and vice versa. DIR DIA directed that all policy for Cyber had to be
coordinated with me.
• Sep 2012 – Jan 2014: Senior Consultant for Sotera Defense Solutions for Cyber and Intel Ops.
• Jan 2014 – March 2015: Manager, Intelligence Requirements for SOS International working
Cyber and Intelligence Issues: Created a new language test to support specialized SIGINT and
Cyber Operations. Developed new processes that use social media to provide situational awareness,
force protection, battle damage assessment and source/investigative lead development.
• 2009 - 2012: Owner, Airborne Ranger Construction in Tucson, Arizona. Learned to really
prioritize and manage projects at a more finite level than I did in the military and built a Cyber range
at Canon Air Force Base in Clovis, NM.
• Additional Experience: Provided classified support to Special Assistant to the President, Cyber
Security Coordinator at Executive Office of the President, White House
4
David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
• Additional Military Experience: Helped develop national level policies at a Combatant Command,
Army Service Component Command, Joint Special Operations Command, and two battalions
deployed (Haiti and Bosnia)
• Future Technologies: Led intelligence community coordination for several Cyber projects that
included DARPA projects, JCTDs, and developing future architecture for an ASCC and US Army
INSCOM, DIA DCS OTO and included biometrics and identity intelligence
• Training: Army Manpower Management Course, PPBES Course, Financial Management of
Intelligence Training, Contract Officer Representative Course, Collection Management and
Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare Course (Ft
Huachuca), US Army Targeting Course, Collection Manager Course, Military Intelligence Transition
Course, Infantry Officer Basic and Advance Course, Command and General Staff Course, Armed
Forces Staff College, US Army Ranger Course, US Army Jumpmaster Course, Air Assault School,
Army G2 and Commanders Course, IMINT Familiarization Course, trained through unit MTTs
Counterintelligence Force Protection Source Operations (CFSO), Joint Services Interrogation
Operations Course (JSIO) UK, G2 CI/HUMINT Familiarization Course, , Counter Surveillance
Training MTT, Reid Deception Detection Training, US Army Mortar Officer Course; Italian
Parachute School; Graduate of the US Army Strategic Planner’s Course. Managed Quickfix
Electronic Warfare helicopters as S3 for 125th
MI Bn, G2 25th
ID for Cobra Gold 1995 in Thailand.
5
David Hale
Email: dhalejr@hotmail.com
Tel: 571 484 6530
• Additional Military Experience: Helped develop national level policies at a Combatant Command,
Army Service Component Command, Joint Special Operations Command, and two battalions
deployed (Haiti and Bosnia)
• Future Technologies: Led intelligence community coordination for several Cyber projects that
included DARPA projects, JCTDs, and developing future architecture for an ASCC and US Army
INSCOM, DIA DCS OTO and included biometrics and identity intelligence
• Training: Army Manpower Management Course, PPBES Course, Financial Management of
Intelligence Training, Contract Officer Representative Course, Collection Management and
Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare Course (Ft
Huachuca), US Army Targeting Course, Collection Manager Course, Military Intelligence Transition
Course, Infantry Officer Basic and Advance Course, Command and General Staff Course, Armed
Forces Staff College, US Army Ranger Course, US Army Jumpmaster Course, Air Assault School,
Army G2 and Commanders Course, IMINT Familiarization Course, trained through unit MTTs
Counterintelligence Force Protection Source Operations (CFSO), Joint Services Interrogation
Operations Course (JSIO) UK, G2 CI/HUMINT Familiarization Course, , Counter Surveillance
Training MTT, Reid Deception Detection Training, US Army Mortar Officer Course; Italian
Parachute School; Graduate of the US Army Strategic Planner’s Course. Managed Quickfix
Electronic Warfare helicopters as S3 for 125th
MI Bn, G2 25th
ID for Cobra Gold 1995 in Thailand.
5

Weitere ähnliche Inhalte

Andere mochten auch

071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation Overlay071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation Overlay
Mintcho Mintchev
 
Small Wars Journal_Identity and Biometrics Enabled Intelligence (BEI)_MAR_16
Small Wars Journal_Identity and Biometrics Enabled Intelligence (BEI)_MAR_16Small Wars Journal_Identity and Biometrics Enabled Intelligence (BEI)_MAR_16
Small Wars Journal_Identity and Biometrics Enabled Intelligence (BEI)_MAR_16
Victor R. Morris
 
Military symbols
Military symbolsMilitary symbols
Military symbols
Rudy Flores
 
Intelligence Specialist Resume
Intelligence Specialist ResumeIntelligence Specialist Resume
Intelligence Specialist Resume
Jennifer Ng
 
Military_Intelligence_Professional_Bulletin_OCT_DEC_2015
Military_Intelligence_Professional_Bulletin_OCT_DEC_2015Military_Intelligence_Professional_Bulletin_OCT_DEC_2015
Military_Intelligence_Professional_Bulletin_OCT_DEC_2015
Victor R. Morris
 
Military Decision Making Process (Mar 08) 3
Military Decision Making Process (Mar 08) 3Military Decision Making Process (Mar 08) 3
Military Decision Making Process (Mar 08) 3
Thomas cleary
 
Military_Intelligence_Professional_Bulletin_APR_JUN_2015
Military_Intelligence_Professional_Bulletin_APR_JUN_2015Military_Intelligence_Professional_Bulletin_APR_JUN_2015
Military_Intelligence_Professional_Bulletin_APR_JUN_2015
Victor R. Morris
 
TRADOC OE Operational Environment 2010-2025
TRADOC OE Operational Environment 2010-2025TRADOC OE Operational Environment 2010-2025
TRADOC OE Operational Environment 2010-2025
US Army TRADOC G2
 

Andere mochten auch (20)

ISR Systems Development
ISR Systems DevelopmentISR Systems Development
ISR Systems Development
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military Networks
 
071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation Overlay071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation Overlay
 
Small Wars Journal_Identity and Biometrics Enabled Intelligence (BEI)_MAR_16
Small Wars Journal_Identity and Biometrics Enabled Intelligence (BEI)_MAR_16Small Wars Journal_Identity and Biometrics Enabled Intelligence (BEI)_MAR_16
Small Wars Journal_Identity and Biometrics Enabled Intelligence (BEI)_MAR_16
 
PMESII-DIME framework
PMESII-DIME frameworkPMESII-DIME framework
PMESII-DIME framework
 
Military symbols
Military symbolsMilitary symbols
Military symbols
 
The Enterprise Integrator - C4ISR
The Enterprise Integrator - C4ISRThe Enterprise Integrator - C4ISR
The Enterprise Integrator - C4ISR
 
Counter Guerrilla Warfare
Counter Guerrilla WarfareCounter Guerrilla Warfare
Counter Guerrilla Warfare
 
KOKODA: So it was at Kokoda? [Humanities]
KOKODA:  So it was at Kokoda? [Humanities]KOKODA:  So it was at Kokoda? [Humanities]
KOKODA: So it was at Kokoda? [Humanities]
 
Intelligence Specialist Resume
Intelligence Specialist ResumeIntelligence Specialist Resume
Intelligence Specialist Resume
 
Mdmp How To Guide
Mdmp How To GuideMdmp How To Guide
Mdmp How To Guide
 
Military_Review_JAN_2017
Military_Review_JAN_2017Military_Review_JAN_2017
Military_Review_JAN_2017
 
Military_Intelligence_Professional_Bulletin_OCT_DEC_2015
Military_Intelligence_Professional_Bulletin_OCT_DEC_2015Military_Intelligence_Professional_Bulletin_OCT_DEC_2015
Military_Intelligence_Professional_Bulletin_OCT_DEC_2015
 
Military Decision Making Process (Mar 08) 3
Military Decision Making Process (Mar 08) 3Military Decision Making Process (Mar 08) 3
Military Decision Making Process (Mar 08) 3
 
Military_Intelligence_Professional_Bulletin_APR_JUN_2015
Military_Intelligence_Professional_Bulletin_APR_JUN_2015Military_Intelligence_Professional_Bulletin_APR_JUN_2015
Military_Intelligence_Professional_Bulletin_APR_JUN_2015
 
TRADOC OE Operational Environment 2010-2025
TRADOC OE Operational Environment 2010-2025TRADOC OE Operational Environment 2010-2025
TRADOC OE Operational Environment 2010-2025
 
Teaching intelligence
Teaching intelligenceTeaching intelligence
Teaching intelligence
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
ASCOPE
ASCOPEASCOPE
ASCOPE
 
Jason Mdmp Chart
Jason Mdmp ChartJason Mdmp Chart
Jason Mdmp Chart
 

Ähnlich wie HaleResume17June2015

Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
Paul Mullins
 
Image Fusion -Multi Sensor Intel Brochure
Image Fusion -Multi Sensor Intel BrochureImage Fusion -Multi Sensor Intel Brochure
Image Fusion -Multi Sensor Intel Brochure
monicamckenzie
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
Duane Blackburn
 
Christian B Wunsch - Resume V2.1 Linked In
Christian B Wunsch - Resume V2.1 Linked InChristian B Wunsch - Resume V2.1 Linked In
Christian B Wunsch - Resume V2.1 Linked In
Christian Wunsch
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
Department of Defense
 
NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017
Bobby L. Sheppard
 
Jose Davila Cv 060309
Jose Davila Cv 060309Jose Davila Cv 060309
Jose Davila Cv 060309
jdavila04
 
MH Summary(Final)
MH Summary(Final)MH Summary(Final)
MH Summary(Final)
mhicks10
 

Ähnlich wie HaleResume17June2015 (20)

N2 DISL Resume
N2 DISL ResumeN2 DISL Resume
N2 DISL Resume
 
Mitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingMitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume Targeting
 
Siek 2016v3 (003)
Siek 2016v3 (003)Siek 2016v3 (003)
Siek 2016v3 (003)
 
Blue and Gray Berets H4D Final Presentation
Blue and Gray Berets H4D Final PresentationBlue and Gray Berets H4D Final Presentation
Blue and Gray Berets H4D Final Presentation
 
Arico Resume 201500317
Arico Resume 201500317Arico Resume 201500317
Arico Resume 201500317
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
 
Image Fusion -Multi Sensor Intel Brochure
Image Fusion -Multi Sensor Intel BrochureImage Fusion -Multi Sensor Intel Brochure
Image Fusion -Multi Sensor Intel Brochure
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
Christian B Wunsch - Resume V2.1 Linked In
Christian B Wunsch - Resume V2.1 Linked InChristian B Wunsch - Resume V2.1 Linked In
Christian B Wunsch - Resume V2.1 Linked In
 
DoD Cyber Strategy
DoD Cyber StrategyDoD Cyber Strategy
DoD Cyber Strategy
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
D20110714cyber
D20110714cyberD20110714cyber
D20110714cyber
 
Boyd Bryant Resume July2012
Boyd Bryant  Resume July2012Boyd Bryant  Resume July2012
Boyd Bryant Resume July2012
 
NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017NXLEVL Capabilities Brief-2017
NXLEVL Capabilities Brief-2017
 
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Jose Davila Cv 060309
Jose Davila Cv 060309Jose Davila Cv 060309
Jose Davila Cv 060309
 
Sheppard Resume 2015 update
Sheppard Resume 2015 updateSheppard Resume 2015 update
Sheppard Resume 2015 update
 
MH Summary(Final)
MH Summary(Final)MH Summary(Final)
MH Summary(Final)
 

HaleResume17June2015

  • 1. David Hale Email: dhalejr@hotmail.com Tel: 571 484 6530 Experience Summary • 30 Years Military experience • 23 Years Intelligence, Cyber and Identity Intelligence Experience • 17 Years’ experience working and coordinating policy issues involving Cyber, SIGINT, Biometrics, Identity Intelligence, Controlled Technical Services and Clandestine Tradecraft • 5 Years Comptroller Experience • 6 Years working Cyber Issues in Industry • Managed and worked the fielding of 41 Large IT Projects • Previous Owner, Airborne Ranger Construction (sold DEC 2012) Security Clearance TS Clearance until Jan 19 NOV 2017 • Clearance date 19 NOV 2012 • Scattered Castles TS/SCI • Life Style Poly 11/23/2010 • Spent 5 years support Focal Point and was a focal point officer • 11 years read on to ACCM Education • Visiting Defence Fellow For Queen’s University Kingston, Ontario, Canada and completed the U.S. Army War College, 2002 • Masters of Business Administration, (Boston University), 1991 • Bachelor of Science, Public Management (University of Arizona), 1978 Additional Info: • Board of Directors, National Military Intelligence Association that provides direct interface with directors of IC Agencies & Services • Queen’s University Policy Advisory Board to the Canadian Privy Council Office (Canadian West Wing) • Trained as an Army Strategist 6Z • ITIL Version 3 Certified • Trained and Experienced EW Officer: Worked with Electronic Warfare, SIGINT and Cyber Operations for 29 years • Trained in Certified Information Systems Security Professional and PMP, awaiting certification • 15 years experience in analysis and policy support; 27 years experience in leading projects and programs; 13 years experience in facilitating key leadership and decision making processes; 8 years experience in leading participation of reports/briefings briefed at the POTUS, Congressional, or SECDEF level Accomplishments • Deputy Commander of US Army Intelligence and Security Command • Previously on NSA Advisory Board • Over 34 years lead or participated in 42 large IT projects and programs in/out of government • Consultant with DIA Defense Clandestine Service (DCS) Office of Technical Operations (OTO), making specialized systems, training, organization and career progression and use/employment of Cyber and Cyber support • With three companies as Director of Cyber and Intelligence Operations • Joint Staff Officer at JSOC & PACOM • Distinguished Service Medal • In charge of several Warfighters and Mission Rehearsal Exercises that included IO/Cyber and Biometrics 1
  • 2. David Hale Email: dhalejr@hotmail.com Tel: 571 484 6530 • Summary: 17 years Cyber experience in policy formulation, interpretation and employment of Cyber capabilities and 25 years experience with SIGINT. Beginning at JSOC in 1999, developed and aided in the formulation of Cyber Policy so that JSOC could use Cyber, then called Information Operations, to be integrated into exercises and later real world operations. As the USAEREUR G2 for Architecture, worked to employ SIGINT and Cyber in operations for support of operations in Bosnia; Kosovo; Afghanistan; Iraq and other locations. As the Deputy Commander of INSCOM, one of the primary duties became the development and creation of the US Army Cyber Command, on line counterintelligence, as well as aiding in the creation and delineation of Cyber Capabilities across the military to include the later formation of the 780th Cyber Brigade, expansion and realignment of the 1st Information Operations Command to support the Army and SOCOM/JSOC and the later creation of the JSOC CNO Squadron. In industry, continued to help develop policy to for Human Intelligence to support Cyber and Cyber to support CI/HUMINT. Also aided in the creation and fielding of several Cyber Capabilities currently used by J3 and J5 USCYBERCOM as well as NSA TAO. All of these required knowledge of PPDs, NSDPs, HSPDs, PPD-20, PPD-28, NSPD 38 as well as well as HSPD 23 and helped to provide input into their formation over the years. • JSOC J2 Plans and OPS June 1999 – June 2001: Aided the JSOC J3 Information Operations Officer, now MG John Davis, in the planning what is now called Cyber in JSOC exercises. This required direct coordination with the SECDEF and his staff, NSA and other intelligence organizations to include White House Advisors. Initially everything was on closed systems and PDAS. Aided in the interpretation of policy from the JSOC and SOCOM perspective, particularly with NSA and OSD. This required work from the law and abstract policy level to implementation at the same time. The policy documents at that time were more primitive and it was difficult to explain the national security objectives and how JSOC could achieve those objectives through various Cyber/Information Operations and SIGINT capabilities. It truly required reading all USC Title 10, 50, 20 and 18 as well as the other existing policy documents at that time. Then proving with our exercise applications the validity and requirement for Cyber/Information Operations. Those operations could be controlled without collateral damage. This involved briefings to the SECDEF, his staff, NSA and Congressional Liaison. This required development, assessment and implementation of several classified projects that were SAP, STO and others. Some slides about these capabilities and exercises were briefed to POTUS. All of this was based on warfighter requirements. • June 2001 – June 2002 Visiting Defence Fellow at Queen’s University, Kingston, Ontario, Canada and Completion of the US Army War College: Assigned to a think Tank in Canada that supported the Prime Minister’s Cabinet, the Privy Council Office (Canada’s West Wing), the Chief of the Canadian Defense Staff, Canada’s NATO representative, Canada’s Doctrine Command and the Royal Military Academy. Provided policy advice to several ministers and the prime minister that became classified because the Canadian government did now want the Canadian public to know they were receiving policy advice from an American serving officer. Aided in the redesign of the Canadian National Military Command Center and the Privy Council Office with systems that could aid them in the Global War On Terrorism and with SIGINT and sanitized Cyber information/intelligence for the Prime Minister and tactical forces. Often reported directly to DEPSECSTATE Armitage as well as the NSA front office. Read on to the Canadian Official Secrets act and was often put in awkward situations that required careful coordination with NSA, CIA and the American Embassy. Made policy recommendations concerning Canadian Foreign and Intelligence 2
  • 3. David Hale Email: dhalejr@hotmail.com Tel: 571 484 6530 Policy with the United States, China, Iran, Kosovo, NATO and Bosnia. Selected by Canada and US State Department to be an Elections Supervisor in Kosovo. • June 2002 – June 2007 USAREUR G2 Plans, Ops and Architecture: Tasked to aid in the development of the Architecture in Afghanistan because of demonstrated expertise in USAREUR, created a project to improve the architecture in Afghanistan that included how SIGINT and Cyber could better support operations given the state of policy at that time. Personally tasked by the CG USAREUR with writing the scenarios for all mission rehearsal exercises of all deploying units using 95% real world intelligence and to incorporate real world SIGINT and Cyber/Information Operations into the exercise. One of the items injected into the exercise was thumb drives being sold on the economy, everyone laughed that would not happen but once the unit was in Afghanistan they discovered classified thumb drives being sold at the local market because. Aided in the implementation of certain special access capabilities for intelligence collection that used both SIGINT and Cyber for ACCM and Once again, this required careful understanding of policies, as they existed at the time. Developed theater and Army Service component policy and foreign engagement places, procedures and regulations for USAREUR G3 for Crisis Action Team and G2 (SIGINT, Cyber and HUMINT Operations, and Contract Oversight). Directed by the CG USAREUR to lead the USAREUR G3 Crisis Action Team for 7 months to include mitigation of Cyber threats and performed command and control of the 173rd Abn Bde and its’ hand over to SOCCENT CG for parachute jump into Iraq. Had to assess and downsize USAREUR projects constantly. Reduced from 800 contractors down to 200 over a 5 year period. This was based on operational warfighter requirements and the lessening of those requirements due to our presence in Kosovo, Bosnia and our ability to be more effective and efficient with new systems and programs. All of this was based on Warfighter requirements. • 2007 – 2009 Deputy Commander US Army Intelligence and Security Command: Selected by the Army Intelligence Senior Leaders to be the Deputy Commander of INSCOM. Uniquely qualified due to experience in Cyber policy formulation, force structure, development of programs and projects. They saw me not just as a manager but a true practitioner that understood Cyber from all of the aspects of law, policy, establishment of units, and TTPs. Lead recommended changes to Cyber Policy, USSIDS and other pertinent policies for two years and was in charge of Congressional liaison for INSCOM. Ensured that INSCOM developed its’ own robust Cyber policy and planning capability. Often coordinated directly with DIR NSA, OSD Staff and other IC agencies that included who would be in charge of Cyber in the US Army, how INSCOM would support and deconflict between US Army Cyber, US Cyber Command, NSA, Combatant Commands, Army Component Commands, and Special Mission Units. In charge of a $2.2 billion budget with 16,000 personnel. Provided policy or intelligence analysis as required by the National Command Authority. Coordinated these issues with other Congress, other agencies and services as well as combatant commands. Directed to aid in fixes to HUMINT/CI; IT architecture; contracts and moving enduring missions to based funding. Also had to explain the online CI concept and protect it from other agencies. This required direct coordination with DIR NSA and explaining how the documents and policies at the time permitted this kind of operation. Convinced all agencies involved that the Army Field Support Command, later that Army Operations Group could support Cyber through CI/HUMINT means that was adopted and currently practiced today. All of this was based on warfighter requirements. 3
  • 4. David Hale Email: dhalejr@hotmail.com Tel: 571 484 6530 • Industry Experience: Provided strategic planning for Computer Sciences Corporation, SOSi, Sotera, DIA Defense Clandestine Service Office of Technical Operations and NSA. Created Cyber weapons and tools for use by the USG. Worked with Special Mission Units that work undisclosed Cyber operations. All of the items described below were based on warfighter requirements generated in different documents or capabilities the warfighter recognized as something they needed. • July 2009 – June 2012: Account Executive, Army & Intelligence Operations. Responsibility and Accomplishments at CSC: Provided strategic guidance and the corporation level and client support at the business level. CSC mans 6 Security Operations Centers around the world and provides Cyber Support and Cybersecuirty to the Australian Forces, Banks in over 50 countries and other wide capabilities. Given bonus and pay raise for increasing CSCs cyber capabilities and offerings. Provided the mission and threat advice to Eagle Alliance, which provides all the IT support for NSA. PM in support of DA G2 and USD (I) on classified capabilities. Consultant to DIA Defense Clandestine Service Office of Technical Operations to help implement a Level III Acquisition Program and the associated policy issues. Worked these issues with other services, agencies and Combatant Commands. Developed a Level III Acquisition Program for Controlled Technical Services. Provide DIA Defense Clandestine Services Office of Technical Operations the exploitation of indigenous sensors. Brought together multidiscipline intel to support to the government (Cyber, SIGINT, IMINT, OSINT, HUMINT, GEOINT, and MASINT disciplines; all-source analysis; identity intelligence/biometrics and, intelligence operations research). Created a cyber weapon/tool that is used by both J5 USCYBERCOMMAND and NSA TAO. Aided CSC employees that were writing policy documents for Homeland Security, DIA, NSA, NGA and Army Intelligence. Was used by the corporate headquarters to harmonize and synchronize our policy support so it was more helpful to the US government. • July 2012 to 2 Sep 2013: Director, Cyber and Intelligence Operations at Sotera Defense Solutions. Responsibility and Accomplishments: Oversight of all Cyber and Intel OPS. Continued to create new capabilities and aid in adjusting policy in support to DIA DCS OTO. To support Controlled Technical services, help create the career field for Technology Intelligence Offers that require 83 weeks to train and work with Cyber issues and equipment. Developed the technical solution to initially win the Electronic Warfare Planning Management Tool ($97.6 million) contract that was later lost on protest. Won the INSCOM GISS contract the capture and proposal lead but was working for SOSi when win was announced. Supported work for INSCOM Red Disk at Fort Gordon, VA that involved Cyber support. Made recommendations to DIA policy writers how DCS HUMINT all and CI could support Cyber and vice versa. DIR DIA directed that all policy for Cyber had to be coordinated with me. • Sep 2012 – Jan 2014: Senior Consultant for Sotera Defense Solutions for Cyber and Intel Ops. • Jan 2014 – March 2015: Manager, Intelligence Requirements for SOS International working Cyber and Intelligence Issues: Created a new language test to support specialized SIGINT and Cyber Operations. Developed new processes that use social media to provide situational awareness, force protection, battle damage assessment and source/investigative lead development. • 2009 - 2012: Owner, Airborne Ranger Construction in Tucson, Arizona. Learned to really prioritize and manage projects at a more finite level than I did in the military and built a Cyber range at Canon Air Force Base in Clovis, NM. • Additional Experience: Provided classified support to Special Assistant to the President, Cyber Security Coordinator at Executive Office of the President, White House 4
  • 5. David Hale Email: dhalejr@hotmail.com Tel: 571 484 6530 • Additional Military Experience: Helped develop national level policies at a Combatant Command, Army Service Component Command, Joint Special Operations Command, and two battalions deployed (Haiti and Bosnia) • Future Technologies: Led intelligence community coordination for several Cyber projects that included DARPA projects, JCTDs, and developing future architecture for an ASCC and US Army INSCOM, DIA DCS OTO and included biometrics and identity intelligence • Training: Army Manpower Management Course, PPBES Course, Financial Management of Intelligence Training, Contract Officer Representative Course, Collection Management and Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare Course (Ft Huachuca), US Army Targeting Course, Collection Manager Course, Military Intelligence Transition Course, Infantry Officer Basic and Advance Course, Command and General Staff Course, Armed Forces Staff College, US Army Ranger Course, US Army Jumpmaster Course, Air Assault School, Army G2 and Commanders Course, IMINT Familiarization Course, trained through unit MTTs Counterintelligence Force Protection Source Operations (CFSO), Joint Services Interrogation Operations Course (JSIO) UK, G2 CI/HUMINT Familiarization Course, , Counter Surveillance Training MTT, Reid Deception Detection Training, US Army Mortar Officer Course; Italian Parachute School; Graduate of the US Army Strategic Planner’s Course. Managed Quickfix Electronic Warfare helicopters as S3 for 125th MI Bn, G2 25th ID for Cobra Gold 1995 in Thailand. 5
  • 6. David Hale Email: dhalejr@hotmail.com Tel: 571 484 6530 • Additional Military Experience: Helped develop national level policies at a Combatant Command, Army Service Component Command, Joint Special Operations Command, and two battalions deployed (Haiti and Bosnia) • Future Technologies: Led intelligence community coordination for several Cyber projects that included DARPA projects, JCTDs, and developing future architecture for an ASCC and US Army INSCOM, DIA DCS OTO and included biometrics and identity intelligence • Training: Army Manpower Management Course, PPBES Course, Financial Management of Intelligence Training, Contract Officer Representative Course, Collection Management and Dissemination Course, MI BN CDR and G2 Course, US War College, Electronic Warfare Course (Ft Huachuca), US Army Targeting Course, Collection Manager Course, Military Intelligence Transition Course, Infantry Officer Basic and Advance Course, Command and General Staff Course, Armed Forces Staff College, US Army Ranger Course, US Army Jumpmaster Course, Air Assault School, Army G2 and Commanders Course, IMINT Familiarization Course, trained through unit MTTs Counterintelligence Force Protection Source Operations (CFSO), Joint Services Interrogation Operations Course (JSIO) UK, G2 CI/HUMINT Familiarization Course, , Counter Surveillance Training MTT, Reid Deception Detection Training, US Army Mortar Officer Course; Italian Parachute School; Graduate of the US Army Strategic Planner’s Course. Managed Quickfix Electronic Warfare helicopters as S3 for 125th MI Bn, G2 25th ID for Cobra Gold 1995 in Thailand. 5