Showing posts with label CYBERSPACE OPERATIONS. Show all posts
Showing posts with label CYBERSPACE OPERATIONS. Show all posts

Wednesday, June 18, 2014

CYBERSPACE AND FUTURE WAR 2025

FROM:  U.S. DEFENSE DEPARTMENT 
Cybercom Chief: Cyberspace Operations Key to Future Warfare
By Cheryl Pellerin
American Forces Press Service

WASHINGTON, June 16, 2014 – In the cyber domain of 2025, the ability of military formations to operate offensively and defensively will be a core mission set, and commanders will maneuver the capability much as they maneuver ground forces today, the commander of U.S. Cyber Command said recently.

Cybercom Commander Navy Adm. Michael S. Rogers, who also is director of the National Security Agency, was the keynote speaker at a June 12 meeting here at a cyber seminar hosted by the Association of the U.S. Army’s Institute of Land Warfare.

The theme was Army Networks and Cybersecurity in 2025.

“In the world of 2025, I believe the ability of Army formations to operate within the cyber domain, offensively and defensively, will be a core mission set for the U.S. Army and its operational forces,” Rogers told the audience. The Cybercom commander said that by 2025 the military services will have ingrained into their culture the reality that networks and cyber are a commander's business.
The admiral, who most recently served as commander of the U.S. Fleet Cyber Command and the U.S. 10th Fleet, said this has been a major cultural challenge in the Navy.

“In the year 2025, I believe … Army commanders will maneuver offensive and defensive capability much today as they maneuver ground forces,” Rogers said, adding that command and control, key terrain, commander's intent, synchronization with the broader commander's intent, and a broader commander's operational concept of operations will be cornerstones of Army cyber operations by then.
“In 2025,” he said, “the ability to integrate cyber into a broader operational concept is going to be key. Treating cyber as something so specialized, … so unique -- something that resides outside the broader operational framework -- I think that is a very flawed concept.”

Between now and 2025, Rogers said, a primary challenge will be integrating cyber and its defensive and offensive capabilities into a broader operational construct that enables commanders to apply another broader set of tools in achieving their operational missions.

When he thinks about how Cybercom and the services will get to 2025, Rogers said, he tries to keep three points in mind.

The first, he said, is that cyber is operations. Commanders must own the cyber mission set, the admiral said, integrating it into the operational vision and becoming knowledgeable about the broad capabilities of a unit, formation or organization and its potential vulnerabilities.

“I think it's going to be foundational to the warfighting construct of the future,” Rogers said, adding that the challenge is as much cultural as technical.
“To make this work, in the end, it's about our ability to synchronize the capabilities of a team,” he added, “from our junior-most individuals to our senior-most individuals, from capabilities resident within [the services] and as a department, to the [external] partnerships we're going to have to form.”
The second point Rogers said he keeps in mind is that requirements of the future include a joint network backbone for all of the Defense Department.
“I never understood why Army, Navy, Air Force, Marine Corps and, arguably, our Coast Guard teammates … were spending a lot of time and money [to independently] create, maintain, build and operate a global communications backbone,” Rogers said. Instead, he added, “make the services responsible for the last tactical mile of [a DOD-wide backbone that spans the globe], down to mobile and tactical users, whether they're in a garrison scenario or whether they're out maneuvering in the field, on an aircraft, on a ship or in a squadron.”

The third point, Rogers said, is that people and partnerships are key.
“Don’t ever forget that, in the end, [operationalizing cyberspace by 2025] is all about people and partnerships,” the admiral said. “It's about our ability to create a workforce that understands the vision, has the tools and capabilities they need to execute this vision, and is integrated into the broader effort.”

The partnership piece is a key area, he added, “because we, the Department of Defense, are not the cutting edge when it comes to networks, [communications] or information technology.”

“We are a user of technology that is largely generated by individuals and organizations that reside outside the DOD. … I don't see that trend changing between now and 2025,” he added.

As Cybercom commander and operational commander for the cyberspace mission set, the admiral said, focusing on five Cyber Command priorities will help military commanders build the joint force for 2025.

The priorities are:
-- Building a trained and ready operational cyber force;
-- Building a joint defensible network whose architecture has core design characteristics of defensibility, redundancy and resilience;
-- Creating shared situational awareness in cyberspace;
-- Creating command and control and operational concepts for use in cyberspace; and
-- Being mindful of policy and administrative changes needed to operate in cyberspace.

Addressing the department’s ability to compete on the open market for exceptional cyber talent, Rogers said, cyber is no different from any other DOD mission in terms of going after talented individuals.

“If the view is that pay is the primary criteria to get people with cyber expertise to join the department, I don't think that's going to work for us,” he added. “We’ll compete because of what makes us different. We will appeal to men and women who have an ethos of service [and] who believe in the idea of being part of something bigger than themselves.”

“We're going to compete for the same people because, quite frankly, we're going to give them the opportunity to apply their knowledge in a way that you can't legally do on the outside,” he added, prompting chuckles from the audience.
“I think we're going to do well,” the admiral said. “[Over the past 10 years], we have exceeded my wildest expectations in terms of our abilities to recruit and retain a high-end cyber workforce, because we’ve been able to focus on why they want to be with us as opposed to why they don't want to be with us.”

Sunday, July 7, 2013

DOD SAYS PEOPLE AND PARTNERS ARE CRITICAL CYBER NEEDS


Navy Lt. John Knolla mans the tactical action officer watch in the combat direction center aboard the Nimitz-class aircraft carrier USS Ronald Reagan during Exercise Valiant Shield 2006 in the Philippine Sea. Valiant Shield focuses on integrated joint training among U.S. military forces, enabling real-world proficiency in sustaining joint forces and in detecting, locating, tracking and engaging units at sea, in the air, on land and in cyberspace in response to a range of mission areas. U.S. Navy photo by Airman Christine Singh 
FROM:  U.S. DEPARTMENT OF DEFENSE 

Critical Cyber Needs Include People, Partners, General Says
By Cheryl Pellerin
American Forces Press Service

WASHINGTON, July 2, 2013 - Despite the inherent technical "geekiness" of cyberspace and urgent Defense Department efforts in that area, people and partners are among DOD's most critical cyber needs, the senior military advisor for cyber to the undersecretary of defense for policy said last week.
Army Maj. Gen. John A. Davis spoke to a large audience at the June 25-27 Armed Forces Communications and Electronics Association International Cyber Symposium in Baltimore.

Cyber partnerships such as those with the National Security Agency and the Defense Intelligence Agency and external partnerships such as those with industry, international allies and academia represent a transformation in the way DOD approaches cyber, Davis said.

For more than two years, he said, "DOD has been fundamentally and deliberately transforming the way we think, the way we organize, the way we train and equip, the way we provide forces and capabilities, the way we command and control those forces, the way we operate and the way we insure leadership and accountability for cyberspace operations."

Even the general's job as military advisor for cyber, a new position formally approved in August in an environment of reduced resources, "is an indication of how seriously senior department leaders are taking this subject," he said.
The standup of U.S. Cyber Command in 2010 was part of this transformation, he said.

"It brought together disparate cyber functions of operating our networks, defending our networks and applying offensive capabilities against adversary networks," said Davis, adding that Cybercom's collocation with the National Security Agency at Fort Meade, Md., greatly improved DOD cyber capabilities.

"There's a much better integration of intelligence through NSA's hard work," the general said. "From shared situational awareness to a common operational picture, NSA is doing some really great work. Leveraging their skills and expertise is not only an operational advantage, it's a necessity."

Beyond NSA's technical focus, Davis said, DOD needs broad strategic context for intelligence to fulfill its cyber mission and that DIA, along with other intelligence community organizations, plays a critical role.

Ultimately, people and organizations who work against the United States and its allies in cyberspace are behind the development of malicious code and software, he said.

"This is where DIA is helping us refine and improve our indications and warning so it's not limited to actions taking place at the speed of light, but actions by humans and organizations and processes that might help us ... act with more options for leadership decisions," the general added.

As it does with interagency partners at the Department of Justice's FBI and the Department of Homeland Security, DOD builds capabilities in cyberspace by working with industry, international partners and academia.

In its work with the defense industrial base, or DIB, DOD is the sector-specific agency under Homeland Security for interacting with the DIB.

In 2010, the voluntary DIB Cybersecurity Information Assurance, or CS/IA, effort opened as a permanent program after a pilot period with 34 companies. Activities under the program enhance cybersecurity capabilities to safeguard sensitive DOD information on company unclassified information systems.

With the publication of a federal rule in 2012, DOD expanded the program, and nearly 100 companies now participate. At the same time, the optional DIB Enhanced Cybersecurity Services, or DECS, became part of the expanded DIB program.
Homeland Security officials said DECS is a voluntary program based on sharing indicators of malicious cyber activity between DHS and owners and operators of critical infrastructure. The program covers 18 critical infrastructure sectors, including banking and finance, energy, information technology, transportation systems, food and agriculture, government facilities, emergency services, water, and nuclear reactors, materials and waste.
"DOD relies heavily on critical infrastructure, which is in part why the department has a role to play in providing support to defend these commercial systems," Davis said. More than 99 percent of electricity and 90 percent of voice and communication services the military relies on come from civilian sources, he noted.

"Defending our networks is a challenge that's not getting any easier because of our reliance on key networks and systems that are not directly under DOD's control," the general observed.

Davis said the DIB CS/IA program and DECS "are part of a whole-of-government approach to improve the nation's cybersecurity posture. It's a holistic approach, because that's what's required in order to achieve this goal."

DOD international engagement supports the U.S. International Strategy for Cyberspace and President Barack Obama's commitment to fundamental freedoms, privacy and the free flow of information, and the right of self-defense, Davis said.
DOD's ongoing cyber engagement with allies and close partners takes many forms, he added, including sharing information about capabilities and processes, warning each other about potential threats, sharing situational awareness and fielding more interoperable capability.

Such engagement includes joint training venues and exercises, he said -- "everything from tabletop exercises to more sophisticated exercises, and we're doing joint training and putting cyber into our bilateral exercises on a more regular basis."

With the State Department and other interagency partners, the general added, DOD participates on cyber matters in bilateral, multilateral and international forums, such as the United Nations and NATO.

"As an example of a critical bilateral relationship," he said, "I've had the great honor twice in the past year to engage as part of a U.S. academic and government interagency forum with counterpart Chinese academic and government organizations."

The last meeting was in Washington in December, Davis said.
"We recognize China as a rising power and one of the world's leading voices in this discussion, so senior government officials across the interagency have actively engaged their Chinese government counterparts, including their military [counterparts] ... in a number of ways already and we would like to see those engagements expand," Davis said.

On July 8, DOD officials and several interagency partners "will hold a working group meeting on cyber with our Chinese counterparts to talk about this directly and to strive for concrete solutions with actionable steps for progress," he added.
DOD's partnership with academia addresses what Davis describes as the department's biggest challenge going forward: building the cyber workforce.
"DOD is looking at ways to fundamentally change the way it recruits, trains, educates, advances and retains both military and civilians within the cyberspace workforce," he said. "The vision is to build a system that sustains the cyberspace operations' viability over time, increases the depth of military cyberspace operations experience, develops capable leaders to guide these professional experts ... and ensures that we build real cyberspace operational capability from within our human resources into the future."

The department is looking to partner in new ways with other federal, academic and private institutions, he said, to attract and retain skilled professionals in cyberspace.

"While cyber is always viewed as a technical area," Davis said, "the fact is it's always about people. People are going to make the difference in cyber, just as they have in every other dimension of DOD operations. So we must get the people part right to guarantee success for the future.

Search This Blog

Translate

White House.gov Press Office Feed