Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars     Apps     EBooks
   AFCEA logo
 

U.S. Army Ponders Cyber Operations

October 15, 2009
By Henry S. Kenyon

 

Gen. Carter F. Ham, USA, commanding general, U.S. Army Europe and the Seventh Army, explains that the Army’s signals community is at the center of a major change within the service as it begins to leverage its legacy information networks and cyberspace to enhance its command and control (C2) capabilities. Communications personnel, he notes, will be vital to building and maintaining the systems on which the Army’s full-spectrum operations rely.

Top officers discuss future road map for network operations as new command begins to take shape.

Modern communications and sensor systems have greatly increased the speed and effectiveness of maneuver warfare and have empowered units at the edge by providing them with greater situational awareness. But these benefits have a price—lack of interoperability caused by disparate equipment and vulnerability to external threats ranging from jamming to cyberattacks.

These issues were on the minds of top U.S. Army officers and U.S. Defense Department officials meeting at AFCEA International’s LandWarNet 2009 conference in Fort Lauderdale, Florida. The Army, as with its sister services, is heavily reliant on networked command and control (C2) systems to manage its activities. Officials at the event discussed a range of related topics including the current state of the Army’s global C2 networks, the promise and threats posed by cyberspace operations and steps the service must take to ensure victory on tomorrow’s battlefields.

The Army must begin to leverage its existing information networks and cyberspace to enable its C2, explained Gen. Carter F. Ham, USA, commanding general, U.S. Army Europe and the Seventh Army. He maintained that this was a historic time for the service as it helps establish a new unified command devoted to cyberspace. This also is a very dynamic time for the Army’s signals community, the general said, adding that communications personnel must be fully engaged in developing the enterprise from the beginning because they help build and maintain the systems on which full-spectrum operations rely.

Sharing data between joint and coalition forces is another key to network-enabled operations. The general cited the Berlin Wall as an example of how different nations approach information sharing. The wall represented the Soviet Union’s attempt to control the flow of information and people while the United States shared information with its allies. Today, the United States is at a similar crossroads, Gen. Ham said. Does the nation want to build and sustain firewalls in the government and with its allies, or can more collaborative structures be examined, he asked.

Barriers to information sharing must come down while finding new ways to operate safely when sharing information must be established, Gen. Ham stated. Teamwork and coordination are necessary regardless of the service, department or nation. The general urged service members to consider how to break down barriers and develop networks that can share C2 information.

Brig. Gen. Steven W. Smith, USA, chief cyber officer, Army Chief Information Officer (CIO)/G-6, noted that the Army is participating in several key initiatives such as the Comprehensive National Cyber Initiative (CNCI), the Defense Department Information Assurance Campaign Plan (DOD IACP), the standing up of the U.S. Cyber Command (CYBERCOM) and operation Gladiator Phoenix. Regarding the Army’s direct role in cyberspace, the general emphasized that the service’s mission is to integrate efforts across the Army staff to provide policy, oversight and guidance for any cyberspace operations.

Operation Gladiator Phoenix will be a major exercise in which 71 percent of the activity will be oriented toward network defense. The remaining 30 percent of the event’s efforts will focus on sustaining exploitation and cyberattack capabilities. The goal of the DOD IACP is to help commands prioritize how they spend money on information assurance. The general adds that the effort has some 20 end-states. Several of these goals are accountability from the top, layered network defense, strong external perimeters, the capability to keep secrets and developing partnerships with industry.

 

Lt. Gen. Jeffrey A. Sorenson, USA, Chief Information Officer/G-6, explains that the Army is establishing fixed network hubs around the world to support its operations. These regional hub nodes will be designed to enhance connectivity between units in theaters across the globe.

Achieving and maintaining the Army’s Global Network Enterprise Strategy is crucial, Lt. Gen. Jeffrey A. Sorenson, USA, CIO/G-6, emphasized. The general outlined several of the key accomplishments needed to make the service’s LandWarNet operational. Among the initiatives the Army has launched is to enhance connectivity by creating fixed regional hub nodes known as network service centers (NSCs) to support operations. Another effort underway is making data and software applications available to warfighters at all echelons. The Army has launched a three-year plan to establish NSCs across the operational theaters. He explained that the goal is to stand up an NSC in Europe in 2009, an NSC in Southwest Asia in 2010 and a facility in Asia in 2011.

To support network operations, Gen. Sorenson described a recent experiment in which an Army unit deployed overseas. The goal of the test was to maintain the unit’s network connectivity at the same level throughout the deployment as it enjoyed in its home base. The general noted that the only time the unit did not have connectivity was when its troops were flown overseas.

Gen. James N. Mattis, USMC, then NATO supreme allied commander transformation, and commander, U.S. Joint Forces Command, discussed the technological and cultural aspects of C2 as they applied to the military. The general said he is passionate about C2, but added that it is a capability that extends beyond technology. “No matter how brave your soldiers are, they’re going to catch RPGs [rocket-propelled grenades] in the chest if you don’t get C2 correctly,” he cautioned.

The general noted that decentralized command speeds action by allowing field officers to exercise their initiative. But he added that training and education are key to achieving this goal.

Technological improvements will change how commanders receive orders, Gen. Mattis predicted. Instead of long, detailed orders that consume bandwidth, battlefield leaders increasingly will be called upon to use their own initiative to achieve operational goals.

Likewise, the general explained, a network is more than just technology. The network—both the hardware and the human—must support troops at the tactical edge. “Agility is not solely technological,” he said.

Noncommissioned officers and officers must be able to take advantage of opportunities. Subordinates must exercise initiative to carry out commanders’ intent, he said.

 

Gen. James N. Mattis, USMC, then NATO supreme allied commander transformation, and commander U.S. Joint Forces Command, points out that although C2 is often viewed in terms of technology, a vital human component remains that must be nurtured and maintained. The general described C2 as a leader-centric practice based on the trust between commanders and their subordinates.

Gen. Mattis said that of all the world’s militaries, the U.S. military is the most reliant on computers. This also makes the United States highly vulnerable. “We’re going to have to be ready to operate in a complex, chaotic information environment” on the battlefield, he said. Warfighters must improvise because war is chaotic and unpredictable. However, he noted that while the character of war may change, its nature will not.

The Army’s command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) road map was another key topic of discussion. Col. William C. Hoppe, USA, of the Program Manager Warfighter Information Network–Tactical (PM WIN-T), PEO C3T, outlined the service’s C4ISR goals, which include increasing spectrum efficiency, connectivity to lower echelons, mobility and transport ability, range and reach, flexibility and ease of employment.

Among the major Army communications systems discussed, the colonel highlighted the enhanced position location radio system (EPLRS) and the single channel ground and airborne radio system (SINCGARS). EPLRS provides voice and high-speed data throughput for mounted and dismounted warfighters. In the near future, EPLRS systems will be integrated with defense advanced Global Positioning System (GPS) receiver (DAGR) devices. Col. Hoppe notes that this application is not necessarily for position reporting but for network synchronization. The Defense Advanced Research Projects Agency (DARPA) and the Defense Information Systems Agency (DISA) also are examining the potential for EPLRS as a part of a dynamic spectrum access technology that would route transmissions to empty areas of spectrum.

SINCGARS, which is used to move voice and data communications to the lowest echelons of the force, is being improved with a new radio. Col. Hoppe noted that a new contract has been awarded to an industry team consisting of ITT and Thales. The SINCGARS G radio combines circuit boards from ITT and elements from Thales’ Joint Tactical Radio System (JTRS) Enhanced Multiband (JEM) radio. He explained that this radio will provide warfighters with capabilities similar to the JTRS.

Col. Hoppe also discussed increments one, two and three of the WIN-T program. Major parts of increment one are being deployed, and increments two and three will create an integrated transmission system with terrestrial and over-the-horizon capabilities. The service also is pushing increment two down to the company level. An important aspect of increment two is a satellite communications application that can reconnect broken terrestrial communications links automatically.

Army Vice Chief of Staff Gen. Peter W. Chiarelli, USA, outlined his views on C2.. He noted that the service is in a critical time of transformation and conflict. He added that the Army has undergone rapid change during the last eight years. The general shared that a critical lesson learned from the past several years is that vital technological and operational changes are made on the ground by soldiers at the tip of the spear. More data now is available to warfighters than ever before, but it must be made available to a variety of personnel across all echelons, he said.

If the sharing of battlefield information had not been managed properly, it would have crippled the Army’s operational efforts, Gen. Chiarelli shared. However, he credits the success of systems such as the Force 21 Battle Command Brigade and Below (FBCB2) and the Command Post of the Future (CPOF) for providing soldiers with increased situational awareness. The tactical ground reporting system (TIGR) is making its way to troops in the field. It is a virtual notebook designed to provide soldiers and commanders with data and information to make better decisions.

Despite these developments, however, there have been challenges. The general noted that communications personnel resisted the development and deployment of C2 systems such as FBCB2, CPOF and TIGR. He added that the Army also takes a cookie-cutter approach to computer security and warned that it is individual soldiers who suffer from bad decisions and lack of foresight about the implications of some policies.

An example of unintended consequences is the pressure that excessive requirements place on new technologies. The general said that procurement processes are having difficulty keeping pace with technological change and that many Army systems have redundant or non-interoperable software, which causes communications issues.

Security policies also can stifle the development of new communications systems for warfighters. Citing the Apple iPhone and the great variety of downloadable applications available for the device, Gen. Chiarelli asked why the Army cannot deliver a similar capability. He speculated that such a system would allow a soldier in combat to access live video from an overhead unmanned aerial vehicle or agricultural data for soldiers on humanitarian missions. The general stressed that he would like to see a method that allowed Army personnel to develop applications for their handheld devices.

Another major topic of discussion was the Army’s Signal Cyberspace Operations Campaign Plan. According to Russell Fenton of the Concepts, Requirements and Doctrine Division at the ArmySignalCenter at Fort Gordon, Georgia, information assurance is a key part of the plan. Among the tenets of information assurance is computer network defense (CND), which must support information assurance.

One facet of the campaign plan is support of enduring CND capabilities. Fenton noted that the Army is developing a new cyber military occupational specialty, or MOS, for warrant officers that would focus on network operations, information security and information protection technology. However, he said that this new skills set would progress in levels of expertise over a period of years to produce experienced and mature cyberwarriors.

The SignalCenter currently is working to address CND gaps. To support this process, the Army also must develop concept documents outlining how it will fight in cyberspace. Fenton noted that the creation of the Cyber Command will influence the Army’s future C2 structure and how it is managed.