Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Networks

Cyber Command Redefines the Art

June 1, 2013
By Robert K. Ackerman

The U.S. Cyber Command is developing a strategy that acknowledges the convergence of network systems by empowering a similar convergence of military disciplines to help place U.S. cyberspace operators on a level field with their malevolent counterparts. This strategy acknowledges that the structure of the cyberforce has not kept pace with technology developments. As all types of information management—networking, communications and data storage—became digitized, previously disparate disciplines assumed greater commonality. With more common aspects, these disciplines share similar vulnerabilities as well as potential solutions.

Informal, Self-Organizing, Ad Hoc
 Relational Networks Are the New Multipliers

June 1, 2013
By Lt. Ben Kohlmann, USN

The advent of social networks is transforming the way the military does business. Net-centric warfare once was in vogue, seeking to capture electrons and raw fiber to transform the way combat was fought. Yet an even more powerful and unanticipated net is making waves in remarkable ways. It is the power of relational networks, fostered by loose ties and catalyzed by the proliferation of quickly evolving online platforms.

These networks of individuals are as far removed from centralized chains of command as anyone can be. They span ranks, ages, services and communities. As with water running down a rocky mountain, they find a way to interact and build each other’s knowledge base no matter the formal obstacles laid down by bureaucracy.

The power of these relationships was made very real to me last year when I joined Twitter. Randomly following military-related users, I soon became engaged in deeply strategic conversations with people I never would have found on my own. Senior Army officers were engaging informally with enlisted sailors and deployed Air Force pilots, sparring and parrying with a flurry of articles, links and philosophical references. Nobody told these folks to work together—they simply assembled on their own.

It became apparent that not only were these self-organizing and ever-evolving groups of people learning about warfare in a totally new way, they were becoming friends. Service members continents apart from each other, never having met, now had groups of peers and friends to have a beer with while on temporary assigned duty or leave. Their virtual conversations turned into very real, face-to-face interactions.

Cybersecurity--
Everybody's Doing It

June 1, 2013
By George I. Seffers

With attacks on critical data increasing in numbers, intensity and sophistication, securing networks is becoming a global effort while fostering greater information sharing among agencies, governments and the public and private sectors. The future of cybersecurity offers greater opportunities for industry and greater cooperation on national security and critical infrastructure protection, say executives at some of the largest U.S. defense companies.

Joint Aerial Layer Network Vision Moves Toward Reality

June 1, 2013
By George I. Seffers

The concept connects disparate networks to provide greater information to warfighters.

U.S. military officials envision one day being able to network together virtually all airborne assets, providing data to warfighters in the air, on the ground and at sea, even under the most harsh conditions. Major milestones in the coming months and years will bring that concept closer to a fielded capability.

The Joint Aerial Layer Network (JALN) is not an actual program. “It is a conglomeration of a number of different programs. It is absolutely a vision of how we’re going to transport information across many domains—air, space, terrestrial and subsurface—and across many different environments—an environment that is totally permissive; an environment that is contested; and an environment that is anti-access and actively denied to us,” explains Col. Anthony Genatempo, USAF, senior material leader for the Space, Aerial and Nuclear Networks Division, Air Force Life Cycle Management Center, Hanscom Air Force Base, Massachusetts. “The Joint Aerial Layer Network is a vision for pulling together lots of different existing networks and being able to route and transport required information to a much wider array of users.” For example, it would disseminate data from Link 16, a network primarily for fighter aircraft, or information gathered by drones, which currently is largely restricted to intelligence, surveillance and reconnaissance networks.

Cyber Train as You Fight

June 1, 2013
By Max Cacas

The U.S. Army is making its facility at West Point the focus of a joint program with the other services, industry and academia, devoted to sharing advanced cybertraining and research. Training in the new cyber realm includes not only basic best practices concerning passwords and mobile device security but also advanced training in the latest network management protocols and technology for members of the Army’s Signal Corps.

Air Force Strikes at New
 Information Challenges

June 1, 2013
By Robert K. Ackerman

Costs, security and operations requirements share top billing on priority list.

The U.S. Air Force is looking to overhaul its networking capabilities to meet new taskings in the post-Southwest-Asia era. Limited resources are changing the way the Air Force moves information throughout the battlespace, so the service must confront its challenges through innovative approaches and cooperative efforts.

The Air Force has to determine which networking issues have organic solutions and which problems must be solved by others—government, other military organizations or even the private sector. It must make those determinations without knowing if it will have the funding to tap outside resources that could meet its needs. And, these issues have to be addressed as cyber and coalition interoperability assume greater emphasis in both planning and operations.

Lt. Gen. Michael J. Basla, USAF, chief of information dominance and chief information officer (CIO)/A-6, U.S. Air Force, is in charge of ensuring Air Force networks effectively support the service as well as the joint and coalition communities. His top concerns are built around space superiority; intelligence, surveillance and reconnaissance (ISR); rapid global mobility; global strike; and command and control.

Gen. Basla relates that, in a discussion with Defense Department officials, he suggested that investments in cyber and information technologies can offset costs in other areas. A nonkinetic effect might be less expensive than a kinetic effect and still achieve an operational objective. But even that option for efficiency faces hurdles, budgetary concerns among them.

Air Force Comes to Grips With Cyber

June 1, 2013
By Robert K. Ackerman

Roles are changing as the service reshapes its digital future.

The U.S. Air Force is subjecting itself to a cyber reality check with an eye toward restructuring the discipline both operationally and organizationally. A working group is parsing the service’s activities in this domain, and this effort involves interaction with the other services as well as the commercial sector.

The restructuring drive is being conducted in concert with other Defense Department changes across the realm of cyber activities. For the Air Force, it includes a shift from communications specializations to a cyber emphasis. Disparate disciplines are overlapping and may be combined. Some traditional Air Force career tracks even may serve as a model for training and promoting new cyber experts.

“We are hard at work trying to define what the Air Force future is in cyber,” says Gen. William L. Shelton, USAF, commander of the U.S. Air Force Space Command. “We are pulling the experts together from government and industry, trying to understand what this future looks like—what we need to build to. Rather than being confined by the past, we instead look ahead and try to determine what our cyber future looks like and how we need to posture ourselves to be much better in the cyber domain than we are today.”

The Space Command has the major command responsibilities for both space and cyberspace in the Air Force. This includes serving as core function lead integrator for both domains, so it is taking the lead in setting the scene for the Air Force in cyber.

This scene envisions the operational community being in charge of cyber operations, with the information technology community working on communications issues. A more efficient architecture with greater commercial involvement will enable a more secure mission-assurance focus in how the Air Force carries out its missions, the general suggests.

NIST Releases Latest Catalog of Security and Privacy Controls for Federal Systems

May 3, 2013
by Max Cacas

A government-wide task force led by NIST is out with the latest catalog of security and privacy controls for federal information systems, including some new thinking when it comes to addressing insider threats that go beyond technology.

Making Tactical Communications History

May 1, 2013
By George I. Seffers

Two brigades from the Army's 10th Mountain Division are preparing to deploy to Afghanistan with a host of technologies that will allow the units to provide their own network down to the tactical edge. The new equipment provides battalion and company commanders with a communications on the move capability and pushes critical data down to the individual squad level.

Army Network Testing 
Increases Commonality

May 1, 2013
By Robert K. Ackerman

The same approach used to test and implement the Army’s single largest networking system is laying the groundwork for extending the network down to the individual soldier. As laboratory tests and field exercises validate the interoperability of separate elements in a network, system conflicts are giving way to greater commonality among different elements.

This effort has borne fruit in the evolution of the Warfighter Information Network–Tactical (WIN–T). The last fielding of WIN–T Increment 1 took place in August 2012, and WIN–T Increment 2 is taking the final steps toward deployment. Meanwhile, WIN–T Increment 3 is beginning to take shape.

As these increments progress toward full implementation, their test efforts are helping leaven out other capabilities. Greater interoperability testing of individual elements in a fully networked environment is allowing engineers to extend interoperable functions farther down the chain of command and into the hands of individual warfighters.

Col. Edward J. Swanson, USA, project manager WIN–T (PM WIN–T), explains that WIN–T Increment 1 provides a static networking capability for forces in the field. While it does not work on the move, soldiers can establish WIN–T linkage at the quick halt—they simply pull their vehicle off the road to a dead stop and immediately begin communications without a complicated setup. Newer WIN–T Increment 1 systems incorporate Joint Network Node Ka-band satellite connectivity, and its capabilities are deployed down to the battalion level. Col. Swanson describes WIN–T Increment 1 as “the backbone of the tactical network today.”

Pages

Subscribe to RSS - Networks