Potential Adversaries Target U.S. Military Vulnerabilities

April 22, 2016
By Robert K. Ackerman
E-mail About the Author

Two major competitive powers are vying for force superiority.


The days of the United States as an unassailable hyperpower have been replaced by an intensely competitive environment where two large rivals have rebuilt their militaries based on perceived U.S. vulnerabilities. Cyberspace is a foremost operational domain for each nation, and the United States must respond to their challenge or risk coming out second in a conflict with either nation.

This was the backdrop for the luncheon on the final day of the 2016 Defensive Cyber Operations Symposium (DCOS) held in the Washington, D.C., convention center April 20-22. Vice Adm. Jan E. Tighe, USN, commander, Fleet Cyber Command and 10thFleet, described how Russia and China both have enhanced their warfighting.

“Russia and China have a growing arsenal of warfighting capabilities specifically designed to challenge us,” she declared. Speaking of the cyber domain, she said, “Every day we fight to defend our network; every day we fight to stay ahead of our adversary.”

Adm. Tighe stated that a common misperception is that “our technologies are our capabilities. People are our capabilities,” she countered, adding, “Necessity is the mother of innovation.”

The Navy’s attack surface expands and contracts daily, the admiral stated. The expansion occurs when vulnerabilities are left unpatched and humans interface with networks without proper security procedures. To address the human factor, the Navy is educating its users to a higher level of understanding about hazards in cyberspace.

“We’re going take our information warfare capabilities and better integrate and leverage them across the Navy,” she declared.

Departments: 

Share Your Thoughts:

"To address the human factor, the Navy is educating its users to a higher level of understanding about hazards in cyberspace."

Methinks it is not hazards but secrets that forces need to be higher educated in, in order to command and control cyberspace. You can be sure that smarter adversaries fully realise that and are well versed in that area to ensure they lead to elicit a logical reaction and ineffective defence, rather than suffer a surprising proaction and effective attack.

It is something of an enigma though to teach, for that which needs to be known for deployment in the field. is that which easily defeats the systems which one would be engaged to defend and protect.

Is that ye olde Catch 22?

Share Your Thoughts: