The Army is transforming its Cyber Command to meet the challenges of a multidomain battlefield. Just over eight years old, the command, located at Ft. Gordon, Georgia, will evolve by 2028 into something possibly called the Army Information Warfare Operations Command, which will fully incorporate cyber, electronic warfare and information operations.
Confronting adversaries on a more complicated battlefield requires advanced tools for a U.S. Army more comfortable operating in the traditional domains of land, sea, air and space. The new Cyber Situational Understanding program of record, however, will give the U.S. Army an increased understanding with actionable information of the cyber domain, explained Portia Crowe, chief, Cyber Engineering at the Army’s Program Executive Office Command Control Communications – Tactical (PEO C3T).
Crowe headed up the AFCEA Aberdeen Chapter’s 4th Annual C4ISR Cyber Panel on March 6 and spoke to SIGNAL Magazine in an interview.
The U.S. Department of Homeland Security Science and Technology Directorate (S&T) and Israel’s Ministry of Public Security (MOPS) are seeking proposals to support collaborative research and development between U.S. and Israeli companies, or between a company and a university or research institute—one from the United States and one from Israel.
Assured Information Security Inc.,* Rome, New York, has been awarded a $48,444,066 cost-plus-fixed-fee contract for full spectrum cyber capabilities. The objective of this effort is to provide the Air Force with tools and technologies to aid in cyber warfare. This contract provides for research, development, and transition of cyber technologies to enable rapid cyber operations and will result in the accelerated delivery of innovative cyber solutions to the warfighter. Work will be performed in Rome, New York, and is expected to be completed by March 5, 2024. This award is the result of a competitive acquisition and two offers were received. Air Force Research Laboratory, Rome, New York, is the contracting activity (FA8750-19-C-0013).
The vulnerabilities of machine learning models open the door for deceit, giving malicious operators the opportunity to interfere with the calculations or decision making of machine learning systems. Scientists at the Army Research Laboratory, specializing in adversarial machine learning, are working to strengthen defenses and advance this aspect of artificial intelligence.
As the U.S. Army continues to evolve its newest warfighting domain, the cyber domain, information plays a key role. The service is working to incorporate information capabilities along with intelligence, electronic warfare, cyber and space, as well as with traditional fire capabilities.
In December, the Army released a doctrine guiding multidomain operations through 2028. The policy acknowledges that U.S. adversaries are contesting all domains, and that in the information environment American dominance is not guaranteed.
The newly created Cyber and Non-Kinetic Operations Division within the Air Combat Command is expected to reach full strength this summer. The new organization integrates multiple missions, including cyber, electronic warfare, intelligence and information warfare.
Some people worry that artificial intelligence will steal their jobs, but machine learning algorithms now generate images of fake fingerprints that match the prints of one in five people on the planet. Other biometric identification systems, such as face and iris recognition, may also be vulnerable. The capability puts the mobile device industry on notice that current biometric authentication systems may not be adequate for securing cell phones and other devices.
Artificial intelligence (AI) has come a long way in recent years, but the technology still has hurdles to overcome if machines are to become true partners and collaborators with humans. To help push the systems to that next level, the Defense Advanced Research Projects Agency (DARPA) is hosting a two-day conference aimed at spurring the next wave of AI advances.
The maritime services continue to maintain a balance between cyber and kinetic weapons even while engaged in a daily cyber conflict.
Leaders for all three maritime services—the Navy, Marines and Coast Guard—participated in a town hall forum during the AFCEA-USNI West 2019 Conference in San Diego, and they agreed that cyber conflict rages on.
“If you’re asking me if I think we’re at war, I think I’d say yes,” Gen. Robert Neller, USMC, Marine Corps commandant, told one audience member. “We’re at war right now in cyberspace. We’ve been at war for maybe a decade. They’re pouring oil over the castle walls every day.”
Artificial intelligence, machine learning, advanced manufacturing, blockchain, 5G, the Internet of Things, quantum computing, data science, cloud computing and cybersecurity all have one thing in common: information.
Rear Adm. Boris Becker, USN, commander of the Space and Naval Warfare Systems Center, made that point during a panel session at the AFCEA-USNI West 2019 Conference in San Diego. “It’s information in warfare and information as warfare,” he added.
The United States is fully engaged in combat operations in the cyber realm, according to a panel of military officials at the AFCEA-USNI West conference in San Diego.
Lt. Gen. Robert Shea, USMC (Ret.), president and CEO of AFCEA International, who served as moderator on the panel, kicked off the discussion saying the nation is in “Phase III” in the information domain. Phase III refers to the multiple stages of war. According to GlobalSecurity.org, the phases include: halting an invasion, force buildup and deployment, counteroffensive or counterattack, and ensuring postwar stability.
China is investing heavily in the Indo-Pacific, a critical region of the world for strategic purposes, and luring poorer countries away from the United States, said Thomas Modly, undersecretary of the Navy.
Modly made the comments during an afternoon luncheon address on the first day of the West 2019 Conference in San Diego.
Last year the U.S. Defense Department released a cyber strategy and followed that with posture review that identified more than 90 gaps in cybersecurity capabilities, many of which were determined to be critical shortcomings. This year, officials expect to begin implementing the strategy, beginning with several priority areas involving endpoint management, network visibility, user authentication and cyber force development, according to Brig. Gen. Dennis Crall, USMC, deputy principal cyber advisor, Office of the Secretary of Defense.
22nd Century Technologies Inc., Somerset, New Jersey, has been awarded a $8,344,625 firm-fixed-price contract to exercise Option III to support the 33rd Network Warfare Squadron (NWS) at Joint Base San Antonio, Texas, in conducting its mission of Defense Cyber Operations (DCO). The contractor will provide plans and implantation in executing the 33rd NWS managed DCO mission. Work will be performed on Joint Base San Antonio, Texas, and is expected to be completed Feb. 28, 2020. The contract is the result of a competitive acquisition and eight offers were received. Fiscal year 2019 operations and maintenance funds in the amount of $8,344,625 will be obligated at the time of award.
The cloud strategy document released this week by the U.S. Defense Department is drawing mixed reactions from industry and military officials. Experts welcome the strategy as an important step toward modernizing the department’s infrastructure but also express some concerns and note that many questions remain.
Machine learning and artificial intelligence (AI) technologies can be used by DOD to gain a competitive advantage, especially in cyberspace operations. While the technology has made it easier for the military to operate and communicate, “It has also a unique set of challenges with dependencies and vulnerabilities for the department, our nation, our economy and our everyday lives,” said Vice Adm. Nancy Norton, USN, director of the Defense Information Systems Agency (DISA) and commander, Joint Force Headquarters–Department of Defense Information Network (JFHQ-DODIN). The admiral presented the keynote luncheon address at the AFCEA Rocky Mountain Cyberspace Symposium on February 5 and spoke to SIGNAL Magazine.
The U.S. Navy is consolidating its information warfare efforts to ensure effective operations across the breadth of the fleet and its ashore assets. This endeavor ties together training, doctrine and equipping as new threats and technologies rapidly change the nature of the information operations realm.
The U.S. Coast Guard is pursuing digital solutions to support its unique set of military, law enforcement, humanitarian, regulatory and diplomatic responsibilities. It is no small feat to provide information technology to its workforce of 87,570, as well as to its cutters, boats, and aircraft that move along the coastline and inland waterways protecting the United States.
Months after initiating a project to research and rapidly field information warfare-related technologies, the U.S. Navy has expanded the effort servicewide and expects to field the first system by the end of fiscal year 2019.
The Space and Naval Warfare Systems Command (SPAWAR) Systems Center Atlantic announced last summer the formation of an industry consortium for the Information Warfare Research Project (IWRP). The intent is to leverage the flexible contracting platform known as other transaction authority (OTA) to rapidly develop and deploy technologies.