Multifaceted efforts that will work in concert with each other are at the heart of U.S. Navy cybersecurity programs. The sea service faces the dual challenge of incorporating new architectures and technologies such as the cloud, light-based communications, artificial intelligence and machine learning amid increasingly sophisticated adversaries. It is implementing new approaches that promise operational efficiency and better cybersecurity, but these approaches are complementary and must function together to realize their full potential.
Work is needed to improve temporal, spectral and information understanding within the layers of the cyber domain to facilitate useful cyber-spectral and information maneuver. These advances could be incorporated into tactics, techniques and procedures as well as tactical and operational systems to enhance the overall military commanders’ decision process to achieve information dominance.
Most of the tactical cyberspace domain is spectrum-dependent and administered solely at the physical layer. Currently, warfighters cannot comprehend, much less maneuver within, a space that is inaccessible to them because they are not in a dimensionality to understand it. They operate in a cyber-spectral flatland.
Technologies are spawning a revolutionary improvement in command and control that will have a transformative impact on how it is conducted at the operational level. These advancements, particularly artificial intelligence, are changing command and control functions such as sensing, processing, “sensemaking” and decision-making. Even greater changes lie ahead as innovation serves a larger role in defining both form and function.
Future U.S. Army regionally aligned forces will benefit from experiences—and solutions—discovered during last year’s integration with the U.S. Army Europe communications network. Although their communicators expected to hit the ground running when they arrived in theater, integrating tactical communications systems was more difficult than expected. Fortunately, new technology and soldiers’ know-how not only solved the immediate problems but also set the stage for easier communications integration in the future.
With the United States engaged in a “long-term strategic competition” with China and Russia, which are mounting persistent cyber attack campaigns that pose long-term risks to America, the U.S. military will act to deter aggression, cyber or otherwise, according to a new policy, known as the Department of Defense Cyber Strategy, from the U.S. Department of Defense.
The U.S. government has not established a comprehensive cybersecurity strategy, nor has it performed effective oversight of cybersecurity as called for by federal law and policy, the U.S. Government Accountability Office (GAO) concluded in a stark report on the state of the nation’s cybersecurity.
Because of the cybersecurity policy lag and related action, federal agencies and U.S. critical infrastructure—including energy, transportation systems, communications and financial services—are vulnerable. And these cybersecurity risks are increasing as security threats evolve and become more sophisticated, GAO, the government’s watchdog agency, reported.
Across-the-board innovation is increasing the national security threat picture, and the U.S. Defense Department is preparing to respond in kind. Technology advances such as hypersonics and artificial intelligence may join macroprojects such as a new space force as peer and near-peer adversaries gear up to overcome U.S. military superiority.
Economics, crime, terrorism and technology form the basis of four major challenges confronting the U.S. intelligence community, according to its director. Dan Coats, director of national intelligence, described the causes of these challenges to a large luncheon audience on the first day of the 2018 Intelligence and National Security Summit sponsored by AFCEA International and INSA at National Harbor, Maryland.
In the future, voice analysis of an intercepted phone call from an international terrorist to a crony could yield the caller’s age, gender, ethnicity, height, weight, health status, emotional state, educational level and socioeconomic class. Artificial intelligence-fueled voice forensics technology also may offer clues about location; room size; wall, ceiling and floor type; amount of clutter; kind of device, down to the specific model used to make the call; and possibly even facial characteristics of the caller.
Artificial intelligence, or AI, will become an integral warfighter for the U.S. Army if the service’s research arm has its way. Scientists at the Army Research Laboratory are pursuing several major goals in AI that, taken together, could revolutionize the composition of a warfighting force in the future.
The result of their diverse efforts may be a battlefield densely populated by intelligent devices cooperating with their human counterparts. This AI could be self-directing sensors, intelligent munitions, smart exoskeletons and physical machines, such as autonomous robots, or virtual agents controlling networks and waging defensive and offensive cyber war.
The federal government, building on existing identity management practices, is investigating how it can leverage passports and other state and federally issued ID cards to verify identity in the digital age. The need to validate a citizen’s identity in person and online is only going to grow across platforms, experts say. And absent a secure commercial solution, the government may have to provide verification of identity.
U.S. Strategic Command headquarters, the lynchpin for U.S. nuclear deterrence, is undergoing the technical renovations it requires to fulfill its current mission and facilitate growth for future operations. The new command and control facility under construction integrates the latest technologies and meets the growing demand to continue to evolve as needs emerge.
Russia’s ability to evolve its use of information operations to leverage social media and the cyber domain continues to shock and challenge the world community. The country’s actions, especially during the 2016 U.S. elections, have brought cyber information operations out of the shadows and into the limelight. Now, state and nonstate actors are frequently using similar techniques to influence the public and achieve political goals once only attainable through armed conflict.
As billions more Internet of Things (IoT)-related devices come online, the barrage of cyber threats will not only continue but will target users in new ways. Moreover, the number of adversaries mounting attacks against the United States in cyberspace will continue to grow in the next year, as nation-states, terrorist groups, criminal organizations and others persist in the development of cyber warfare capabilities, Michael Moss, deputy director, Cyber Threat Intelligence Integration Center (CTIIC) warned during recent Congressional testimony.
Government IT professionals have clear concerns about the threats posed by careless and untrained insiders, foreign governments, criminal hackers and others. For the government, cyber attacks are a matter of life. We must deal with them as a common occurrence.
The U.S. Army is making multiple changes to the way it educates soldiers fighting in the cyber and electronic warfare domains. Rather than training soldiers on step-by-step processes, the service is educating personnel to come up with their own solutions on a technologically complex battlefield.
The U.S. Army is poised to implement five force design changes related to the integration of multidomain capabilities, including intelligence, cyber and electronic warfare. The integration of such capabilities is designed to allow commanders to act more quickly on the cyber-era battlefield.
David May, senior intelligence advisor, U.S. Army Cyber Center of Excellence and Fort Gordon, Georgia, explained the changes while serving on a multidomain panel at the AFCEA TechNet Augusta conference.
Cambridge International Systems Inc.,* Arlington, Virginia (N6523618D3003); Grove Resource Solutions, Inc.,* Frederick, Maryland (N6523618D3004); PeopleTec Inc.,* Huntsville, Alabama (N6523618D3005); Systems Technology Forum Ltd,* Fredericksburg, Virginia (N6523618D3006); and UEC Electronics LLC,* Hanahan, South Carolina (N6523618D3007), are each awarded a combined $949,900,000 multiple award, indefinite delivery/indefinite quantity, supply contract utilizing firm-fixed-price and cost-plus-fixed-fee delivery/task orders. The contracts are for Cyber Mission Systems, kitting, and supplies.
Lt. Gen. Stephen Fogarty, USA, commander of U.S. Army Cyber Command, suggests the command could get a new name and says he would recommend the same for the U.S. Cyber Command.When the Army command was first established in 2010, Cyber Command was the appropriate name, but that is not longer the case, he asserted. “I think we’re well past that now. We’re at the point where, in the future, it’s going to change to something like this: Army Information Warfare Operations Command or Army Information Warfare Dominance Command.”
The U.S. Army is head and shoulders above the other services in the cyber arena, Rear Adm. William “Bill” Leigher, USN (Ret.), director of Department of Defense Cyber Warfare, Raytheon, stated.
“The Army is the example that I hold up to my fellow sailors. The Army doing is it exactly right,” Adm. Leigher said.