Lt. Gen. Mark Bowman, USA (Ret.), former director of command, control, communications and computers/cyber for the Joint Staff, paints a dire picture of future warfare. The next war, he says, will begin with wave after wave of cyber and electronic warfare attacks that our nation is not prepared for. Although the Army is making strides in training the cyber electromagnetic activities (CEMA) force, the service may not be able to address all scenarios in a training environment.
On the multi-domain battlefield of the future, U.S. forces can expect to see more robots, pilotless ships and planes, and driverless convoys, as well as cyber and other game-changing capabilities, said Lt. Gen. Paul Nakasone, USA, commanding general, U.S. Army Cyber Command.
Gen. Nakasone made the comments during the afternoon keynote address at AFCEA TechNet Augusta 2017 in Augusta, Georgia.
“We are witnessing a fundamental change and transformation in the character of war," he said. “This transformation is being driven by technology and demographics, socioeconomic and political changes.”
The Army’s first doctrine for fighting in the cyberspace and electronic warfare domains already is changing the way the service operates, said Maj. Gen. John B. Morrison Jr., USA, commander, Cyber Center of Excellence and Fort Gordon, told the AFCEA TechNet Augusta audience in Augusta, Georgia.
Army officials have multiple pilot projects in the works to help define formations that will integrate cyber electromagnetic activities (CEMA).
According to Maj. Gen. John B. Morrison, Jr., USA, commander, Cyber Center of Excellence and Fort Gordon, the Army has initiated one pilot project with the Army Pacific Command and is seeking to begin another within the continental United States to better define formations that will integrate cyber, electronic warfare, signal and intelligence capabilities.
Lt. Gen. Paul Funk II, USA, the commander of III Corps, which is preparing for war, called for a network with simplicity as a core requirement.
— George Seffers (@gseffers) August 8, 2017
Northeastern University will develop a system that organizations and individuals can use to audit and control personally identifiable information leaks from connected devices. The research team will investigate how to use machine learning to reliably identify the information in network flows and will develop algorithms that incorporate user feedback to adapt to the constantly changing landscape of privacy leaks.
NAO Cyber Veterans LCC, Arlington, Virginia, is being awarded $26,992,500 indefinite-delivery/indefinite-quantity contract, resulting from solicitation N00189-17-R-0021, that will include terms and conditions for the placement of firm-fixed-price task orders to provide a variety of information technology support and analytical services in support of the U.S. Fleet Cyber Command Navy Authorizing Official Directorate. The contract will include a five-year base ordering period and six-month option period, which if exercised, the total value of this contract will be $30,000,000. Work will be performed in Suffolk, Virginia (80 percent); and Arlington, Virginia (20 percent). Work is expected to be completed by August 2022.
The U.S. military must adopt a software-defined network to improve agility, flexibility and interoperability with international partners while keeping pace with technological changes, says Lt. Gen. Robert Ferrell, USA (Ret.), former Army chief information officer/G-6.
Owning every piece of hardware is no longer necessary or feasible, says the general, who retired in May. “This legacy environment that we have that is now hardware-based is not going to cut it,” he asserts.
A software-defined network offers a number of benefits, but getting there is no easy task, Gen. Ferrell indicates. “The software-defined network is the way to go, but that’s going to take some time to move in that direction,” he says.
The U.S. Army is consolidating major electronics disciplines in an approach that brings education and operations under a single umbrella. This confluence extends to physical plants as well as organizational charts. For example, the Cyber Center of Excellence at Fort Gordon, Georgia, is co-located with its operational counterpart to meld the identities of theory and practice.
The Office of the Director of National Intelligence is developing a set of common definitions to unify descriptions of cyberthreats used by different elements of the intelligence community. The effort seeks to bridge differences among various segments of the community when it comes to assessing these threats and reporting them to government organizations and industry. A common vernacular will help generate a common threat picture that can serve government and industry alike, experts agree.
The mind of society is the battlefield in the current global struggle for geopolitical domination. The uses of soft power dominate in this battle and information warfare is the name of the game—not “cyber war” in all the ways it has been described but the influence and ultimately control of individual minds that, like cells in a body, make up the Mind of Society. Then control is used as leverage to achieve objectives that are often hidden.
The U.S. Army is serious about the narrative that it is serious about cyber. The service has put its organizational architecture on the line by prioritizing the newest warfighting domain while converging it with long-extant but re-emerging combat disciplines, a senior leader says.
The executive order signed by the president in May to strengthen the nation’s cybersecurity policies is evidence that the federal government has recognized and is going to take significant steps to address increasingly frequent and sophisticated cyber attacks. This order is a great first step, but must be supported by more innovative and flexible acquisition and procurement strategies and processes.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded Salt Lake City-based startup Evernym a $749,000 Small Business Innovation Program (SBIR) award to develop an easy-to-use, decentralized mechanism for managing public and private encryption keys needed for the secure and scalable deployment of blockchain technologies.
Officials with the Institute for Cybersecurity at Regent University recently announced the school is building a state-of-the-art cyber range training facility at its Virginia Beach campus. The Regent Cyber Range will open o during the fourth quarter of this year and will offer hands-on training programs for enterprises, consultancies, government and military organizations.
The U.S. Army Research Laboratory (ARL) opened the Army Cyber-research Analytics Laboratory (ACAL) on July 19, a facility that unlike any other lab, provides industrial and federally-funded partners—including universities—access to highly-sensitive live cyber-security data, the service has announced.
The new research space was developed as a result of a partnership with Army Cyber Command and represents an extension of ongoing collaborative efforts with the Defense Department’s science and technology community, said Philip Perconti, ARL director.
The U.S. Defense Department’s Rapid Reaction Technology Office (RRTO) will conduct a solutions meeting in late October in McLean, Virginia, according to a recent announcement posted on the FedBizOpps website. Companies will provide short technical presentations to government representatives about their technologies and products with the potential to be selected for pilot projects or experimentation if the technology appears to match the department's cyber needs.
The RRTO is interested in:
Nearly everyone has heard a parent or grandparent refer to the good ol’ days. Tales usually begin either with, “When I was your age…” or “In my day, we didn’t have….”
While it seems appropriate that octogenarians and nonagenarians tell such stories, today they’re not the only generations sharing memories that begin with, “When I was young….” People in their 20s and 30s reflect on their youth wistfully because members of the younger generation—who, by the way, are only five or 10 years younger than they are—can communicate, play, buy and sell, and share life moments in ways that surprise even 20-somethings.
On the eve of last year’s U.S. presidential election, two computational social scientists from the University of Southern California published an alarming study that went largely unnoticed in the flood of election news. It found that for a month leading up to the November vote, a large portion of users on the social media platform Twitter might not have been human.
The users were social bots, or computer algorithms built to automatically produce content and interact with people on social media, emulating them and trying to alter their behavior. Bots are used to manipulate opinions and advance agendas—all part of the increasing weaponization of social media.
U.S. Army officials expect that by this fall, they will have formal approval of a rapid prototyping process for acquiring cyber and electronic warfare prototypes assessed during the just-completed Cyber Quest 2017 exercise at Fort Gordon, Georgia.
Army officials describe Cyber Quest as an annual cyber and electronic warfare exploration and collaboration event hosted by the Cyber Center of Excellence. This is the second year for the event.