You are on page 1of 7

it/networks

TIME MANAGEMENT
THE ARMY WANTS
FLEXIBILITY TO INSERT
NEW TECHNOLOGIES
INTO ITS NETWORK
AS IT CONTINUES
TO MODERNIZE.

Buying Time
The Army lays out its schedule for 2021 network update
By Mark Pomerleau

T
he Army’s top network buyer provided the most should be driving the preliminary design review for the capability
detailed timeline to date of how the service will plan set of 2023.
an update to its tactical network in 2021. “I’m going to be fielding one while I’m doing the detailed design
“We have until about early [20]20 to get after the on the second while I’m doing the [science and technology] and
meaningful experiments that are going to inform our technology research for the third,” Bassett said.
final set of design choices as we refine our prelimi-
nary design,” Maj. Gen. David Bassett, Program Executive Officer WHAT’S IN STORE FOR 2021
for Command, Control, Communications-Tactical, said at a May 1
AFCEA event. Army officials also said that some of the hardware and software
In a chart outlining what the 2021 capability set — which, among that will be included in the 2021 capability set is not guaranteed
other tasks, will provide units more abundant communications for future iterations.
options — could look like, he listed broad deadlines for when the “Capabilities that will be assessed between now and capability
Army wants open proposals on hardware and software solutions set ’21 procurement [are] pretty much locked in place and after the
and when it is trying to narrow down which of these proposals will [preliminary design review] we’ll have a better idea of exactly what’s
work for the service. in and what’s out,” Col. Garth Winterle, program manager for tactical
Bassett said that, while ideally he’d like to keep software solutions radios in PEO-C3T, said during the same event.
open as long as possible, hardware solutions will likely need to be He added that while there has been some concern of vendor lock,
identified earlier in the process. the Army is currently resource constrained.
According to the chart, the Army will be open to hardware and “If we have only a certain number of vendor solutions that are
software solutions in fourth quarter 2019. Around spring 2020, demonstrating that capability as part of the \set ’21 evaluation, that
the Army will finalize hardware solutions while industry proposes does not man those vendors are locked in for those capabilities,”
software packages. In the third quarter 2020, the Army expects he said. “In many cases, we have multiple vendors that will be
to narrow potential products for both areas. demonstrated whether from [Rapid Equipping Force] procured
Also revealed by the chart is the fact that Army leaders won’t look assets or assets that have been procured to support the 1st of the
for hardware solutions again until summer 2021 and software until 82nd [Airborne Division] evaluation.”
second quarter 2022. These capabilities will then compete in field experiments, said
“There’s going to come a point where all of your good ideas in Winterle. In the case of multiple vendors, there will be a run off
PHOTO: STAFF SGT. CODY HARDING/ARMY

technology are too late, like a good idea cut off point. Then those and down select. The Army has said these experiments, which
things are going to have to flow into the next capability set,” he said. have occurred in concert with the Network Cross Functional
“It doesn’t mean we’re going to ignore them, it just means in order Team, have helped better inform designs and drill down on risk
to deliver that integrated capability, we’ve got to be able to converge reduction.
on something. We want good broad divergent critical thinking about “We had hoped by now to be experimenting at brigade level. But
the range of technical options that are available to us and then we the money didn’t move,” Bassett said. “The above threshold repro-
want to converge and deliver capability.” gramming last year wasn’t approved. The one that we needed this
Bassett noted that the Army will juggle simultaneous network year to keep it on track wasn’t approved even inside the Pentagon.
upgrades in the near future. By the time the service gets to critical So we’re going to have less experimentation than we had hoped
design review of the 2021 build, the Network Cross-Functional Team for to inform our design.” o

C4ISRNET.com/it-networks JUNE 2019 21


electronic warfare

SEWING THINGS TOGETHER

Signaling NAVY LEADERS WANT AN EW


SYSTEMS UPGRADE TO HELP

change
PROVIDE A CLEARER PICTURE
OF WHAT’S HAPPENING.

How an electronic warfare update could help the Navy


By Adam Stone

T
he Navy wants to harden its aircraft carriers, cruisers, shipboard systems becomes critical.
destroyers and warships against an ever more hostile “You have more flow of information, allowing the combat system
electronic warfare environment. To do so, the service to make faster, real-time decisions. It also gives the combat system
recently awarded a $184 million contract to Lockheed a better picture of the overall environment that it sits in,” he said.
Martin. With its broad range, Block 2 creates situational awareness across
The contract is for ongoing production of Block 2 the electromagnetic domain. When it’s possible to integrate that intel
systems that are part of the Surface Electronic Warfare into the combat system, “that’s a very powerful capability, in that it
Improvement Program, or SEWIP. enables the combat system to be looking everywhere all at once,”
SEWIP supports AN/SLQ-32(V), a shipboard electronic warfare Ottaviano said.
system that delivers both support and countermeasure protection In practical terms, Block 2’s sophisticated signal processing
for U.S. and international navies. should give commanders the ability to more effectively interpret the
The Block 2 upgrade “increases system capability significantly,” electronic warfare landscape.
said Joe Ottaviano, director at Lockheed Martin Rotary and Mission “Most battles take place close to shore, where you get more signal,”
Systems. “The number of threats and signals out there is increasing Ottaviano said. “This system can take apart that complex, dense
exponentially, and the system has to be able to handle those more environment very quickly and ascertain what is a threat and what
complicated threats. It also brings the system into the digital age as is not a threat. In a digital world, I can look at an extremely fine level
the first open-architecture EW system that the Navy had moved on.” and tear those signals apart so that I can understand exactly what
Designed in the 1970s and deployed in the 1980s, AN/SLQ-32 is going on. Being digital gives me the ability to look at the environ-
(pronounced “slick”) scans the electronic spectra for indications ment with much finer granularity.”
of incoming missiles. While a Block 1 upgrade worked to fine-tune The open-architecture approach also allows Block 2 to seamlessly
some of those capabilities, Block 2 is more of a reboot, giving the interface with other intelligence, surveillance and reconnaissance
system considerably expanded powers. Reaching across the entire assets, such as the Advanced Off-Board Electronic Warfare system.
electromagnetic spectrum, Block 2 enables the AN/SLQ-32 system “Together that gives you an increased field of view,” Ottaviano
to tune into not just missiles, but also ships, radio traffic and other said. “It comes from being digital and it comes from having an open
key electronic signals. system. A lot of work was done to standardize the interfaces, to really
The Navy points to enhanced capabilities via an upgraded think well into the future.”
electronic support antenna, an electronic support receiver and Further future-proofing comes via the programmability of Block 2,
an open interface with the Navy’s key combat systems. “These which is largely based on off-the-shelf technology components.
upgrades are necessary in order to pace the threat and improve “As threats continue to become more complex, we had to be sure
PHOTO: COURTESY LOCKHEED MARTIN

detection and accuracy capabilities of the AN/SLQ-32,” according the system was software upgradable to give the system additional
to Navy documents. capabilities,” he said. “This is a new tool and everyone is still finding
Together, these improvements will “take electronic warfare to the out just how powerful it is. If there is a decision to upgrade systems
21st century,” Bryan Fox, engineering agent manager at the Naval software, we can do it very quickly and easily.”
Surface Warfare Center’s Crane Division, said in a news release. Looking ahead, Ottaviano said a planned future Block 3 likely will
“We are giving the war fighter game-changing technologies so that augment Block 2’s passive scanning with tools for an active response
current and future threats can be combatted.” on the electromagnetic spectrum. In January, the Navy awarded
Ottaviano said the open interface is significant in an increasingly Northrop Grumman a contract to bring a modern electronic warfare
hostile electronic warfare environment, where integration between attack capability to U.S. surface ships. o

22 C4ISRNET.COM
Electronic Warfare

Building
Blocks
The E/A-18G Growler
electronic attack plane is
about to get more lethal
By Valerie Insinna

B
FRESH GROWLER FILLS
oeing’s E/A-18G Growler could receive a package AN EA-18G LANDS ON
of upgrades in the mid-2020s that would provide a THE FLIGHT DECK OF
suite of new tools to electronically attack its foes. THE AIRCRAFT CARRIER
Early this year, the Navy awarded Boeing initial THEODORE ROOSEVELT.
funding to begin studying what kinds of technologies
could be incorporated into a “Block 2 Growler,” said
Jen Tebo, the company’s director of Super Hornet and to digest and the aircrew’s workload is minimized, she said.
Growler development. “All of that is kind of accomplished through software-defined
“There were kind of rumblings of Growler Block 2 a year ago, and radios that are enabled through a flexible and adaptable hardware
now it is a real thing,” Tebo told reporters on the sidelines of the Navy architecture,” Tebo said.
League’s Sea-Air-Space, held May 6 – 8 in Maryland. “The Growler is “That not only gives the Navy step function capability now, but
the only platform of its type that is being produced today, so it makes it also sets up the infrastructure and the architecture to allow us
sense that we would take something that was designed in the ’90s and to continually evolve capability, as threats are dynamic out there
now enhance it to be relevant for decades to come.” and they change,” she said. “We don’t know what they are, and the
The Navy is interested in retrofitting some — potentially all — life of the Growler is very, very long.”
of its E/A-18G fleet in the mid-2020s. The exact nature of those The Block 2 upgrades will also contain some capabilities that
upgrades is still to be decided, but Tebo outlined a couple of the Boeing has already developed for the latest Block 3 iteration of the
improvements. Super Hornet, such as low-drag conformal fuel tanks. The company
First, Boeing plans to improve the electronic attack sensors. For is also assessing whether to boost the Growler’s 7,500-hour service
example, it is considering enhancements to Northrop Grumman’s life as part of the retrofit process.
ALQ-218 system, used by the Growler for radar warning, electronic Boeing is in the “wrap up phases” of its initial trade study and
support measures and electronic intelligence, Tebo said. will brief the Navy and other stakeholders in industry on its result,
Boeing leaders also plan to add “adaptive, distributed processing” she said.
so that the E/A-18’s computers can quickly digest and pump out “As we move later this year to the SFR — the system functional
threat information. And because the computers will be processing requirements phase — sometime in that you’ve got to nail down an
more information and delivering it to the pilot and weapon system architecture to get to the functional requirements of this and how
officer, it makes sense to improve interfaces so that the data is easy we might achieve them.” o

Being Decoy approach includes saturating the environment with electronic


decoys to hide units or sensitive assets.
Gen. Robert Brown, the commander of Army Pacific, speaking
PHOTO: MASS COMMUNICATION SPECIALIST 3RD CLASS ANDREW LANGHOLF/NAVY

during a March 27 presentation at AUSA Global Force Symposium


This isn’t your dad’s denial held in Huntsville, Alabama, explained that the Army must get back
and deception to denial and deception. In this new environment, the use of denial
and deception will look different from that of years past.
By Mark Pomerleau He described the potential prospect of deploying 10,000 water
bottle-sized devices that emit the electronic signature of a TYP-2
radar. With 10,000 of these signatures in the environment, “good
Officials are becoming more specific about what the congested and luck finding the actual TYP-2,” and just think of all the time wasted
contested battlefield of tomorrow might look like. doing it, Brown explained.
Unlike technologically inferior foes of the counter-terror fight Lt. Gen. Stephen Fogarty, commander of Army Cyber Command,
in Iraq and Afghanistan, near-peer adversaries have sophisticated has envisioned dropping a decoy emitting strong signals off a truck
technologies that can jam communications and even geolocate units at a fork in the road, thus drawing enemy attention to it.
merely based on sensing the units’ electronic signature. This trail “Now we are presenting multiple dilemmas to the adversary,”
could be internet connections or radio transmissions, all of which he said.
exist in the electromagnetic spectrum. These decoys can be used, for exampale, to throw adversaries
Under the Army’s new concept — multidomain operations — off the trail of friendly forces or distract from other items forces
the service has moved beyond notional, conceptual and future might want to protect.
terms and started outlining what it needs to present sophisticated “If I have something like a counterfire radar, that is going to be really
adversaries with multiple dilemmas. important to me. Maybe what I want to do, again, is push an alternate
In the non-kinetic electromagnetic spectrum world, the new threat to the adversary,” Fogarty said. o

C4ISRNET.com/electronic-warfare JUNE 2019 23


c2/COMMS

Teaming with
Potential
The US Navy’s
unmanned dream: FRIENDLY FIRE
A common control system AN MQ-8C FIRE SCOUT IS CHAINED TO THE FLIGHT DECK OF THE
INDEPENDENCE-CLASS LITTORAL COMBAT SHIP CORONADO.
By David B. Larter

T
The philosophy that is driving the Navy toward a goal of having one
he Navy’s growing and increasingly diverse portfolio control system to run all unmanned platforms in the service’s portfolio:
of unmanned systems is creating a jumble of control a goal that is a good ways away, Small said.
systems, creating problems for a force that hopes robot “The end state is — future state nirvana — would be one set of soft-
ships, aircraft and submarines will help it to regain an ware that you could do it all on,” he said. “I think that’s a faraway vision.
advantage over rivals such as China and Russia. One And the challenges are every unmanned system is a little bit different
major issue with having myriad systems, however, is and has its own requirements. And each of the integration points — a
needing to train sailors on several different ones, which destroyer, shore base or submarine — has slightly different integration
can prove time-consuming, inefficient and expensive. requirements as well.
“From a manned-machine teaming and sailor-integration perspec- “But the vision is that we can enjoy commonality as much as is
tive, we need a portfolio of systems to do a wide variety of things,” possible and share pieces of software wherever possible.”
Capt. Pete Small, the head of unmanned maritime systems at Naval The effort mirrors a similar endeavor in the surface Navy to develop
Sea Systems Command, said. “We can’t bring a different interface a single combat system that controls every ship’s systems.
for each platform to our sailors — from a training perspective but also The goal is that if a sailor who is trained on a big-deck amphibious
from an integration perspective. ship transfers to a destroyer, no extra training will be necessary to run
“We might have a destroyer that needs to operate an [unmanned the equipment on the destroyer.
surface vessel] and an [unmanned underwater vehicle] and they all “That’s an imperative going forward — we have to get to a single
need to be linked back to a shore command center. So we’ve got to have integrated combat system,” Rear Adm. Ron Boxall, the chief of naval
common communications protocols to make that all happen, and we operations’ director of surface warfare, said in a December interview
want to reduce the burden on sailors to go do that.” at the Pentagon with C4ISRNET sister publication Defense News. o

Paths Hamilton said Air Force leaders are operating under the assumption
that an adversary might take one or two of the networks down and that

of Least
the new system should automatically find the right path to move the
data to intelligence personnel downrange.

Resistance
These types of mesh or fractal networks are what the Air Force
will need in the future, Hamilton said. Already, he added, insurgents
have proven they work.
“One thing I learned from facing insurgent bad guys: they’ve got
What the Air Force learned mesh networks figured out,” he said.
“When we figured out how to stop their comms through any one
from insurgents’ networks medium, they were very quick to adapt and move to another medium.
I think that is a lesson learned from their [tactics, techniques and
By Mark Pomerleau procedures] that we need to incorporate into our operations.”
The head of Air Combat Command, Gen. James “Mike” Holmes,
Air Force leaders plan to experiment this summer with a mesh network said April 11 that the service plans to rely more on commercial systems
that would allow military users in hard-to-reach areas to connect to a and is less likely to consider building its own specific, purpose-built
top-secret network and share intelligence information without the fear communication system.
of losing service. “It’ll be about protecting the data, keeping our confidence in the data
Department of Defense officials worry that in a potential conflict as people try to take the confidence we have away from us and build
with China or Russia, adversaries will look to shut down friendly systems that can communicate over fiber, over commercial telecom,
communications channels. As a result, soldiers will need resilient and over Wi-Fi, over satellite links, over all the different paths that are out
PHOTO: ENS. JALEN ROBINSON/NAVY

redundant forms of communication. there,” Holmes said.


To combat that possibility, Air Force officials want a system that has Similar to the JWICS system’s ability to automatically find the right
multiple ways to quickly connect to the Joint Worldwide Intelligence pathway, Holmes described an approach of that would mimic the way
Communications System. commercial cellphones automatically connect to the proper cellphone
“It’s a kit that, when units go out and deploy to bare base locations, network or Wi-Fi.
they’re able to set up and get linked into JWICS,” Shane Hamilton, “You don’t always know how you’re talking to your spouse; you
associate director of intelligence at Air Combat Command, said April 11 just know the cellphone is figuring it out and finding the path to get
at an event at Langley Air Force Base. there,” he said. o

24 C4ISRNET.COM
c2/COMMS

Sense of
PENALTY SHOOT OUT
THE ARMY IS UNDERTAKING
Direction
SEVERAL EFFORTS TO SUPPORT The Army targets systems to ‘see’ 1,000 miles
LONG-RANGE, MULTIDOMAIN
OPERATIONS. By Mark Pomerleau

A
dversaries are creating systems to keep U.S. forces of long-range precision,” she said.
at bay, including long-range missiles, advanced radar On the materiel side, Walters outlined a variety of capabilities —
equipment to sense incoming assets and non-kinetic from the space to the terrestrial layer — the Army is pursuing to get
means of engagement, such as cyber and electronic after the challenges of sensing deep into enemy territory.
warfare. This has made the Army realize it needs a The first is the multidomain sensing system. This is designed to
long-range penetrating capability to thwart these so- be sensor-centric as opposed to platform-centric and will include
called anti-access area denial areas. things from tethered antennas to high-altitude balloons to low-orbit
But, in order to target accurately, the Army has said it needs to be satellites in space, Walters said.
able to “see” thousands of miles to locate what it is shooting at. “We want smart sensors that are tied down to shooters to close the
“Right now, we have a challenge with sensing deep in the U.S. gap to when we see the enemy to when we kill the enemy,” he said.
Army. The chief’s No. 1 priority for modernization is long-range Part of the multidomain sensing system includes sensors, such
precision fires,” Maj. Gen. Robert Walters, the commander of the as synthetic aperture radar and moving target identification sensors
Intelligence Center of Excellence, said March 26 during the AUSA enabled with artificial intelligence, that can detect enemy move-
Global Force Symposium in Huntsville, Alabama. ments on the ground.
Brig. Gen. Jennifer Buckner, director of cyber within the Army’s “The intent of this aerial layer of intelligence, surveillance and
G-3/5/7, told an audience at a March 21 AFCEA conference held in reconnaissance is to enable us to sense deep so that we can provide
National Harbor, Maryland, that the need to see long ranges means the intel support to targeting, but we can also provide electronic war-
sensing where missiles are firing, but also viewing activity in virtual fare capabilities deeper into the enemy’s formations,” Walters said.
space. He added that this includes electronic attack.
To address this hybrid approach, Army officials have outlined a “We have to be able to sense that far to provide that to the shoot-
variety of efforts, including task forces and actual materiel solutions. ers for them to engage the enemy,” he told C4ISRNET. “We have to
One is an intelligence, surveillance and reconnaissance task force do it rapidly. That’s why we want the smart sensors in the sky and
created in 2018 by the Army’s intelligence directorate to optimize we can program them so we know what the enemy’s order of battle
Army ISR for so-called multidomain operations, Cheryle Rivas, an looks like.”
Army spokeswoman, told C4ISRNET. A program called TITAN will change the need for four different
The task force will also enhance and capitalize on complementary ground systems that receive overhead information to one, Walters
capabilities across the joint force and intelligence community. said, with the intent being to capitalize on national assets, commer-
Rivas noted that the task force performs a complementary and cial capabilities and capabilities possessed by sister services.
enabling role to the Army’s eight cross-functional teams, which sit According to a slide during Walters’ presentation, TITAN will
under Futures Command and are associated with the service’s top allow for the conduct of deep targeting in a contested environment
six modernization priorities: long-range precision fires; next-gen and enabling “cross-domain fires with AI shortened kill-chains.”
combat vehicles; future vertical lift; the network; air and missile Walters also included the Terrestrial Layer System in this discus-
PHOTO: SGT. MICHELLE U. BLESAM/ARMY

defense; and soldier lethality. sion of providing sensing capabilities deep into enemy territories.
Rivas added that intelligence is central to the Army’s ability to TLS is a combined signals intelligence and electronic warfare system
conduct lethal strikes that are not hampered by the denial strategies that will be mounted on ground platforms.
of near-peer competitors. Walters told C4ISRNET that the ultimate intent for the Army is
The task force “is working alongside the long-range precision fires, to provide all these capabilities at all echelons.
assured precision, navigation and timing, and future vertical lift TLS will be at the brigade combat team level, as well as with the
cross-functional teams to optimize existing intelligence capabilities, expeditionary military intelligence brigades, while TITAN will be at
as well as to identify critical collection requirements from the space all echelons and ground stations. The multidomain sensing system
to the terrestrial layer that can provide targetable data in support will likely be a division and above asset, he told C4ISRNET. o

C4ISRNET.com/c2-comms JUNE 2019 25


cyber

Cyber
insights
Will every Marine a
rifleman remain?
By Kyle Rempfer

P
lans to bolster the Marine Corps’
cohort of cyber experts are moving
forward, but this new unit will not
don the service’s uniform, service SEMPER WI-FI
leaders said. NEW MARINES CYBER UNIT
The Marine Corps will create ‘CAN HAVE PURPLE HAIR,’
a new Cyber Auxiliary division, BUT NO EAGLE, GLOBE AND
Commandant Gen. Robert Neller said April 29, ANCHOR, COMMANDANT SAYS.
and the new force will not be beholden to strict
Marine grooming standards.
“We are going to do a Marine Corps Cyber Auxiliary,” Neller said boot camp and putting on a uniform as a mid-career rank upon
at the Future Security Forum in Washington. entry into the service.
“If anybody wants to join, you can sign up. You can have purple Because the new force will not be wearing the Eagle, Globe and
hair, too, but no [Eagle, Globe and Anchor].” Anchor, they won’t be Marines who went through boot camp.
The comment was easy to dismiss as a joke, but Marine officials Still unanswered is what exactly a Cyber Auxiliary will do.
said the Cyber Auxiliary unit is a serious endeavor that is moving “Cyber expert” is sometimes used as a catch-all by government
forward, although confirmed details are scarce. officials, ranging from white-hat hackers, to information technology
“I will confirm, however, that the CMC was not joking about professionals to intelligence collectors.
the creation of a new cyber unit,” said Capt. Joseph Butterfield, Whether the cyber operators will be in the field, or be relegated
Headquarters Marine Corps spokesman. to offices, is yet to be seen. But putting civilians into operational
To underscore the need for unconventional approaches to man- roles comes with complications, Marine Corps Times previously re-
power, Neller recounted a 2015 event in Silicon Valley. Neller said ported.
he was surrounded by experts from all over the world for five days For instance, legally, some offensive cyber operations would have
of lectures on directed energy, biomechanics, artificial intelligence to be carried out by a uniformed service member.
and more. Modernizing the Corps has been a major focus. The effort has
“You just sit there and go, ‘wow, I had no idea,’” he said. “You have included goals such as fielding all 32 infantry battalions with small
to kind of open up your mind a little bit.” quadcopter drones and implementing a new 12-man rifle squad PHOTO: CPL. JOSEPH SCANLAN/REGIONAL COMMAND SOUTHWEST
While new technology is being introduced, fundamental military model to free up Marines for areas like cyber and intelligence.
principles like training hard and maintaining discipline remain. But the modernization push also means introducing automated
“At some point in the fight, there may be a time where somebody’s vehicles such as amphibious ship-launched sea drones. That tech-
going to stand on a piece of ground with a weapon in their hand and nology changes the way warfare is conducted.
say, ‘this is mine; you can’t have it,’” Neller said. Neller was bullish regarding the possibilities for naval and air
“But to get to that point, you have to control your network and automation, including swarming underwater and aerial drones. But
deny them theirs.” he remained skeptical of ground automation at its current level.
The need for specialized cyber experts is one felt across the “Obviously, autonomy, robotics, manned-unmanned — that’s
Defense Department, and the federal government at large. Military all happening ... pretty much every vehicle you have can be driven
leaders have found it difficult to coax talented computer and tech autonomously. I mean, the other day they drove an amphibious
wonks away from the private sector’s lucrative six-figure salaries assault vehicle up and down the beach, driven by somebody with
and into public service. a controller,” Neller said.
The new Cyber Auxiliary unit may be a workaround. “That sounds great until it throws track and the robot can’t put
It also appears to address concerns from Marines expressed a track back on. And the robot can’t do security, and then I’m going
over the past few years when the idea of “lateral entry” into the to ask you if you’re going to put your son or daughter in the back
service for cyber experts was introduced — the option of skipping of that thing without a human driving?” o

26 C4ISRNET.COM
cyber
RESPECT MY AUTHORITY
CYBER OPERATIONS WERE
FEW AND FAR BETWEEN.
NO MORE.

Pushing
forward
New authorities mean new missions at Cyber Command
By Mark Pomerleau

L
eaders at U.S. Cyber Command have used new author- conventional activities.
ities to conduct more cyberspace operations in the last In previous years, cyber operations were less understood by both
few months than in the previous 10 years, according to senior government leadership and military commanders, leading
Department of Defense officials. to cyberwarfare being considered as an afterthought in planning.
“I would say that in 8, 9, 10 years — under the old Operators “understand that every time they touch the keyboard
decision process — I can count on less than two fingers where the authority comes from and where they are in the command
the number of operations conducted,” a senior Defense chain and who is authorized that particular operation. It’s clear,” the
department official, speaking on the condition of anonymity, told Defense Department official said.
reporters in April. “That’s part of the checklist of when you log on and before you
The new process — known as National Security Presidential take an action. Just like a pilot climbing into a cockpit or a soldier
Memorandum (NSPM) 13 and minted in August 2018 — replaced picking up a rifle and going on patrol, they understand their [rules
an Obama administration-era process, which required presidential of engagement], they understand their left and right bounds, they
approval for offensive and defensive cyber operations taking place understand the objectives, they understand how that all fits into a
outside U.S. networks. higher echelon of objectives.”
“In this time since mid-August, when the new process went into He added that while they might not be conducting cyber effects
place, we’ve conducted many more” operations,” the official said. operations daily, they are regularly leading collection operations
The official, as well as other top officials in the DoD enterprise, and preparation.
declined to say just how many more operations Cyber Command Cyber Command officials noted that Congress granting additional
has undertaken since the executive branch created a new process authorities in this space has cleared the way for daily operations.
for signing off on operations. In 2018’s defense policy bill, Congress clarified which activities
NSPM-13 is essentially the process by which the government qualify as an exemption to the covert action statue by listing “clan-
grants approval for offensive and defensive cyber effects operations, destine” cyber operations as a traditional military activity, excluding
the official said. The process can be associated with any department it from previous restrictions. This allowed the Defense Department
or agency, although it mostly revolves around DoD operations. The to hunt outside of its networks to see attacks before they reach the
formal document that describes the process is classified. United States.
DoD is now operating under a new concept known as “persistent “You can imagine that if we are not considered a traditional
engagement,” which recognizes that cyber forces must be in constant military activity, that we essentially have to declare or make very
contact in cyberspace with competitors day to day. A key pillar to overt any of our operations — and acknowledge that it is being done
that concept is what officials call “defending forward,” which in- by the Department of Defense and the United States of America,”
volves operating outside U.S. networks to face threats as far away Moore said.
from the United States as possible. That is “not very conducive to being successful inside the cyber
Defending forward is a concept that “helps us better protect domain,” he continued. “By declaring it a traditional military activity,
ourselves,” Maj. Gen. Charles Moore, the director of operations, J-3 it allowed us to move away from that.”
at Cyber Command, told reporters May 7 during a media briefing Similarly, this authority — as well as NSPM-13 and the language
at Fort Meade. in the bill authorizing actions against certain nation-state actors
“When we do this, we can observe enemy techniques and their should they conduct malicious activity in cyberspace — allowed
procedures and tactics, as well as potentially uncover any tools or Cyber Command unprecedented freedom of action in defensive
weapons they might be utilizing.” actions during the 2018 midterm election.
PHOTO: J.M. EDDINS JR./AIR FORCE

Moore added that the new decision-making process had been “We had actually been constrained to only operating our forces on the
critical because it allowed departments and agencies “the ability [DoD Information Network],” Maj. Gen. Timothy Haugh, commander
to execute cyberspace operations within very specific confines as of the Cyber National Mission Force, told reporters at Fort Meade.
given to us by the president and requires very close coordination “We’re proud of how it was done, meaning we worked really closely
and synchronization with the interagency in terms of doing that.” with the Department of State, we worked really closely with European
The combination of a maturing Cyber Command, a more experi- Command to be able to do missions, and at the end of those missions
enced cyber force and new authorities that allow for more activity we had a more secure ally, we gained insights that we wouldn’t have had
have led to a normalizing of cyber operations alongside other more otherwise in a very transparent way.” o

C4ISRNET.com/cyber JUNE 2019 27

You might also like