Cybersecurity

Army adds cyber war to combat training

Army Cyber Command logo

The Army is stepping up its process to prime troops for combat, weaving cyber operations into more traditional training exercises. It is the latest example of how the military’s newest domain – cyberspace – increasingly is mixing into the kinetic warfare that has long defined military operations.

Recently, top Army leaders have outlined ways the service is building up its approach to cyber, including in training exercises, improving cybersecurity, developing digital weapons and establishing policies to govern it all.

"(Cyber) threats are real, growing, sophisticated and evolving," Lt. Gen. Rhett A. Hernandez, commander of Army Cyber Command, said at the Association of the United States Army conference in Washington on Oct. 23. "In cyberspace, the significant advantage will go to the side that can protect and secure critical information as well as gain and exploit advantages.”

Active defense and a closely guarded offense, both central to military operations in cyberspace, hinge on force modernization. A key part of that is continuing strides toward a joint information environment that will provide a comprehensive operational view across the Army and broader Defense Department, Hernandez noted in an official statement.

Army CIO/G-6 Lt. Gen. Susan Lawrence said that common view is currently hindered by a fractured and poorly integrated environment. "We have got to able to, in any type of combat or spectrum of operations, have technology overmatch against any enemy, and getting to this environment will allow us to do that," Lawrence said.

Beyond the network, commanders across the military are building cyber into training exercises.

Lt. Gen. Donald Campbell, commanding general of the Army’s III Corps and Fort Hood, Texas, said that cyber capabilities used in a recent exercise resulted in soldiers degrading opposing forces’ command and control systems by 40 percent, according to a Nextgov report. Campbell also said social media was used in the exercise to target locals, and that these kinds of exercises need to be part of future Army training.

“We met daily, in a targeting brief for an hour and there were specific focused targets on what we would do to the network and what we would do to our network,” Campbell said, according to Foreign Policy.

Similarly, the U.S. Army Europe’s 5th Signal Command also has incorporated cyber into training, including the use of a mock phishing scam to simulate the release of malware into a network critical to operations, Stars and Stripes reported.

“What you will see over time evolving is cyberspace becoming more mainstream in all our training avenues across the Army,” said Patrick Manners, a development director for Army Cyber Command.

Army leadership also is looking into the new weapons cyberspace requires, and how their use will be governed.

“We’re working hard with mission command as well as with [Army Space and Missile Defense Command] to work our way through an initial capabilities requirements document to determine what gaps we believe we have…to support tactical and operational requirements,” Hernandez said, per FP. That study, for which Hernandez did not offer a timeline, “will produce a set of requirements that will drive an expanded level of capabilities beyond what we have today.”

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

Featured

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

  • FCW Illustration.  Original Images: Shutterstock, Airbnb

    Should federal contracting be more like Airbnb?

    Steve Kelman believes a lighter touch and a bit more trust could transform today's compliance culture.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.