Cybersecurity

Army adds cyber war to combat training

Army Cyber Command logo

The Army is stepping up its process to prime troops for combat, weaving cyber operations into more traditional training exercises. It is the latest example of how the military’s newest domain – cyberspace – increasingly is mixing into the kinetic warfare that has long defined military operations.

Recently, top Army leaders have outlined ways the service is building up its approach to cyber, including in training exercises, improving cybersecurity, developing digital weapons and establishing policies to govern it all.

"(Cyber) threats are real, growing, sophisticated and evolving," Lt. Gen. Rhett A. Hernandez, commander of Army Cyber Command, said at the Association of the United States Army conference in Washington on Oct. 23. "In cyberspace, the significant advantage will go to the side that can protect and secure critical information as well as gain and exploit advantages.”

Active defense and a closely guarded offense, both central to military operations in cyberspace, hinge on force modernization. A key part of that is continuing strides toward a joint information environment that will provide a comprehensive operational view across the Army and broader Defense Department, Hernandez noted in an official statement.

Army CIO/G-6 Lt. Gen. Susan Lawrence said that common view is currently hindered by a fractured and poorly integrated environment. "We have got to able to, in any type of combat or spectrum of operations, have technology overmatch against any enemy, and getting to this environment will allow us to do that," Lawrence said.

Beyond the network, commanders across the military are building cyber into training exercises.

Lt. Gen. Donald Campbell, commanding general of the Army’s III Corps and Fort Hood, Texas, said that cyber capabilities used in a recent exercise resulted in soldiers degrading opposing forces’ command and control systems by 40 percent, according to a Nextgov report. Campbell also said social media was used in the exercise to target locals, and that these kinds of exercises need to be part of future Army training.

“We met daily, in a targeting brief for an hour and there were specific focused targets on what we would do to the network and what we would do to our network,” Campbell said, according to Foreign Policy.

Similarly, the U.S. Army Europe’s 5th Signal Command also has incorporated cyber into training, including the use of a mock phishing scam to simulate the release of malware into a network critical to operations, Stars and Stripes reported.

“What you will see over time evolving is cyberspace becoming more mainstream in all our training avenues across the Army,” said Patrick Manners, a development director for Army Cyber Command.

Army leadership also is looking into the new weapons cyberspace requires, and how their use will be governed.

“We’re working hard with mission command as well as with [Army Space and Missile Defense Command] to work our way through an initial capabilities requirements document to determine what gaps we believe we have…to support tactical and operational requirements,” Hernandez said, per FP. That study, for which Hernandez did not offer a timeline, “will produce a set of requirements that will drive an expanded level of capabilities beyond what we have today.”

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

Featured

  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from Shutterstock.com

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Wed, Oct 31, 2012 Earth

The world desperately needs to update the Geneva Conventions to define a cyber attack on civilian infrastructure as an attack on civilians. And therefore treat such attacks as a crime against humanity. Treat the belligerent generals and the crackers the same, firing squad.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group