• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD AND HOMELAND SECURITY UPDATE

November 10, 2017 by

Sponsored by Spectra Cyber Security Solutions

Cyber Security Solutions


————————————————————————
07 Nov 17. DoD is outpacing itself on cyber. One of the observations most oft discussed surrounding the cyber domain is how fast it moves. So fast, evidently, that the Defense Department is outpacing itself.
“We are outrunning our headlights,” Lt. Gen. Paul Nakasone, commander of Army Cyber Command, said during a keynote presentation at the CyCon U.S. conference in Washington Nov. 7. “We’re learning so much, whether or not it’s with our forces, with our doctrine, with our strategy; we are well forward of where we thought we would ever be.”
Nakasone referenced the progress DoD has made in the past seven years in this domain, namely the stand up of a cadre of dedicated cyber warriors and the employment of such forces. This has manifested itself in Cyber Command’s cyber mission force, the roughly 6,200 person, 133 team force of offensive, defensive and support teams made up of personnel from the service cyber component commands, which Nakasone described as a gamechanger.
That is the capability DoD built over the past seven years, Nakasone said, adding it’s a capability that they’ve employed defensively and offensively, as well referencing the fight against the Islamic State group, the most public of offensive cyber efforts executed by the U.S.
“What have we learned?” Nakasone asked, “a tremendous amount.” This includes lessons pertaining to:
• Force structure;
• Force employment;
• Command and control of forces;
• The ability to bring capabilities to the forefront;
• How to take defensive teams and ensure they are informed by offensive teams; and
Regarding offensive and defensive personnel, Cyber Command has worked to train each cyber warrior to the same joint standards.
“The first thing you want to do is be careful about saying it’s one or the other. I do think that there’s a benefit and an advantage … that one might inform the other,” Rear Adm. T.J. White, commander of the Cyber National Mission Force at Cyber Command, said during a panel at the INSA National Security and Intelligence Summit in Washington Sept. 6. “There’s a lot that we’ve learned in anticipating what you might have to do on the offense by understanding very, very well what is going on with the defense.”
Others have also noted lessons learned regarding force employment through operational lessons, especially on the defensive side where they can spilt defensive teams – made up of 39 individuals – eschewing the need to send everyone toward a problem.
“One of the things we found with practical experience is we can actually deploy in smaller sub elements, use reach-back capability, the power of data analytics; we don’t necessarily have to deploy everyone,” Adm. Michael Rogers, the commander of CYBERCOM, told the House Armed Services Committee in May. “We can actually work in a much more tailored, focus[ed] way optimized for the particular network challenge that we’re working. We’re actually working through some things using this on the Pacific at the moment.”
Elaborating on this notion, Brig. Gen. Maria Barrett, deputy of operations J-3 at CYBERCOM, has noted that this construct allows for greater agility.
“You would send a smaller group forward and then do whatever analytic work or analysis you need to do back at home base, be it Fort Gordon or San Antonio or Hawaii or reach back and do some of that work there,” she said. “That kind of facilitates us being a little bit more agile and quick.”
Cyber Command has also expounded on these operational lessons and taking them to training and validation exercises. “From that lesson, our branch at Cyber Command has said now that we’ve seen that lesson at an exercise, let’s bring in the mission force experts and figure out how we craft our doctrine to reflect operations,” said an exercise leader at Cyber Command’s annual Cyber Flag told C4ISR

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    February 3, 2023
    Read more
  • VETERANS UPDATE

    February 3, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    February 3, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT