• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD HOMELAND SECURITY UPDATE

November 17, 2016 by

16 Nov 16. The US Army’s cyber operations are challenged by the amount of data flowing through the network, according to the service’s cyber director in the Army’s G-3/5/7 branch.
“We are challenged with big data analytics,” Brig. Gen. Patricia Frost said at Federal Times’ CyberCon conference in Washington on Wednesday. The Army and the other services are working on how to cull through “a tremendous amount of data” in a way that brings appropriate knowledge or information to the decision-makers in the field.
“At echelon, when you talk to our commanders, they are overwhelmed, they rarely feel they [have] the information required to get to the decision,” Frost said.
Solutions to understanding the cyber battle space and help process the data could include visualization tools to aid commanders in the electronic warfare spectrum; the ability to pinpoint an adversary, if the adversary can see you in cyberspace; and where one may be denied the ability to operate, she said.
Brig. Gen. Jennifer Buckner, deputy commander of operations at U.S. Cyber Command’s Cyber National Mission Force, said the force’s relationship with the Defense Innovation Unit Experimental (DIUx) has helped bring some technologies to light that could help offensive and defensive operations in cyberspace, to include better ways to speed through or harvest data and even respond automatically based on data ingested into the system. The need to process large amounts of data into usable information for commanders is just the “tip of the spear” of cyber operations. The network itself, Frost noted, is a war fighting platform for the “digitized” military. “If you are denied service on that war fighting platform, portions of what you are trying to achieve as a commander” cannot be accomplished, she said.
“We look at the capabilities needed and so we have to train our forces to understand the war fighting platform defensively, but then what do we actually want to put in the hands of our commanders at echelon that would give them an offensive advantage,” Frost said. “I truly believe that our commanders at each echelon need to have capability to visualize this battle space, this [Department of Defense Information Network] DoDIN.”
And cyber operators need to see the battle space and how data is moving within that — whether they are sitting in a contingency-operating base or a forward-operating base — in order to shape operations, according to Frost. Then the Army needs to ensure it’s providing the right tools to act on the offense within cyberspace when necessary. On the defensive side of cyber operations, the Army is getting ready to conduct an event it’s calling Hack the Army, recently announced by Army Secretary Eric Fanning, Frost noted. The concept is similar to the Defense Department’s “bug bounty program” that pays outside hackers to discover and disclose vulnerabilities on DoD networks. Hack the Army will launch at the end of November. (Source: C4ISR & Networks)

11 Nov 16. US Army officials have seen the growth in cyber defense coming down the pike. This is in part to its Defensive Cyberspace Operation infrastructure program. For its part, the Program Executive Office for Enterprise Information Systems is tasked with providing DCO the non-tactical, enterprise network. PEO EIS is executing a four pronged approach based upon an operational needs statement for DCO, which includes DCO infrastructure, cyber protection team tools, web vulnerability, and the big data platform – developed by DISA and Army Cyber Command.
To augment DCO, the Army is undertaking a new effort to acquire defensive cyber tools for cyber protection teams (CPT) falling under the cyber protection team tools prong of the DCO program. “It’s designed to deploy tools and an infrastructure to defend the network and do some forensic operations and analysis to identify trends and catch the bad guys,” Ralph Ocasio, the deputy program manager for installation information infrastructure communication

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT