US Army Command Learning Cyberwar From Social Media

Young, social media-savvy Soldiers may be the linchpin in commanders' efforts to use cyber networks to throw virtual effects at enemies in future battlefields, according to US Army leaders.

"I think there is a better comfort level with our young folks that understand the complexity of the environment in which we are operating," Col. Jerry Turner, commander of the 2nd Stryker Brigade Combat Team, said at a Nov. 3 discussion on cyber operations, hosted by the Association of the US Army.

"They think in a very network kind of way because that's how they operate in their daily lives," he continued. "I really think we have to figure out how to take advantage of it."

During his 2nd Infantry Division unit's rotation at Fort Irwin, California, earlier this year, the unit's use of cyber effects in simulated battle underwent study as part of the Cyber Support to Corps and Below pilot.

Now with five rotations completed under the pilot, cyber officials are reviewing the research, which has the potential to shape doctrine in how maneuver commanders use cyber in battle.

"A network is a warfighting platform, and we need to treat it as such," Brig. Gen. Patricia Frost, director of cyber for the Army's Office of the Deputy Chief of Staff, G-3/5/7, said at the discussion. "It is not an [information technology] service."

According to Frost, the pilot studies have shown that a team of no more than 15 Soldiers, consisting of various ranks and expertise, worked best to advise a brigade commander on offensive and defensive cyber tactics, electronic warfare and information operations against mock enemies.

The expeditionary cyber teams embed and learn the ins and outs of their respective brigade to offer a distinct set of cyber tactics that fit into the commander's battle plans.

"They're the ones who understand the battle rhythm, systems and processes of that brigade," Frost said. "They're the ones who will take those capabilities and integrate them."

With cyber assets on hand, Turner said, he was able to make his unit more adaptable and agile in the pilot's training scenarios.

They also helped his unit influence enemy movements and neutralize the connective tissue between the enemy's main force and local forces. "These networks give us options," he said. "You can't attack everything I got."

The brigade commander relied on cyber assets so much that he voiced concern on how to protect them from enemy attacks when they're let loose on the real battlefield.

"If it was me, one of the Army's No. 1 priorities would be to protect these networks," he said. "It's what makes us, with the current force structure, capable of doing what we're asked to do."

In the pilot program, leaders had to sift through a flood of information coming from several cyber assets when quick military decisions were needed.

"I look at the network as very diverse," Turner said. "We need to figure out how we fuse all this, because it's a lot."

As a whole, the evolving cyber domain has also been difficult for Army strategists to keep up with. "That's where we're struggling," Frost said. "We are overwhelmed by the volume of data and how it has continued to grow exponentially every year."

One possible solution is building up the force of cyber operators. In fiscal year 2016, about 130 Army cyber operators were trained. This year, more than 560 operators are expected to graduate from the Army Cyber School at Fort Gordon, Georgia, according to Col. Kenneth Rector, the school's commandant.

At the school, lessons will focus heavily on cyber theory and emphasize the need for Soldiers to adapt and embrace new and ever-evolving technologies.

"They have to be invested in lifelong learning," he said of cyber operators. "Technology that we're teaching today very likely has a shelf life."

The unique school setting also gives young soldiers entering the budding career field a chance to learn from each other and, perhaps, even teach the entire class themselves.

"When they come to the classroom, they might be the expert," Rector said. "We allow them to have an adaptive environment where there's some crosstalk in the classroom, and maybe the instructor isn't always the expert."

Army.mil:    UK announces the creation of the 77th battalion, a cyber unit for soldiers familiar with social media:

 

 

« Some Observations On Britain's New Cyber Security Strategy
German Spy Chief Fears Russian Interference In 2017 Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Waterfall Security Solutions

Waterfall Security Solutions

Waterfall Security is focused on protecting critical infrastructure and industrial control systems from remote online cyber attacks,

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

CyberHunter Solutions

CyberHunter Solutions

CyberHunter is a leading website security company that provides penetration testing, Network Vulnerability Assessments, cyber security consulting services to prevent cyber attacks.

CertiProf

CertiProf

CertiProf has been enhancing professional lives since 2015, offering a wide range of IT certifications and agile framework training.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.