US Army Command Learning Cyberwar From Social Media

Young, social media-savvy Soldiers may be the linchpin in commanders' efforts to use cyber networks to throw virtual effects at enemies in future battlefields, according to US Army leaders.

"I think there is a better comfort level with our young folks that understand the complexity of the environment in which we are operating," Col. Jerry Turner, commander of the 2nd Stryker Brigade Combat Team, said at a Nov. 3 discussion on cyber operations, hosted by the Association of the US Army.

"They think in a very network kind of way because that's how they operate in their daily lives," he continued. "I really think we have to figure out how to take advantage of it."

During his 2nd Infantry Division unit's rotation at Fort Irwin, California, earlier this year, the unit's use of cyber effects in simulated battle underwent study as part of the Cyber Support to Corps and Below pilot.

Now with five rotations completed under the pilot, cyber officials are reviewing the research, which has the potential to shape doctrine in how maneuver commanders use cyber in battle.

"A network is a warfighting platform, and we need to treat it as such," Brig. Gen. Patricia Frost, director of cyber for the Army's Office of the Deputy Chief of Staff, G-3/5/7, said at the discussion. "It is not an [information technology] service."

According to Frost, the pilot studies have shown that a team of no more than 15 Soldiers, consisting of various ranks and expertise, worked best to advise a brigade commander on offensive and defensive cyber tactics, electronic warfare and information operations against mock enemies.

The expeditionary cyber teams embed and learn the ins and outs of their respective brigade to offer a distinct set of cyber tactics that fit into the commander's battle plans.

"They're the ones who understand the battle rhythm, systems and processes of that brigade," Frost said. "They're the ones who will take those capabilities and integrate them."

With cyber assets on hand, Turner said, he was able to make his unit more adaptable and agile in the pilot's training scenarios.

They also helped his unit influence enemy movements and neutralize the connective tissue between the enemy's main force and local forces. "These networks give us options," he said. "You can't attack everything I got."

The brigade commander relied on cyber assets so much that he voiced concern on how to protect them from enemy attacks when they're let loose on the real battlefield.

"If it was me, one of the Army's No. 1 priorities would be to protect these networks," he said. "It's what makes us, with the current force structure, capable of doing what we're asked to do."

In the pilot program, leaders had to sift through a flood of information coming from several cyber assets when quick military decisions were needed.

"I look at the network as very diverse," Turner said. "We need to figure out how we fuse all this, because it's a lot."

As a whole, the evolving cyber domain has also been difficult for Army strategists to keep up with. "That's where we're struggling," Frost said. "We are overwhelmed by the volume of data and how it has continued to grow exponentially every year."

One possible solution is building up the force of cyber operators. In fiscal year 2016, about 130 Army cyber operators were trained. This year, more than 560 operators are expected to graduate from the Army Cyber School at Fort Gordon, Georgia, according to Col. Kenneth Rector, the school's commandant.

At the school, lessons will focus heavily on cyber theory and emphasize the need for Soldiers to adapt and embrace new and ever-evolving technologies.

"They have to be invested in lifelong learning," he said of cyber operators. "Technology that we're teaching today very likely has a shelf life."

The unique school setting also gives young soldiers entering the budding career field a chance to learn from each other and, perhaps, even teach the entire class themselves.

"When they come to the classroom, they might be the expert," Rector said. "We allow them to have an adaptive environment where there's some crosstalk in the classroom, and maybe the instructor isn't always the expert."

Army.mil:    UK announces the creation of the 77th battalion, a cyber unit for soldiers familiar with social media:

 

 

« Some Observations On Britain's New Cyber Security Strategy
German Spy Chief Fears Russian Interference In 2017 Elections »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

Cyber Secure Forum

Cyber Secure Forum

The Cyber Secure Forum is a premier cybersecurity event dedicated to bringing together experts, and professionals to explore the latest trends, share knowledge, and discuss strategies.

Brinqa

Brinqa

Brinqa is a leading provider of unified risk management and security analytics.to manage IT governance and technology risk.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Framatome

Framatome

Framatome Cybersecurity portfolio is directly inspired by its unique experience in nuclear safety for critical information systems and electrical systems design.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.

e-Xpert Solutions

e-Xpert Solutions

e-Xpert Solutions is a company specialized in the Information Security field since 2001. Our skills are strong technical expertise and the development of tailor-made solutions.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

Intelequia

Intelequia

Intelequia SOC is the Security Operations Center your company needs. 24x7 monitoring, protection and automated response to cyber threats.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.