The Army is stepping up its process to prime troops for combat,
weaving cyber operations into more traditional training exercises. It is
the latest example of how the military’s newest domain – cyberspace –
increasingly is mixing into the kinetic warfare that has long defined
military operations.
Recently, top Army leaders have outlined ways the service is building up its approach to cyber, including in training exercises, improving cybersecurity, developing digital weapons and establishing policies to govern it all.
"(Cyber) threats are real, growing, sophisticated and evolving," Lt. Gen. Rhett A. Hernandez, commander of Army Cyber Command, said at the Association of the United States Army conference in Washington on Oct. 23. "In cyberspace, the significant advantage will go to the side that can protect and secure critical information as well as gain and exploit advantages.”
Active defense and a closely guarded offense, both central to military operations in cyberspace, hinge on force modernization. A key part of that is continuing strides toward a joint information environment that will provide a comprehensive operational view across the Army and broader Defense Department, Hernandez noted in an official statement.
Army CIO/G-6 Lt. Gen. Susan Lawrence said that common view is currently hindered by a fractured and poorly integrated environment. "We have got to able to, in any type of combat or spectrum of operations, have technology overmatch against any enemy, and getting to this environment will allow us to do that," Lawrence said.
Beyond the network, commanders across the military are building cyber into training exercises.
Lt. Gen. Donald Campbell, commanding general of the Army’s III Corps and Fort Hood, Texas, said that cyber capabilities used in a recent exercise resulted in soldiers degrading opposing forces’ command and control systems by 40 percent, according to a Nextgov report. Campbell also said social media was used in the exercise to target locals, and that these kinds of exercises need to be part of future Army training.
“We met daily, in a targeting brief for an hour and there were specific focused targets on what we would do to the network and what we would do to our network,” Campbell said, according to Foreign Policy.
Similarly, the U.S. Army Europe’s 5th Signal Command also has incorporated cyber into training, including the use of a mock phishing scam to simulate the release of malware into a network critical to operations, Stars and Stripes reported.
http://fcw.com/articles/2012/10/29/cyber-training.aspx
Recently, top Army leaders have outlined ways the service is building up its approach to cyber, including in training exercises, improving cybersecurity, developing digital weapons and establishing policies to govern it all.
"(Cyber) threats are real, growing, sophisticated and evolving," Lt. Gen. Rhett A. Hernandez, commander of Army Cyber Command, said at the Association of the United States Army conference in Washington on Oct. 23. "In cyberspace, the significant advantage will go to the side that can protect and secure critical information as well as gain and exploit advantages.”
Active defense and a closely guarded offense, both central to military operations in cyberspace, hinge on force modernization. A key part of that is continuing strides toward a joint information environment that will provide a comprehensive operational view across the Army and broader Defense Department, Hernandez noted in an official statement.
Army CIO/G-6 Lt. Gen. Susan Lawrence said that common view is currently hindered by a fractured and poorly integrated environment. "We have got to able to, in any type of combat or spectrum of operations, have technology overmatch against any enemy, and getting to this environment will allow us to do that," Lawrence said.
Beyond the network, commanders across the military are building cyber into training exercises.
Lt. Gen. Donald Campbell, commanding general of the Army’s III Corps and Fort Hood, Texas, said that cyber capabilities used in a recent exercise resulted in soldiers degrading opposing forces’ command and control systems by 40 percent, according to a Nextgov report. Campbell also said social media was used in the exercise to target locals, and that these kinds of exercises need to be part of future Army training.
“We met daily, in a targeting brief for an hour and there were specific focused targets on what we would do to the network and what we would do to our network,” Campbell said, according to Foreign Policy.
Similarly, the U.S. Army Europe’s 5th Signal Command also has incorporated cyber into training, including the use of a mock phishing scam to simulate the release of malware into a network critical to operations, Stars and Stripes reported.
http://fcw.com/articles/2012/10/29/cyber-training.aspx