Foreign Policy Blogs

GailForce: Latest Information from the Military on Its Cyberspace Operations Part One

cyber war

Last week I attended the Cyberspace Symposium 2014 in Colorado Springs.  The topic was:  Managing Cyber Chaos:  Integrating education, industry and government into the anarchy of the virtual world.  I thought it was an excellent venue and provided great insight into what approaches the military is taking toward cyberspace and why.

I know for a variety of reasons there is much skepticism concerning the military and cyber.  There have been lots of reports in the media accusing the military of “hyping” the cyber threat and trying to militarize the internet.  For example, at the conference, Major General Alan Lynn, the Vice Director of the Defense Information Systems Agency (DISA), the organization responsible for providing and operating the military’s communications and information sharing systems, stated that each month they encounter 180 million malicious attack events.  Critics say these numbers are inflated and include everything from hackers simply taking on the challenge of cracking the networks to spying and criminal activity.  They also accuse the DoD of militarizing the internet.

I think critics are missing two major points, both of which were talked about at the conference.  First, the military is heavily dependent on cyberspace, and if there is a problem, regardless of what group, individual, or nation state caused it, they along with many in business and the public could be impacted negatively.  For example, when I first became involved in cyber in 1999, about 90 percent of military communications went over a commercially owned circuit at some point in their transmission.  A 2008 report by the Defense Science Board stated:

“About 85% of the energy infrastructure upon which DoD depends is commercially owned, and 99% of the electrical energy DoD installations consume originates outside the fence.”

Several of the speakers provided more insight on this point.  General William Shelton, USAF, Commander, Air Force Space Command said people used to summarize critical military requirements with the phrase “beds, beans, and bullets.”  Now you need to add connectivity.  He elaborated further by saying, “intelligence, logistics and operational plans come from remote locations.”  You have to retain connectivity to get the critical information needed to conduct military operations.

This brings me to my second point: General Shelton also pointed out others know that cyber is our “life line.”  He remarked that, “buried in millions of attacks today are sophisticated actors trying to find holes, insight into operations, weapons systems, and capabilities.”  He asked the question could they also cause things to fail at a time and place of their choosing.

When he said that, two incidents came to mind. In December 2013 the Navy Times reported that the USS Chancellorsville (CG-62) had been struck by a target drone while conducting tests of the Navy’s Combat System Ship Qualification trials for the installation of its Baseline 9 Aegis combat system off the California coast. According to the report “the ship’s crew had about a four second warning the target controllers at Point Mugu range had lost control of the BQM-74 (drone) before the drone struck the ship.”  I wondered if an enemy could do that to us. The initial report said it would take six months and $30 million dollars to repair the damage.

The second incident concerns one of the reasons U.S. Cyber Command was stood up. In 2012 the Naval War College hosted an international law conference.  As stated in the conference report:

“In one of the talks Captain Timothy J. White, USN, of the Navy Information Operation Command discussed the building of U.S. Cyber Command. He explained there were external actors and internal structural deficiencies driving the process of standing up Cyber Command. In 2008, while engaged in active operations in Afghanistan, the potential compromise of data security and integrity of data led to a loss of confidence in command and control. That was a driving factor in examining what steps were necessary to secure cyber. There was a mobilization around this imperative with a clarification of terms and consultation with lawyers.  JFCC-NW and JTF-GNO came together in the fall of 2009 to form Cyber Command, organized as a subordinate unified command under U.S. Strategic Command. The mission of Cyber Command is how to contribute to defending the nation, and how to support the mission around and across the globe. In cyber, we need to be able to see, understand, and prepare for various threats.”

Of note, I thought one of the best talks at the conference was given by Cyber Commands Director of Operations (J3) Major General Brett Williams.  He opened up proceedings with his talk “Cyberspace Operations.” Some of his key points of the military aspects follow:

Think I’ll end here.  There is a lot more information to share from the conference. More to follow.  As always the views expressed are my own.

Exit mobile version