he firefight is now in cyberspace, and Army forces are gearing up to throw down.
Army leaders emphasize, however, that the technology ud to fight the battle is not as important as the people who u it. Attracting, keeping and “growing” smart,mentally agile soldiers, civilian employees and leaders are the keys to achieving U.S. military overmatch in cyber-space.
The idea, expresd last October at an Institute of Land Warfare panel discussion on building Army cyber forces by BG(P) George J. Franz III, “is to encourage a forum where an E-1 with a good idea can trump an O-6 with a bad idea.” Franz is the director of current operations and the Cyber National Mission Force at U.S. Cyber Command.
Getting to the rank-trumping point involves creating an environment in which there is a free exchange of ideas,much like at top technology companies, with Google usu-ally mentioned somewhere in the reference. Abnt, of cour, are six-figure paychecks, game rooms, sundae bars and facial massages, and it must be achieved while keep-
34ARMY I March 2014
T
By Dennis Steele洪恩英语下载
Senior Staff Writer
Cyber Warriors
ing to the military standards of discipline, respect, physical fitness and the like.
COL Jennifer G. Buckner agreed with Franz, adding, “This is a mission space which really does afford a unique oppor-tunity within the Army.”
She commands the 780th Military Intel-ligence Brigade—the Army’s first cyber brigade, considering the unit’s decade-long, cyber-oriented lineage—and said a soldier’s skill t can mean more than rank in her unit in regard to the mission assignment, calling cyber organizations on the whole “as clo to a meritocracy”as there can be in the Army.
“We have specialists who are perform-ing missions today of national and strate-gic significance becau they are very good at what they do,” Buckner said.梦想高中
tp是什么意思To get the most out of her soldiers and keep them, Buckner employs a decidedly nonmilitary concept and term: talent management. Part of that means crafting specialized training and education oppor-tunities, often to meet the aspirations of an individual soldier, while playing for long-term benefits to the Army.
delay什么意思
Bad on advice she received from a previous 780th commander, she likened the process to creating “a Google-like at-mosphere in a military unit,” adding an important cyber battlefield distinction:“We’re in contact every day; we’re in the fight every day.”
Within the Army, a hybrid military intelli-gence-signal-information operations head-quarters is leading the overall effort: U.S. Army Cyber Command/Second Army (AR-CYBER). Throughout DoD, network de-fens and other measures have been taken to protect against cyber attacks, but the U.S. military’s broad objective is not to hunker
Draw a Line In the Silicon
March 2014I ARMY 35
Web-Bad Puzzles
Boost America’s Cyber Defen
The Defen Advanced Rearch Projects Agency (DARPA) is running a public gaming website to crowd source (the art of capitalizing on free volun-teer labor and someone el’s computer) to help find vulnerabilities in commercial software. DARPA calls it the Crowd Sourced Formal Verification (CSFV) program, but it goes by V erigames on the Web and offers five games.
Woven into each game’s code are math problems that reprent a particular software code source.
税负痛苦指数
When players advance a game level, they automati-cally create an algorithm that looks for bugs and -curity vulnerabilities in the code. When an issue is discovered through CSFV game play, the participat-ing software company or responsible agency is alerted. Professional analysts then focus on solving the problems instead of wasting their highly paid time looking for them.
Contests and tournaments are offered in order to boost participation and DARPA-helping fun. You must register and be at least 18 years old to play.
Visit
36ARMY I March 2014
2nd Battalion specializes in exerci training support, field-ing a cyber war opposing force (Red Team) element that directly challenges units in IO force-on-force exercis. Its Blue Team (friendly force) checks units’ vulnerabilities and specializes in delivering operational curity (OPSEC) as-ssments while providing IO planning support and OPSEC officer certification.
poland什么意思
The command’s 1st Battalion also has a training function, primarily specializing in unit vulnerability asssments, and it also employs a Red Team—but its Red Team is sneaky. Ac-cording to the comm
and’s website, 1st Battalion’s Red Team asssment support comes “in the form of emulating adver-saries’ information operations against the organization [by conducting] open-source rearch [and] Dumpster diving.”Think about cyber “Dumpster diving” as looking for infor-mation scraps that soldiers throw away or leave around—bits and bytes that add up to a larger haul. The Red Team
also conducts social engineering scenarios and “surrepti-tious entry to facilities of friendly forces.”
Other teams within ARCYBER provide direct support for defensive and offensive action, and many of them will rve as deployable teams attached to Army organizations. (Teams have been working alongside units in Afghanistan through a cyber-force “surge” effort to provide them with requested support.)
Most soldiers and civilian technicians come to ARCY-BER from the Military Intelligence and Signal branches, signifying support and cooperation from the U.S. Army In-telligence and Security Command and the U.S. Army Net-work Enterpri Technology Command in organizing the cyber-committed force structure—which, under different circumstances, could have been a prolonged turf battle. In turn, the importance of upgrading and enlarging the Army’s cyber force is signified by the fact that manpower, operations and maintenance funding is generally being taken out of hide with no
funding increas to cover tho costs in a time of budget anxiety and austerity. ARCYBER currently is colocated with U.S. Cyber Com-mand at Fort George G. Meade, Md. In addition to the 1st IO Command (headquartered at Fort Belvoir, Va.), it has the 780th Military Intelligence Brigade at Fort Meade and elements of the 7th Signal Command (Theater) at Fort Gor-don, Ga., under operational control.
Army officials recently announced a decision to shift ARCYBER to Fort Gordon with plans to break ground for a new headquarters in 2016 to consolidate staff and support elements from veral locations around the Washington, D.C., area (primarily Fort Meade and Fort Belvoir) and colocate with 7th Signal Command while getting its people into modern, purpo-built facilities. When the move is finished, ARCYBER is expected to have approximately 1,200 soldiers and civilian employees at Fort Gordon who will overe and support about 21,000 Army cyber person-nel around the world.
It has been a quick trip. ARCYBER only became opera-tional in 2010.
DoD’s sprint to create cyber forces stems from a U.S. na-tional curity determination made public in 2009, which asrts that the laws of armed conflict apply to the cyber world as they do to the physica
l world. An attack on the United States’ cyber infrastructure, causing mass casualties and widespread damage, would be considered the same as an aerial bombing with similar effect. A finding as to what specific degree of attack would constitute an act of war is ongoing, accepting the tact of “we’ll know it if we e it” in the meantime.
aking down the East Coast’s power grid would fit
into the general construct. Goofing up a city’s web-
site? Probably not. There also is the unanswered question: When could an attack on a civilian commercial entity, such as a financial institution, elevate to a national curity concern?
The preci position of America’s line in the silicon re-mains murky, but depending on the verity of an attack, America’s respon would remain flexible, ranging from condemnation or economic sanctions to missile launches.
The national curity finding covers only traditional na-tion-states to which traditional diplomacy and war acts ap-ply, not cyber terrorists, criminals or individual nut cas.
With cyber defen and territorial defen intertwined, however, President Obama directed establish
ment of U.S. Cyber Command in 2009, placing it under U.S. Strategic Command, which also commands the bulk of America’s nuclear arnal.
U.S. Cyber Command is headed by Army GEN Keith B. Alexander, who also is the director of the National Security Agency (NSA) and chief of the Central Security Service. The administration recently decided to keep that multi-hat com-mand structure despite the highly charged political and pub-lic atmosphere in the wake of Edward Snowden’s NSA leaks.
avec
aynThe decision confirms the basic reasoning for tting up the national Cyber Command that way—that the threat is so high and is coming from so many directions that the United States must prent a consolidated defen and bring all guns to bear.( Of Cour an Army Cyber
Discussion Video is Online
The Institute of Land Warfare’s Contemporary
Military Forum, “Building the Army’s Cyber Forces
… Globally Responsive, Regionally Engaged,” can
be viewed at www.army.mil/professional/ilw/cy-
新水
ber.html.
The discussion was led by LTG Edward C. Car-
don, commanding general of U.S. Army Cyber
Command, and includes testimony from other au-
thoritative figures in the Army cyber operations
field.
T
38ARMY I March 2014vigaa