Back to news

December 19, 2018 | International, C4ISR

CENTCOM chief: The future of warfare demands more cyber authorities

By:

The Pentagon has received more power to conduct cyber operations in the past 18 months. But for the top Army commander in the Middle East and Central Asia, the new authority is not enough.

The head of U.S. Central Command, Gen. Joseph Votel, wrote in a Dec. 18 paper that the Pentagon must “normalize” electronic warfare and cyberattacks and incorporate them into daily operations.

“Normalizing the cyberspace domain means broader authorities that are more responsive than current bureaucratic processes,” Votel wrote in the Army's Cyber Defense Review. “It also means we need simple and streamlined organizations and processes to increase lethality and enhance performance.”

The paper was coauthored by Votel, Maj. Gen. Julazadeh and Maj. Weilun Lin.

“Our failure to operationalize and normalize the cyberspace domain effectively cedes it to our adversaries, gives them a competitive advantage and, ultimately, creates an increased attack vector against our objectives,” the authors said.

President Trump gave the Pentagon new authorities to conduct cyber operations in August and minimized the process where other agencies can object to cyberattacks, known as “deconfliction.”

Secretary of Defense Jim Mattis can conduct hacking operations without approval from the White House so long as they do not interfere with the American “national interest,” according to four current and former White House and intelligence officials who were either part of internal deliberations or briefed on the changes.

Yet some current and former U.S. officials are skeptical that the new authorities will mean more effective hacking operations for the Pentagon, because it does not solve the nuances of cyberattacks.

But the new mandates do not go far enough for the three officer authors, who argued that cyberwarfare should be under the same authorities as other types of operations.

“We must not see cyberspace as drastically different and separate from other domains that we create new processes to prepare, plan and fight in this new domain. We continue to seek processes that smooth and simplify operations, reducing friendly friction and accelerating decision-making.”

Current and former Pentagon officials have pointed to conducting cyberattacks against enemies that use networks of neutral or partner nations as an area where the Pentagon has changed its decision-making process in recent years. Those officials also pointed to how the Pentagon was able to use hybrid warfare tactics during the 2016 liberation of Mosul, Iraq, as a textbook example of future hybrid operations.

Votel, Julazadeh and Lin echoed the sentiment of other Pentagon officials who have advocated for cyberattacks, electronic warfare and other information operations to be integrated earlier in military operations.

“We need to proactively execute cyberspace and information operations early in 'Phase 0 / steady state' of the planning process — well before operation execution. Only then can we shape the [information environment], hold our adversaries' capabilities at risk and execute at the speed of war,” the three wrote.

For example, Pentagon officials say they closely monitored Russia's 2014 hybrid war in Ukraine and learned from Moscow's tactics.

Votel, Julazadeh and Lin shed light on the changes, writing that information operations were previously “integrated as an afterthought.” Yet over the last two years, Central Command has incorporated cyberattacks, electronic warfare and military deception at the “strategic level.”

And this hybrid warfare has driven new acquisition demands in the Pentagon.

“We need technology and capabilities to keep pace with the operational environment and continue to build the partnerships to do so,” the three officers wrote.

In recent years, Central Command has bolstered its hybrid warfare through new contracts. The centerpiece of that effort is a July 2017 contract worth $621 million to Science Applications International Corporation for IT support to Central Command that could last seven years.

In August 2018, Vistra communications was also awarded a $22 million contract to support offensive and defensive cyber operations for Central Command.

https://www.fifthdomain.com/dod/2018/12/18/centcom-chief-the-future-of-warfare-demands-more-cyber-authorities

On the same subject

  • The Army roughs out its $1B cyber training contract

    March 13, 2020 | International, C4ISR, Security

    The Army roughs out its $1B cyber training contract

    Mark Pomerleau The Army released its draft proposal March 10 for a contract that could worth as much as $1 billion to provide cyber training for the Department of Defense. The Cyber Training, Readiness, Integration, Delivery and Enterprise Technology (TRIDENT) is a contract vehicle to offer a more streamlined approach for procuring the military's cyber training capabilities. The largest part of that contact will be the Persistent Cyber Training Environment (PCTE). PCTE is an online client in which members of U.S. Cyber Command's cyber mission force can log on from anywhere in the world for training and to rehearse missions. Cyber Command leaders have said the component is one of the organization's most critical needs. Currently, no integrated or robust cyber training environment exists. The procurement is being organized by the Army on behalf of the Defense Department. According to slides from a December industry day, a final solicitation is slated for the end of second quarter 2020 with an award expected at the beginning of 2021. “The objective of Cyber TRIDENT is to provide for the managed evolution of the PCTE Platform and to provide support across all facets of the Acquisition Life Cycle for PCTE,” the documents read. “The goal of Cyber TRIDENT is to continue development operations with the integration of software and hardware enhancements from third party vendors as technology insertion occurs while conducting testing, providing periodic system updates, and fielding technology upgrades of PCTE to the Cyber Mission Forces (CMF) through an agile cadence. The vision is to leverage the existing PCTE baseline and investment in cyber training software and related infrastructure through Associate Contractor Agreements (ACAs) or subcontracts with current platform vendors.” The notice also describes how the program manager envisions management, maintenance, and evolution of the PCTE platform. This includes platform architecture and product management, agile development and delivery systems engineering processes, development and automation, hardware and software infrastructure management, user event support, development operations (DevOps) environment management, PCTE infrastructure tool management, help desk support and onsite and remote support. Using what are known as Cyber Innovation Challenges to award smaller companies a piece of the program, the program office is already incrementally building a platform, which is in use and is helping to prove out the concept for PCTE, refine requirements for the final contract, and reduce risk. Officials and members of industry have indicated that the awardee of TRIDENT will inherit the final prototype version of PCTE, dubbed Version C, and advance that forward. Industry officials noted that the draft document doesn't include many surprises and that DoD leaders have been receptive to feedback, through the prototyping process and industry engagements. https://www.fifthdomain.com/dod/2020/03/12/the-army-roughs-out-its-1b-cyber-training-contract/

  • UK defence group Babcock boosted by confident outlook

    November 13, 2024 | International, Land

    UK defence group Babcock boosted by confident outlook

  • What will replace the Army's Shadow UAS?

    October 29, 2021 | International, Aerospace

    What will replace the Army's Shadow UAS?

    The Army is on a mission to replace its aging Shadow Unmanned Aerial System, but with what? Jen Judson rounds up the competitors.

All news