Back to news

July 3, 2018 | International, C4ISR

Does DoD know how to supply intel for cyber ops?

By:

Cyber has been an official domain of warfare for nearly a decade, yet the Department of Defense is still learning how to integrate it with operations. And some members of Congress are concerned the traditional military intelligence organs to this day don't understand intel support to cyber ops.

The House Armed Services Committee is directing that a briefing on the subject must take place by December 1, 2018. The briefing — delivered by the under secretary of defense for intelligence, in coordination with the Defense Intelligence Agency and the military services — is expected, according to a provision in the committee's annual defense policy bill, to address multiple issues, including:

  • Efforts to standardize a common military doctrine for intelligence preparation of the battlefield for cyber operations;
  • Efforts to develop all-source intelligence analysts with the capability to support cyber operations; and
  • Efforts to resource intelligence analysis support elements at U.S. Cyber Command and the service cyber components.

“The committee is concerned about the Defense Intelligence Enterprise's ability to provide the cyber community with all-source intelligence support, consistent with the support provided to operations in other domains,” the provision, called an “item of special interest,” says.

In some cases, other intelligence disciplines, such as human intelligence or signals intelligence, might be needed to help enable a cyber operation. A committee aide noted that the goal is to get DoD to think about cyber operations just as operations in any domain and build the infrastructure to support that.

According to Gus Hunt, Accenture Federal Services cyber strategy lead, cyber as a domain is really no different than the others from an intelligence support perspective.

The objective of intelligence, he told Fifth Domain in a recent interview, is to ensure it provides timely information about the adversary, who they are, the status of their capabilities and any information about the threats that are there.

“I think what you're seeing ... is that people are asking the question are we appropriately structured or resourced and focused to be as effective as we possibly can in this new realm of cyber and cyber operations,” Hunt, who previously served as the chief technology officer at the CIA, said.

“Because they're asking the question, I think the obvious answer is ... we're not structured as effectively as we possibly can be ... [but] it's really good that people are sitting there asking.”

The Army is experiencing similar problems, especially when it comes to experimenting with force structure changes and bringing cyber effects to the tactical edge, which currently don't exist.

“We're not seeing a corresponding growth in the intel organizational structure with the cyber and” electronic warfare, Lt. Col. Chris Walls, deputy division chief for strategy and policy in the cyber directorate of the Department of the Army G-3/5/7, said at the C4ISRNET conference in May.

“The existing intel force structure is really going to be stressed when we put this EW and cyber capability into the field unless they have a corresponding growth and capability as well,” Walls said of tactical cyber effects and teams.

https://www.fifthdomain.com/congress/2018/07/02/does-dod-know-how-to-supply-intel-for-cyber-ops/

On the same subject

  • United Technologies nets $325.2M contract for F-35 depot maintenance

    October 8, 2019 | International, Aerospace

    United Technologies nets $325.2M contract for F-35 depot maintenance

    ByEd Adamczyk Oct. 7 (UPI) -- The Pratt & Whitney division of United Technologies Corp. was awarded a potential four-year, $325.2 million contract for aircraft maintenance equipment for the F-35 fighter aircraft. The contract, announced by the Defense Department on Friday, calls for UTC to provide material and support equipment for depot maintenance facilities, as well as non-recurring sustainment activities, supplies, services and planning for depot activations. It also includes two F135 full-scale mockup engines and four modules for test activities in support of the F-35 Lightning II Program. Work will be performed largely at UTC's Oklahoma City facility, as well as in several other locations within the United States and in foreign countries, and is expected to conclude in 2023. Fiscal 2019 aircraft procurement funds of the Navy, Marine Corps and Navy, as well as those of non-Defense Department agencies and foreign buyers of the F-35, will pay for the contract, the Pentagon said. The F-35 has been in service since 2015 and is currently in the fleets of, or with purchases planned by, 12 nations. Built by Lockheed Martin with UTC as a major subcontractor, the plane is a single engine, fifth-generation stealth combat aircraft designed for ground-attack and air-superiority missions. Currently regarded as the world's most advanced fighter plane, its F135 engine delivers over 40,000 lbs. of thrust and has been included on each of the 425 F-35s manufactured thus far. https://www.upi.com/Defense-News/2019/10/07/United-Technologies-nets-3252M-contract-for-F-35-depot-maintenance

  • Contracts for October 21, 2021

    October 22, 2021 | International, Aerospace, Naval, Land, C4ISR, Security

    Contracts for October 21, 2021

    Today

  • U.S. Navy's newest air-to-air missile could tilt balance in South China Sea
All news