Back to news

December 14, 2018 | International, C4ISR

Marines looking to integrate new information capabilities

By:

The Marine Corps has famously claimed that every Marine is a rifleman, but the Corps has moved 1,000 personnel in the last two years to focus on cyber, electronic warfare, signals intelligence and information operations.

These moves have come at the cost of infantry, “a pretty big cost to go pay for the Marine Corps,” Kenneth Bible, deputy director of the C4 directorate and deputy chief information officer, said Dec. 6 at the Charleston Defense Contractors Association Defense Summit. "The commandant really had to go think about taking that out of the structure to create these [units] across the Marine Corps.”

Now the Marines are looking to integrate these new units — called Marine Expeditionary Force Information Groups, or MIGs — with traditional formations. The deputy commandant for information, a new three-star position created in 2017 to oversee all aspects of information-related warfare, is overseeing efforts to further develop the groups and integrate them into battle plans.

"How does he employ those capabilities as part of an integrated warfare plan? How does he implement a strike package in the information domain?” Bible said. “We really have to figure out how to go make that a relevant force and make it something that the MEF commanders can use.”

Bible explained these forces will be able to provide traditional military information support operations, psychological operations, military deception, or cyber to fight in the information environment.

An operational advisory group met earlier in December with all of the group commanders that focused a lot on how they were maturing capabilities, Bible said.

Some of the key questions that still remain surround how to provide intelligence support to cyber, as well as how to incorporate information support capabilities for a more integrated force package, from shaping operations to when operations actually take place.

Bible said that Lt. Gen. Lori Reynolds, the deputy commandant for information, has told the organization to start building out exercise plans to work more closely together, adding there will be more specifics to come in the near future.

Trident Juncture, NATO-led Trident Juncture exercise in Norway that took place from Oct. 25 to Nov. 7, he said, was a good example of getting limited capability out to commanders to test. New tactical defensive cyber teams participated in the exercise and commanders saw their impact, Bible said.

https://www.c4isrnet.com/c2-comms/2018/12/11/marines-looking-to-integrate-new-information-capabilities

On the same subject

  • This training tool could be the answer to stop mass cyberattacks

    July 9, 2020 | International, C4ISR, Security

    This training tool could be the answer to stop mass cyberattacks

    Mark Pomerleau At air bases across Europe, networks are under attack. Malicious hackers have gained access to sensitive systems, information, controls and critical infrastructure. But cyber operators from U.S. Cyber Command, in concert with Five Eyes partners, have been called in to thwart these attempts in real time. This was the main scenario for this year's capstone cyber training exercise put on by Cyber Command, Cyber Flag 20-2. The exercise, which took place June 15-26 and was exclusively defensive in nature, saw more than 500 participants and 17 teams participating from five countries across nine time zones, and it included America's National Guard, the U.S. Energy Department and the Five Eyes alliance — Australia, Britain, Canada, New Zealand and the U.S. Australia, however, did not participate during this iteration. Officials told reporters this week that the purpose of Cyber Flag 20-2 was to continue building the community of defensive cyber operations and to improve the overall capability of the Five Eyes countries to defend against cyber aggressors. The drill involved teams defending IT and operational security networks against a live, opposing force trying to disrupt, deny and degrade the air bases' operations. The networks under attack were industrial control systems simulated to generate network traffic for an aviation fuel farm, power grid, air traffic control radars and electronic access control systems. The attacks came in the form of malware that targeted devices responsible for fuel and power. But the unique aspect of this year's exercise, as C4ISRNET previously reported, was the use of a new remote cyber training tool called the Persistent Cyber Training Environment. PCTE is an online client that allows Cyber Command's cyber warriors, as well as partner nations, to log on from anywhere in the world to conduct individual or collective cyber training as well as mission rehearsal, which to date had not existed for the cyber force as it does for physical troops. The program is run by the Army on behalf of the joint cyber force. The platform not only allowed the exercise to continue as planned amid the coronavirus pandemic, but it enabled collaboration and simultaneous training across the world. A new way to train Officials say PCTE is providing Cyber Command with an entirely new way to train cyber forces, which previously was difficult given a lack of infrastructure and the time needed to set up ranges and scenarios. It also allows Cyber Command and military units to conduct more frequent training. Cyber Flag typically was Cyber Command's largest and only holistic tactical training event, held annually during June. For units, aside from Cyber Flag, there were no other ways to stay sharp on their skills unless they built their own environments. Now, Cyber Command plans to hold more exercises, with Cyber Flag 20-3 occurring in the fall. “The delivery of the Persistent Cyber Training Environment absolutely allows us to increase the frequency and the complexity of exercises that are conducted by the command itself,” Coast Guard Rear Adm. John Mauger, director of exercises and training at Cyber Command, told reporters. “Going forward, I would expect you to see a series of exercises throughout the year where we are reaching out to the different teams to test their capabilities or to focus on specific issues that are of concern or interest to us. “Going forward, we're going to get the benefits of both those distributed exercises along with increasingly complex exercises as PCTE is instantiated across both the secret network and the top-secret network.” Scenarios and environments can be stored, saved, reused and modified if needed in the system for later exercises. Smaller units will also be able to leverage these scenarios to practice whenever needed. The PCTE virtual environment for this year's exercise included 25 interconnected ranges of more than 3,000 virtual machines — a high-fidelity network that simulated and emulated open internet traffic with more than 4,000 static websites that store and share data. The simulated air base networks created in PCTE had fully configured Windows active directory domains with over 100 nodes running more than 10 types of major operating systems, along with 35 simulated user control workstations actively surfing the internet and using Microsoft Office products to access, create and transfer files. Moreover, officials also explained PCTE can be integrated into larger, multi-combatant command-type exercises to simulate the cyber effects, such as Global Lightning and its companion Cyber Lightning. Global Lightning is an annual global exercise run by Strategic Command to test integration across several geographic and functional combatant commands. Cyber Lightning is Cyber Command's portion to the exercise. “We think that is the next evolution of the Persistent Cyber Training Environment and how we take to the tier 1 exercises, incorporate cyber effects. They're no longer white-carded,” Col. Tanya Trout, Cyber Command's PCTE director and acting director of the Joint Cyber Training Enterprise, told reporters. White carding involves telling exercise participants that a certain action has occurred. This was typical of cyber effects, given it was difficult to realistically simulate them, which diminished the training value in exercises because participants didn't experience the full breadth of these actions. Now, these activities can play a real role in exercises increasing the overall fidelity of training across the joint force and continuity of all operations of warfare. The system will also be able to be used for mission rehearsals. A Cyber Command official said the force can input prior operations, such as those used against the Islamic State group, to train against. Additionally, they'll be able to upload to the platform malware discovered in operations. The PCTE program office, which is in the prototyping phase despite delivering the first portion to Cyber Command in February 2020, also learned valuable lessons in Cyber Flag. Officials said the two-week exercise provided the program office with six months' worth of data it can use to make significant improvements. Prior to the February delivery, the program office leveraged several smaller-scale training events at the unit level to incrementally increase capabilities and scalability as well as help geographically dispersed teams prepare for tier 1 exercises like Cyber Flag. Overall, officials are happy with how the system performed in its first tier 1 exercise, pointing to little to no latency issues, though there were periodic improvement tickets. “What we found through the rapid development and use of the Persistent Cyber Training Environment is that we really have a unique capability to move forward with,” Mauger said. https://www.c4isrnet.com/dod/cybercom/2020/06/25/this-training-tool-could-be-the-answer-to-stop-mass-cyberattacks

  • UK defense exports set new record in 2018

    July 31, 2019 | International, Aerospace, Naval, Land, C4ISR, Security

    UK defense exports set new record in 2018

    By: Andrew Chuter LONDON — Sales of Typhoon jets to Qatar and F-35 related components to the U.S. were largely behind a record breaking year which saw British defense exports in 2018 reach £14 billion, according to new figures released July 30 by the Department for International Trade(DIT). Export sales rose by £5 billion compared with 2017, boosting the British into second place in terms of global defense exports and pushing Russia and France into third and fourth place, respectively, for the year. The DIT report illustrates how reliant Britain is on Middle East partners like Saudi Arabia and Qatar for its high performing exports business. The report shows that close to 80 percent of all British defense exports came from the region last year. Anti-arms campaigners in Britain are currently mounting a challenge against the legality of some previous defense exports to the Saudis. Over the last ten years, the Middle East, North America and Europe have provided the biggest markets for the British, in that order. The figures were provided by the DIT's defense and security arm, known as the Defence and Security Organisation (DSO). According to the DSO, the British took an estimated 19 percent share of the defense export market for 2018, compared with 14 percent by Russia and 9 percent by France. As is the case every year, the U.S. arms industry continued to dominate the world market, with DSO figures putting the Americans in control of 40 percent of a global export market, at $100 billion for 2018, according to the government department. The vast majority of British defense exports are from the air market sector. Around 96 percent of export sales last year were generated from defense aerospace, with the Typhoon sales to Qatar and an accompanying deal to purchase Brimstone missiles a major driver in Britain's good year. The other major factor is the ramp up in the supply of items for the F-35 production line. Britain is the biggest overseas partner on the F-35 build program with BAE Systems and Rolls-Royce among a number of important suppliers. This lack of diversification is a concern for London. France, for example, may not have done as well as the British last year overall, but a number of defense industry sectors contributed to what turned out to be a good performance. French exports rose to €9.1 billion, a 30 percent rise from 2017. It's biggest customers last year were Qatar, including Rafale fighter jets and NH-90 helicopters; Belgium, with Griffon and Jaguar armored vehicles; Saudi Arabia, including patrol vessels; and Spain, for NH-90 helicopters. “It is worth noting that the portfolios of major competitors to the UK, such as the USA and France, appear slightly less unbalanced than the UK's, and therefore, these supplier nations are less exposed to sector fluctuation,” noted the DIT report. The good news for the UK: this year should go some way to redressing the balance between the British export sectors. The major maritime success of the Type 26 anti-submarine frigate, selected by both Australia and Canada, should starting appearing in the export data for 2019. Security equipment exports also continued to grow last year, the DIT reported, rising 7.2 percent from 2017 and crossing the £5 billion barrier. Almost half the exports went to Europe, with the North American market accounting for 18 percent of the sales. Cyber accounted for roughly 40 percent of those exports. https://www.defensenews.com/global/europe/2019/07/30/uk-defense-exports-set-new-record-in-2018/

  • Thales and MKU to co-develop the Elfie Night Vision Device for India and the world

    February 12, 2020 | International, Land

    Thales and MKU to co-develop the Elfie Night Vision Device for India and the world

    Lucknow, February 7, 2020 - Taking the association a step ahead, Thales and MKU today announced the co-development of the ELFIE Night Vision Device (NVD) for the armed forces in India and across the world on the sidelines of DefExpo 2020. With this, both companies have further solidified the MoU signed in 2018 for strategic co-operation on developing optronic devices. This co-operation involves co-development of these devices at MKU's facility in Kanpur, Uttar Pradesh. A lightweight monocular with the widest field of view, ELFIE provides unprecedented mobility and night combat capability. Whether hands-free (on a face mask or helmet mount) or weapon-mounted, ELFIE is suitable for left or right eye use and provides stereoscopic vision in binocular configuration. ELFIE is ideal for vehicle-driving and for paratroopers and special forces operators. When mounted on a weapon, it provides a red dot sight or laser pointer to the user. The integration of the first pre-series of ELFIE at MKU's facility in Kanpur is expected to be completed in the first trimester of 2020. A true model of the “Made in India” ELFIE night vision device is expected to be available in the first trimester of 2021. “We are enthusiastic about taking our strategic association forward with MKU with the co-development of ELFIE. This embodies the Government's ‘Make in India' initiative. Coming up in the Defence Industrial Corridor of Uttar Pradesh, this versatile night vision device will be offered to the armed forces in India as well as across the world. Together with MKU, we look forward to strengthening the industrial ecosystem while also contributing towards job creation in the country,” said Pascale Sourisse, Senior Executive Vice President – International Development, Thales. Neeraj Gupta, Managing Director, MKU Limited, said, “We are delighted about this partnership with a global technology leader like Thales. This association will combine Thales' expertise with the manufacturing abilities of MKU and boost local manufacturing for the defence industry. We will develop the entire supply chain and the devices will be manufactured to exacting international standards.' For more details on Thales' presence at DefExpo India 2020, please click here. About MKU Limited: MKU Limited is a leading defence company for soldier systems in India with a customer base in over 100 countries. Known for its capabilities of providing innovative protection and surveillance solutions, It has state-of-the-art manufacturing and test facilities for Electro-Optics in India that complies to JSS 55555 & MIL 810G standards. The company is already supplying night vision devices to Special Forces, CAPFs and State Police Forces in India and is participating in various tenders from the tri-services under MoD and CAPFs under MHA. MKU is a Global leader in the development and manufacture of Ballistic solutions for Personnel and Platforms. Its products are trusted and used by over 230 forces in the world. The company is currently executing an Indian MoD contract for 158,279 Ballistic Helmets for the Indian Army and Navy. About Thales Thales (Euronext Paris: HO) is a global technology leader shaping the world of tomorrow today. The Group provides solutions, services and products to customers in the aeronautics, space, transport, digital identity and security, and defence markets. With 80,000 employees in 68 countries, Thales generated sales of €19 billion in 2018 (on a pro forma basis including Gemalto). Thales is investing in particular in digital innovations — connectivity, Big Data, artificial intelligence and cybersecurity — technologies that support businesses, organizations and governments in their decisive moments. About Thales in India Present in India since 1953, Thales is headquartered in New Delhi and has other operational offices and sites spread across Noida, Gurgaon, Hyderabad, Bengaluru and Mumbai, among others. Over 1600 employees are working with Thales and its joint ventures in India. Since the beginning, Thales has been playing an essential role in India's growth story by sharing its technologies and expertise in Defence, Transport, Aerospace and Digital Identity and Security markets. Thales has two engineering competence centers in India - one in Delhi NCR focused on digital identity and security business, while the one in Bengaluru focuses on hardware, software and systems engineering capabilities for both the civil and defence sectors, serving global needs. View source version on Thales: https://www.thalesgroup.com/en/india/press_release/thales-and-mku-co-develop-elfie-night-vision-device-india-world

All news