Back to news

May 4, 2018 | International, C4ISR

The sparring partner who roughs up Marines with Snapchat

By:

The arm of the U.S. Marine Corps charged with tackling emerging threats has inked a deal that it says will allow it to do more realistic testing.

“You want a sparring partner who reflects your adversary's capabilities,” said Lt. Col. Dan Schmidt, head of the field testing branch at the USMC Warfighting Lab.

Enter MD5, the National Security Technology Accelerator. The Marine lab will identify challenges, develop warfighting concepts and design wargames and experiments. MD5 also will provide a platform upon which to accelerate these evolving concepts.

Together the partners will support an Adaptive Threat Force Cadre, specially trained individuals who can share with their cohorts new and evolving response methodologies in the face of a wide range of threats.

While the Marine lab will bring a military sensibility to the table, MD5 offers a private-sector approach. It is represented in this collaboration by Quantico, Va. based training-solutions contractor Guard Unit.

“MD5 is designed to bring a commercial mindset to help solve problems in DoD,” said Zenovy Wowczuk, chairman of Guard Unit. “We bring technologists and other folks who haven't been standardized with DoD doctrine. They are private sector free thinkers, so they reflect the future adversary who also hasn't been indoctrinated into that mindset.”

Schmidt laid out a number of specific warfighting challenges the partners seek to address.

The partnership aims to tackle pervasive challenges in the information environment, issues around electronic warfare, cyber security, and command and control. The Marines want to look at technological fixes as well as organizational changes that could make the force more responsive to these threats.

“How do we dominate and operate effectively with decentralized execution in a contested information environment?” Schmidt said. “Maybe if we just change a little bit of how we train and organize, we can dramatically impact the way we execute. We have a whole year of experiments lined up to flesh that out.”

They also plan to look at hybrid logistics in support of future fighters. “We may have to spread out to greater distances with smaller units. Then you have to move blood plasma to the point of injury in a contested environment with contested networks. Now you are facing a whole new set of problems,” he said.

Hybrid logistics could resolve some of these issues by combining the planning skills of human experts with artificial intelligence, robotics and rich data tracking.

Another area of interest involves dense urban operations, an emerging combat scenario that brings my it myriad new concerns and challenges.

“We know that the Marine Corps will fight expeditionary wars in mega-cities and we are in the process of discovering the implications of that,” Schmidt said.

This exploration will likely dig deep into issues of networking, spectra and cyber strategy.

“You have tunnels and skyscrapers and all this electromagnetic density,” Schmidt said. “We are in the early stages of developing an urban campaign plan, which has to include a range of emerging technologies. Our ground combat element, our logistics, our electronic environment ― all will play into how we fight in this environment.”

MD5's close ties to industry could prove beneficial here. “We could pull in subject matter experts who have done city planning, who understand where the weak points are, and we could mount that data against the Marine Corps force to see how they react,” Wowczuk said. “We could pull from [off-the-shelf] technology to make it very difficult for the Marine Corps to do their job.”

Early collaborations between the Marine and MD5 already have proven out the powerful potential of a bringing commercial-side view to the fight. In one experiment, a mock adversary was able to cull social media to gather critical intelligence on Marine activities.

“We weren't used to that paradigm, where there is this rich environment of people on Snapchat taking pictures of us. They showed us just how easy it is to gather information, and from there we can devise new ways to protect some of our intelligence interests,” Schmidt said. “We would not have seen that without MD5. This is all about having an alternative perspective.”

https://www.c4isrnet.com/electronic-warfare/2018/05/03/the-sparring-partner-who-roughs-up-marines-with-snapchat/

On the same subject

  • Pentagon finalizes first set of cyber standards for contractors

    February 3, 2020 | International, Aerospace, Naval, Land, C4ISR, Security

    Pentagon finalizes first set of cyber standards for contractors

    Mark Pomerleau The Pentagon has finalized the long anticipated cybersecurity standards contractors will have to follow before winning contracts from the Department of Defense, a new process called the Cybersecurity Maturity Model Certification (CMMC) 1.0. The model is a tiered cybersecurity framework that grades companies on a scale of one to five based on the level of classification and security that necessary for the work they are performing. “The government and the contractor community must keep working together to address real and growing cybersecurity threats, and we need a robust response to protect our infrastructure, information, and supply chains,” said David Berteau, president and chief executive of the Professional Services Council, a trade association for federal contractors. “With today's announcement, DoD has achieved a significant milestone. Here's what industry officials need to know about the version finalized Jan. 31. Why it was needed Previously, the Pentagon did not have unified standard for cybersecurity that businesses needed to follow when bidding for contracts. Companies could claim to meet certain industry standards for cybersecurity, but those assertions were not tested by auditors, nor did the standards take into account the type of work a company was bidding to complete. Since then, defense officials have said that cybersecurity is not a one size fits all approach. In the meantime, adversaries have discovered it is easier to target unsuspecting down tier suppliers, rather than prime contractors. “Adversaries know that in today's great power competition environment, information and technology are both key cornerstones and attacking a sub-tier supplier is far more appealing than a prime,” Ellen Lord, the under secretary of defense for acquisition and sustainment, told reporters in a briefing at the Pentagon Jan. 31. Officials have said cyber theft by adversaries costs the United States about $600 billion a year. What will change? Contracts will mandate bidders reach a certain level of certification to win specific jobs. For example, if businesses aren't bidding on a contract that has extremely sensitive information, they must only achieve the first level of certification, which involves basic cybersecurity such as changing passwords and running antivirus software. More sensitive programs will require more stringent controls. Smaller companies down the supply chain will not, however, have to have the same level of certification as primes, said Katie Arrington, chief information security officer for the Office of the Under Secretary of Defense for Acquisition and the point person for the certification. Another significant change with the new process is the creation of an accreditation board and assessors. The board is an outside entity, separate from DoD, that will be charged with approving assessors to certify companies in the process. The accreditation body was formed earlier this month and officials are working on identifying and training the assessors, which will be called Certified Third-Party Assessment Organizations (C3PAO). What's next? Officials explained Jan. 31 that CMMC will follow a crawl, walk, run approach to ensure companies aren't unprepared for the change. The accreditation board is in the process of training the auditors that will oversee the certificaion. Once the requirements are met, a company's certification is good for 3 years. In the meantime, DoD plans to release 10 requests for information and 10 requests for proposals that will include the new cyber standards this year. The first solicitation could come as early as June. Arrington said earlier this week that she expects 1,500 companies to be certified by the end of 2021. She added that all new contracts starting in fiscal year 2026 will contain the cybersecurity requirements, however, Lord noted that they will not be not retroactive to previous contracts. https://www.fifthdomain.com/dod/2020/01/31/pentagon-finalizes-first-set-of-cyber-standards-for-contractors/

  • Australia fast-tracks its hunt for replacement frigates

    June 9, 2024 | International, Naval

    Australia fast-tracks its hunt for replacement frigates

    Shipbuilders were reportedly given four weeks to respond to the request, plus another three weeks to explain how follow-on frigates can be locally built.

  • How Army researchers are using software and analytics to maximize battlefield power

    July 27, 2018 | International, C4ISR

    How Army researchers are using software and analytics to maximize battlefield power

    By: Todd South ABERDEEN PROVING GROUND, Md. — As soldiers at every level become more connected and devices proliferate, the strain on the field-level power grid increases. Staff at the Army's Research, Development and Engineering Command dove into the finer details of power management, auto tuning and analytics to drive how soldiers use power in the field. Most of that work is focused around the tactical microgrid, basically the network of power that runs tactical operations. Think thick cables, generators and all the power that lets the computers, radios and networks run to digest the vast amounts of information, communication and other electrical needs consumed by a modern military. In the not-too-distant past, generator operators and technicians played a sophisticated guessing game that involved a clock, multimeter, flashlight and notepad to measure and mark which power supplies were running, at what level, and where they were on fuel. But by adding digital capabilities and software-driven devices into the guts of what were simple analog generators and boxes full of copper wiring and switches, they have created a type of brain for what was formerly a mindless system. That's resulted in the new Advanced Medium Mobile Power Source, the first new generator for the service in years. The combination of that device, controllers within the system, and advanced software gives the soldier a centralized place to monitor and manipulate the different devices in the microgrid that will help the flow of power move to where its needed. “I can tell you if you're using too many lights or computers on one of those three phase lines and if you're out of balance,” said Bradley Stanley, an RDECOM computer scientist. By using software to make those readings, the end user can then shift the strain to other parts of the system, maximizing power output and fuel use for what can be 24-hour, days long operations. Another software improvement in “autotuning” is helping make what can be a multi-person with expert training four-hour job into an automated procedure handled by the computer. https://www.armytimes.com/news/your-army/2018/07/26/how-army-researchers-are-using-software-and-analytics-to-maximize-battlefield-power

All news