22 janvier 2020 | International, C4ISR, Sécurité

What new documents reveal about Cyber Command’s biggest operation

Mark Pomerleau

New documents provide insight into the growing pains U.S. Cyber Command faced in building a force while simultaneously conducting operations.

The documents, which were released as part of a Freedom of Information Act request from the National Security Archive at George Washington University and later shared with journalists, are a series of internal briefings and lessons from the Defense Department's most complex cyber operation at the time, Operation Glowing Symphony.

That operation was part of the larger counter-ISIS operations — Joint Task Force-Ares — but specifically targeted ISIS's media and online operations, taking out infrastructure and preventing ISIS members from communicating and posting propaganda.

While Cyber Command described the operation, which took place in November of 2016, as a victory in the sense that it “successfully contested [ISIS] in the information domain,” the documents demonstrate the extent to which the command was still learning how to conduct operations and the exact steps to follow.

“Process maturation is something they pull out a lot. Obviously, as CYBERCOM was standing up, it was pulling together plans for how they were going to operate. They actually hadn't operated that much,” Michael Martelle, cyber vault fellow at the National Security Archive, told reporters. “A lot of these frameworks were formed in theory. Now they go to try them out in practice.”

Cyber Command leaders have stressed in public remarks for years that the command was building its force while operating. But the extent of those operations has been limited. Officials in recent years have explained that the command didn't undertake many offensive operations. One official said last year he could count on less than two fingers the number of operations, Cyber Command conducted in the last decade or so. One member of Congress said DoD didn't conduct an offensive cyber operation in five years.

But when they were in action, in this case with Operation Glowing Symphony, Martelle said the documents show cyber leaders did not anticipate the amount of data they would access.

“They actually weren't prepared for the amount of data they were pulling off of ISIS servers ... CYBERCOM was not set up for an operation of this magnitude from day one,” he said. “They had to learn on the fly, they had to acquire on the fly, they had to grow on the fly.”

The documents note that Cyber Command's capability development group, is “developing USCYBERCOM data storage solutions.”

The capabilities develop group, now known as the J9, serves as the advanced concepts and technology directorate and worked to plan and synchronizing cyber capability development and developed capabilities to meet urgent operational needs.

Experts had noted that in the past the CDG/J9 had been stressed in recent years by a limited staff and burdened by developing tools for operational needs, namely Joint Task Force-Ares.

Another example of potential growing pains the documents point to was the fact that updates to operations checklists were not made available readily to the team.

Finally, the documents note that authorities and processes the command was operating under that the time were restrictive in some cases.

“Absent of significant policy changes from [the office of the secretary of defense], USCYBERCOM is limited in its ability to challenge ISIS [redacted]. As a result, USCYBERCOM has [redacted] to achieve our objectives,” the executive summary of a 120-day assessment of Operation Glowing Symphony says.

Those authorities and processes have been streamlined by the executive branch and Congress in recent years.

Commanders now follow a process that defaults toward action, Maj. Gen. Dennis Crall, deputy principal cyber adviser and senior military adviser for cyber policy, said during an event Jan. 9. He explained the updated process provides continuity, tempo, pace and timing.

Ultimately, Martelle noted that the real importance behind Operation Glowing Symphony is that Cyber Command used the experience from those events and Joint Task Force-Ares more broadly as a template for future operations.

Cyber Command's top official, Gen. Paul Nakasone, who was also led Joint Task Force-Ares, has noted that the task force laid the foundation for the Russia Small Group, which was created to combat election interference in the 2018 midterms.

“This concept of a task force lives on. A lot of that thinking came from what we were doing in 2016,” he told NPR.

That task force has now evolved to be more all encompassing covering election threats more broadly.

https://www.fifthdomain.com/dod/cybercom/2020/01/21/what-new-documents-reveal-about-cyber-commands-biggest-operation/

Sur le même sujet

  • Les frégates de la classe Nansen souffrent d’un défaut sérieux de conception. Le chantier Navantia mis en cause

    7 décembre 2018 | International, Naval

    Les frégates de la classe Nansen souffrent d’un défaut sérieux de conception. Le chantier Navantia mis en cause

    (B2) Un premier rapport du bureau enquêtes accidents norvégien (AIBN) l'affirme sans ambages. La collision entre une frégate de la marine norvégienne KNM Helge Ingstad et un tanker maltais (Sola TS) dans la baie de Hjeltefjorden en Norvège le 8 novembre, révèle un problème grave de conception sur certains navires fabriqués par les chantiers navals espagnols Navantia. Une alerte sécurité vient d'être envoyée Un naufrage à proximité des côtes Rappelons-nous, c'était juste après l'exercice de l'OTAN Trident Juncture, la frégate norvégienne (qui porte le numéro de coque F-313), effectuait des manœuvres à proximité des côtes, près du terminal pétrolier de ce fjord norvégien situé non loin de Bergen, quand il heurte le pétrolier qui naviguait en sens inverse. La collision ne provoque que peu de dég'ts dans le pétrolier, mais pour le navire militaire les conséquences sont autrement plus graves. Une enquête des bureaux d'accidents civil et militaire norvégiens La frégate norvégienne, qui fait alors partie de la force navale permanente de l'OTAN (SNMG1), est atteinte « au-dessus et au-dessous de la ligne de flottaison » et « absorbe énormément d'eau » comme le signale le ministère norvégien de la Défense. Il n'est plus stable et doit être échoué. Ses 137 marins doivent être évacués. Une enquête est alors diligentée associant le bureau d'enquête accidents maritime norvégien (AIBN) et son pendant militaire (DAIBN), auquel est associé l'unité d'enquête maritime maltaise (MSIU), autorité du pavillon du pétrolier. Les compartiments non étanches Trois compartiments étanches à bord du KNM Helge Ingstad sont inondés : « la salle du groupe électrogène arrière, les quartiers de l'équipage du pont Orlop et le magasin » selon le rapport de l'AIBN. La stabilité est jugée « médiocre », mais le navire est encore considéré comme 'sauvable'. Cette première évaluation ne résiste pas. L'eau gagne du terrain. Elle « coule de la salle des génératrices arrière vers la salle des engrenages via les arbres creux de l'hélice, puis de la salle des engrenages, vers les salles des machines avant et arrière via les boîtes de rangement dans les cloisons ». Quand la salle d'engrenage est inondée, l'évacuation des 137 marins est décidée. Le navire est considéré comme « perdu ». Huit marins sont légèrement blessés dans les différentes manœuvres. Le navire échoué coule à pic Les autorités espèrent encore pouvoir récupérer le navire, qui flotte toujours, en le fixant avec des c'bles. Mais dans la nuit du 12 au 13 novembre, ils s'arrachent et le navire coule à pic. Le navire est désormais considéré comme irrécupérable, même si les travaux sont toujours en cours pour être renfloué, comme le précise le ministère norvégien de la Défense. Perte sèche : 4,2 milliards de couronnes (environ 220 millions d'euros). Une enquête nécessaire chez Navantia L'autorité norvégienne préconise une vérification des navires norvégiens de même conception. Oslo dispose encore de quatre navires de la même classe — le KNM Fridtjof Nansen, le KNM Roald Amundsen, le KNM Otto Sverdrup et le KNM Thor Heyerdahl — construits sur les chantiers navals espagnols de Ferrol de Navantia. Elle demande ainsi à Navantia de mener « une enquête sur les problèmes identifiés lors de la première enquête et de déterminer s'il s'agit également d'un problème lié à d'autres navires ». L'industriel espagnol doit aussi envoyer une notification aux chantiers, propriétaires et exploitants concernés, pour leur indiquer « les mesures à prendre pour assurer la sécurité ». (Nicolas Gros-Verheyde) https://club.bruxelles2.eu/2018/12/un-defaut-de-conception-dans-les-fregates-de-type-nansen-le-chantier-navantia-mis-en-cause/

  • Memo reveals US Navy must pick between future destroyer, fighter or sub for FY23 plan

    9 juin 2021 | International, Aérospatial, Naval

    Memo reveals US Navy must pick between future destroyer, fighter or sub for FY23 plan

    The service may have to pick just one of three major modernization programs on the horizon to fund, and postpone the other two due to budget limitations.

  • US Space Force launches ‘Victus Nox’ responsive space mission

    17 septembre 2023 | International, Aérospatial, Sécurité

    US Space Force launches ‘Victus Nox’ responsive space mission

    The Victus Nox mission, Latin for “conquer the night,” was meant to demonstrate the ability to rapidly acquire, build, integrate and launch a satellite.

Toutes les nouvelles