Pages

14 October 2017

$ Six billion US Army's Tactical Communication Networks is scrapped, what can we learn

General Mark Milley, the US Army Chief of Staff is a go getter and a man in a hurry. He has initiated number of measures like acquisition of equipment and improvement in their  communication network - Warfighter Information Network-Tactical (WIN-T), the Backbone Of The U.S. Army's Tactical Network

Today’s soldiers expect to have network access anywhere, anytime. With the General Dynamics-built Warfighter Information Network-Tactical (WIN-T), commanders can communicate on-the-move and soldiers can have their voices heard, their texts received, and their location displayed on a map.WIN-T is the U.S. Army’s tactical network backbone providing secure voice and data communications for soldiers on the battlefield without the need for fixed infrastructure. 

The US Army may not have stealth fighters or nuclear submarines, but it’s a high-tech organization all the same. Even walkie-talkies are digital and networked nowadays. From the foot soldier navigating the front lines with GPS, to the drone taking pictures overhead, to the officer making plans at the command post, to the supply clerk ordering spare parts back at base, a modern army depends on a complex network of computers sharing data over land lines and radio waves. But land lines can be cut, radio waves can be jammed, and computers can be hacked—especially if you’re up against the Russians. In their unofficial invasion of Ukraine, Russian forces routinely shut down Ukrainian communications, leaving units isolated, deaf, and blind. They triangulated the sources of Ukrainian transmissions so they could target devastating artillery barrages.

The Army is “taking a hard look” at its flagship tactical communications network after receiving more negative reviews from the field, said Chief of Staff Gen Mark Milley. He listed several issues plaguing the  WIN-T: it is too complex to operate in combat conditions, it is not as transportable as it needs to be and it is not completely secure from cyber intrusions. Milley sees the current systems as too vulnerable to jamming and hacking, too big a target for artillery, and too immobile for rapid maneuver. Those are tolerable weaknesses against the low-tech Taliban or Islamic State, but crippling in a high-intensity war against Russia or China. Milley faces the risk that, in the next war, the US Army’s communications will get shut down — as the Ukrainian Army’s networks were in 2014, paralyzing them against the Russian invasion.  He looked at the Russian threat and decided that Army networks weren’t up to it. A generation fighting low-tech guerrillas in Afghanistan and Iraq had left the Army with a digital backbone deeply unsuited to fighting a sophisticated nation-state. There had been billions invested in Army networks since 9/11, but in the urgency of constant combat, they’d grown  with different systems slapped together to meet different needs and then kludged into submission. The network depended on a legion of contractor field service representatives and a mountain of heavy equipment, all installed at a large, stationary bases—completely incompatible with a war of maneuver in eastern Europe. The network emitted radio signals at high power in all directions—easy for Russian antennas and artillery to zero in on. The network wasn’t designed to withstand  serious electronic or cyber attack—favoured weapons of the modern Russian military. Perhaps worst of all, at least some commanders were using the network to micromanage their subordinates—a path to disaster in mobile warfare, as the French army of 1940 could tell you. 


So this spring, General Milley ordered a comprehensive review of the Army’s networks. What the Chief of the Army originally thought might take “four to six weeks” has turned into a massive effort involving not just the military but extensive outreach to Congress and industry. Milley briefed congressional committees on progress and met personally with major contractors to get their input on the art of the possible, kicking off a series of Army-industry roundtables.He spun off a separate but related review of electronic warfare—both the defensive systems that protect US networks and offensive systems that jam an adversary’s.

Gen. Mark Milley shared in his posture hearing in May, “the character of war does change on occasion. And one of the drivers – not the only driver – is technology.” In other forums, he has elaborated that “we have new insights into the character of future conflict, and we have had glimpses of what our Army and its Soldier must be ready to do in the coming decade.” Shifts in the character of war offer an opportunity: if we can anticipate or at least recognize them, we can adapt proactively, maintaining or regaining overmatch and forcing competitors to react to us.

Over and over, Milley and other Army leaders mentioned one essential: speed. In a world where Moore’s Law doubles computer power every 18 months, you can’t afford an acquisition cycle that took 15 years to field new technology. Cybersecurity in particular has to be updated constantly or it becomes obsolete. Speed is a problem for all four armed services, but the Army especially has a poor track record on high-tech programs, from the cancelled Comanche stealth helicopter to the cancelled Future Combat Systems. FCS, in particular, struggled with the complexity of the mobile network it was  trying to build. As a result, while the Army isn’t a low-tech service, it does face a higher bar of skepticism when it asks Congress to fund high-tech systems.

Some fixes won’t take any new technology at all—just retraining on old techniques. Cold War soldiers learned to maintain radio silence, or at least cut conversations short, when they didn’t want the Russians to pick them up. They learned to position antennas behind hills, so the Soviets couldn’t detect their emissions, or well away from other assets, so a barrage targeting the transmissions wouldn’t destroy everything and everyone else. All these tactics must be updated for the modern age. At the same time, however, an army in the field may need to discard some bandwidth-hungry luxuries of modern networks: live video from drones, video teleconferencing,and massive packets of PowerPoint slides. The junior officers who’ve been digitally micromanaged with these tools might even say good rid 

WIN-T increment 1 was fielded to the entire Army between 2004 and 2012. An increment 1b upgrade was developed to improve cybersecurity. Increment 2 is focused on mobile users, and was approved for full rate production in June 2015 by the Defense Department. It has so far been fielded to 14 brigade combat teams and eight division headquarters. WIN-T increment 3 is in development, and one of its key features will be “ease of use.”

Meanwhile, a letter signed by 176 House and Senate members was sent to Milley  asking for the program to be accelerated. “I'm not going to accelerate it until I'm convinced it will work in combat against the enemies of our country that may be coming in the future,” Milley insisted. “That's kind of where we stand right now. But I owe you and this committee and others a rigorous review within about four to six weeks.”

How bad is it? At a hearing  of the House Armed Services air and land subcommittee Army Lt. Gen. Bruce Crawford, Army Chief Information Officer/G-6 said this: “

Current Network Challenges The network evolved over the past 16 years to address numerous challenges, including a common operating picture that could not be shared among all formations at echelon, data storage and transport challenges, warfighting systems that lacked the ability to work together, Unfortunately, our current network is too complex, fragile, not sufficiently mobile nor expeditionary, and one that will not survive against current and future peer threats, or in contested environments. We find ourselves  where our network is not user-friendly, intuitive, or flexible enough to support our mission in the most effective manner and demands a heavy reliance on industry field service representatives to operate and sustain these systems. In addition to the emerging threats, we have also seen a commercial innovation explosion that accelerated at a rate with which our standard acquisition process could not keep pace. Future adversaries are not inhibited by the same processes, allowing them to better exploit new technology to their advantage. 

Readiness Challenges Based on the emerging threat and the explosion of technology, we are seeing a change in warfare of the future.

Network Assessments.  Over the past year, the Chief of Staff of the Army led an assessment of the Army’s network and modernization plans. These network assessments involved all four network mission areas – the Enterprise Information Environment Mission Area, Intelligence Mission Area, Business Mission Area and the focus of today’s testimony, which is the Warfighting Mission Area. The Army conducted this internal assessment in parallel with the study directed by Congress  on the Army’s tactical network, which was carried out by the Institute for Defense Analyses (IDA). The findings of the internal Army assessment were corroborated by the IDA study as well as feedback from Department of Defense testing agencies, combat training center rotations, joint exercises, and feedback from operational commanders. The internal and external assessments have revealed high risk challenges that we feel must be mitigated to enable our Army to “fight tonight” against peer adversaries. These findings documented significant challenges across four broad areas of network governance, requirements, acquisition, and innovation, which continue to negatively affect the Army’s ability to provide its Warfighters with simple, intuitive, resilient and protected network enabled capabilities.

Specifically, in the area of governance, the assessments revealed that the lack of a single Army network integrator has resulted in multiple “stove-piped” mission command systems and networks, with multiple, duplicative and non-integrated information technology programs. The assessments noted an emphasis on technical specifications, rather than clearly defined operational requirements leading to disconnects between the acquisition community and the operational force. Our current acquisition process does not allow the Army to rapidly acquire and integrate emerging capabilities, allowing the warfighter to keep pace with technology and stay ahead of the evolving threat. This prevented the Army from effectively leveraging the exponential growth of investments by commercial industry partners over the past decade and capitalizing on the robust Research, Development, Testing and Evaluation (RDT&E) capabilities of our Joint partners. Additionally, the extensive developmental and operational testing required for programs of record has prolonged development and delayed delivery of network-enabled capabilities. 

Finally, in the area of innovation, the assessments found that the Army is not capitalizing on industry best practices and must increase integration between developers and operators. This lack of direct engagement with the actual users of the network-enabled capabilities has reduced the Army’s ability to assess and provide immediate feedback to the acquisition community in order to influence the development of improved solutions to network challenges.  

Army Network Priorities. As the Army has looked at developing its new network path forward, we have focused on four priorities: command posts, tactical network transport, mission command systems, and interoperability. For command posts, the new path will seek to improve survivability and mobility. For tactical network transport, the Army will take steps to integrate multiple network transmission paths into a unified transport layer to increase survivability against evolving electronic warfare threats. For mission command systems, the Army will take steps aimed at delivering a common operating environment through a unified mission command suite of systems and applications.


New Mission Command Tactical Network Path Forward.    After comprehensive senior Army leadership consideration and review of potential alternatives, the Army’s new network modernization path forward will be to halt programs that do not remedy operational shortfalls identified by internal and external assessments, fix those programs required to “fight tonight” and then pivot to a new acquisition strategy of “adapt and buy” that allows for rapid insertion of new technologies. This requires us to leverage industry best practices by creating and enforcing a standards-based open architecture that is both coherent and flexible enough to define standards while not limiting possibilities for insertion of new technologies; and  alignment to new governance, acquisition reform, testing reciprocity, innovation venues, and initial ‘adopt and buy’ capabilities. 

The Army will maximize available Commercial-off-the-Shelf (COTS) and available solutions to improve the survivability and mobility of command posts. We will incorporate solutions to increase survivability against electronic warfare and cyber threats.  The Army will also deliver coalition and Joint radio gateways with access to tactical data links aimed at integrating air-to-ground communications to improve Joint and Army interoperability and close air support. The Army’s pivot to an “adapt and buy” acquisition approach will enable us to deliver a “future state” network to counter the high-end threats and to keep pace with technology. This new approach will help us leverage proven Joint, Special Operations Forces (SOF), and industry solutions that are readily available. 

The future network must be built with real-time feedback from Soldiers on the ground and immediately address jamming, cyber, electronic warfare, power and spectrum consumption, joint and interagency interoperability, and air-to-ground communications shortfalls. In the near term, the Army will focus on a less-complex tactical network, moving complexity to the enterprise, freeing up Soldiers to focus on warfighting tasks rather than integrating information technology. This improves current network capability that includes satellite communications, network mobility and security, tactical radios, mission command applications and Position, Navigation and Timing capacity.

The Army left lawmakers shaking their heads when they announced they plan to shut down the controversial WIN-T program — except they aren’t really shutting it down: They’re going to keep buying it for a year. They’re also planning to buy other hardware and software that’s not 10 years out of date, as much of the current network equipment is. Senate Armed Services Committee Chairman Sen. John McCain blasted Army leaders for WIN-T performance setbacks and questioned how it is possible that these issues are now surfacing after the Army already invested $6 billion in the program. Congress appropriated $552 million for WIN-T in fiscal year 2017, and the Army is seeking $420 million for 2018.

Major General James J. Mingus U.S. Army Mission Command Center of Exelence blamed the troubles on the sheer size of the program. High-tech systems that require frequent updates are hard to manage when they are as large as WIN-T
Industry experts said WIN-T has suffered from the slow pace of development and production, and the Army’s inability to keep up with the speed of innovation in the IT world.

Turner and other lawmakers asked if the Army knew what system it will move to in the future. “What are you pivoting to?” he asked. “And what you described was a process, not a destination, not a system, not a procurement program. So, and with all due respect, I believe that the answer is, you don’t know, right?”
Crawford conceded that the Army does not yet know the answer to that question.
“The answer is we do not have an objective system,” the general said. “If there were an objective system on the shelf, sir, we would be trying to go and purchase that objective system.”Lawmakers also asked if the Army has an alternative system for on-the-move mission command capability.
“The alternative system for on-the-move mission command — between now and fiscal year 2022, we have a system called Joint Battle Command Platform,” Crawford said. “It’s actually one of the preferred at the maneuver level — systems and our formations for on-the-move mission command.” The service plans to field JBCP to the entire force between now and fiscal 2022, Crawford said.

As the hearing wrapped up, Rep. Niki Tsongas, D-Massachusetts, told Army officials that she is still not satisfied with what she heard in the hearing. “Even after testimony today I still feel that your way forward is half-baked, not fully developed and overly optimistic,” she said. “My father used to have the saying, ‘You may not be right but you’re positive.’ And in essence I think you’re being very positive, but it’s not clear that the way forward is actually right.”
To streamline, the Army is targeting tools and technology that are less complicated and easier for soldiers on the ground to operate. It’s a problem Crawford and other Army leaders acknowledged has taken a long time and concerted effort to attempt to fix.

Other key areas of emphasis involve toughening troops against interference with satellite communications, including through more use of tropospheric transmission capabilities that extend the network and enable communication amid loss of satellite communication. And then there’s the push to simplify and restructure command posts themselves, making them lighter, more mobile and less susceptible to enemies intercepting signatures and communications that reveal soldiers’ locations.

“Peer adversaries have been developing [capabilities] — not just electronic warfare and cyber — with the ability to link sensor to shooter. They’re able to sense us and link to direct and indirect fire capabilities that can kill. Survivability of the command post is based on real threats and the realization that while fighting 16 years of combat, our peers have also gone to school on us and developed capabilities that put us at significant risk if we don’t mitigate that risk.”

If we see the situation in Indian conditions most of the issues are similar in nature. Look at the different projects undertaken by Indian Army's Director General of Information Systems. A total budget of Rs 90000 crores ( a wild estimation) to be delivered in 2025 and beyond when the technology will be obsolete. Look at the time span the different projects are taking. Is it acceptable?

In 2007 my Army Commander once told me, If I was the Chief I would go to Bangalore, meet the three head honchos of Indian Silicon Valley, ask them this is what I require, get a timeline and fund requirement and hand over the projects of DG Info System to whoever is selected. Period. 

Though it looks too simplistic, but somebody has to catch the bull by the horn as Gen Milley has done. Do we have it in us to show the guts to do it.

You guess is as good as mine. 

Can India Counter Emerging Chinese Capabilities Like Stealth Aircraft? – Analysis

By Pushan Das
Source Link

Defending Indian airspace from any potential Chinese aerial challenge or intrusions in the future with the proliferation of stealth aircraft in the region, will be eventualities that the Indian Air Force must contend with.




Army Chief Milley Turns To Industry For Network Overhaul

By SYDNEY J. FREEDBERG JR.
Gen. Mark Milley

ARLINGTON: Want to sell information technology to the US Army? Then you need to write this down: Paul.A.Ostrowski.mil@mail.mil. That’s the email of the generalseeking industry’s input — historically something of a struggle for the service — as the Army reviews and overhauls its networks.



Why the world should worry about North Korea's cyber weapons

By Joshua Berlinger
Source Link


North Korea's hackers have been accused of carrying out some of the most audacious cyber attacks of the past few years, from siphoning millions of dollars to stealing state secrets. Analysts say cyber capabilities have become a key asset in North Korea's war chest, used for a wide range of purposes including hacking adversaries like South Korea and pilfering money.

Succession – The Key Word in Chinese Politics

By Zheng Wang

If we have to choose a single word for Chinese politics since the Qin Dynasty (221-206 BCE), the first central government established in China, that key word should be “succession.” With no parliamentary democracy and popular elections, the succession of current leaders became the number one problem for the different generations of rulers in China — from the emperors of the dynasties, to Chairman Mao, and to the current President Xi Jinping.

What the World Can Learn from Taiwan's China Experience

Daniel KlimanHarry Krejsa

As China’s economic gravity becomes inescapable and its military reach extends into the Western Pacific and the Indian Ocean, nations large and small are trying to benefit from the upside of China’s ascent while managing the attendant geopolitical risks.

China’s continued rise presents a series of balancing acts. How to engage China economically while limiting vulnerability to coercion.

Iran's Great Cultural Advantage

By Robert Kaplan

Throughout all the vicissitudes of dealing with Iran, an obvious fact has been insufficiently addressed: The external behavior of Iran's regime is simply more dynamic and more effective than that of any other Muslim regime in the Middle East. Iran has constructed thousands of centrifuges. Tehran has trained and equipped Hezbollah in Lebanon and Shiite forces in Iraq and Yemen, and it has propped up Syria's embattled president. Turkey and the Arab world appear sleepy-eyed in comparison. Iran acts. The other Muslim countries struggle to formulate responses, and when they do, they are still less effective than the Iranians. Why is that so? What secret sauce does the Iranian regime have?

Revising Strategy Documents

Assessing Defense Reform Series

There is widespread dissatisfaction with the existing strategy formulation process and resulting documents because of their perceived lack of prioritization and the disconnect between goals and resources, as well as the burden the processes place on staff and decisionmakers. As a result, both congressional chambers made proposals for reform. These proposals complement each other in some places and conflict in others. Common themes are more centralization to allow a unified vision and less susceptibility to staff-level consensus, more classification to allow increased candor in the documents without risking criticism by outside groups, and simplification of statutory requirements to allow focus on the key issues and reduce staff burden. FY 2017 is not the final opportunity for reform. The Congress can make further changes in the future as insights are gained from the outcome of these reforms and from the next set of strategic reviews.

HACKING NORTH KOREA IS EASY. ITS NUKES? NOT SO MUCH



AS TENSIONS WITH North Korea escalate into a full-on cold war, a cold cyberwar is playing out in tandem: Beneath the very public nuclear standoff, both the US and North Korea have privately ramped up their digital aggression, the Kim regime's hackers rampaging through networks around the globe and the US answering with its own attacks on the systems used by those hackers.

North Korean hack of US war plans shows off cyber skills


Seoul/Hong Kong: The techno soldiers of Kim Jong Un are growing more aggressive in defending North Korea’s supreme leader against threats from Donald Trump and South Korea.

The country’s hackers stole military plans developed by the US and South Korea last year that included a highly classified “decapitation strike” against the North Korean leader, according to a South Korean lawmaker. The plans were devised as the regime in Pyongyang steps up nuclear tests and fired long-range missiles toward the Pacific Ocean.

Russia’s Neighbors Respond to Putin’s ‘Hybrid War’


Though the Latvian government has yet to say just what caused the disruption, the country’s intelligence services announced last week that they are investigating if the unusual loss of service resulted from a Russian electronic attack; a Russian ship equipped for electronic warfare was reportedly just offshore at the time.

Who’s Afraid of George Soros?

BY EMILY TAMKIN

Last winter, in the middle of anti-corruption demonstrations, a television broadcaster accused George Soros — the Hungarian-born, Jewish-American billionaire philanthropist — of paying dogs to protest.

The protests in Bucharest, sparked by dead-of-night legislation aimed at decriminalizing corruption, were the largest the country had seen since the fall of communism in 1989. Romania TV — a channel associated with, if not officially owned by, the government — alleged the protesters were paid.

From Russia With Poison

Thomas L. Friedman

There is an abiding dream in the tech world that when all the planet’s people and data are connected it will be a better place. That may prove true. But getting there is turning into a nightmare — a world where billions of people are connected but without sufficient legal structures, security protections or moral muscles among companies and users to handle all these connections without abuse.

The century of revolution

by Serge Halimi

The first communist revolution had almost as many consequences for the rest of the world as it did for Russia itself. Its demise has brought about another type of universalism: capitalist globalisation.


The Ominous, Massive Military Exercises in Eastern Europe

REID STANDISH

On September 14, Russia and Belarus launched a massive military exercise along their western borders and in the Russian exclave of Kaliningrad. It’s meant to mimic war with three invented adversaries: Veishnoriya, the Western-backed aggressor in the scenario, is intent on driving a wedge between Russia and Belarus. Along with its two allies, Lubeniya and Vesbasriya, the imagined countries present a major threat to Russian security. More real, however, is the fear among Russia’s neighbors that such a situation could soon become a reality. 

Inflection Point for American Seapower

By Seth Cropsey

Despite the cold civil war between the American left and right and the internecine struggles within each political party, there are occasional glimpses of agreement on issues as fundamental to the government’s purpose as the nation’s defense. 

In the same week of June that the guided-missile destroyer U.S.S. Fitzgerald collided with a Philippine-flagged container ship in the approaches to Tokyo Bay, Senator Roger Wicker (R-Miss.) and Congressman Rob Wittman (R-Va.) introduced a bill that would make it the U.S.’s declared policy to meet the Navy’s goal of 355 ships. Co-sponsors of the bill, called the SHIPs Act, included Senators Mazie Hirono, Richard Blumenthal, Tim Kaine, and Jeanne Shaheen as well as Congressmen Colleen Hanabusa and Carol Shea-Porter. All of these co-sponsors are Democrats. The immediate task is to align the House and Senate versions of the bill.

Why the world should worry about North Korea's cyber weapons

By Joshua Berlinger
Source Link

(CNN)North Korea's hackers have been accused of carrying out some of the most audacious cyber attacks of the past few years, from siphoning millions of dollars to stealing state secrets.

Analysts say cyber capabilities have become a key asset in North Korea's war chest, used for a wide range of purposes including hacking adversaries like South Korea and pilfering money.

Revelations From A Thwarted Plot On New York



by Scott Stewart
Source Link

An undercover FBI agent posing as a jihadist on social media received a message from Abdulrahman El Bahnasawy in April 2016. El Bahnasawy, a Canadian citizen who was then 18 years old, claimed to support the Islamic State, said he wanted to conduct an attack in New York City and solicited the agent's help in planning one. Over the next month, he discussed possible targets and methods with the agent, sending maps of the New York subway system and photos of Times Square. He also introduced the agent to two other men: Talha Haroon, an 18-year-old U.S. citizen living in Pakistan who wanted to participate in the attack, and Russell Salic, a 36-year-old doctor in the Philippines who would help finance it.

Computer virus infects US military drone fleet: report

By Olivia Beavers

Editor’s note: This story inadvertently went off reporting from a Wired.com article published in 2011. The story, as published by The Hill, incorrectly stated that the military had detected the virus two weeks ago. We regret the error.

A computer virus has reportedly infected the US military drone fleet, Wired.com reported, citing three sources familiar with the matter.