Pages

15 March 2018

The Army’s new tool in firing back? Cyber

By: Mark Pomerleau  

This is the first part of a two part series exploring how the Army is considering using cyber techniques on the battlefield.The Army has introduced three new concepts for 21st century battles including a new counter-drone capability, a tactical “cyberfire” used to neutralize enemies and cyber-enabled attacks as part of an ongoing pilot program. The service is iteratively adding these capabilities to the Cyber and Electromagnetic Activity (CEMA) Support to Corps and Below (CSCB) pilot program that explores where cyber, electronic warfare and information operations capabilities should exist on the battlefield.


New cyber and electronic warfare capabilities are forcing a hard look at military structure.

Maj. Wayne Sanders, the lead for the CSCB pilot, in an interview with Fifth Domain, said the counter-drone capability was part of training for a unit providing force protection against a key adversary’s drone capability.


During exercises in August, members of Army Cyber Command outfitted a quadcopter to assist in signal identification.

In terms of tactical cyber counterfire, Sanders explained that the brigade combat team successfully identified an adversary’s cyber activity in their networks, requested support to return fire to stop the attack not simply plug holes from a defensive perspective. This was the first time this had been done, he added.

If a unit is being fired upon, Sanders said, it is going to want to be able to return fire.

The Army is continuing to experiment with cyber capabilities at the tactical edge (Steve Stover/Army).

Sanders also described how units explored what they called cyber-enabled kinetic effects, which involved leveraging cyberspace as a surveillance capability to identify targets in physical space. By penetrating an IP camera network, data was fed back into the brigade operations center to try and identify a high value target. While teams didn’t know the exact location of the target identified by the hacked camera, they used their intelligence platform and the geospatial intelligence team to confirm the target’s location for a kinetic strike.

“We helped shape the commander’s understanding of the battlefield and we already knew that it was a brigade high payoff target so we’ve leveraged our capability within cyberspace to help them deliver a kinetic strike,” Sanders said.

This capability can be done both remotely and locally, but in this example, Sanders said it was done locally with expeditionary forces gaining the intelligence.

Expeditionary cyber teams

The goal of these rotations is to see what types of capabilities can be integrated into tactical units rather than always having to rely on remote capabilities that are in high demand.


The Army is continuing to integrate cyber and electronic warfare maneuver forces at the tactical edge.

The Army is working on a construct of expeditionary CEMA teams – a recommended scalable force structure within Army Cyber Command that provides offensive and defensive cyber operations, electronic warfare analysis and capability and information operations – that the brigades don’t currently have.

The Army is assessing these capabilities and force structure to make recommendations to the Army.

These teams can be tailored if the brigade commander has a cyberspace operational need that requires these capabilities. Prior to the rotations, Army Cyber Command will get with the brigade leadership 180 days prior to ask what exactly the commander desires to complete their mission, and they tailor the team and effects accordingly.


As the Army is testing new capabilities for cyber and electronic warfare at the tactical edge, these capabilities must be able to meet the commanders' needs.

The capabilities that exist within the brigade currently, Sanders said, are EW personnel and CEMA chiefs who are cyber and EW planners. “The point of that expeditionary CEMA team construct is to potentially reinforce a brigade commander’s requirement,” he said.

Future of the pilot

The pilot was initially envisioned to go for eight rotations, with the eighth concluding last year. However, leaders have said they expect to continue with about three rotations a year.

Lt. Gen. Paul Nakasone, commander of Army Cyber Command, told C4ISRNET in an interview over the summer that the Army has requested a report on what has been learned through the pilot thus far. The report will be completed in the coming fiscal year, he said, adding there will be recommendations of where the Army should go with the manning, equipping, training and employment of these elements.

The Army is continuing to evolve concepts to fight and win in future operating environments. But what will these capabilities look like, and how will they impact the overall force structure?

Sanders said as the Army is transitioning into this assessment period, it will seek to provide Army leadership with options to potentially build the force structure to support the work of the pilot.

Part two will explore the effects and authorities construct to employing tactical cyber teams.

No comments:

Post a Comment