[ISN] Navy Amasses Digital Armada

From: InfoSec News <alerts_at_private>
Date: Mon, 5 Dec 2011 03:21:27 -0600 (CST)
http://www.afcea.org/signal/articles/templates/Signal_Article_Template.asp?articleid=2816&zoneid=334

By Robert K. Ackerman
SIGNAL Magazine
December 2011

The sea service is marshalling its forces to cruise the cyber realm.

The U.S. Navy is operationalizing cyber throughout the service as it 
reconfigures both its force and its overarching network. The goal is to 
pull cyber operations out of the corner and into the middle of daily 
force activities as part of the Navy’s information dominance mission.

Achieving this goal will require substantial changes in both training 
and operations. Cyber activities must continue unabated as a host of 
potential adversaries threaten the network. And, success may depend on 
how well the Navy balances security requirements against the need to 
innovate on the fly.

These issues include where cyber fits into the concept-of-operations 
plan; where it fits into the operational plan; and how the tactics, 
techniques and procedures for information dominance in the cyberdomain 
affect changes—particularly for achieving kinetic and nonkinetic effects 
early in a conflict that would preclude the need to move to a higher 
level of warfare.

“The next step of taking information dominance forward is 
operationalizing it down to the core,” declares Rear Adm. Gretchen 
Herbert, USN, commander of Navy Cyber Forces. “What we don’t want is for 
cyberspace and cyber operations to be relegated to the domain of a 
specific job area. We want to make it part of everything that we do 
throughout mission planning and warfighting.”

The aim of this approach is to have necessary cyber information readily 
available for the commander without that leader needing to extract it 
from a niche position in the realm of operational information. For 
example, if a commander sees that battlespace communications are 
hampered in a particular sector, he or she would be able to determine if 
it was caused by adversarial actions and respond accordingly. Because 
that cyber information was not stashed in a specific realm, such as 
communications or intelligence, the commander would be able to 
understand second- and third-order effects of cyber.

[...]


_____________________________________________________
Subscribe to InfoSec News - www.infosecnews.org
http://www.infosecnews.org/mailman/listinfo/isn
Received on Mon Dec 05 2011 - 01:21:27 PST

This archive was generated by hypermail 2.2.0 : Mon Dec 05 2011 - 01:20:32 PST