Currently viewing the tag: "U.S. Military"

I’ve been in the Navy for a little more than a decade.  The one important thing I would share from my experience is to understand and embrace the art of expendable. Each day I quickly review the major ramifications if I was to simply have been expended. This expenditure can take forms in the shape of great opportunities, a too great a failure, or even a life tragedy. This art has significant ramifications not only in your professional career but even greater importance in your personal life.

In my professional life I’ve made it a priority to ensure that if I was simply removed from the command or mission progress toward success would not be hindered. This isn’t a new concept. The Army does it in the form of a 1-up-1-down relationship; learn the job of the individual who works for you and the job of the person for which you work. This will pay dividends and probably save someone’s life when things become chaotic. But rarely do I see individuals fully embrace this concept. Often they are concerned with trying to increase their importance in the organization. Believing that importance, holding key information, or having an irreplaceable skill will not make one great. It will serve as a detriment to the organization, mission, or goal which you dedicated your time and portion of your life to assist and move forward. Ultimately that is what you’ve chosen to do; give part of your life to a cause. Why cloud it with foolish selfishness that negates the strategic contribution you are trying by your service?

My application of this art is through deep involvement with the people with which I’m privileged to work with. What I’ve found successful is to know your shipmates and leaders and to exploit their passion. Often that passion is to make a significant difference; a goal and desire much of us share. That desire can be served best if it is reminded that it is expendable. There will be someone to replace you no matter when that time comes. With this fuel you will be driven to achieve things to a level that the information hoarders and sole skill believers are unable to achieve. You’ll teach and train your subordinates to know and understand not only their roles but your role. Once you achieve this your people know their duties and yours. Combined together there is greater cohesiveness, camaraderie, and unity toward the organization’s goal. This new knowledge and ability allows them to foresee issues ahead of what they were able to before and mitigate them at their level. This foresight and mitigation the perpetuates through your level and the levels above you. This then allows strategic progress to be made within the organization.

The Navy, with some exceptions, has enjoyed a different level of security comfort compared to it’s boots on the ground sister services. While it has rigorously practiced it’s shipboard damage control; it’s ability to absorb blows in the form of inbound weapons and it’s affect upon the human capital has not been something trained to on a large enough scale to influence individuals within.  The last time this really had to be considered by the Navy is in World War II and the age of Fleet Admiral King.  That was a period almost 70 years ago and our organization and culture has forgotten the valuable lessons of that age.

One of my mentors made an impression on me by saying “A day will come when the Navy will determine it is finished with you; make sure you’re prepared for that day.” I find this statement to hold more significance today then when I first heard it several years ago. It motivates me, makes me hungry for more, and reminds me we’re all expendable.

Defense Systems has a decent summary of the major military programs affect by the recent FY13 budget submission.  Titled “Winners and losers in the fiscal 2013 budget” it highlights the following for each service:

Navy/Marine Corps:

  • Small Tactical Unmanned System (UAV) will receive $32 million in FY13, and $300 million in FY13-FY17.
  • Fire Scout vertical take-off and landing aircraft, the service will instead procure a larger Fire Scout based on a larger Bell Helicopter air frame.
  • Medium-Range Maritime Unmanned Aerial System was terminated based on the Fire Scout changes.

Army:

  • Warfighter Information Network-Tactical (WIN-T) will receive $900 million in FY13, and $6.1 billion from FY13 through FY17. FY13 includes purchase of net-centric warfare IP modems and low-rate initial production (LRIP) to support testing.
  • Modification of Stryker vehicles to incorporate command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) systems to facilitate mission command-on-the-move.

Air Force:

  • Cyber capabilities take precedence for U.S. Cyber Command is $3.4 billion in FY13, and  $18 billion from FY13 through FY17.
  • Advanced Extremely High Frequency (AEHF) satellites (fully funded part of $8B FY13 and $40.1B through FY17).
  • Space-Based Infrared System (SBIRS) for surveillance (fully funded part of $8B FY13 and $40.1B through FY17).
  • Operationally Responsive Space program will be restructured to provide “more responsive and timely space capabilities to the warfighter.” Included in $8B FY13 and $40.1B through FY17.
  • (3) NATO Alliance Ground Surveillance (AGS) systems $200M in FY13.  Based on Global Hawk Block 40.
  • Global Hawk Block 30 is cancelled as previously discussed in the initial Defense Budget Priorities post. Will continue to use U-2 through FY25.  Reducing $800 million in expenditures for fiscal 2013, and $2.5 billion from fiscal 2013 through fiscal 2017.
  • Reduce MQ-9 Reaper armed unmanned aerial vehicles (UAV) purchase by 24.  But the funding will still be expended for ground stations.
  • Predator will be utilized for a longer period then initially planned to fence funding for the Army’s Gray Eagle.

The hardest part about all of these changes is the adjustment.  The Defense Industrial Base must flex in order to ensure those programs that are designated to provide capability longer must be examined to ensure fatigue and extended failure does not adversely limit their mission up time ability.  Likewise those entities with program that were cut will immediately request reassessment and ultimately reduce their workforce or reorganize and retask. This is not an easy task but it is the contractor’s role.  The intention when utilizing contractors is for this very purpose.  The entities within the Government and Military will also require retasking which is much harder to effectively achieve.

This reexamination is not much different then when I strive to get more and more effective dollar out of my diesel VW Jetta.  At 150,000 miles there is maintenance to be done but there is no need to purchase a new vehicle when the current one is providing all the capabilities required.  The difference is the human element and that should always be handled with care.

In the end there are no “Winners” or “Losers” but the goal is better efficiency and effectiveness.  If this is achieved at least you can look a taxpayer in the eye with confidence you maximized every dollar they provided.

[via Defense Systems]

 

Incoming search terms:

win-t funding, win-t budget

Download (PDF, 2.3MB)

First the obvious disclosure piece.  I’m never comfortable with allowing & receiving reports from those you procure services from.  I’m even less comfortable with Northrop Grumman’s Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage report.  I don’t understand what would possess the U.S.-China Economic and Security Review Commission to accept such a report let alone request and fund it from a Department of Defense contractor with significant interests in this developing area.  I could care less if these information security analysts were the best on the planet this in my mind is a clear conflict of interest and “personnel firewalls” have zero effectiveness.

With all that mentioned let’s see what they put together in this massive document.

The immediate focus of the document is  on “information confrontation.”  They point to a Chinese paper on Infomization Dominance.  Sounds a lot like the U.S. Navy’s Information Dominance Corps focus doesn’t it?  Additionally it discusses China’s Integrated Network Electronic Warfare or INEW strategy.

PLA analysts consistently identify logistics and C4ISR infrastructure as U.S. strategic centers of gravity suggesting that PLA commanders will almost certainly attempt to target these system with both electronic countermeasures weapons and network attack and exploitation tools, likely in advance of actual combat to delay U.S. entry or degrade capabilities in a conflict.

This is of significant concern.  The United States has continued to outsource and outsupply items through every portion of our lives and the result is this has forced the US Military to be dependent upon similar sourcing paths and venues.  Until a shift toward in house production and upfront investments to mitigate supply chain risk this will continue to leave a massive vulnerability through every level of the Department of Defense and Critical Infrastructure of the United States.

At least 50 civilian universities conducting information security research nationwide benefit from one or more of roughly five main national-level high technology grant programs, reflecting what appears to be a broad technology development plan consistent with published national priorities.

My immediate response was that the U.S. has so many more universities conducting information security research that it dwarfs the metric listed.  While true what is more concerning is the number of individuals China has attending our universities which compliments this metric.  The cost is often prohibitive for the US Government and Military to send or acquire personnel from places like Carnegie Mellon University.  However, for a highly resourced entity the ability to integrate with the leading Computer Science and Information Security university and research entities is much more significant.

Without strict control of this complex upstream channel, a manufacturer of routers, switches, or other basic telecommunications hardware is exposed to innumerable points of possible tampering and must rely on rigorous and often expensive testing to ensure that the 11 semiconductors being delivered are trustworthy and will perform only as specified, with no additional unauthorized capabilities hidden from view.

Until the U.S. changes its Research and Development to include Production capabilities this will pose a massive risk which cannot be managed, improved, or worked around.  I’ve seen discussions to make this a responsibility of the GSA or other major government entity but I’m not sure GSA could effectively get this accomplished.  I believe an entity tasked with this would need to be supported heavily by the National Laboratories and Research & Development components of the USG.

Professional state sponsored intelligence collection not only targets a nation’s sensitive national security and policy making information, it increasingly is being used to collect economic and competitive data to aid foreign businesses competing for market share with their U.S. peers.

There is no longer a difference between national security information and economic and competitive data information.  Intellectual Property is part of a Cyber War and this includes the piracy of information and data.  The difficult part of this is discerning the difference between Cyber Warfare and  Cyber Crime.  Where does this get handed to Cyber Command or the Department of Homeland Security?  This is something that is currently being debated in the U.S. Congress.  There are a couple of Information Security Bills being tossed around;  Senator McCain’s Bill and Senator Lieberman’s Bill.

Media and industry reports portray some of the incidents attributed to China as advanced but the reality is that many successful penetrations are “advanced” only because the targeted organization was unable to stop them or detect the presence of the operators on their networks.

This is simply the complex media spin that exists in the United States.  It makes it more interesting and sexy if it was complex.  The story isn’t as valuable (yes advertisements run everything) to the news venue with out this interesting and sexy spin on it.  Not bad to note that this is the case but if you don’t understand that this is occurring you aren’t paying enough attention.

Activities attributed to state sponsored operators often appear to target data that is not easily monetized in underground criminal online auctions or markets but highly valuable to foreign governments. Highly technical defense engineering information, operational military data, or government policy analysis documents rarely if ever appear to be a priority for cybercriminal groups.

This is well executed obfuscation of the intent of the adversary.  If it is difficult to determine why certain information was ex-filtrated then it provides less alarm to the victim.  This allows further ex-filtration from other entities to compliment the data and turn it into very valuable and actionable information.

To date, the former joint venture between Huawei Shenzhen Technology Company Ltd and Symantec, Inc. is the only major partnering between a Western information security firm and a Chinese high technology company.

This has since been disolved as of 26 March 2012.  The New York Times did a quick piece called Symantec Dissolves a Chinese Alliance.  So we’re starting to see significant implications of a quiet and cold Cyber War that is well underway both in the private and public sectors.

The PLA is to prepare for “Local wars under informationized conditions.”

PLA leaders included additional responsibilities under the third role that identified not only space and distant ocean areas as domains vital to Chinese national security interests, but also included the electromagnetic spectrum—a change that is likely already driving PLA investment in the development of more sophisticated information warfare capabilities. 

And

The PLA Daily described warfare under informationized conditions as being characterized by opposing sides using complete systems of ground, naval, air, space, and electromagnetic forces.

This essentially reflects the exact move the U.S. Navy made in 2009 when Admiral Roughead formed the U.S. Navy’s Information Dominance Corps.  It effectively recognized the Electromagnetic Spectrum as the 5th domain.  This has also been echoed via General Michael Hayden (USAF, Ret), former Director of NSA and CIA.  So who started this operationalization of Cyberspace?

Information Confrontation Theory: The strategic imperative for the PLA to operate in the electromagnetic domain is driving the formulation of a new approach to information warfare, termed information confrontation (xinxi duikang; 信息对抗), that applies system of systems operations theory to information warfare, viewing it as a macro-system comprised of discrete capabilities linked together under a single command structure and fully integrated into the overall campaign plan.

Information confrontation theories currently being developed and refined within the PLA today seek to address these gaps, particularly the need for more coherent command infrastructure.

With this section I see absolutely no difference compared to the initiatives the USG and its Military is pursuing.  Remind you of anything?  Maybe the Cold War?  The “adversary has developed this so I must” paradigm.  Locks everyone in a continuous do-loop until someone finally gives up.

PLA had created a “super-elite unit of cyberwarriors” designed to carry out network exploitation of foreign networks.

There have been continued reports on this network exploitation team formed in China and in other countries which now includes the United States Military.  Unlike the United States China has denied existence of this type of unit even though numerous evidence, videos, and other indicators continue to validate it’s existence.   But at this point this fact doesn’t matter.  Most are operating under the assumption that it does exist and that most countries with the ability will form a similar cadre with cyber expertise.

Much of the remainder of the document stipulates and speculates on what-ifs and could happen items.  This can be chalked up to “cyber marketing.”  This brings me back to the disclosure  piece.  The document isn’t that bad but since Northrop Grumman produced it you must rightfully discount it.  This then devalues the tax dollars that were spent on it.  I have nothing against Northrop Grumman.  I simply believe this could have been produced in a much better fashion from one of the dedicated Federally Funded Research and Development Centers (FFRDC), like SEI or MITRE vice a services and production based contractor such as Northrop Grumman.

[via USCC]

Set your Twitter account name in your settings to use the TwitterBar Section.