Local

February 9, 2018
 

Cyber Activities at the National Training Center Support Real World Operations

Tags:
Steven P Stover
Fort Irwin, Calif.

Maj. Wayne Sanders, chief, Cyber Electromagnetic Activities Support to Corps and Below, U.S Army Cyber Command (left), and Sgt. Major Jesse Potter, the S3 operations sergeant major for the 780th Military Intelligence Brigade (Cyber) (right), watch as Spc. Justin Longshore, a cyber operations specialist assigned to the 782nd Military Intelligence Battalion (Cyber), controls a unmanned aircraft system (UAS) as it maneuvers towards a U.S. Army unit before it is ‘attacked’ by an anti-UAS capability as part of the CSCB program during the 1st Stryker Brigade Combat Team, 4th Infantry Division, National Training Center Rotation 18-03, Jan. 18 to 24.

U.S. Army Cyber Command is using the Cyber-Electromagnetic Activities Support to Corps and Below program at the Army’s Combat Training Centers to develop and test CEMA concepts and operational cyber support to those units.

The lessons learned from CSCB support to the National Training Center’s rotational training units, Opposing Forces and Operations Group have resulted in numerous milestones including defensive cyber counterfire and systems that disrupt and neutralize unmanned aircraft systems (anti-UAS).

According to Sgt. Maj. Jesse Potter, the S3 operations sergeant major for the 780th Military Intelligence Brigade (Cyber), it has been an iterative process, learning more each time about developing tactical training that mirrors real world operations.

“Having been involved in all the previous CSCB rotations — and every rotation is a learning event — one of the big learning points is, in this specific rotation, the use of cyber enabled kinetic effects,” said Potter. “That is, the commander understands cyber is not only good for intelligence, but provides him with a sensor-to-shooter link that he is able to then leverage against High-Payoff Targets (HPTs). In other words, using cyber to gain access, to be able to see HPTs, and then to use that in concert with other capabilities to be able to geographically locate and neutralize HPTs is a technique that had not been done in previous rotations.”

Maj. Wayne Sanders, the ARCYBER CSCB chief, gave an example of how that plays out for Tactical Cyber Counterfire missions. He said the defensive cyber operations team was noticing anomalous activity on the brigade’s network at certain times — usually late at night. The brigade intelligence section knew who the cyber threat actors were, but because there was a lack of touch points between the intelligence section and the network defenders, they never they never put the two together.

Maj. Wayne Sanders, chief, Cyber Electromagnetic Activities Support to Corps and Below, U.S Army Cyber Command (left), and Sgt. Major Jesse Potter, the S3 operations sergeant major for the 780th Military Intelligence Brigade (Cyber) (right), watch as Spc. Justin Longshore, a cyber operations specialist assigned to the 782nd Military Intelligence Battalion (Cyber), controls a unmanned aircraft system as it maneuvers toward a U.S. Army unit before it is ‘attacked’ by an anti-UAS capability as part of the CSCB program during the 1st Stryker Brigade Combat Team, 4th Infantry Division, National Training Center Rotation 18-03, Jan. 18 to 24.

“That is where that CEMA piece is so critical, because otherwise intelligence stays in the S2 channels, and communications stays in the S6,” said Sanders. “This is the CEMA’s job and the Expeditionary CEMA Teams (ECTs) provide that extra expertise that leverages the higher level capabilities, such as the RCCs (Regional Cyber Centers), and the JCC (Joint Cyber Centers), and through the IC (Intelligence Community) — the result is more arrows in the commander’s quiver to generate effects.”

Potter said that in all the previous rotations the DCO perspective was focused on DCO Internal Defensive Measures, which includes hardening the network and monitoring activity in the network, part of information assurance.

“No rotation has done, up until this rotation, any semblance of a DCO counterfire,” said Potter. “To identify the target, being able to characterize the target, and then being able to make the transition from making an internal threat assessment, to making a request to target that individual as a process.”

Potter and Sanders both remarked on another significant achievement during this rotation which was the anti-UAS capability.

Staff Sgt. Jason Lott controls unmanned aircraft system as Warrant Officer Felipe Tristan observes, as they maneuver the unmanned aircraft system towards a U.S. Army unit before it is ‘attacked’ by an anti-UAS capability as part of the Cyber Electromagnetic Activities Support to Corps and Below program during the 1st Stryker Brigade Combat Team, 4th Infantry Division, National Training Center Rotation 18-03, Jan. 18 to 24. Lott and Tristan are assigned to the 782nd Military Intelligence Battalion (Cyber).

“There were UAS threats in the area that the OPFOR possessed that we did not have a capability for. We want to be able to task our ARCYBER enterprise to create a capability against those other threats, and that’s the model that we want to use,” said Sanders. “The Army has figured out, no matter where they go, we want to use the intelligence community to tell us what types of threat are out there so we can use our enterprise to create capabilities against that.”

According to Sanders, the Commander of Operations Group is able to change the training scenario with as much or as little cyber play as they want, usually depending on how the brigade is doing in the fight; the OPFOR having a UAS capability is a real world possibility.

“The primary purpose for what we’re doing is to build confidence in the anti-UAS equipment. That it can actually function as the unit is told it can function, so when the Army deploys into theater they will actually have the real world capability to know — they have seen it work in testing — so they know that it works and they’ll actually deploy it,” said Potter.

Potter went on to say that is why a capability developer is critical to the ECT force structure.

“From the ECT perspective, this helps prove the concept of why the capability developer is so critical to the ECT,” said Potter. “When they arrived they identified an additional threat which their capability did not counter … a capability developer could potentially create a solution to counter the new threat in real time to support the maneuver commander.”
 

Spec. Justin Longshore, a cyber operations specialist assigned to the 782nd Military Intelligence Battalion (Cyber), controls a unmanned aircraft system as he maneuvers it toward a U.S. Army unit before it is ‘attacked’ by an anti-UAS capability as part of the Cyber Electromagnetic Activities Support to Corps and Below program during the 1st Stryker Brigade Combat Team, 4th Infantry Division, National Training Center Rotation 18-03, Jan. 18 to 24.




All of this week's top headlines to your email every Friday.


 
 

 
3

Do Furniture Your Way

One of my favorite things about my husband being an active duty soldier is that we get to live in lots of different parts of the country. Seeing new towns, trying new restaurants and being exposed to unique cultures are adventu...
 
 
3

Bobcats on Fort Irwin

Fort Irwin is home to a variety of wildlife ranging from the overly abundant common raven, to the elusive bobcat. The bobcat (Lynx rufus) is a species of cat found throughout North America, from parts of Mexico to southern Cana...
 
 
1

A Small Shop with a Big Personality

Fort Irwin, Calif. — Tucked just inside of the Main entrance to the Fort Irwin Post Exchange, the Military and Civilian Spouses club operates the MCSC Consignment Shop. The small corner location is packed with items hand-craf...