FirstSpear TV

Archive for the ‘CEMA’ Category

Check Those URL Forwarders

Sunday, April 11th, 2021

We don’t like to use URL forwarding services because so many readers access SSD via Government networks which quite smartly, often suppress the links. However, many companies insist on using them because it’s what their marketing professional was taught in school. Sure, they can provide data to the user, but they can also be nefarious.

If you’re ever unsure of where a shortened URL will take you, check out tools or websites like they’ll provide you with some info on the link before you actually click it.

A Look at US Army CEMA in INDO-PACOM

Thursday, April 8th, 2021

For those of you unfamiliar with Cyber-Electromagnetic Activities, these Tropic Lightning Soldiers from the 25th Infantry Division recently conducted training in the dense Hawaiian training area. There’s a lot of biomass out there and it presents challenges to signal capture, geo-location, and countermeasures. These Soldiers talk about how they contribute to the fight.

First Multi-Domain Task Force Plans to be Centerpiece of Army Modernization

Wednesday, February 10th, 2021

WASHINGTON — The Army’s first Multi-Domain Task Force is charting an unknown path to help reshape how the total force fights and wins on future battlefields, its commander said Wednesday.

Initiated in March 2017, the MDTF pilot program focused on defeating an enemy’s anti-access/area denial, or A2/AD, capabilities in the Indo-Pacific region. Since then, through exercises and assessments, the program ensured the task force was able to deploy and operate in the region before it officially activated in the fall.

“There is little doctrine for [MDTFs],” said Brig. Gen. Jim Isenhower, the commander, adding his trailblazing unit will be a centerpiece of Army modernization.

As a centerpiece for the future Army, MDTFs are “new, networked, maneuver theater assets, focused on adversary A2/AD networks,” Isenhower said. Their capabilities also provide deterrence options for combatant commanders.

“The Army has empowered us, and asked us to figure out how we’re going to maneuver effectively in all domains, which will characterize how we fight in the future,” he added.

Down the road, the MDTF, which is based at Joint Base Lewis-McChord, Washington, won’t be alone. Later this year, a second MDTF is being planned to stand up in Europe. A third task force may also stand up and serve the Indo-Pacific next year.

The first MDTF originally had a field artillery brigade as its core that merged with an Intelligence, Information, Cyber, Electronic Warfare and Space, or I2CEWS, element.

“Through distributed operations and with access to requisite authorities, MDTFs are advanced headquarters that synchronize kinetic and non-kinetic capabilities in support of strategic objectives,” Isenhower said.

“We face increased physical and virtual standoff through layered and integrated networks, where adversaries leverage all instruments of national power to blur the lines between competition and conflict, altering international norms to the detriment of the international community,” he said.

Great power competition

For the MDTFs, the plan ahead is to evolve and outpace the speed of any persistent, great power competitors like China and Russia, said an officer assigned to the task force.

“Great power competition requires an Army that is capable of complete integration across the joint force to compete with our adversaries,” he said.

From a joint warfare perspective, this is where the MDTF comes in. “Our exercises are joint, our plans are joint, and we incorporate input from across the joint services at every turn,” he said.

That foundation enables the total force to use a broad range of multidisciplinary capabilities. It also gives joint forces the freedom of action to fit the needs of each service, he said.

Preparing Soldiers

Like with other Army organizations, it’s the individuals selected who make the task force exceptional, according to one of its senior enlisted members.

“Within our ranks are highly-trained Soldiers with specialized skill sets, [and are] technologically astute, creative thinkers, who are looking at new ways to address complex problem sets,” they said. “The diversity of our formation fosters an environment of critical thinking, and the Soldiers who comprise our task force are leaders at the front of their career fields.”

The MDTF Soldiers reflect the nation, he added, and are “the best at coming together to leverage technology and joint resources to meet the imperatives of our national defense strategy.”

After qualifying for the task force, they said, each member represents the best of each priority they specialize in. “That’s one of the most exciting parts of this — the Soldiers who comprise our organization,” he said.

Whether in exercise or garrison, the MDTF members do things others simply cannot, they said. Specifically, the experience of working in joint exercises, or becoming fluent in the synchronization and planning efforts typically linked to the joint environment.

“Every member on the MDTF values their opportunity to contribute to the Army’s — and the joint force’s — efforts to develop these new concepts, like [multi-domain operations] and all-domain warfare,” Isenhower said.

Joint problems need joint solutions

But the task force will only be as successful as the joint partnerships they maintain, they said. Those partnerships have come with their share of eye-openers.

“Our proximity to joint partners [has given us] a few lessons learned,” said a senior officer assigned to the task force. “We tend to get these large gains out of exercises that we’ve been on in the Pacific, but one of those lessons we were coming away with is that we need a more persistent training environment.”

On any given week, the MDTF may partner alongside a Carrier Strike Group from the U.S. Navy or fire planners from the U.S. Air Force.

These are prime examples of how the task force is a joint-enabler, and “without those joint partners, we’d become an Army solution [for] only Army problems,” the officer said. Instead, “we’re looking to work [with] joint partners toward joint solutions.”

“Many times, joint solutions are inhibited by closed architectures within respective forces, Isenhower said.

The task force “found opportunities to accelerate joint interoperability by just getting the right people in the room to talk to each other and figure out how to break down both literal and figurative firewalls that might inhibit rapid communication,” he said.

Although there is still work to do, the task force is on the right track, he said. MDTFs will simultaneously integrate joint partners and emerging technologies to inform the Army’s transformation into a faster, more dynamic force.

“This is a unique opportunity, and the MDTF — Soldiers and family members alike — feel privileged to be a part of it and don’t take for granted the responsibility and the privilege the Army’s given us to chart this path forward,” Isenhower said.

By Thomas Brading, Army News Service

Army Spectrum-Sensing Technology to Help Units Avoid Detection

Tuesday, February 9th, 2021

ABERDEEN PROVING GROUND, Md. (Feb. 3, 2021) – The Army is improving situational awareness of the electromagnetic battlefield by developing spectrum-sensing capabilities that provide Soldiers with greater awareness of their own radio emissions.

Soldiers currently cannot “see” their own radio emissions within the radio frequency spectrum, putting them at risk of detection by adversaries. The Army’s spectrum awareness effort provides intuitive graphic overlays that enable Soldiers to visualize the energy emitting from their radio frequency systems, said Jonathan Lee, an engineer with the Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center – a component of Army Futures Command’s Combat Capabilities Development Command.

“Knowing what we look like to the enemy from an electromagnetic perspective is a critical capability at all echelons of the Army,” said Lee. “This technology improves one’s situational understanding of the electromagnetic environment. It will enhance units’ ability to determine if a signal is friendly or malicious, and it will aid in planning maneuvers.”

Spectrum awareness is one of eight promising Army-developed science and technology efforts the Network Cross-Functional Team (CFT) has prioritized to receive research, development, test, and evaluation prototyping funds to move from early research and development to the demonstration and validation phase.

“Today, we need to be more judicious in order to increase survivability, specifically for our command posts where technology that transmits is most dense,” said Chief Warrant Officer 5 Chris Westbrook, N-CFT chief of marketing research and senior technical advisor. “This effort is going a long way to informing network design and our capability sets.”

Fiscal year 2020 is the first year the Network CFT requested and received prototyping funds aligned to science and technology integration efforts in support of future network capability sets.

“The funding is allowing the science and technology community to take the next step in developing spectrum awareness capabilities that will address capability gaps for the Army,” said Lee. “We believed this technology could be further matured to support additional complex propagation environments and support the identification of new and complex signal types. More work has to be done to further improve our situational awareness and understanding capabilities, but this funded effort is a key step in enhancing those for our Soldiers.”

Lee and his team were able to continue growing the capability from a Department of Defense technology readiness level (TRL) 4– which represents component or breadboard validation in a laboratory environment – to a TRL 6, which is a prototype ready for demonstration in an operationally relevant environment. This included further maturing capabilities for actionable intelligence and improved mission planning, such as Electronic Attack Effects Simulator (EAES) and Real Time Spectrum Situational Awareness (RTSSA).

EAES provides near-real time modeling and simulation to compute and visualize the impact of an adversarial electronic attack on a proposed course of action, thus aiding commanders in determining how best to maneuver assets within the battlespace.

RTSSA senses and compares detected spectrum against authoritative assignment data in the Joint Spectrum Data Repository to discriminate between “friendly” and adversarial communications emitters and other unauthorized radio frequency emitters, thus improving the quality of spectrum assignments and command decision support.

The C5ISR Center is partnering with the Network CFT and program executive offices (PEOs) to ensure these maturation efforts are properly vetted early for a viable and smooth transition to a program of record.

EAES, RTSSA and other C5ISR Center spectrum awareness capabilities are slated to be integrated with current and future increments of the Electromagnetic Warfare Planning Management Tool (EWPMT) – a capability under Project Manager Warfare and Cyber of PEO Intelligence Electronic Warfare and Sensors (IEW&S) that supports the commander’s military decision-making process.

“The EWPMT helps mitigate a critical vulnerability gap across most Army formations today: the ability to understand a unit’s friendly ‘foot print’ in the electromagnetic spectrum,” said Lt. Col. Jason Marshall, PEO IEW&S’s product manager for Electronic Warfare Integration (EWI). “This enables electronic warfare officers and electromagnetic spectrum manager Soldiers to inform their commander on how to conduct emission control, which ultimately enhances force protection and command post survivability in near-peer conflict.”

According to Marshall, the capability of widespread spectrum sensing contributes to a more accurate, timely, and tactically relevant understanding of the radio frequency spectrum, providing Soldiers with enhanced mission planning and the ability to inform multi-domain operations.

The C5ISR Center is working with PdM EWI to identify additional capabilities and demonstration needs. Spectrum awareness technologies are slated to be included in the first capability drops scheduled for fiscal years 2022 and 2023.

“The collaboration between the user community, research and development and acquisition is key to identifying what technologies are within the realm of possibility while refining the Soldier’s requirements as the current tactics, techniques, procedures and doctrine evolve,” Marshall said.

By Jasmyne Douglas, DEVCOM C5ISR Center Public Affairs

National Cyber Range Complex Charleston and NIWC Atlantic Fosters Collaboration through Cybersecurity Simulation Exercises

Wednesday, December 23rd, 2020

The National Cyber Range Complex (NCRC) Charleston, located at Naval Information Warfare Center (NIWC) Atlantic, recently hosted teams of cybersecurity professionals to compete and hone their cybersecurity skills in the NCRC Cyber Red Zone Capture the Flag (CTF) competition.

Based loosely on the outdoor “capture the flag” game, as well as the board game, “Battleship,” this year’s Cyber Red Zone CTF event was given a maritime twist. During CTF, 35 teams competed in 48-hour time slots to find hidden clues and virtual flags by hacking into mock computer systems. In order to accommodate all the teams of cybersecurity professionals from across the Department of Defense, as well as the three collegiate Reserve Officers’ Training Corps (ROTC) teams, the NCRC held 11 sessions from early October to mid-November with four teams competing concurrently in each session.

The NCRC Charleston hosted two teams in October with participants from The Citadel’s Cybersecurity Team, as well the Marine Corps Operational Test and Evaluation Activity (MCOTEA). Although NIWC Atlantic cybersecurity professionals have previously participated in past National Cyber Range CTFs, this was the first year NCRC Charleston hosted any teams.

“By learning how to thwart an attack, or better yet, seeing how an attacker attacks, it helps cybersecurity professionals design better defenses, which ultimately protects your information and mine,” said Jeff King, NCRC Charleston director.

For the CTF, the flags were assigned point values based on difficulty and each team worked under the pressure of time limits to accumulate points, said Scott West, NCRC Charleston lead event director. The teams with the most points won in their respective event.

During the NCRC Cyber Red Zone CTF, cadets from The Citadel used their offensive cybersecurity skills to compromise modern wireless networks, web applications, and Windows and Linux operating systems. During the event, cadets also researched specialized embedded Real Time Operating Systems (RTOS) and communications standards, to include the National Marine Electronics Association 2000 standard and Automatic Identification System. Both of these communications standards are commonly used on marine vessels for navigation and engine operations.

As part of the event, West said that the cadets learned new lessons and techniques while solving several of the competition’s more complex challenges.

“We had to learn a lot of protocols, a lot of new skills,” said Citadel Cadet Shiloh Smiles, The Citadel. “We had to apply things used in other areas here in ways that are difficult. I was just trying my best to get information and do some damage.”

Cadets that competed in the NCRC Cyber Red Zone CTF are also recipients of either the National Science Foundation (NSF) Scholarship for Service (SFS) or the DoD Cyber Scholarship Program (CySP).

“These cadets will go on to spend at least three years working for the United States government as cyber professionals, so CTF training really helps to prepare them for future tasks,” said West.

The Citadel cadets expressed their appreciation for participating in the CTF at NCRC Charleston as a chance to reinforce classroom training.

“I don’t think anywhere else could have provided an actual experience like this for us.” said Smiles. “I’m really thankful that I was able to have this opportunity.”

The NCRC CTF event offered a similar experience for Marine Corps cyber professionals to practice and sharpen skills in a realistic training environment.

“Members of the MCOTEA team use these types of events to maintain proficiency,” said King. “MCOTEA is the independent operational Test & Evaluation authority for the Marine Corps and is responsible for the operational and cyber testing of products that NIWC Atlantic builds prior to them going to warfighters.”

While the networks and systems in the CTF are simulated, the technology represented is common to many of the systems actively being developed, tested, and fielded across the DoD, said West.

“Serial-based protocols used in the CTF are actively used in U.S Navy vessels and Marine Corps vehicles,” said West. “These type of events provide those vulnerability assessment analysts with tools and realistic challenges needed to identify deployments and determine potential mission impact to assess risk to interconnected mission-critical systems.”

NCRCs conduct cyberspace testing, training and mission rehearsal/preparation events for the full spectrum of DoD customers including those involved in research, development, acquisition, testing, training and operations. The NCRC Charleston supports a wide variety of event types including science and technology demonstrations, developmental test & evaluation, operational test & evaluation, security controls assessments, cyberspace operations training, cyberspace tactics, techniques procedures development, forensics/malware analysis, and cyberspace operations mission rehearsal/preparation.

The Charleston facility is one of two OSD R&E resourced Navy cyber test and training range facilities, with NCRC Patuxent River as the second facility.

Story by Kris Patterson, Naval Information Warfare Systems Command (NAVWAR)

Photo by Joe Bullinger, US Navy

New Cap Badge for UK Special Forces Communicators

Tuesday, December 15th, 2020

According to the latest issue of the Royal Signals magazine, “The Wire” the new SFC cap badge was endorsed on 18 Aug 20 and was marked by a small ceremony in the church on Stirling Lines by the Unit Padre, with the Master of Signals Lieutenant General Nick Pope KCB CBE and HQ 1 (UK) Signal Brigade Commander Brigadier John Collyer in attendance.

Male members of all the Royal Navy, Royal Marines, British Army and the Royal Air Force are eligible to become Special Forces Communicators. They, along with Royal Signals soldiers in trade, are assigned to Hereford based 18 (UKSF) Signal Regiment and provide close support to the SAS, the SBS and the SRR.

The Regiments consists of:

• SBS Signal Squadron

• 264 (SAS) Signal Squadron

• 267 (SRR) Signal Squadron

• 268 (UKSF) Signal Squadron

• 63 (UKSF) Signal Squadron

18 (UKSF) Signal Regiment fulfils several roles:

•Provides highly secure communications for UKSF operations

•Provides electronic warfare and signals intelligence for special forces operations

•Intercepts and monitors enemy communications at short range in difficult circumstances for strategic purposes

Assessment, Selection and Training is quite comprehensive. Candidates must successfully complete a five day Briefing Course. Next, is an optional SFC Preparation Course.

The Special Forces Communicator Course itself consists of six phases:

• Technical Trade Assessment (one week)

• General Support Comms (six weeks)

• Physical Aptitude (five weeks)

• Close Support Comms (five weeks)

• Conduct After Capture (two weeks)

• Military Training (three weeks)

• SF Parachute Training (three weeks)

Candidates must also complete SERE training.

Once qualified, SFCs are eligible for specialty pays.

Everybody Wants to be SI until it’s Time to do SI Sh!t

Tuesday, December 8th, 2020

We used to have a saying in SOF, “don’t confuse enthusiasm with capability.”

Sure, laugh, but when I look at resumes from former IC and SOF folks, everybody mentions SI. We’ve even got careerfields in the military that think they’re going to take it on like a side gig. I’ll let you in on a secret, all that other stuff you spend all your time concentrating on is the side gig. SI is a full time job and it’s in demand. Add in EW and CYBER and it’s the whole mission.

That’s right, the Cold War is long over with the Soviets prancing around with Motorized Rifle Divisions. Maneuver around long enough and you would’ve just run into them, they were so big. A small ISR footprint could support huge task forces.

But for that past couple of decades it’s been about rooting out the enemy so you can choose how to deal with him. It might be a kinetic strike, a commando raid, or maybe something even more devious like making his fortune disappear from his bank accounts in the Caribbean or having a self driving delivery van run over his mother. Yes, we are smack dab in the age of intelligence, which has become the operation. Hence, so many “operators” wanting to say they did something else once they get out and are looking for jobs.

So, if you’re going to tell people you can do it, maybe you ought to learn a little about it.

Rohde & Schwarz have been in the comms receiver and direction finding business for 85 years. Why, just this fiscal year, they generated EUR 2.58 billion in revenue. They boast over 12,000 employees in 70 countries. Everyone looks to them. They know what they’re doing. So when they offer something titled, “Webinar: An Introduction to Direction Finding,” you take it. That is if you don’t want to sound like an idiot when you tell the chippy down at the pub who works for a TLA how you’re a one-man F3EAD cycle.

So go check out this intro to direction finding. And oh yeah, don’t let the EW and Cyber guys tell you that knowing the target language isn’t important. You can only do so much with externals.

Cybersecurity: Rheinmetall Solution Wins Bundeswehr Innovation Prize

Friday, November 27th, 2020

High-performance application for protecting IT data networks takes first prize

Rheinmetall’s work in the field of cybersecurity received a special accolade at the Innovation Conference 2020, an event staged by CODE, a research institute with close ties to the Bundeswehr. The Innovation Conference coincided with CODE’s annual meeting at the University of the Bundeswehr in Munich, which this year took place online.

Thanks to an innovative solution for protecting data networks, Rheinmetall vanquished a total of 37 competing contributions to take first prize. “Moving Target Defence in Micro-Segmented Zero-Trust Networks” was the title of the award-wining contribution prepared by the expert team of the Cybersecurity business unit of Rheinmetall Electronics GmbH in Bremen, Germany. Technically speaking, the winning contribution is based on the application “Rheinmetall Security Appliance”, or RhSA, which the company developed to protect highly sophisticated IT infrastructures from cyberattacks.

A central feature of the Rheinmetall Security Appliance is the “Moving Target Defence” function, which can significantly enhance the security of networks. In essence, Moving Target Defence replaces real IP addresses with virtual ones, thus preventing attackers from reconnoitring individual end points for their attacks, creating virtually insurmountable barriers to any attack.

This highly topical issue seized the attention of the jury, which comprised representatives of various Bundeswehr institutions (Centre for Geoinformation); the German Ministry of Defence (Cyber/Information Technology department); the research institute CODE; and the Koblenz-based Federal Office for Bundeswehr Equipment, Information Technology and In-Service Support, or BAAINBw.

Following a careful review of all of the contributions submitted, Lieutenant General Michael Vetter, head of the Cyber/Information Technology department at the Federal Ministry of Defence, proclaimed the Rheinmetall team the winner of this year’s competition.

Though endowed with a jackpot of €15,000, the real prize was the chance to engage in in-depth discussions with experts from the Bundeswehr, for whom warding off cyberattacks is a top priority. In 2017 the Bundeswehr established an independent military organization to take on this mission, Cyber and Information Space. In the view of the German government, digital sovereignty, that is to say, “Security made in Germany”, is particularly important in this context.

As Matthias Lindenberg, head of the Cyber Solutions business unit at Rheinmetall, puts it, “The award obviously represents a huge success for our team, one that spurs us on to achieve bigger and better things. We’re very pleased that our innovative “Moving Target Defence” approach won the prize and caught the attention of the Bundeswehr experts. We’re convinced that we can be a powerful, reliable partner of the Bundeswehr in the realm of cyber defence, and especially the German military’s Cyber and Information Space Command. But we also offer attractive solutions to the civil sector for protecting highly complex networks.”

For Rheinmetall, a new strategic line of business: Cyber Defence Rheinmetall has been addressing questions relating to IT security for a number of years now, and has since declared Cyber Defence a strategic area of activity. To enable systematic marketing of the Rheinmetall Security Appliance and the expansion of our cybersecurity portfolio, the Group recently established a new business unit: Rheinmetall Cyber Solutions GmbH of Bremen.

Developed in-house and based on so-called micro-segmentation, Rheinmetall Security Appliance (RhSA) is a market-ready solution for protecting complex LAN and WAN infrastructures of the kind operated by large corporations. During the past year, RhSA has already been successfully tested in a pilot operation by a well-known industrial group, which uses it to protect the networks at one of its largest production plants.

Besides RhSA, the Rheinmetall Cyber Solutions portfolio includes preparation of information security concepts for projects and products as well as development of solutions for practical implementation (e.g. cryptography and hardening measures), plus conducting vulnerability analyses and forensic IT investigations of cyberattacks.

The Group is eager to see Rheinmetall Cyber Solutions GmbH establish itself as an expert technology provider in the military and civil cybersecurity markets.

The CODE research institute
The CODE research institute (Cyber Defence) at the University of the Bundeswehr in Munich was established in 2013. Its mission is to bring together interdisciplinary experts from the sciences as well specialists from the military, business, industry, public authorities, and professional associations representing the fields of information and communications technology, the aim being to promote progress in the realm of cybersecurity.

Tasked with exploring new ways of encouraging the demand-oriented identification and introduction of IT innovations in the German Ministry of Defence’s area of responsibility, the annual Cyber and Information Technology Innovation Conference first took place in 2018. Research foundations, commercial enterprises, government authorities and private individuals can submit and present their innovative ideas here in the field of IT. The best of these earn a prize at the Innovation Conference.