The Buzz

Everything You Need to Know: How the Army Is Preparing for War with Russia and China

Offensively and defensively, some services such as the Air Force are already working on computer algorithms engineered to replicate human behavior in cyberspace as a way to deceive and therefore track attackers. Computer generated automation can closely replicate cyber activities conducted by a human being, therefore enabling a cyber defender to lure and then track the activities of attackers.

Cyber Quest took place within a broader context of the ongoing U.S. military transition to a wider range of interconnected networks. The Pentagon’s current Joint Information Environment (JIE) aims to facilitate greater IT interoperability between service networks using common IP protocol standards; this is designed to both increase mission-related data-sharing while also implementing increased network protections.

U.S. military IT developers, including Army participants in the Cyber Quest exercise, recognize that movements toward JIE and the Joint Regional Security Stacks (JRSS) present a double-edged dynamic.

On the one hand, greater interoperability greatly expands cross-domain U.S. military mission capabilities, consolidates data centers and reduces a hardware footprint, but increased connectivity could also increase vulnerability.

For this reason, U.S. military cyber modernization is squarely oriented toward adding needed protections to individual service networks, while at the same time seeking to harvest the benefits of greater interoperability.

“We can't afford a bunch of stove-piped systems. We want to integrate data into an interoperable, operational and technical infrastructure - getting these capabilities into the hands of those who would be employed,” Morrison said.

Findings from the simulated cyber war exercises will soon inform a special report for U.S. Army Training and Doctrine Command.

“We are planning the next Cyber Quest for 2018,” Roberts added.

This first appeared in Scout Warrior here.

Pages