The cyber war after next

The cyber war after next

As many mainstream people in government and industry continue struggling to get a basic grasp of cyber-security and cyber-war, the Air Force’s top cyber chief is already trying to think 20 years out.

Space Command boss Gen. William Shelton acknowledged Thursday in his whirlwind tour around town that he has trouble even seeing 20 months out, given how quickly the cyber-world changes. But as the military-industrial-congressional complex accepts that cyber is here to stay and growing in importance, it has to start applying the same kind of big-picture approaches it has long used in planning and acting in the real world.

For example, the Air Force must start thinking now about the cyber dimensions of plugging advanced aircraft — such as the F-35 Lightning II and the much-anticipated new bomber — into the larger information grid.


“The blending of cyber and air domains must be transparent,” Shelton said. “As we get to advanced tactical data links … the seams between ground air and space layers could start to show. These systems will plug directly into the [Global Information Grid], and we’ll have analogous defense responsibilities all the way to the platforms. In cyberspace, a risk accepted by one is a risk shared by all. Adversaries are probing every possible entry point into the network looking for that vulnerable weak spot – if we don’t do this right, those new data links could become one of those spots.”

Old-fashioned cyber-defense also will remain critical. Shelton said he wants networks riddled with sensors and redundancies to spot intrusions and irregularities, as well as redundancies and layers to keep the bad guy out — “walls within walls,” he said. Although he said the Air Force today is “very good” at cyber-defense, he said it must get a “predictive capability,” because it can’t monitor and defend everywhere.

“We have to identify the assets we protect and then protect the essential ones,” he said. “We have to make conscious decisions that other parts of network don’t receive as much attention, so as you can see shifting from ‘traditional’ cyber defense to a strategy of resilience and layers” — what he called “the walls and moats” developed by the 24th Air Force.

Shelton wants a network that can “disable diseased applications, switch to a different [operating system] on backup hardware and a combination of myriad other defensive actions.” Not only must the Air Force and other services handle these kinds of defense for its nonclassified network, it also has to improve the classified high side, he said. Shelton expects an analysis of alternative on how to improve the Air Force’s SIPRNET this month or next — don’t look for much coverage of it in the press.

Here’s something else he touched on that will mostly play out behind the scenes: Shelton described a “debate” inside the family about how DoD is going to continue to mainstream cyber into its organization and operations.

“As we think about how we’re going to operate in cyber there are still many, many questions,” he said. “Is there really, in the future, a big DoD network that’s centrally  managed and controlled? Or do each of the services have their independent capabilities to come together in the standard model?”

There’s even an argument about whether DoD and the services need separate cyber-commands — though Shelton did not characterize it that way. He did ask, rhetorically, “Who employs those capabilities? In cyber, you could be anywhere to employ capability. Does that mean CyberCom has no role, or the CoComs have no role, or we somehow parcel capabilities out to the CoComs with reach-back to CyberCom?  I am answering with questions because we don’t know the answers to those questions just yet. It’s a very active debate —  very heady stuff for those of us in the Department of Defense right now.”

DoDBuzz asked Shelton after his speech to expand on this discussion, and he set up this parallel: Today the combatant commanders ask the Air Force for a certain number of airplanes to conduct a certain mission within their battlespace. A number of B-1B Lancers flies over to … ahem … “Southwest Asia,” and then begin flying sorties to support the campaign. But does Central Command need airmen to physically be in Qatar, or Kabul, to defend (and attack) computer networks? Or can they be in Fort Meade or down in Tampa? And do those airmen “belong” to CyberCom, or CentCom?

“That’s kind of the dilemma,” Shelton said. “Physical presence and command authority.”

He did not answer any of the questions he raised, but you can imagine the pros and cons of each side. At very least, if you can keep troops safely out of harm’s way in a command center in Florida, that’s less risk at your headquarters downrange and less cost to transport, feed, clothe and sustain them forward. But the services obviously prize the value of tactical operations centers and forward headquarters, where everyone on the team can see and hear and smell their colleagues, enabling them to work closer together. If you’re the commander and your cyber-soldier is just as important as your intel guy or your logistics guy, there’s a strong argument for all of them to be downrange.

Then there’s the money issue — the services’ cyber-divisions are only a few years old, and they, like every new box in the org chart, have survival as their first priority.

Whatever happens, Shelton said the cyber-threat is only increasing. DoD’s networks are probed more than 10 million times a day, he said, and they’re getting more sophisticated all the time.

Join the Conversation

i’m just really PO’d to realize that the machines are (or have been for awhile) aware that we are aware that they are aware of their awareness.

gonna be some hurt comin down

BIG problem is this is a none BIG item to DoD brass so it gets over looked. Reality we need to look into more cyber defense less in to GCV and other BIG item which current vehicles can do already we need cyber defense all over since networks can be crashed by any enemy with a good hacker in there ranks.

can i get the work-form-home cyber pak? (meniacle laugh)

cyber defense is soooo cool… infinite possibilities for DoD to do some good here.

Just don’t link the server to the internet.

HELLOW my felow Americans :25 years ago tried my best to tell them about tooooday nnnnno one payed attention .and NOW i am telling you every minute is Preciouse please ! understand they will use the Atomic Bomb Do not bleave Puttin .in one hand they kiss in the other hand they Stab LOOOOK since mulla’s are in Power,Africa andonesia australia syria America the World is upside DOWN WHY ? OILMONeY SANCTION is JOKE for khameneyeeeee ‚in 20 years NEXT GENERATION CAN NOT DO ANY THING WHY YOU TRUST KOOOMOONISTS WE SEND TRHE BREAD TO THEM AND THEY HHHUUUGED KHAMENEYYYEEEE<PLEASE WAKE UP IS MORE IN TO IT THAN YOU SEEEEEEE >TRUELY YOURS MARYAM

POLITIC is NOT gone STOP the AMBITION OF AYATOLLAS FRENCH THEY MADE A MISTAKE TO BRING KHOMEINY !NOW CHINA AND RUSSIA ARE MAKING THE SAME MMMMMMISTAQKE<THIS TIME THE WORLED IS IN DANGER IS NOT ANY ROOM TO LET THE MMMMMOOOONSTER GROWWWWWW BIGGGGGER AND EAT US .PLEASE WAKE UP

regurdless who be the king :The World is in dannnnnger of khameneeeee and his group WHO EVER IS HELPING THEM NOW IN FUTUR WILLLLLLLLL BITE HIS .….….….….….….….….….….….….….….….….….….….….….….….….FINGER but then new GENERATION WILLLLLLL PAY THE PRICE AND THEY WILLLLLL NOT BE READY TO DESTROY THIS MONSTERS WHICH YOUUUUUU CREATED OUT OF KNOWLEDG >IS STIIIIIL SHORT TTTTTIME TOOOO CURE DOOOOO ITT OR LOOOOOOOOOOOOOOOSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSE IT

Ayatolasss are unpredictable they sign something they do something else.Now we try not to get foooled by them OR by their Dobbllee Agent ‚LESSON CARFULLY even XXXXX does not know their plan. by accident ‚was found .Good luck .KEEEP in touch

its time you hire some real talent, though every gig I get offered from you people sucks, you get what you pay for, if your only willing to pay sub-par then that’s the lever of security you will end up with., it time to pony up before it’s 2 late.

*required

NOTE: Comments are limited to 2500 characters and spaces.

By commenting on this topic you agree to the terms and conditions of our User Agreement

AdChoices | Like us on , follow us on and join us on Google+
© 2014 Military Advantage
A Monster Company.