When consumers purchase smartphones, they don't come with bulky
instruction manuals, said Lt. Gen. Paul A. Ostrowski.
a reason for that, said Ostrowski, principal military deputy to the
assistant secretary of the Army (Acquisition, Logistics and
Technology). Smartphones are designed to be used intuitively.
July 20, 2017 - Army networks should be as intuitive and expeditionary as smartphones, said one of the force's top acquisition officers, speaking at the Association of the United States Army's Hot Topics seminar on "Army Networks".
(U.S. Army photo by Peggy Frierson)
Besides being intuitive, smartphones can be used across
states and even across the world without having to be
adjusted for location, he said.
Army networks still
have a ways to go before they are as easy to use in an
expeditionary manner as smartphones, he said.
Ostrowski spoke Thursday at the Association of the United
States Army's Hot Topics seminar on "Army Networks."
Besides being intuitive and expeditionary, the network must
be secure and must be able to be integrated with each of the
services as well as with coalition partners, he said.
Additionally, networks must be maintained and operated
by Soldiers on the battlefield, he added.
future fight, the Army will not have the luxury of field
service representatives running around the battlefield, he
Brig. Gen. Joseph "JP" McGee, deputy commander
for Operations, U.S. Army Cyber Command, said another goal
for the future network is to simply identify and catalog
everything that's attached to it, from computers to
This Internet of things needs to be made as
invulnerable as possible. McGee added that there are still a
number of weaknesses to be addressed, but he declined to go
into detail on any of them due to operational security.
NETWORKS NEED STEM EXPERTISE
Air Force Maj. Gen. Burke "Ed" Wilson, deputy principal
cyber advisor to the secretary of Defense and senior
military advisor for cyber, Office of the Under Secretary of
Defense for Policy, Office of the Secretary of Defense, said
that on a national level, more science, technology,
engineering and math needs to be taught to children at
younger ages, even in elementary school.
Having a good base of STEM knowledge, he said, is important
to the military's accessions mission.
He added that
he thinks the services are doing a surprisingly good job at
recruiting and retaining this talent.
acting Army chief information officer, G-6, said that those
who defend the networks need to have more blended training.
By blended, he explained getting Soldiers in electronic
warfare, intelligence, information technology and other
specialties trained together to operate effectively together
instead of being stove-piped. That approach is now being
applied throughout the Army, he said.
Wang added that
the pace of hostile cyberattacks has accelerated recently.
Instead of single viruses, hackers have devised "a mashup of
viruses" that offer more sophisticated attacks.
TAPPING INDUSTRY FOR SOLUTIONS
To counter these threats, Wang said the Army will need
to tap industry to automate responses to cyberattacks using cognitive networks,
artificial intelligence, neural networks, pattern
recognition, automation and big data.
Maria B. Barrett, deputy director of Current Operations,
J-3, U.S. Cyber Command, said the Army is tapping into
industry solutions through participation in the Defense
Innovation Unit Experimental, or DIUx.
military representatives in Silicon Valley, California, and
other high-tech centers in the U.S., to stay abreast of
innovative technologies that can be applied to network
Maj. Gen. Garrett S. Yee, military
deputy/Cyber Security Office of the Chief Information
Officer/G-6, said that additionally, Fort Gordon, Georgia,
hosted a Cyber Quest last month, in which 27 industries
showed interests in providing the latest technologies in
cyber and electronic warfare.
Cyber Quest is a
cyber/electronic warfare experimentation and collaboration
between Soldiers, industry and Army researchers together.
Yee predicted that more industries will show interest in
future Cyber Quests.
Ostrowski said that the Army is
investing a lot of money in cybersecurity. It's currently
second in dollars spent after aviation.
The Army has
also been reaching out to numerous industry partners and
will soon have a second roundtable discussion with them. All
ideas are welcome from industry, he added. "This is a call
to action. Failure is unacceptable.
"If we fail to
achieve that vision of the network, we fail as a nation,"
Ostrowski said. "This is serious stuff. We have to get on
with next-generation capability."
By U.S. Army David Vergun
Army News Service
Comment on this article