Tag Archives: Cyberwarfare

Not Like Yesterday: David Kilcullen’s Out of the Mountains

and into the Littorals

In a 1997 speech to the National Press Club that will be familiar to many Navy and Marine Officers, General Charles Krulak, 31st Commandant of the Marine Corps, told the story of Roman consul Publius Varus. Consul Varus was a once successful general whose legions were decimated by Germanic tribes using what we might refer to as asymmetric tactics that left the Roman’s flummoxed. Varus’ last words were recounted as “Ne Cras, Ne Cras,” or “Not like yesterday.” The story presents a challenge to military leaders in our own generation to refrain from getting complacent in their own capabilities, and to continue to adapt their organizations to meet new and unexpected threats.

General Krulak’s went on to introduce the concept of an urban “three block war,” in which combat forces would simultaneously conduct humanitarian relief, peacekeeping, and high intensity combat operations in the space of three contiguous blocks of a complex urban environment. In many ways General Krulak’s words were more prophetic than he could know, as within six years U.S. forces were engaged against an irregular enemy in complex, densely populated urban terrain in Iraq.

American combat troops out of Iraq and on the cusp of departing Afghanistan. This makes it the perfect opportunity to examine old ideas about urban warfare with fresh eyes and look for  both the continuities and the differences resulting from a globally connected world and the proliferation of advanced weapons and technologies down to the sub-state level.

Dr. David Kilcullen, an Australian soldier and counterinsurgency specialist who advised U.S. leadership on strategy in Iraq and Afghanistan, has taken a major step in this direction with his new book Out of the Mountains. Kilcullen’s new work analyses the major trends driving the future of conflict around the world. His findings will indeed have far reaching implications for the U.S. military, which has been focused for years on a rural insurgency based in the mountains and deserts of Afghanistan. Conflict will not be as it was yesterday. It will be fought in major coastal urban centers amidst tens of millions of people, and it will span all domains including land, sea, air, and cyber. These conflicts will be complex and will almost never have a purely or even primarily military solution, but their intensity will at the very least require military force to protect and enable other forms of power and influence as they are applied in support of U.S. strategic goals. The U.S. Navy and Marine Corps will need to be adaptable and flexible in order to remain mission-capable in such an environment.

This article will examine the major trends that Kilcullen identifies, and attempt to delve deploy into their military implications. Dr. Kilcullen identifies four “mega-trends” that are shaping the future of humanity, and with it the future of warfare as a human endeavor. These trends include:

  • Increasing Population – The U.N. estimates that the global population will continue to increase, especially in developing nations, before leveling off around 9 billion people sometime in the latter half of the century.
  • Urbanization – For the first time in human history, more than half of the population worldwide lives in cities.
  • Littoralization – Most cities, and certainly the largest ones, are in coastal zones that provide access to seaborne transportation and thus access to the global economy. Kilcullen usefully defines the littorals as the portion of land and air that can be targeted by weapons from the sea, and likewise that portion of sea and air that can be targeted from land.
  • Digital Connectedness – Internet and mobile phone access are beginning to saturate markets worldwide, and in some countries access to communications technology outstrips access to sanitation facilities.

The first three of these trends are not news. Kilcullen notes that sociologists have been writing about population and urbanization for decades, and urban conflict was a major focus of military thinking in the 1990s. However, the acceleration of these trends, combined with the burgeoning level of digital connectedness not widely foreseen in the 1990s, means that urban conflicts will take on a new level of violence and intensity that will be broadcast around the world instantaneously. This will provide our adversaries with powerful commercial tools to enable command and control  (C2) of independent networked cells in a dynamic battlespace.

Operation Iraqi FreedomAt the operational level, planners can expect warfare to range from the multiple-battalion level assault on Fallujah at the high-end to complex “urban seige” attacks such as Mumbai and Nairobi in the mid-range to the persistent urban violence of the drug wars in Rio de Janeiro’s favelas at the low-end. In each instance, the enemy will be a small, networked, and extremely well-armed group. It will reside in a sea of millions of civilians and be able to call upon commercial digital networks from cell phones to Twitter to collect intelligence, post propaganda, and act as ad hoc C2 nodes to coordinate operations. It will also be able to draw on a massive global transportation system to transport people, weapons, and finances around the world in short order.

1127-for-webMUMBAImapfIn order to flesh out the capabilities of modern networked urban terrorist groups, Kilcullen analyzes in detail the 2008 Lashkar-e-Taiba (LeT) Mumbai assault. LeT’s ground-breaking tactics, which displayed a level of free-flowing swarming ability that is at the very least rare for a sub-state actor, are worth examining. The attack was carried out by multiple cells of just a few individuals each who had conducted a thorough reconnaissance of their targets for nearly a year.  The attackers used maritime ratlines normally employed by smugglers to move from Karachi to the port of Mumbai, making landfall in a slum neighborhood with little police presence.  Once the assault began, their actions were coordinated via cell- and satellite-phone by a LeT command team operating their own combat operations center in Pakistan (likely with some support from Pakistani ISI). The team used broadcasts from CNN and other media networks to inform their battle tracking and develop an open-sourced understanding of the Indian police response. This allowed the LeT cells to remain several steps ahead of Indian security forces for several days, killing civilians at several high-profile public locations around Mumbai before they were finally surrounded and neutralized.

Digital connectedness is also allowing insurgent groups to expand their presence into the global information space that was once the sole purview of states and large corporations. Regular readers of this blog will likely remember that al-Shabaab live-tweeted the recent Navy SEAL raid in Barawe, and after the special operators withdrew, were able to claim victory before Western news outlets even knew the operation had taken place. The militants then followed up by posting pictures of equipment that the SEALs had left behind during their extraction from the firefight.  While seemingly trivial, this allowed al Shabaab to stake its claim to the information available on the attack, and perhaps shatter some of the aura of invincibility surrounding the SEALs since their assault on Osama bin Laden and rescue of Captain Richard Philips from Somali pirates.

It is beyond the scope of a single blog post to analyze all of the future trends that Kilcullen examines in detail. Indeed, the book itself is likely just the first of a great deal of research that still needs to be done on the future of urban conflict against evolved irregular or hybrid adversaries in mega-slums and other dense and highly complex urban environments. Much of that research will, of necessity, have to focus on non-military aspects of conflict prevention and mitigation, due to the unavoidable fact that future urban conflicts will be driven by sociological factors inherent to the urban systems where they are being fought. Under Kilcullen’s formulation, urban design and development will in many ways become as important to American policy as foreign aid, governance and economic development, and security sector reform.

The implications for military doctrine and organization will be significant as well. It will impact Naval doctrine, organization, and ship-building plans even as Navy leadership seeks to focus its efforts and budgetary priorities towards AirSea Battle. The same is true for the Marine Corps’ efforts to reposition itself as the nation’s amphibious crisis response force following a decade of warfare in landlocked environments. In following articles, we will examine these implications in depth, and attempt to achieve a better degree of resolution on the future of urban littoral combat and the steps that the Navy and Marine Corps will need to take to remain mission-capable in that environment.

Dan Dewit is a researcher with the Arleigh Burke Chair in Strategy at the Center for Strategic and International Studies in Washington. From 2009- September, 2013 he served as an officer in the U.S. Marine Corps.

Post-OPCON Strategy for the US-ROK Alliance

(This article is cross-posted by permission of the United States Naval Institute Blog and appeared in its original form on July 25th here.)

According to the Yŏnhap News Agency last Thursday, ROK Defense Minister Kim Kwan-jin “confirmed…that he had requested the U.S. government” to postpone the OPCON (Operational Command) transfer slated for December, 2015. Citing from the same source, the National Journal elaborated further by saying Minister Kim believed that the United States was open to postponing the transfer because “a top U.S. government official leaked to journalists”  Minister Kim’s request for the delay.

Chuck Hagel and Kim Kwan-jin
Ministerial-level meeting
There may be several reasons for the ROK government’s desire to postpone the OPCON transfer. First, the critics of the OPCON transfer both in Washington and the ROK argue that this transition is “dangerously myopic” as it ignores “the asymmetric challenges that [North Korea] presents.” Second, given the shrinking budget, they argue that the ROK may not have enough time to improve its own C4I (Command, Control, Communications, Computer and Intelligence) capabilities, notwithstanding a vigorous procurement and acquisition of state-of-the-art weaponry and indigenous research and development programs for its local defense industries. Third, South Korea’s uneven defense spending, and operational and institutional handicaps within the conservative ROK officer corps have prevented South Korea from developing a coherent strategy and the necessary wherewithal to operate on its own. To the critics of the OPCON handover, all these may point to the fact that, over the years, the ROK’s “political will to allocate the required resources has been constrained by economic pressures and the imperative to sustain South Korea’s socio-economic stability and growth.” As if to underscore this point, the ROK’s defense budget grew fourfold “at a rate higher than conventional explanations would expect” due to fears that the United States may eventually withdraw from the Korean peninsula. It was perhaps for these reasons that retired GEN B. B. Bell, a former Commander of the United States Forces Korea, has advocated postponing the transfer “permanently.
 
However, the Obama Administration’s reversal of its decision to hand over the OPCON to the ROK military appears unlikely. First, in the face of the drastic sequestration cuts in the upcoming fiscal years, long-term commitment in the Korean peninsula may be unsustainable. Second, since both the United States Armed Forces and civilians suffer from war-weariness after having fought in Iraq and Afghanistan for over a decade, it is unlikely that they will accept long-term overseas commitment of this magnitude. Which leads to the third point that the United States will likely favor diplomatic solutions when dealing with Kim Jŏng-ŭn, since the DPRK has recently expressed its desires to engage in dialogues. Fourth, “[m]ost economic and military indicators show that South Korea has an edge over North Korea in almost all measures of power.” While many opponents of the transition point to the DPRK’s asymmetric threats to make their case, Suh Jae-jung contends that “quantitative advantage quickly fades when one takes account of the qualitative disadvantages of operating its 1950s-vintage weapons systems” which has led “serious analysts [to] conclude that ‘North Korea never had a lead over South Korea.’” Most importantly, arguments against the scheduled transition are weak because they tend to focus only on the military dimensions of the ongoing conflict.
 
There are several ways in which the US-ROK alliance  can enhance security dynamics on the peninsula in the aftermath of the OPCON transfer. One obvious approach would be to seek diplomatic solutions to proactively deter further provocations by Kim Jŏng-ŭn. Despite the deep-seated rancor and distrust between the two Korean states, both Korean states have nevertheless agreed to reopen the Kaesŏng Industrial Complex. The latest inter-Korean talk held at P’anmunjŏm demonstrates more than anything else the need to “cajole and flatter the young ruler…[by] allowing Kim Jŏng-ŭn to save face as sovereign ruler of his country.” As Miha Hribernik and I wrote in June, one way of doing this would be to “accept his offers to discuss arms reduction first.” In addition, the US-ROK alliance could defuse tension on the Korean peninsula by recognizing the DPRK as a sovereign state. Such measures would prevent miscommunication where parties involved are “not talking to each other but rather, past each other.”
 
Nevertheless, the US-ROK alliance must avoid appearing weak even as it seeks diplomatic solutions to guarantee peace and security for the Korean peninsula. As I wrote earlier, “in order for diplomatic endeavors to be sustainable in the long-run, they must be backed up by a credible threat of coercion.” With or without the OPCON, there are several ways in which the US-ROK alliance can effectively deter future DPRK aggressions. One such option, as I’ve written earlier, would be for the United States Pacific Fleet and the ROKN, along with the JMSDF, to form a combined fleet whereby the three navies “would may share their unique resources and cultures to develop flexible responses against future threats by Kim Jŏng-ŭn.” Second would be to allow the ROK JCS Chairman to assume command of the CFC with the top American general serving as his deputy as was proposed in June during a ministerial meeting held between Secretary of Defense Chuck Hagel and Defense Minister Kim Kwan-jin. However, at this juncture, according to the Washington Post, “the 28,500 U.S. troops here will not fall under the command of the South…[since] the United States and South Korea will have separate commands.” Third, to proactively deal with possible DPRK missile attacks, the US-ROK alliance, together with Japan, can develop a collective missile defense system.  Fourth, as retired Admiral James Stavridis argues, since the world has converged into smaller communities through globalization, we must take the fight to our adversary by “follow[ing] the money [to upend] threat financing” abroad and at home. Last but not least, since the DPRK’s  recent asymmetric attacks against the US-ROK alliance have been waged on cyberspace to cripple their infrastructures, the US-ROK alliance, in tandem with the international community, can work together to enhance their cyber security.
Despite unfounded fears among retired officers and conservative analysts that the OPCON transfer may considerably weaken South Korea’s security, it does not mean that the United States will completely withdraw from the Korean peninsula. Nor does the ROK resemble South Vietnam after the Paris Treaty of 1973. That is, the ROK remains an economically and politically stable nation. With new transition come new opportunities for innovative growth. For the ROK, OPCON transfer just may present such opportunities to protect itself from further aggression by Kim Jŏng-ŭn.

 Jeong Lee is a freelance international security blogger living in Pusan, South Korea and is also a Contributing Analyst for Wikistrat’s Asia-Pacific Desk. Lee’s writings have appeared on various online publications, including East Asia Forum, the Georgetown Journal of International Affairs and the USNI Blog.

Surviving the Invisible Commons

This article originally featured at the USNI Blog

In his piece, “Imminent Domain,” ADM Greenert suggests that the EM and Cyber spectrums need now be considered a stand-alone domain of conflict. Respectfully, we’re already there. The electronic environment, wired and unwired, is an obsession for defense planners. In CYBERCOM, the EM-Cyber spectrum practically has its own unified command. The navy’s component of CYBERCOM, the “10th Fleet,” in name harkens back to ADM Greenert’s example of the rise of sub-surface warfare. From the military’s fears over an assassin’s mace style EMP attack to the public’s obsession in movies like Live Free, Die Hard and games like Black Ops 2, the awareness is more than there. While we may have recognized this new environment, ADM Greenert is right in that we have not taken this challenge to heart.  If forces are going to operate as if the EM-Cyber spectrum is a domain of warfare, they must act as they would in the physical battlefield on the tactical level, not just the strategic: take cover, stay organized, and interrupt the enemy’s OODA loop.

 

TAKE COVER

 

In a battlefield, soldiers take cover to avoid detection and enemy fire. In the EM-cyber realm, we’ve made a habit of unnecessarily exposing ourselves to vulnerability. The US Navy has created an entire web of centralized databases that require not just mere control of the EM environment, but also a stability that often doesn’t exist at sea.

The Ordnance Information System-Retail (OIS-R) is the perfect example of unnecessary exposure to EM spectrum weakness. The system, designed to manage all ordnance administration, accounting, and inventory, requires a command to sign in to a shore-side database requiring uninterrupted connection through a Java interface. To access a ship’s ordnance data, one MUST have a functional internet connection either hard-wired or satellite. If account problems exist, troubleshooting must be done through other wireless means (phone, email, etc…) with land-based facilities. Each step requires a series of exposures to a very particular type of EM-Cyber connection to operate effectively.

The old system, Retail Ordnance Logistics Management System (ROLMS) was a stand-alone database that would update parallel shore-side databases through message traffic. The old system, while potentially harder for a single entity to manage, didn’t open the whole system to multiple weaknesses by environmental interference, enemy interference both kinetic and cyber, and equipment errors shore-side that a ship cannot trouble-shoot. It might be easier to keep all your ordnance (admin) in a huge pile, but to require warfighters to make a run through the open plains of TRON to get it is not a good idea.

 

STAY ORGANIZED

 

The drive to create centralized databases is often driven by a lack of organization on the part of the end-user. Properly organized supplies (data) minimize loss and the need to reach back into the logistical chain for material already packed. If the networks on ships are any indication, the average sailor enters the EM battlefield with absolutely no organization whatsoever. Sign in to a ship’s NIPR network and one will likely find  decade old files, repeated, in over a dozen similarly named folders: Operations Department, Ops, Operations, Ops Dept, OS1’s Folder, etc… Perhaps, those folders will have subfolders of the same name down 20 deep in series. Poor organization leads to inefficiency; inefficiency requires time, bandwidth, and exposure that should go towards the survival of the force and the success of operations. Ships need to treat their networks as they do their home desktops, organizing their material in a sensible way and deleting wrong, obsolete, or useless files.

Organization becomes the key to minimizing the need to go off-ship: well organized tech pubs, updated instructions in intuitive places, and personnel willing to spend the minute to search . A badly organized NIPR network is a reflection of how the navy treats the rest of its data: sloppily. We have seventeen sources pinging a ship for the same information that is held in 8 PowerPoint trackers, 2 messages, at least one call over the voice circuits, and 30 emails. Today, we expect every sailor to be at least an LS1 of the data-GSK, without giving them the tools or support to be so. One could drastically decrease the need to go off-ship for information by teaching sailors how to do a proper “ctrl-f” search or assigning an IT2 to deleting the ¾ of the network dedicated to obsolete files, animated .gifs, and 12 years of sea-and-anchor PowerPoints. Better training must exist not only in how to use data and of what kind, but how to properly disseminate/find it as well.

The battlefield equivalent of how we treat our data is sending soldiers into combat with a dozen different weapons from over the past century, but hiding them, their magazines, and their ammunition randomly throughout the base in mis-labeled boxes.  Like a poorly organized supply system, perceived “lost items” that are merely hidden end up wasting bandwidth on downloads, emails, and voice traffic as sailors work to solve the problems whose answers are merely in the 20th sub-folder down or in the inbox of the department head who doesn’t read his email. We must worry almost as much about the organization of our data as we do our organization of physical objects.

 

DOMINATE THE OODA LOOP

 

Survival often depends on an ability to use the enemy’s expectations of your methods against them. Some have suggested the navy embrace a wider range of bandwidths for communication; while true, more drastic measures are necessary to navigate the EM-cyber commons. In 2002, LtGen Paul Van Riper became famous for sinking the American fleet in a day during the Millennium Challenge exercise; he did so by veiling his intentions in a variety of wireless communications. We assume wireless to mean the transfer of data through the air via radio signals, but lights, hand signals, motorcycle couriers, and the like are all equally wireless.  These paleo-wireless concepts are just what we need for flexibility and security in the EM environment.

Combot vulnerabilities to wireless hacks are of particular concern to warfighters. Data connections to operators or potential connections between combots and ships serve as a way for enemies to detect, destroy, or even hijack our assets.  While autonomy is the first step in solving the vulnerability of operator connections, combots in the future must work as communicating teams. Fewer opportunities should be provided for subversion by cutting the long link back to the operator while maintaining the versatility of a small internally-communicating team. However, data communication between combots could still be vulnerable. Therefore, combots must learn from LtGen Van Riper and move to the wireless communications of the past. Just as ships at sea communicate by flags and lights when running silent or soldiers might whisper or motion to one another before breaching a doorway, combots can communicate via light, movement, or sound.

Unlike a tired Junior Officer of the Deck with a NATO code-book propped open, computers can almost instantly process simple data. If given the capability, a series of blinking lights, sounds, or even informative light data-transmissions  could allow combots of the future to coordinate their actions in the battlefield without significantly revealing their position. Combots would be able to detect and recognize the originator of signals, duly ignoring signals not coming from the combot group. With the speed and variation of their communications, compressed as allowed by their processing power, combots can move through the streets and skies with little more disruption than a cricket, lightening bug, or light breeze. High- and low-pitch sounds and infrared light would allow for communications undetectable to the average soldier or an enemy EW platform.

One must also accelerate faster than the enemy’s OODA loop can process. In the cyber realm, the enemy is often software long-ago released by its human creators. Like the missile warfare that inspired AEGIS, cyber warfare is both too vast and too fast for human reaction. Capital investment would concentrate more money in autonomous and innovative defensive programs: 10th Fleet’s AEGIS. Proactive patrol and detection can be done with greater advancements in adaptive self-modifying programs; programs that can learn or understand context are far more appropriate.  Recent developments in computing systems point to organic systems that could “live” in the systems they defend. Biological processors and organic computing allow for hardware that thinks and learns independently, potentially giving defensive networks the added advantage of an instinct and suspicion. Imagine the vast new horizons in the OODA loop of defensive cyber systems with hubs sporting the defensive animal instinct and the ability to re-wire their own hardwareQuantum computing also hovers over the horizon, with not only vast consequences for computing speed, but he whole cryptological offense-defense equation. The image painted is dramatic and far-off, but modest investment and staged introduction would serve as a better model than the dangerous possibility of a “human wave” mode of thinking. With fluid cyber-defense systems guarding more disciplined communicators, the US Navy can crush ambushes in the invisible commons.

 

ACTING LIKE IT

 

We will never be able to completely control the invisible commons; it is too heavily populated and easily influenced. Those conflicts held within vision are often confusing enough; the invisible becomes infinitely harder to master. However, if we minimize unnecessary exposure, organize ourselves well, and move with aggressive speed and unpredictability, our convoys of data will survive their long mili-second journey across the EM-cyber sea. ADM Greenert is right in saying the EM-Cyber world is a new field upon which battle must be done. However, while we may have realized it, we must start acting like it.

Matt Hipple is a surface warfare officer in the U.S. Navy.  The opinions and views expressed in this post are his alone and are presented in his personal capacity.  They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.

 

From Epipole to Cyber War

Walls and Counter-Walls
Walls and Counter-Walls

From The Jaws of Victory

In the Peloponnesian War, the 414 BC final battle of Epipole showed the pitfalls of an over-reliance on communications and single circuits. During this last battle of the Athenian siege of Syracuse, the Syracusans countered the attempt of Athens to wall in the city by building a counter-wall in the projected path of Athen’s efforts. The Syracusans had gained a critical blocking position, and Athenian General Demosthenes concocted a plan to dislodge the defenders. The Athenian forces stalled during the daytime battles outside the counter-wall, when their enemies could easily observe and rally against them, so General Demosthenes planned t strike the counter-wall at night. The well-organized nighttime Athenian attack completely overwhelmed and nearly destroyed the first Syracusan garrison. As the alarm sounded, the Athenians rushed forward without allowing themselves time to re-organize and re-identify. When the first real resistance was met, the ensuing disaster captured by Thucydides is worth citing in full:

IFF degrades to, "is this person stabbing me in the face?"
Primative IFF:  “is this person stabbing me in the face?”

“Although there was a bright moon they saw each other only as men do by moonlight, that is to say, they could distinguish the form of the body, but could not tell for certain whether it was a friend or an enemy. Both had great numbers of heavy infantry moving about in a small space. Some of the Athenians were already defeated, while others were coming up yet unconquered for their first attack. A large part also of the rest of their forces either had only just got up, or were still ascending, so that they did not know which way to march. Owing to the rout that had taken place all in front was now in confusion, and the noise made it difficult to distinguish anything. The victorious Syracusans and allies were cheering each other on with loud cries, by night the only possible means of communication, and meanwhile receiving all who came against them; while the Athenians were seeking for one another, taking all in front of them for enemies, even although they might be some of their now flying friends; and by constantly asking for the watchword, which was their only means of recognition, not only caused great confusion among themselves by asking all at once, but also made it known to the enemy, whose own they did not so readily discover, as the Syracusans were victorious and not scattered, and thus less easily mistaken. The result was that if the Athenians fell in with a party of the enemy that was weaker than they, it escaped them through knowing their watchword; while if they themselves failed to answer they were put to the sword. But what hurt them as much, or indeed more than anything else, was the singing of the paean, from the perplexity which it caused by being nearly the same on either side; the Argives and Corcyraeans and any other Dorian peoples in the army, struck terror into the Athenians whenever they raised their paean, no less than did the enemy.”

In Sicily, the simple task of a man not stabbing his own ally in the face with a sword was hard enough with only primordial Identification Friend or Foe (IFF) and comms. In today’s high-speed remote-control warfare and vulnerable high-tech comms, in which seconds can mean life-or-death, the potential to accidentally destroy a friend, miss an enemy, or become isolated is even greater. When the enemy knows the “watch-words,” this potential becomes a certainty as paranoia and confusion set in.
 
The Offense Challenge

 

The defender often has the simpler fight. As illustrated in the excerpt and so aptly explained by the indomitable Chesty Puller, “So they’ve got us surrounded, good! Now we can fire in any direction, those bastards won’t get away this time!” The U.S. Navy, in its typical role as the expeditionary power, will almost always have that offense-disadvantage. It has yet to fight an enemy that can attack the precious network of communications that creates such an unspeakable force multiplier in the field. When the network is attacked, the swarm of American ships, missiles, and aircraft itself becomes a liability, as were the Athenians who cut apart their own brothers ahead of them.
 
Protecting Less with More
 
The solution to the communication weakness is to stay ahead of the offense-defense struggle through aggressive capital investment and streamlined lines of communication. As with the use of setting AEGIS doctrine to auto-respond to anti-ship missile (ASM) threats, cyber-warfare is far too fast for human operators. Our virtual-defense infrastructure may be significant, but it is slow, human, and defending far too many unnecessary and redundant communications. A response is a smarter investment in cyber-defense capital and a more disciplined use of our vital communications networks.

"We got the info via e-mail? Good! Bill, request a message. Susanne, request it be added to three status and SITREP messages. I'll request voice reports on two different circuits. I'll also need 6 of you to chat them every 3 minutes from your individual accounts. After that, we'll send a powerpoint for them to update. Also, one of you be sure to forget this is high-side information and constantly ping them until they cave and email it from Gmail. Get to it, people!"
“We got the info via e-mail? Good! Bill, request a message. Susanne, request it be added to three status and SITREP messages. I’ll request voice reports on two different circuits. I’ll also need 6 of you to chat them every 3 minutes from your individual accounts. After that, we’ll send a powerpoint for them to update. Also, one of you be sure to forget this is high-side information and constantly ping them until they cave and email it from Gmail. Get to it, people!”

Streamlining comes from bringing all communications under control, or more accurately bringing under control those using them. We are the Athenians screaming our watch-word at one another because no one bothered to re-organize before charging in. It boils down to paying attention and staying calm; what we have is seventeen sources pinging a ship for the same information that is held in 8 PowerPoint trackers, 2 messages, at least one call over the voice circuits, and 30 emails with at least half the lazy people asking for the information in the CC line. The sheer bandwidth of material that needs protection and monitoring could be decreased with a “ctrl-f” search of email and message traffic. It also leaves a veritable treasure-trove of information lying around in hundreds of different locations, making it easier to steal or detect. Better training – not only in proper communications procedures/methods, but basic computer literacy, – could solve this problem.

Unfortunately, people are not as good at defending us from cyber attack as John McClane might have you think.
Unfortunately, no matter what Hollywood would have you believe, most cyber attacks can’t be defeated by John McClane.

The speed of cyber-attacks only allows the “labor” side of the equation to be reactive; capital investment would concentrate more money in autonomous and innovative defensive programs: 10th Fleet’s AEGIS. Proactive patrol and detection can be done with greater advances in adaptive self-modifying programs and programs that can learn or understand context.  Recent developments in computing systems point to more organic systems that can”live” in the systems they defend. Biological processors and organic computing allow for hardware that thinks and learns independently, potentially giving defensive networks the added advantage of an instinct and suspicion. The development of mutable indium antimonide magnetic processors mean that the circuit hardware of a device may now be as mutable as the software running it. Imagine the vast new horizons in the OODA loop of defensive cyber systems  with hubs sporting the defensive animal instinct and the ability to re-wire their own hardware. The image painted is dramatic and far-off, but modest investment and staged introduction would serve as a better model than the dangerous possibility of a “human wave” mode of thinking. With better fluid cyber-defense systems guarding more disciplined communicators, the U.S. Navy can guard its forces against Epipolaes.

Matt Hipple is a surface warfare officer in the U.S. Navy. The opinions and views expressed in this post are his alone and are presented in his personal capacity. They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.