Download as pdf or txt
Download as pdf or txt
You are on page 1of 61

Army Cyber Resilience 21 • Giant Leaps in Space 31 • Globalizing Cybersecurity 37

SA Dis
TC ru
O pti
M ve
Ri
se
AFCEA’S INTERNATIONAL JOURNAL • AUGUST 2020 • $5.00 s

ARMY/MULTIDOMAIN
OPERATIONS
Collaborative Combat From the Ground Up

Cover-AUG20.indd 1 7/21/20 3:19 PM


Shutterstock/metamorworks
INTRODUCING
SIGNAL Kids!
AFCEA’s STEM PUBLICATION
AFCEA'S STEM PUBLICATION
THE SIGNAL Kids is a magazine written
INTERNET
OF THINGS for elementary school students
ages 8-12, offering them career
ideas, age-appropriate technology
stories, games and fun facts with
a focus on science, technology,
engineering and mathematics.
SPONSORED BY
The publication also features kid
reporters who share their relatable
vantage point with young readers.
SIGNAL, FEBRUARY 2020 | Official Publication of AFCEA 1

Go to url.afcea.org/SIGNALforKids to read the digital version of SIGNAL Kids.

For information on sponsoring the next issue of SIGNAL Kids, contact Bodil Lund, blund@afcea.org


FEDERAL
IDENTITY
FORUM AND EXPO • 2020
September 8 – 11, 2020 • Virtual Collaboration Event

The Federal Identity Forum (FedID) is the U.S. federal government's


primary outreach and collaboration-building event with the identity
community worldwide. This annual event promotes a comprehensive
understanding of current capabilities, pending needs, market trends
and future directions. The goal is to advance public-private and
cross-discipline collaboration to improve the application of identity
and access management disciplines across all mission spaces.

FedID-Cover2-AUG20.indd 1 7/20/20 5:26 PM


SEE THE BATTLESPACE
FROM A BETTER ANGLE.
ALL OF THEM.

Keeping you connected with 360-degree situational awareness is critical, now


more than ever. For dismounted warfighters on the ground to pilots supporting
from the sky, Viasat's BATS-D AN/PRC-161 radio brings a common operational
picture to those who need it most - even in highly contested environments.

BATS-D — the world’s only handheld Link 16 radio.


Learn more at viasat.com/batsd-2

Signal0820.indd 1 7/20/20 5:21 PM


Network Attached
Storage
ON THE

Tactical Edge

RUGGED. TRUSTED. SECURE.


Protect your critical data from malicious cyber threats in
forward deployed conditions with our rugged integrated
network attached storage (NAS) system. This revolutionary,
high-performance storage solution provides FIPS 140-2
certified data encryption with near-zero latency, instant
data destruction and integrated key management for
secure data protection. Our customizable cybersecurity
fly-away-kit meets NIST, FIPS and NIAP standards while
providing rugged, leading-edge storage, compute
capacity and networking capable of securing top-secret
data at the tactical edge. 

SERVERS | DISPLAYS | STORAGE | NETWORKING | EMBEDDED | CYBER


info@crystalrugged.com | 800.378.1636 | crystalrugged.com

Signal0820.indd 2 7/20/20 5:21 PM


AUGUST 2020 / Volume 74, No. 12

Multidomain
Maneuvering
The U.S. Army has a
big stake in reshaping
the force to conduct
multidomain
operations.
PAGE 14

ARMY/MULTIDOMAIN DISRUPTIVE SATCOM


OPERATIONS
28 Technology
14 The Army Shapes Joint Drives New Satellite
All-Domain Operations Communications
The service’s Futures and SPONSORED
Concepts Center is taking
Capabilities CONTENT

its multidomain concept The democratization


of space is underway SPECIAL
to the joint level. INTEREST
in orbit above the Earth.
By Kimberly Underwood EDITORIAL

17 Aligning the Tactical 31 Military Aims to 40 Getting the


Network with Joint Urgently Provide Disruptive Whole Picture
All-Domain Warfighting Satellite Capabilities with Next
Army leaders are making
The year-old Space Generation 911
Development Agency Mobile device
sure the integrated tactical
emphasizes speed in pursuing capabilities make
network fits into joint plans
for multidomain operations. innovative space capabilities. first responders
more efficient,
21 Army Gears Up To 34 NRL Extends situationally
Battle for Cyber Resilience Autonomous Satellite aware.
ARL research taps existing Tracking Ability 42 Multi-Domain
areas while breaking new The Navy’s Blossom Point
ground. By Robert K. Ackerman site adds remote antennas. Secure Systems
Aid Remote
25 Army Adds Element CYBER Government
of Surprise to 37 Leaders Seek a Grand Workers
Technology Search Strategy for Cybersecurity Devices let
Officials never know Geopolitics in an online at-home workers
what they will get world are defined by what’s securely access
with xTechSearch. changed and what hasn’t. classified data.
By George I. Seffers By Shaun Waterman

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 3

Signal0820.indd 3 7/22/20 9:32 AM


Army Cyber Resilience 21 • Giant Leaps in Space 31 • Globalizing Cybersecurity 37
SA Dis
TC ru
O pti
M ve
Ri

On the Cover
se
AFCEA’S INTERNATIONAL JOURNAL • AUGUST 2020 • $5.00 s

Soldiers from the U.S. Army’s 56th Stryker


Departments
Brigade Combat Team take part in a nighttime
combined arms live-fire exercise in North 6 Behind the Lines
ARMY/MULTIDOMAIN
OPERATIONS
Macedonia. Combined training is part of the
effort to bring forces to bear into multidomain 8 SIGNAL Today
operations. Cover design by SIGNAL Art Director
10 Disruptive
Collaborative Combat From the Ground Up

Chris D’Elia based on U.S. Army photography by


Staff Sgt. Frances Ariele L. Tejada, USA. By Design
A Signal Protection Plan to
Raise the Noise Floor

11
By Maj. Ryan Kenny, USA

11 NewsNet
12 Career
Progressions
13 President’s
Commentary
Cyber Resilience
Looms Large Everywhere
By Lt. Gen. Robert M. Shea,
USMC (Ret.)

45 ProductQuest
47 Association News
47 AFCEAN of
the Month
53 International
Chapter News
55 Advertiser Index
56 Incoming
53



How to Prime the
Innovation Pump
By Maj. Gen. Jennifer Napper,
USA (Ret.)

SIGNAL (ISSN-0037-4938) (USPS 496-300) is published monthly by AFCEA International at 4114 Legato Road, Suite 1000, Fairfax, Virginia 22033-4002, (703) 631-6100. Toll-free
(800) 336-4583. For direct-dial numbers to specific departments, see Association News. Subscription rate to nonmembers of AFCEA, 1 year (12 issues) $59. To foreign post
offices, $82. Single copies: $5 each, plus postage. Domestic postage: $2.00 for the first issue; $1.00 for each additional. AFCEA membership dues: $50 per year, $20 of which
is for a subscription to SIGNAL; student rate is $15, $7 of which is for subscription to SIGNAL. Periodicals postage paid at Fairfax, Virginia, and at additional mailing offices. Posted under
Canada Post Publications Mail Agreement #40612608. GST No. 87364 3266 RT0001. Canada returns to be sent to IMEX Global Solutions, P.O. Box 25542 London, ON N6C 6B2. POSTMASTER:
Send address changes to SIGNAL, AFCEA Service Center, 4114 Legato Road, Suite 1000, Fairfax, Virginia 22033-4002. Authors are entirely responsible for opinions expressed in articles appearing
in AFCEA publications, and these opinions are not to be construed as official or reflecting the views of AFCEA International. The name SIGNAL ® and The Cyber Edge® are registered in the U.S.
Patent and Trademark Office. All rights reserved. Copyright 2020 by AFCEA International. Copyright is not claimed in the portions of this work written by government employees within the scope of
their employment. Reproduction in whole or in part prohibited except by permission of the publisher. The publisher assumes no responsibility for return of unsolicited manuscripts or art. Change of
mailing address: by email, include subscriber name, old and new addresses, to service@afcea.org, by phone at (703) 631-6158, or online by accessing your profile at www.afcea.org/portal. See login
instructions on screen under “Public Message.” Allow 3 weeks for delivery of first copy. Microfilm copies of SIGNAL may be obtained from National Archive Publishing Company, www.napubco.com,
300 N. Zeeb Road, Ann Arbor, MI 48106. Article reprints can be purchased through the editorial department, signal@afcea.org.

4 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 4 7/21/20 3:21 PM


Signal0820.indd 5 7/20/20 5:22 PM
Behind the Lines
AFCEA’s INTERNATIONAL JOURNAL

In this issue Chairwoman of the Board


DeEtte Gray
“Our network moderniza- Publisher
tion efforts will enable joint Lt. Gen. Robert M. Shea,
USMC (Ret.)
all-domain command and
control (JADC2) capability.” Associate Publisher
Vice President, SIGNAL Media
—Brig. Gen. Robert Collins
Beverly Mowery Cooper
(USA), program executive
officer for Command, Control,
Communications-Tactical page 17
A New Battlefield Paradigm EDITORIAL

A
Senior Director, SIGNAL Media
rmies always have been at the center of mili- Editor in Chief
tary operational planning, as nations have Robert K. Ackerman
defined victory in battle by the occupation
Director, Content Development
of land using their own forces. But today’s
Executive Editor
U.S. Army is more than just a land force. As with the George I. Seffers
other services, it operates in more than one domain.
And now, multidomain operations are redefining Senior Editor
modern militaries. Kimberly Underwood
This new paradigm goes beyond simply dipping Contributing Editors
a toe into a new body of water. Instead of using Maj. Gen. Jennifer Napper,
other domains to support its operations, the Army USA (Ret.)
is melding all other domains into a single entity.
Here a Sat, This multidomain approach is designed to exploit all
Henry S. Kenyon

There a Sat playing fields to the fullest.


And, of course, the other services are involved.
Shaun Waterman
Editor at Large
PAGE 28 The concept of multidomain operations brings the Clarence A. Robinson Jr.
Air Force, the Marine Corps, the Navy and the
Space Force into play. The quest for joint operations Technical Adviser
seems quaint in comparison with the need to incor- Dr. R. Norris Keeler
porate these diverse forces into a multidomain activ-
“You used to have to wait ity. Yet, peer competitors such as China and Russia PRODUCTION
a year or longer and spend already are using emerging technologies to combine Director, Editorial Production
an exorbitant amount of their forces into a broadly interoperable entity. Cyndy Hogan
money to go out and buy a One domain that does not have its own dedicated
force yet is cyber, and it may play the biggest role Art Director
radiation-tolerant processor of all in multidomain operations. The U.S. Army Chris D’Elia
that would have all the capa- is striving to develop the networked connectivity Associate Editor
bilities of your calculator. necessary to allow effective multidomain operations. Megan Lee
Now you can go online over- With all the organization required to put together
Assistant Editor
night and buy something a new battlespace force, it still comes down to data. Julianne Simpson
that has all the capabilities The linchpin to success remains information, and
the Army is working to harness that with its own Marketing, Advertising and
of your smartphone.” Communications Coordinator
technological innovations. Information is the key to
—Grant Bonin, senior Bodil Lund
vice president of business all domains in the battlespace.
development, Spaceflight page 28 Social Media Manager
Rachel Lilly
“Having an automated
E-NEWSLETTERS
system can help recover Robert K. Ackerman
the spacecraft easier Senior Director, SIGNAL Media
Editor in Chief
Director, Communications
and faster than a person Maryann Lawlor
sitting in a seat.” ADVERTISING
SIGNAL encourages letters
— Andrew Cox, head, Satellite and to the editor. Submit them
Communications section, Naval to signalnews@afcea.org Director, Advertising
Research Laboratory page 34 Jennifer Deuterman

6 SIGNAL, AUGUST 2020

Signal0820.indd 6 7/21/20 3:28 PM


2021

SAN DIEGO CONVENTION CENTER, SAN DIEGO, CA

February 16–18, 2021 • www.westconference.org

Learn and network while exploring and experiencing the latest platforms,
leading-edge technologies and state-of-the-art networking capabilities
that support the Sea Services' operations. The Western Conference and
Exposition (WEST), co-sponsored by AFCEA International and the U.S.
Naval Institute, presents government, military, industry and academia
senior leaders who gather to discuss emerging systems, platforms and
technologies that will impact all areas of operations. Registration is free for
military and government personnel.

#WEST2021

Signal0820.indd 7 7/20/20 5:30 PM


SIGNAL Today
For links to content on this page, visit news.afcea.org/STAugust20.
White House photo

Photo FIREWORK
of the DISPLAYS
Month A firework display goes off at
the Washington Monument
in Washington, D.C., in July.
The display was part of the
Salute to America event.

Reader Comments SIGNAL Online


“Exciting use case description! Quantum technologies Exclusive online content is posted throughout
are indeed critical to enabling warfighting edge capabilities the month. Here are selected recent items.
using C4ISR. It is interesting to see DoD’s partnerships
thru SBIR-STTR [Small Business Innovation Research and Access to Data Operations Is
Small Business Technology Transfer] to further this agenda.” Key for Indo-Pacific Operations
—Jatin Singh in response to “Quantum Technologies Suit Up for the Pacific Air Forces leaders call for improved communi-
Battlefield,” June SIGNAL. cations and information in a challenging region.
“My interest is investing in, and promoting, buy and China’s Long March to Telecommuni-
hold stratagies for publicly traded companies that support
national defense, national security and the DHS critical cations Primacy Picks up the Pace
infrastructure sectors, so it was thought provoking (and Chinese telecommunications technology
helpful) to consider the realignment of the NCTC [National is not being welcomed with open arms
Counterterrorism Center] from a mission perspective.” around the world, but alternatives are few.
—BW Schulz in response to “Counterterrorism Methods Space Force Sends Additional
Refocused to Acheive Greater Clarity,” June 2, SIGNAL Online.
GPS Capability into Space
“The languages you code in are the tools you use. The skill The third launch of the GPS III system
is knowing how to solve problems, then you choose the adds performance and protection.
appropriate tools to implement your solution. COBOL is
appropriate for a lot of business problems.”—Julian in response to Join us at SIGNAL online, Twitter and Facebook
“Aging Workforce Brings on COBOL Crisis,” The Cyber Edge, July SIGNAL. to participate in SIGNAL Today conversations.

8 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 8 7/20/20 5:31 PM


ACCESS THIS FREE WEBINAR
www.afcea.org/signal/webinar

Legacy PBX Migrations


and Connecting Dial Tone
(aka Direct Routing)
to Microsoft Teams
The public sector needs modern and scalable alternatives to legacy PBXs. In many
cases, Microsoft Teams is becoming the preferred alternative since so many are al-
ready leveraging it for video calls, screen share, chat and file sharing. The recent health
crisis has dramatically accelerated this adoption and IT teams suddenly have a trained
user community, ready and willing to expand their use of Teams to include making
and receiving phone calls. Ribbon can help departments and agencies securely mi-
grate communications to Teams, either immediately or over time, enabling you to
use Teams as a primary solution, as part of a long-term migration, or in concert with
Ribbon’s own Microsoft- and JITC-certified call servers that support Direct Routing
for Teams. Regardless of the deployment model, the same Ribbon assets can be de-
ployed and easily redirected as the communications environment evolves. This webi-
nar will help staff learn about securing communications with Microsoft Teams Direct
Routing and legacy PBX migrations:
• What phone system features SPEAKER:
can Microsoft Teams deliver? WILLIAM
GRABNER
• Is Microsoft Direct Routing secure? VP of Ribbon
• Can you keep your PBX and Federal Sales
use Teams for phone calls?
• Is there a way to enhance SPEAKER:
Teams calling services? BRAD
• Where is a Session Border CHALKER
Controller required? Sr. Principle
Product Manager
• How do organizations move
forward without starting over?
MODERATOR:
GEORGE I.
SEFFERS
Executive Editor
SIGNAL Magazine

HOSTED BY

Signal0820.indd 9 7/20/20 5:31 PM


Disruptive By Design

A Signal Protection Plan to Raise the Noise Floor

A
recent posting of a satellite image
from the U.S. National Training
Center by Col. Scott Woodward, BY MAJ. RYAN KENNY, USA
USA, raised a lot of eyebrows. The Maj. Ryan Kenny, USA, created an online
image shows a cluster of electromagnetic forum to foster discussions on emerging tech-
signals emitted from a battalion-sized nologies at www.militarycommunicators.org.
unit participating in a large-scale training The views expressed here are his alone and do
event. These signals were captured as part not represent the views and opinions of the
Defense Department, U.S. Army or other orga-
of the exercise from more than 10 kilome-
nizations with which he has had an affiliation.
ters away. This picture showed what many
of us already know: we have an electro-
contact: Maj. Ryan Kenny, ryankenny@militarycommunicators.org
magnetic emission discipline problem.
Because we did not fear large-scale
attacks on known command posts in Afghanistan and detection. Military communicators and electromagnetic
Iraq, we did not worry about blaring electromagnetic experts should be integral members of any planning effort
signals from satellite terminals, tactical radios or the doz- to revise doctrine or develop new tactical approaches.
ens of locally purchased cellphones our forces used. Nor To minimize signals, the military will need industry’s
did we worry about an adversary using unmanned aer- help. To ensure we always plan for the next contest, we
ial vehicles to deploy sensors from afar. However, times should assume the worst when it comes to signal detection,
have changed. As we prepare for the next fight, we must and system requirements should have safeguards baked in.
demand a strategy to protect our forces from signal By masking the electromagnetic signature of our units,
detection. in-depth, we can challenge an adversary to find the high-
Sophisticated long-range sensors paired with powerful est-value assets during the first volley. Presenting layers of
new data analytics tools increase the likelihood of long- noise may help hide the signals that matter most and pre-
range detection. Any device that emits electromagnetic serve combat power for response efforts. Every long-range
energy presents detectable patterns of fluctuations and shot matters, and counter-battery tactics will be critical in
pulses within a given radio frequency range. Engineers the early phases of most fights.
design antennas to propagate radio waves omnidirec- To fight and win in a contested electromagnetic domain
tionally, or focused into a directional beam. What affords will require new tactics to confuse an adversary’s sensors
long-range communication also enables long-range and analytical tools continuously. The future of the elec-
detection. tromagnetic fight will also demand the ability to adapt new
Machine learning systems that detect signals from means of detecting ever-evolving signal patterns rapidly.
electromagnetic noise have proven their worth. From Likewise, avoiding detection requires new techniques and
radiologists searching for anomalies to credit card com- tactics for deploying, operating and maneuvering emitters.
panies looking for fraud, these tools have taken signal We may still own the night, but we may be losing the
detection to a level previously unimagined. These same electromagnetic domain. The risk of detection is real, and
methods can find and target radio-frequency emissions. countermeasures are increasing due to advances in sen-
Because of these new signal detection capabilities, the sor proliferation and machine learning. To adapt to and
military must develop a whole-of-force strategy to pro- overcome these challenges, the Defense Department needs
tect combat forces from electromagnetic detection and a plan to dominate the electromagnetic domain, minimize
targeting. I believe this effort will require four essential emissions, mask signals and continuously present patterns
goals: dominate the spectrum, minimize signals, mask in of emission that confuse our adversaries’ detectors. The
depth and continuous passive obfuscation. time has come to raise the noise floor.
To dominate the electromagnetic domain, the best
defense may be a great offense. We cannot allow an adver- Disruptive by Design explores innovation and
sary to detect signals from our high-value targets. Tacti- ideas with the potential to expand capabilities
cal planners should know the ranges of adversary signal and revolutionize products, services and behaviors.
detection capabilities and the offset required to prevent For more information, visit url.afcea.org/YoungAFCEAN.

10 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 10 7/20/20 5:32 PM


NewsNet
LLNL

Moving Forward
with Agile Combat
The U.S. Air Force is moving forward
with its concept of Agile Combat
Employment as a way to increase its
force generation capabilities in a con-
tested environment. The Pacific Air
Forces (PACAF) under Gen. Charles
Q. Brown, USAF, who is moving into
his role as the chief of the Air Force
on August 6, replacing a retiring Gen.
David Goldfein, USAF, began looking
at how to engage small groups of multi-
functional airmen to increase capabili-
LLNL Breaks Ground ties in the Indo-Pacific region last year.
PACAF has already conducted train-
on Exascale Computing ing of airmen in this so-called Agile
Combat Employment concept, which
Facility Modernization Project is designed to shift operational-level

U.S. Air Force photo by Staff Sgt. Heidi Goodsell


forces into smaller, tactical-level forces.
The National Nuclear Security Administration’s (NNSA’s)
Lawrence Livermore National Laboratory (LLNL) has broken
ground on its Exascale Computing Facility Modernization
project. It will substantially upgrade the mechanical and
electrical capabilities of the Livermore Computing Center. The
upgrades will enable the facility to provide exascale-class service
(supercomputers capable of at least one quintillion calculations per
second) to the NNSA laboratories: LLNL, Los Alamos and Sandia.

DHS Funds U.S. Small Business Research


More than two dozen research contracts have been awarded
to 23 small businesses to participate in phase one of the
U.S. Air Force photo by Staff Sgt. Ashley Hawkins/Released

Department of Homeland Security Science and Technology


Directorate’s Small Business Innovation Research program.
Each project will receive up to $150,000 to conduct proof-
of-concept research over a six-month period to address spe-
cific homeland security technology needs. The research and
development topics the contracts cover include development
of the Next Generation 911 multimedia content analysis
engine capability for the Emergency Communications Cyber
Security Center; a remote sensor data protection and anti-
spoofing technology; an in-building coverage analysis system
using the existing first responder’s radio and smartphone;
and a machine-learning module for detection technologies.

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 11

Signal0820.indd 11 7/20/20 5:32 PM


Career Progressions

Military Brig. Gen. Patrick D. Frank, USA,


has been assigned as chief of staff,
USA, has been assigned as deputy
director for operations, National
U.S. Central Command, MacDill Joint Operations Intelligence Center,
Brig. Gen. Larry Q. Burris Jr., Air Force Base, Florida. Operations Team One, J-3, Joint Staff,
USA, has been assigned as director, Washington, D.C.
CJ3, Combined Joint Task Force- Col. Phillip N. Frietze, USMC, has
Operation Inherent Resolve, been nominated for appointment to Col. Forrest C. Poole III, USMC,
Operation Inherent Resolve, Iraq. the rank of brigadier general.   has been nominated for appointment
to the rank of brigadier general. 
Col. Adam L. Chalkley, USMC, has Sgt. Maj. Jody J. Hall, USA, has
been nominated for appointment to been assigned as the command Brig. Gen. Andrew D. Preston, USA,
the rank of brigadier general.  senior enlisted leader for the Special has been assigned as chief of staff, U.S.
Operations Command, South, Army Pacific, Fort Shafter, Hawaii.
Brig. Gen. Robert S. Cooley Jr., Homestead Air Reserve Base, Florida.
USAR, has been assigned as chief Col. Ryan S. Rideout, USMC,
of staff (Individual Mobilization Maj. Gen. Karsten S. Heckl, USMC, has been nominated for appointment
Augmentee), U.S. Army Reserve has been nominated for appointment to the rank of brigadier general.
Command, Fort Bragg, North to the rank of lieutenant general and
Carolina. assigned as commanding general, Maj. Gen. Andrew M. Rohling, USA,
I Marine Expeditionary Force. has been assigned as commanding
Maj. Gen. Dennis A. Crall, USMC, general, U.S. Army Africa/Southern
has been nominated for appointment Maj. Gen. Diana M. Holland, USA, European Task Force, Italy.
to the rank of lieutenant general has been assigned as commanding
and assigned as director, command, general, Mississippi Valley Division, Lt. Gen. Steven R. Rudder, USMC,
control, communications, and U.S. Army Corps of Engineers, has been assigned as commander,
computers (C4)/cyber, and chief Vicksburg, Mississippi. U.S. Marine Corps Forces Pacific,
information officer, J-6, Joint Staff. and commanding general,
Col. (P) Mark J. Hovatter, USA, Fleet Marine Corps Forces Pacific.
Lt. Gen. Lewis A. Craparotta, has been assigned as deputy director,
USMC, has been assigned as plans and strategic integration, J-5, Brig. Gen. Thomas J. Tickner,
commanding general, Training and U.S. Africa Command, Germany. commanding general, USA, has been
Education Command. assigned as commanding general, North
Col. Peter D. Huntley, USMC, has Atlantic Division, U.S. Army Corps of
Brig. Gen. Robert B. Davis, USA, been nominated for appointment to Engineers, Brooklyn, New York.
has been assigned as chief of staff, U.S. the rank of brigadier general.  
Army Central, Shaw Air Force Base, Maj. Gen. Richard M. Toy, USA, has
South Carolina. Maj. Gen. David T. Isaacson, USA, been assigned as chief of staff, United
has been assigned as chief of staff, Nations Command, Republic of Korea.
Maj. Gen. Christopher T. Donahue, U.S. Cyber Command, Fort Meade,

Industry
USA, has been assigned as Maryland.
commanding general, 82nd Airborne
Division, Fort Bragg, North Carolina. Brig. Gen. Mark H. Landes, USA, has
been assigned as commanding general, Redhorse Corporation,
Brig. Gen. David S. Doyle, USA, First Army Division East, Fort Knox, Washington, D.C., has
has been assigned as commanding Kentucky. named John Zangardi
general, Joint Readiness Training as president.
Center and Fort Polk, Fort Polk, Maj. Gen. David W. Ling, USAR,
Louisiana. has been assigned as commanding
general (Troop Program Unit),
Maj. Gen. Scott L. Efflandt, USA, 79th Theater Sustainment Command, SES, Luxembourg, has named Thai
has been assigned as commanding Los Alamitos, California. Rubin as chief legal officer.
general, 1st Armored Division and
Fort Bliss, Fort Bliss, Texas. Col. Julie L. Nethercot, USMC, DTS, Arlington, Virginia, announces
has been nominated for appointment Col. Brian Sims, USAF (Ret.), as direc-
Col. Kyle B. Ellison, USMC, to the rank of brigadier general.  tor of operations and Derek Kernus
has been nominated for appointment to support business development and
to the rank of brigadier general.  Brig. Gen. Frederick M. O’Donnell, information technology operations.

12 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 12 7/20/20 5:32 PM


President’s Commentary

Cyber Resilience Looms Large Everywhere


BY LT. GEN. ROBERT M. SHEA, USMC (RET.) to come to grips as a nation and consider our interna-

F
tional partners if we are to grasp the full meaning of cyber
or many, the issue of cyber resilience conjures up resilience.
thoughts of conducting military operations in a denied Industry and government must rise to the task with fresh
environment. But the COVID-19 pandemic has added thinking on partnerships, perhaps going as far as govern-
another dimension. The importance of cyber resil- ment investing in key private sector technologies to ensure
ience to everyday activities we remain competitive in the information domain.  Ulti-
has been illustrated through the mately, for their part, industry and academia will continue
changes wrought by the corona- to develop the necessary new technologies. To reiterate, a
virus. As the need for online tele- strategic planning approach across government, industry
work and related efforts continues and academia is vital.
to expand, so do the attack vectors The cyber-resilient network must be ubiquitous with
leveraged by cyber marauders. the ability to rapidly identify, isolate and withstand attacks
Any organization must have using multiple tools and techniques. It must avail itself of
the ability to perform its mission machine learning that enables the network to identify and
despite adversity, especially in a respond quickly to anomalies with limited human involve-
work environment threatened by ment and allows new technologies to be rapidly inserted. 
cyber attacks or lack of informa- A pair of studies conducted by the National Security Tele-
tion technology network resiliency. communications Advisory Committee (NSTAC) over the
These challenges need not be brought about exclusively by past two years could provide the framework for a valuable
nefarious actors. As an example, adverse network effects can path forward. The 2018 NSTAC Report to the President on
be the result of shortcomings in network design, engineer- a CyberSecurity Moonshot and the 2019 NSTAC Report on
ing and implementation. In parts of the United States, the Advancing Resiliency and Fostering Innovation in the iCT
productivity of teleworkers is diminished and schools can- Ecosystem lay out sound ideas for moving forward with a
not effectively conduct remote classes because of the lack carefully designed cyber infrastructure that is both resilient
of sufficient bandwidth. Emergency responders and law and secure. It is time to revisit these studies and implement
enforcement also are affected by the efficacy of cyber opera- many of their recommendations.  
tions. In short, many people cannot access the bandwidth If information is to be the dominant strategic asset
they need for daily life. we expect, we need to rally to this ideal at all levels of
In the aggregate, these shortcomings affect national secu- national power. This effort needs to include identifying
rity through their economic, societal and educational rami- the key technologies in which we must invest. We have
fications. The impact of COVID-19 has given us reason to done this before. President Dwight D. Eisenhower ral-
reconsider the critical nature of the telecommunications lied the necessary expertise and organization to build the
and computing infrastructure. interstate highway system and the St. Lawrence Seaway,
Overall, COVID-19 has awakened the public to the fact that and President John F. Kennedy mobilized the engineering
we are not where we need to be in terms of cyber resilience. and scientific communities nationally to land a man on
We remain highly vulnerable, and we need a strategic plan the moon in less than a decade. All were bold efforts with
going forward to address the shortcomings. Our information strong leadership.
networks often have evolved without broad national security Just as those endeavors generated invaluable spinoffs,
and economic considerations. We must develop a coordinated so too can the design and development of a new network
strategy with integrated actions to fix the problem. focused on security and resilience. Our technology expertise
Additionally, the threat from rogue actors and nation- gives us what we need to accomplish this, and it will produce
states continues to expand. They persist in exploiting lucra- rapid and worthwhile benefits. We cannot tolerate the alter-
tive targets that fail to exercise proper cyber hygiene. Even native. Now is the time to stop talking and start doing.
government cyber efforts are disjointed. You cannot sepa-
rate the Defense Department from the rest of government
and industry, if for no other reason than the interrelation-
ship of the commercial supply chain and the global trans-
portation network demand a more assimilated approach to
developing the needed resiliency. To share or comment on this article
The hard truth about cyber resilience is that it remains go to http://url.afcea.org/August20
elusive without vision and strong leadership. We need

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 13

Signal0820.indd 13 7/20/20 5:32 PM


A U.S. Army soldier stands outside a Humvee before
the start of the Dasman Shield live fire exercise in
Kuwait in February. During the exercise, the military
looked at the beginnings of all domain operations,
including air-to-ground command control, as well
as partner interoperability with Kuwaiti forces.

The Army Shapes Joint


All-Domain Operations
The service’s Futures and Concepts Center is
taking its multidomain concept to the joint level.

T
he message from the intelligence community and top operating concepts and informing doctrine. In supervising
leaders of the U.S. military is clear. The nation is in near- those activities, Gen. Wesley reports directly to Gen. John
peer competition, just underneath the level of outright “Mike” Murray, commander, Army Futures Command.
war. As such, the U.S. military is investing in aligning its “For the last 30 years, we have been the dominant pre-
capabilities and functionality to fight as a Joint force seamlessly eminent force in the world, and we’ve had luxuries during that
across the sea, air, land, space and cyberspace. Along with the time that are now waning,” Gen. Wesley explains. “In the early
other services, the U.S. Army is work- 2000s, when we went to modularity, we became much more
ing to shape the approach of how the BY KIMBERLY BCT-centric in our design methodology and BCTs in the
military will fight in the future under UNDERWOOD COIN [counterinsurgency] environment were fully sufficient
Joint all-domain operations. because they had sufficient power relative to the threats we
For the Army, it may mean a shift from solely a brigade were facing. But in doing that, we got rid of our capability to
combat team, or BCT, focus that worked well in a counterin- add echelon, and we lost to some degree the ability to conduct
surgency environment, to a more flexible force structure above campaign-level operations across the theater.”
the brigade level that enables multidomain operations, says Lt. To address the gaps, the Army has set a goal of achieving
Gen. Eric Wesley, USA, director, Futures and Concepts Center multidomain operations by the year 2028. While it is a tall
(FCC), and deputy commanding general, U.S. Army Futures order, the service is making key strides to achieve this oper-
Command. The FCC is responsible for divining the Army’s ational vision, the director contends. Led by the FCC, the
future operating environment and then deriving the related process starts with designing the conceptual components

14 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 14 7/20/20 5:32 PM


ARMY/MULTIDOMAIN OPERATIONS

of multidomain operations, which the Army released in Nonetheless, to achieve that level of convergence, “there
U.S. Air Force photo by Senior Airman Kevin Tanenbaum

December 2018, and then defining the practices that will is still a lot of work ahead to get that aligned,” the general
guide warfighters across an all-domain battlefield. This suggests. The Air Force’s Advanced Battle Management
would be the doctrine for multidomain operations, which System (ABMS), which the Air Force, Army and Navy
the Army is in the process of creating, he states. first tested last December in a three-day exercise with the
As part of that effort, the general’s team at the FCC is build- U.S. Northern Command, is a start, the general says, “but
ing the operations and organizations, known as ONOs, and the next step is what’s under the hood. And what we aren’t
is coordinating that development with the Combined Arms clear on is how the Air Force systems connect with ours
Center (CAC), which is led by Lt. Gen. James
Rainey, USA, who also is the commander of
Fort Leavenworth.
“We’re starting with those things that we
have the capability to do and moving it into
the doctrine so that we can start training at the
right level for these capabilities of the future,”
he explains. “We want to make sure what we
are writing as doctrine is consistent with what
is in multidomain operations, and that they are
writing a doctrine that is within the realm of
the possible. It’s a give and take, and it’s a pro-
cess which takes a while, but by the end of this
year you’re going to see some decisions on the
rate at which we move concept into doctrine.”
However, an overarching component of that
process is the Army’s contribution to how the
entire U.S. military will engage across the air,
sea, land, cyber and space warfighting domains, The Army is working at the Joint level to form a multidomain operations concept
or Joint all-domain operations, also known as for the military, says Lt. Gen. Eric Wesley (l), USA, director, Futures and Concepts
JADO. Center, and deputy commanding general, U.S. Army Futures Command,
“You just can’t have different services have speaking with Retired Col. Kenyon Gill (USMC) at MILCOM 2019.
their own MDO concepts and federate them
together,” Gen. Wesley clarifies. “It’s the unique nature of and how our systems connect with the Air Force, and that’s
MDO, integrating all the domains of warfare: space, cyber, the hard work that has to be done. What we are advocating
electromagnetic warfare, land, maritime, and air. And it’s for is that it is incumbent on the Air Force’s ABMS system
the integration of those things such that the total is greater to connect to our capabilities, that it has got to be designed
than the sum of the parts that creates overmatch against your to enable our capabilities, because it is at the edge where
opponent. But because those domains all come from different these capabilities must bring their effects.”
services and in some cases are parts of the interagency, you In addition to the challenge of bringing the services
quickly realize that this has to be a top-down effort.” together on a collective technical understanding of what
The military also is organizing the joint approach to must be built for JADC2, the services also need the tech-
command and control for that future operating environ- nology required to conduct multidomain operations, Gen.
ment, or the functional concept of joint all-domain com- Wesley ventures. Here, the Army’s communication, com-
mand and control, known as JADC2. “And we have a key puting and tactical network capabilities will be crucial to
role in shaping and influencing the requirements and achieving all-domain operations, the general continues.
description of what that is,” he notes. “To create overmatch, you have to be able to continually
The Army is engaging with the Air Force, Space Force, and rapidly integrate domains in the theater of war, not
Navy and the Marine Corps to develop the JADO concept just at one point but across the theater,” he states. “That
by November and has been conducting exercises to test means you’re trying to integrate the air, cyber, space, land
initial JADC2 functionality with the Air Force at its JADC2 and maritime for effect rapidly and continuously, within
center at Nellis Air Force Base, Nevada. So far, the general minutes or seconds. The network becomes the backbone
is optimistic regarding the progress towards JADO from a of your ability to conduct convergence, and your ability
conceptual perspective. to integrate these domains will be dependent on the vital-
“In the last year, we’ve gone from the services not com- ity of our network. That is where you will truly converge
municating at all on a joint MDO concept, for all intents effects at the tempo we will have to have in the future.”
and purposes, to being months out from exercising a In the meantime, the Army’s Project Convergence—
concept,” he states. “We are negotiating that with the other which features a technology demonstration still planned
services to make it fit at the joint level. It is a joint effort despite the pandemic for late August at the Globally Inte-
and a joint design.” grated Wargame—will test the design of the integrated

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 15

Signal0820.indd 15 7/20/20 5:32 PM


sensors at the edge, and how information and data on tar- center is examining what a flexible force structure template
gets moves to shooters. The project is led by Gen. Murray could look at the higher echelons above the brigade level—
and Lt. Gen. James Richardson, USA, deputy commanding division, corps, field armies and theater armies—to evolve
general for combat development. It is where the multido- them from mere headquarters to interdependent, echeloned
main operations concept will prove itself out or not, Gen. multidomain warfighting formations.
Wesley says. “We’re going to demonstrate the first capabili- “We had to say, ‘What does the Army look like in order
ties that the cross-functional teams are then going to mani- to develop what we call multidomain formations,’” the gen-
fest,” the director states. eral says. “That’s AimPoint. AimPoint is a template that the
Gen. Wesley also is working with the Combat Capa- chief of staff of the Army has approved for planning, and to
bilities Development Command (CCDC), led by Maj. Gen. be clear, all it is, is an azimuth or an orientation. It kind of
John George, USA, to coordinate technology develop- describes in a template format what the Army ought to look
ments in relation to Joint all-domain operational concepts. like in order to be able to fight multidomain operations. It’s
“There’s this symbiotic relationship between the FCC and not a force structure design or what the size of the Army is
CCDC, where the labs support the requirements that we or what the specific formations look like. It’s a template to
say we will need, and inform us of the technologies that experiment with and to plan against.”
will come,” Gen. Wesley notes. Additionally, the director is As part of the AimPoint effort, the FCC is considering
interacting with Assistant Secretary of the Army for Acqui- total Army analysis decisions, known as TAAs, to start
sition Logistics and Technology Bruce Jette to consider building the structures that are defined by the template.
how and when to purchase multidomain solutions for Joint “Those will be incremental, and when the chief can afford
warfighting “that are supported by what the labs say is avail- it, we’ll make decisions on those,” Gen. Wesley clarifies.
able in terms of technology.” At each echelon, the Army would have to provide the
Also, the FCC is taking the first steps in developing a ability to plug into the domain capabilities. “We don’t have
related multidomain operations force structure for the the theater fires capability that we used to have, and we
Army through its AimPoint Force Structure Initiative. The have lost the core fires capability and the division fires capa-
bility,” the director emphasizes. “In terms of campaigning,
that skill set was mortgaged in order to enable us to con-
duct COIN operations at the BCT level. So, what AimPoint
does is it describes our ability to fight at echelon. Also, if

Zero Trust
you are going to integrate all domains that cross all services
and reach into the interagency, and you have to be able to

Security
integrate those very rapidly and continuously, you can see
that you’ll need to have echelon responsibilities to integrate
some of those capabilities for the right effect. So, it’s restor-
ing a campaign-level quality Army to be able to fight in the
Because People are future.”
the New Perimeter The service chief has already signed off on developing
The traditional four walls that protected an
a Theater Fires Command to integrate the fires across
organization’s data no longer exist: More the theater, and he is building multidomain task forces
people are accessing more resources, and intended to enable theater operational commanders
from more locations, than ever before.
Learn how government agencies can utilize
to penetrate any adversarial anti-access/area denial, or
Okta as the foundation for a successful Zero A2AD, capabilities.
Trust program now, and in the future. Over the next few months, the general’s main focus
Learn More at remains helping to finalize the JADO concept. “The joint
okta.com/ZeroTrustModel concept, from an FCC perspective, is my number one
priority,” Gen. Wesley states. “We’ve got to get that under-
stood because that is going to define how the Joint Force
fights. The Army thinks we know how we’re going to fight
in the future, but we’ve got to get consensus across the
Joint Force.”

Gartner & Forrester Leader


FedRAMP Authorized
CAC/PIV Support

contact: Kimberly Underwood,


kunderwood@afcea.org

16 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 16 7/20/20 5:33 PM


U.S. Army
ARMY/MULTIDOMAIN OPERATIONS

The Army is integrating Joint All Domain


Command and Control capability as part
of its tactical network modernization efforts.

Aligning the Tactical Network with


Joint All-Domain Warfighting
Army leaders are making sure the integrated tactical
network fits into joint plans for multidomain operations.

T
he U.S. Army has spent the last two years pursuing a Cross-Functional Team (CFT), we are aligning Capability
modernized integrated tactical network, or ITN, that Set (CS) development to JADC2 objectives and are seeking
supports increased mobility, resiliency and capabili- to optimize experimentation and existing program efforts
ties. Now, the service has a focus toward making sure to enhance JADC2 capabilities.”
that the modernization of that network can enable joint all- As part of the Army’s contribution to JADC2, in par-
domain command and control, or the concept of JADC2. ticular, the PEO C3T and the Network CFT—the mod-
The service is preparing to fight ernization team—are supporting ground domain data
seamlessly across the sea, land, BY KIMBERLY and network transport capability, Gen. Collins says. “For
air, space and cyberspace, or mul- UNDERWOOD example, mobile and expeditionary network transport
tidomain operations, by 2028. systems, such as small aperture terminals, gateways,
“Our network modernization efforts will enable JADC2 cross-domain guards and secure waveforms, are needed
capability,” states Brig. Gen. Robert Collins (USA), program to support MDO [multidomain operations] and pro-
executive officer for Command, Control, Communica- vide transport of sensor to shooter data in the JADC2
tions-Tactical (PEO C3T). “Working with the Network construct,” he states. “We must also be able to carefully

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 17

Signal0820.indd 17 7/20/20 5:33 PM


manage data flow over network transport to ensure that the actively involved in the mission engineering threads as they
volume of data that will be produced does not ‘clog’ tactical design the network architecture of the future to ensure that
network transportation pipes.” we have joint fires, joint situational awareness and a joint
Capabilities in medium earth orbit and low earth orbit tactical grid for the joint force, so that our Army modern-
offer another communication pathway for multidomain ization efforts are aligned with those. And we will work that
operations. The modernization team has started development very closely going forward.”
and experimentation efforts And although the military has had to cancel many JADC2
with commercial satellite and other exercises and events since mid-March—includ-
constellations and ground ing JWA Defender 2020 and combat center rotations—due
terminals to leverage those to the pandemic, the Army has had the opportunity since
capabilities as they mature, then to obtain feedback from the 1st Brigade Combat Team,
the general notes. 82nd Airborne Division, which was deployed to the Middle
The PEO C3T and the East as part of the global response force mission, Gen. Gal-
Network CFT also will lagher says.
explore data management Going forward, the Army will test its JADC2 efforts dur-
techniques, harnessing arti- ing the next JWA, planned for the last week of June and
ficial intelligence, machine early July in 2021. That JWA JADC 2 effort will be tied
learning, tactical cloud, and to the Pacific Sentry event held by the U.S. Indo-Pacific
edge computing to help Command and will build on the success of the 2019 JWA
mitigate network transport exercise, during which the United States worked with the
issues, Gen. Collins offers. Five Eyes nations and other partners, such as Singapore and
Moreover, to enhance the Because of the complexities of
France.
common operational picture the multidomain operations “One of the most important aspects of the Army is that
for MDO, the team will con- environment, the Army has we are always going to fight as part of a joint force,” Gen.
duct experimentation efforts to make sure that the force Gallagher continues. “And we usually fight with coalition
in the near future to look structure and equipping are teammates. So, [we are] making sure that we are aligned
at how the Army can inte- closely aligned, says Brig. with the JADC2 CFT out of The Joint Staff and partnering
grate MDO overlays into its Gen. Robert Collins (USA), with the Air Force, the Marine Corps, Navy and others to
Command Post Computing program executive officer make sure that our alignment, as we reach our objectives in
Environment. for Command, Control, the future to deliver the network that allows us to be MDO
As such, the service is Communications-Tactical. dominant by 2028, is aligned with our teammates across the
coordinating closely with the military departments and across the Defense Department.”
other military departments, Gen. Collins says. “Working with The Network CFT director clarifies that the team is pos-
joint service partners, we are understanding the necessary tac- tured to deliver the first tranche of technologies as part
tical network requirements to support JADC2.” of its Capability Set 2021 (CS 21), following a successful
“We have to make sure that everything we do as an Army critical design review this spring—which fits right in with
allows us to remain interoperable with our joint partners and the plan to help enable JADC2. “We are moving faster to
our coalition teammates,” adds  Maj. Gen. Peter Gallagher, keep pace with emerging technology and threats in cyber,
USA, director of the Network Cross-Functional Team (Net- spectrum and electronic warfare,” Gen. Gallagher notes. In
work CFT). addition to providing a modernized ITN, the team also is
Over the last year, the Army began experimenting with providing advancement capabilities to the Expeditionary
JADC2 during Project Convergence, the 2019 Joint Warf- Signal Battalions. As part of Phase 1 of the CS 21 rollout,
ighting Assessment (JWA), other tabletop exercises and the equipment they are purchasing includes: single-channel
events with the combatant commands. Because the develop- data radios; dual-channel headsets for leaders to monitor
ment of Army-related JADC2 capabilities involves the initial two radio networks; variable height antennas, which are
partial linkage of sensors and the Army’s tactical network essentially tethered drones for range extension of tactical
with the other services, the Network CFT and PEO C3T radios; line-of-sight backhaul, a critical capability add to
attended several experiments connecting to the Air Force’s gateways to bridge multiple networks together seamlessly
Advanced Battle Management System, Gen. Gallagher says. for operators; and mobile broadband kits that allow soldiers
The Army has worked to connect with the Air Force’s JADC2 to tie into either available Army or non-Army networks,
experimentation nucleus, their Shadow Operations Center explains Joe Welch, deputy, Program Executive Office Com-
at Nellis Air Force Base, Nevada, and at trials at Eglin Air mand Control Communications-Tactical.
Force Base, Florida. “We are focused on best value, as we will be fielding this
“That is very critical,” the Network CFT director states. equipment for quite a while,” Welch says. “We are buying
“We’ve been working closely over the last several months to capabilities for the first four brigades for Phase 1 in fiscal
stay in sync with The Joint Staff, and they have had several year 20 and then into FY 2021. And we are putting RFIs
ABMS demonstrations at Eglin and Nellis, and we’ve par- [request for information] out to allow market research and
ticipated in JADC2 experimentation exercises. And we are further experimentation.”

18 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 18 7/20/20 5:33 PM


ARMY/MULTIDOMAIN OPERATIONS

In addition, Welch says that fielding base bands and Gen. Collins also recommends that more attention be
very small aperture terminals, or VSATs, will allow for paid to the nonkinetic capabilities for MDO, both cyber and
additional mobility and expeditionary use. electronic warfare, which are needed to confront the enemy
Moreover, the PEO C3T and the Network CFT will anti-access/area denial, or A2AD, environment. “And across
be conducting additional prototyping efforts over the all those capabilities, we’ve got to make sure that they are not
next fiscal year, given the alignment of Army resources only survivable but expeditionary and can rapidly transition
focused just on the development of tactical communica- from competition to conflict,” he advises. “Moreover, open
tions and networking solutions. systems and modular architecture approaches will continue
“We have put on contract 17 prototyping efforts to to enable adaptive and innovative technology that are key to
get after CS 23 and CS 25,” Gen. Gallagher clarifies. This supporting all domain operations.”
includes three rapid prototyping initiatives from the In addition to the material side, the service also needs to
Office of the Secretary of Defense; eight efforts from the address how its training and equipping is synchronized with
Combat Capabilities Development Command’s C5ISR its organizational force structures for MDO formations, the
Center; and six efforts resulting from the team’s technical PEO C3T offers.
exchange with industry in Austin, Texas, last year. The “We’ve got to make sure that the force structure and
emerging technologies that they select from the various equipping are closely aligned, because of the complexities
prototyping efforts will transition to a program, if feasi- of the multidomain operations environment,” Gen. Collins
ble, or, if not ready, will continue to prototyping in CS 25. states. “Partnering with the CFTs has really strengthened our
Welch and Gen. Gallagher spoke to the industry as part ability to refine concept of operations and requirements.”

“Our network modernization efforts will enable JADC2 [joint all-domain command
and control] capability. Working with the Network Cross-Functional Team, we are
aligning Capability Set development to JADC2 objectives and are seeking to optimize
experimentation and existing program efforts to enhance JADC2 capabilities.”
—Brig. Gen. Robert Collins (USA), program executive officer for Command, Control, Communications-Tactical

of Aberdeen Proving Ground’s virtual Advance Planning As the prior lead of PEO Intelligence Electronic Warfare
Briefing to Industry in June and reminded companies of and Sensors (IEW&S)—which is now being led by acting
the next technical exchange meeting scheduled for Sep- PEO IEW&S Mark Kitz—Gen. Collins worked closely with
tember in Nashville, and also virtually. CFTs and counterparts, including the Assured Position,
In addition, the team plans on spending the next year Navigation, and Timing CFT, the Network CFT and the
fielding the new equipment and conducting related intelligence surveillance and reconnaissance (ISR) task force,
training for CS 21, and delivering technologies to bri- in pursuing MDO. He suggests that sensing capabilities will
gades and multiple expeditionary signal battalions. continue to be crucial in achieving comprehensive warfare.
Then, following the prototyping for CS 23, the parties “Deep sensing needs to be a big focus for MDO, leverag-
will start the planning stage for CS 25, identifying tech- ing both national and commercial capabilities, specifically
nological need areas. in space, and manned and unmanned aerial ISR, and col-
Part of PEO C3T’s efforts include a functional realign- lectively taking that synthesizing [of information] to inform
ment of the office to ensure program officers are aligned mission command,” he notes.
with the modernization lines of effort, Welch says. “We And although he is just two months into the role as PEO
are standing down the Network Enablers Program Office C3T, Gen. Collins will continue to focus on JADC2. 
and standing up a new program office, the I2S Program “We certainly are looking toward focusing on MDO and
Office, or Integration, Interoperability and Services, which large-scale combat operations,” Gen. Collins says. “Whether
will enable much more focused activities closely related to it’s demonstrations, experimentation or prototyping of con-
the Network CFT,” he notes. PEO C3T also is standing up cepts, or even as we shape touch points, we absolutely are
a CS development office. “So, you will see some change to making sure that we’ve got a solid road map that gets us to
our org chart,” he adds. MDO, and enabling an MDO-capable force.”
That realignment is necessary, given the threat “of very
lethal peer adversaries,” Gen. Gallagher emphasizes. “We
have to be able to move, and move with speed, so we are
looking at formation-appropriate platforms, reduced sig-
natures, increased speed and an increased ability to sepa-
rate the forces, and really making sure we can reduce our
electronic signature,” he says. “There is a lot of work being contact: Kimberly Underwood,
done in that space.” kunderwood@afcea.org

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 19

Signal0820.indd 19 7/22/20 9:52 AM


ACCESS THIS FREE WEBINAR
www.afcea.org/signal/webinar

Architecting
a Cloud Data
Management Strategy
There’s a lot involved when migrating to cloud, so it’s important to know
what tools and technologies can make a difference for mission success.
Design your hybrid cloud to accelerate capabilities and deliver the
highest level of data protection for mission-critical systems.
This session will cover:
• Managing and protecting data across the hybrid cloud
• Increasing cloud readiness through APIs and automation
• Architecting cyber resilience and the importance of immutable backups

SPEAKER: MODERATOR:
REBECCA HOWARD
FITZHUGH WAHLBERG
Director of Developer Correspondent,
Relations, Rubrik SIGNAL Media
Rebecca is the Director of Developer Relations Howard Wahlberg has been involved
at Rubrik, Inc. She focuses on enabling cus- with content strategy and content
tomer API adoption through the Rubrik Build creation at AFCEA international
community. Rebecca began her career as a data for more than 5 years. He is an experi-
analyst in the US Marine Corps. Prior to joining enced communicator, moderator and
Rubrik, she was an enterprise architect where public speaker and has done voice
she worked with various federal agencies, overs for a variety of videos, podcasts
foreign governments, enterprise, and service and training sessions for AFCEA as
provider customers across multiple verticals. well as other organizations.

Signal0820.indd 20 7/20/20 5:36 PM


ARMY/MULTIDOMAIN OPERATIONS

Shutterstock/Gorodenkoff
Army Gears Up To
Battle for Cyber Resilience
ARL research taps existing areas while breaking new ground.
BY ROBERT K. ACKERMAN areas of research that have been given vulnerable to a variety of attacks,” he

T
greater emphasis reflecting the more states. These run the gamut from com-
he U.S. Army is attacking defen- urgent need for cyber resilience. plex assaults to unsophisticated attacks.
sive cyber operations from the Alexander Kott, chief scientist of the With so many mobile assets, devices
laboratory. It is focusing new ARL and Army ST—senior research and systems are increasingly vulner-
research efforts, including auton- scientist—for cyber resilience, has able to cyber attacks. He points out that
omous network agents, on ensuring just begun reshaping ARL research to most assets on which people rely, such
cyber resiliency in the battlespace. reflect this new mission. What comes as cellphones and tablet devices, are
Some of this work builds on related out of the lab could have significant relatively disadvantaged. Many people
efforts long underway at the Com- ramifications to the civilian world as do not realize that they tend to be in
bat Capabilities Development Com- well as the military. close proximity to cyber adversaries, so
mand Army Research Laboratory “This is a whole world of interesting it is relatively easy for both parties to
(ARL). Other thrusts aim at exploiting opportunities,” Kott says. achieve some form of contact.
capabilities that are within reach but “Most of the cyber assets and net- Most of all, people generally are
not yet ready to field. Still more are works in our society are highly not trained cyber defenders, Kott

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 21

Signal0820.indd 21 7/20/20 5:33 PM


available to us, or they will be spoofed
in some way,” he states.

Cybersecurity Takes a Moving ahead in cyber resilience


will require overcoming two hurdles

Hit From COVID-19


that double as opportunities. The first
is a quantitative one. “We need to learn

T
how to measure cyber resilience,” Kott
he COVID-19 pandemic brings with it a new set of cyber vulner- states. He adds that no engineering dis-
abilities built around lifestyle changes throughout society, and cipline ever has achieved any degree
these vulnerabilities cry out for new means of cyber resiliency. of maturity and sophistication without
“It’s quite possible that historians will remember COVID-19 as determining how to measure its prop-
one of the very important civilizational turning points,” says Alexander erties. Yet, no one seems to have any
Kott, chief scientist of the Army Research Laboratory and Army ST for method for measuring or even quanti-
cyber resilience. “COVID-19 is acting as a forcing function. It forces us fying cyber resilience. “It will be cyber
to accelerate the transition to a more virtual society than we were before, resilience engineering when we learn
and it is accelerating the trend that was occurring before COVID-19 but how to measure cyber resilience,” he
was happening more slowly and less noticeably.” declares. “That means we need rigorous
He continues that even if a reliable vaccine appears and alleviates fears tools that can measure cyber resilience.
of the virus, a large fraction of the workforce will never return to full- Only then can we actually improve our
time office life. Recent experiences have shown that virtual offices can cyber resilience.
be effective and can save a lot of money for both workers and businesses. “Once we have the means for measur-
Society will rely to a much greater degree on distributed work locations ing how good our cyber resilience is, we
such as home offices as well as mobile locations. will be able to make much more impact-
But this flexibility means that physical security will not be as good ful progress in it,” he warrants.
as in a formal office environment, which is rife with dedicated security The second big hurdle facing cyber
services and arrangements, Kott points out. Networks and computer resilience is the need for autonomous
security in particular are less secure with fewer controls. Even if a busi- artificially intelligent agents to execute
ness provides support personnel for home workers, it will be facing chal- actions for resisting, observing and
lenges inherent in serving multiple virtual customers. recovering from cyber compromises,
“What all this means is that the cyber attacker will have many new Kott says. He offers that the reliance
opportunities to get into our systems,” he posits. on human cyber defenders is eco-
Achieving cyber resilience in this new atmosphere is all the more nomically and technically inefficient.
important, Kott emphasizes. “The question now becomes, how do we This is not to imply that highly intel-
make it so that penetrating our systems is of little value to the attacker? ligent humans are unnecessary for cyber
Can we make it a fool’s errand for the attacker? Can we prevent that defense, he emphasizes. Rather, peo-
attacker from gaining any meaningful value for all the hard work they ple need to be reinforced with greater
have to invest in compromising our network and our system? numbers of autonomous artificial cyber
“COVID-19 made the importance of cyber resilience much greater defense agents. Industry is moving in
than it was before,” he declares. this direction, he notes, albeit “slowly
and hesitantly.”
Security orchestration, automation
and response (SOAR) technologies are
observes. This applies to both civilian “Hoping for some kind of a cen- an integrated collection of tools that
and military personnel. tralized continuous monitoring and help human defenders respond in a
Kott points out that cyber resilience is defense by a third party is often centralized manner to security com-
especially important for the Army as the unrealistic,” Kott observes. “One of promises. Yet, these are not foolproof,
service relies on cyber operations to an the first things a sophisticated cyber Kott says, adding that a more aggres-
increasing degree. The Defense Depart- attacker will do is disable the ability sive move in that direction is neces-
ment describes cyber resilience as the to communicate reliably with those sary. This would include making SOAR
ability of systems to resist, absorb and third-party defenders.” This applies tools more intelligent, so they could
recover or adapt to an adverse occur- to managed cyber defense services address unpredictable combinations,
rence during operation, so accordingly, providers, both in the civilian and and making them available locally on
the Army must be able to continue to military worlds, and they are comple- sub-networks.
carry out its mission when its cyber sys- mented by commercial software sup- One ARL effort focuses on tactical
tems are compromised or under attack. pliers that send upgrades and secu- autonomous intelligent agents for cyber
This includes being able to return a sys- rity patches. “A successful cyber attack defense. The overwhelming majority of
tem to “a reasonable degree of perfor- would make sure that those third- today’s cyber defense tools are “watch-
mance” as soon as possible, he notes. party remote services will not be easily ers,” Kott says. If they see an anomaly,

22 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 22 7/20/20 5:33 PM


ARMY/MULTIDOMAIN OPERATIONS

The Army Research Laboratory’s research


U.S. Army

efforts into cyber resiliency include


development of autonomous self-
monitoring systems that do not require
network experts to follow cyber activities
around the clock without assistance.

detailed issues facing Army cyber


resilience differ from those of the
other services. At the ARL, research-
ers already are working on a number
of projects, some of which will be
enhanced or strengthened.
One project is the Cyber Collabora-
tive Research Alliance, which comprises
government, academia and industry.
This alliance aims to create the founda-
tions of cybersecurity science, and it
includes cyber resilience. Kott wants
to see more work in that direction,
they alert the user or network manager something that we don’t want to hap- including rigorous analysis and design
to what they see. But as effective and pen,” he admits. of deception techniques aimed at the
important as these watchers are, they These potential ramifications include cyber attacker. The goal is to make the
are not “doers,” he points out. They do breaking software, crashing a network intruding cyber attacker unproductive,
not engage in the activities that are most or corrupting data. The probability may he explains. These deceptions could be
important for cyber resilience, leaving be low, but it cannot be counted out. linked to physical military deceptions.
that action to the human they’ve just For that matter, human cyber defenders Cyber deception is inseparable from
alerted. “This does not bring us cyber can pose the same risk, he points out. physical military deception, Kott con-
resilience,” Kott maintains. This risk must be weighed against the tinues. This includes electronic war-
Effective cyber resilience defense negative consequences from not taking fare and electromagnetic operations,
tools must be active fighters, not merely action or from waiting until humans and clever tactics would integrate
watchers, he continues. These active can respond, he adds. cyber and electronic warfare.
fighters must take independent, intel- Gaps, challenges and opportuni- Another target under development
ligent actions to maintain systems’ resil- ties abound, but Kott notes that the would be the ability to learn how the
ience against compromises. Accord-
ingly, they must have a significant

U.S. Army
degree of autonomy, via artificial intel-
ligence, to be able to respond rapidly to
a compromise. They also must be able
to absorb the compromise, and at least
partially recover from it—and quickly,
Kott adds. The speed necessary for these
actions often requires “the absence
of human involvement at time scales
humans cannot support,” he points out.
This mandates intelligent analysis of
risks and ramifications of the actions
the agents are trying to take, Kott says.
He adds that research into these types
of agents is beginning to emerge, but
again it is “somewhat hesitant.” This
hesitance comes from the inability to
guarantee that the actions of an auton-
omous intelligent cyber defender will
not cause undesirable ramifications. A Stryker Brigade combat team equipped with Warfighter Information Network-Tactical
“Anyone doing something inevitably Increment 2 (WIN-T 2) prepares to move out during a Network Integration Evaluation. Army
takes risks, and there is a risk that the Research Laboratory scientists are exploring new methods of ensuring cyber resiliency so
actions of [this type of] agent will do enemy operations cannot fully deny U.S. forces the use of their cyber assets in wartime.

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 23

Signal0820.indd 23 7/20/20 5:33 PM


adversary operates once inside the area of active research for several resilience of networks,” Kott says. “If
network. That would allow defensive years, Kott allows. Network resilience we don’t have communications, it is
operations that parry the adversary’s also has been an ARL research focal even more difficult to achieve resil-
thrusts, Kott notes. This will require point for some time. ience of individual nodes. Therefore,
building rigorous theory and experi- The ARL has extensive collabora- we invest heavily into more resilient
mental methods to support this tive efforts with academia and indus- [communication] networks, and a
approach to cyber resilience. try for research into autonomous major path toward resilience of net-
The ARL also is working on a proj- agents, and some of this work can be works is heterogeneity of these net-
ect called tactical autonomous active applied to cyber resilience. The lab- works using a variety of channels
defense. This effort is focusing in par- oratory recently awarded $3 million where we can jump from one type of
ticular on defending military vehicles, to industry and academia partners physical channel to another—not just
and Kott offers that some of the ideas for a program on autonomy enter- radio frequency, but also other types
emerging from this work are begin- prise—Scalable, Adaptive and Resil- of channels used in communications,”
ning to look like autonomous intel- ient Autonomy, or SARA. This focuses he states. Intelligent, clever and decep-
ligent agents. The laboratory is starting on autonomous mobility, but Kott tive switching between those channels
a multi-university research effort on emphasizes that its research also is would help achieve this goal.
cyber autonomy, which may include important for cyber autonomy. The
performing sophisticated deception ARL is seeking input from existing
via continuous learning and observa- and new industry partners, including
tion from another perspective. international partners, on that topic.
Some ongoing ARL research already Other cyber resilience efforts link
touches upon cyber resilience issues. the virtual with the physical. “We
Multidimensional cyber intrusion believe that the resilience of our contact: Robert K. Ackerman,
detection and analysis has been an computers is inseparable from the signalnews@afcea.org

TechNetCyber

DECEMBER 1 – 3, 2020 | BALTIMORE CONVENTION CENTER, BALTIMORE, MARYLAND

Rescheduled from June with more DISA content than ever! Adversaries have taken to cyberspace to
wage continuous campaigns against political, economic and security interests. Protecting cyber assets
that connect people to information requires more than a single entity. At TechNet Cyber, multiple
partners will network, collaborate and create a formidable united front more powerful than individual
efforts can achieve alone.

WWW.CYBERSECURITYEXPO.ORG

24 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 24 7/20/20 5:33 PM


ARMY/MULTIDOMAIN OPERATIONS

Army Adds
Element of Surprise
to Technology Search
Officials never know what they
will get with xTechSearch.
BY GEORGE I. SEFFERS

U.S. Army photo by Sgt. Jacob Kohrs


Soldiers from the 5-3 Field Artillery Regiment conduct live-fire exercises with the High-Mobility Artillery Rocket System at Yakima Training Center.
A lighter-weight, longer-range rocket fuel is one of the winners of the xTechSearch competition that will contribute to multidomain operations.

B
eing surprised on the battlefield is never a good never done business with the Army. Some may have never
thing, but Army officials, who are focused on worked with other parts of the military or the federal gov-
modernizing the force, welcome industry—espe- ernment. Ultimately, finalists receive awards of $120,000
cially small businesses—to offer solutions they each and will be invited to demonstrate proofs of concept
didn’t know existed and didn’t know they needed. of their dual-use technologies to a panel of Army judges.
The xTechSearch competition seeks novel, disruptive The program is a departure from traditional develop-
concepts and technologies to support the Army’s top ment and procurement practices in a number of ways,
modernization priorities, all of which contribute to the including being open to never-before-considered tech-
service’s vision of multidomain operations, or MDO. The nologies, capabilities, concepts or solutions, rather than
MDO concept describes how the U.S. Army, as part of defining requirements down to the size of nuts and bolts
the joint force, can counter and defeat a near-peer adver- or the number of lines of code. “In some cases, the Army
sary in all domains in the 2025-2050 timeframe. doesn’t even know that the solution’s out there, but also in
The xTechSearch program provides cash prizes to some cases, companies are developing technologies that
selected small businesses to proceed through four phases they don’t realize could solve an Army problem,” says Zeke
of the technology competition. The focus is primarily Topolosky, chief, Strategic Partnerships Office, at the Com-
on so-called nontraditional companies that may have bat Capabilities Development Command Army Research

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 25

Signal0820.indd 25 7/20/20 5:33 PM


Laboratory (CCDC-ARL), who oversees the xTechSearch turnkey solution for the exact platforms that we’re using
programr. now for Army weapon systems, as well as longer-range Air
In some cases, the entrepreneurs themselves may be sur- Force systems. Both of them could drop and replace the fuel
prised to learn the Army can use their technologies. “Some that they were already using and get a 50 percent increase in
of these nontraditional vendors that we’re trying to reach range,” Topolosky notes. “This enables things that the long-
aren’t aware of all the specific Army requirements for all the range precision fires teams are trying to accomplish. It also
systems we need to field. It’s a two-way street with us learn- enables you to have lighter-weight platforms because you
ing about new stuff that’s out there and also having innova- can use less fuel to achieve the same range.”
tors out there realize they could tweak their system a little And that longer range supports the MDO concept. “The
bit and solve an Army problem,” Topolosky adds. idea of multidomain operations that we will have to tie all
He cites one company that presented a lightning detection these things together—the sensors out in the field with long-
system. “They had a system of sensors that could predict range weapon systems—this will enable us to be able to put
and pinpoint lightning detection locations. Through some fires on target at closer or longer ranges. We can either carry
conversations and questions … they realized they could do more payload in closer or enable farther standoff distance.
some mortar detection or incoming fire detection using this Forty to 50 percent increase in range is very significant. It’s
technology. It would be very low power, very passive,” Topo- almost called a leap-ahead capability from what we’ve been
losky reports. “They went on to give the Army opportunities doing,” Topolosky explains.
to test the system in live-fire events.” Bruce Jette, the assistant secretary of the Army for acquisi-
The winners of the first two challenges offered surprises of tion, logistics and technology, and the man credited with
their own. Adranos offered a solid-rocket propellent that is starting the xTechSearch program, echoes that sentiment.
lighter weight and offers longer range than traditional rocket “There just aren’t very many new people coming into the
fuel. According to the company’s website, rocket fuels have rocket fuel industry, and to have a company come in and
not really changed in 60 years. just come up with a rocket fuel that is significantly more
“Their chemistry allowed them to basically make a capable than the rocket fuel that we are currently using,

Access AFCEA On-Demand Events:


Register Now

AFCEA-GMU C4I CENTER SYMPOSIUM


https://www.afcea.org/event/GMU-Registration
Register to view sessions from the April symposium connecting
academia, industry and government to address important issues in
technology and systems research and development.

AFCEA CMMC SYMPOSIUM


event.afcea.org/OnDemandCMMC2020
The Cybersecurity Maturity Model Certification (CMMC) rolls out
later this year, and it will affect both homeland security and the
defense industrial base. This on-demand symposium helps industry
understand how its contracting strategies will change.

ARMY SIGNAL CONFERENCE


event.afcea.org/SignalConferenceOnDemand2020
The Army SIGNAL Conference moved online to support important
conversations between industry, defense and academia. The on-
demand sessions promote outreach and understanding within this
important community as it works to accomplish critical work for the
nation’s security.

WWW.AFCEA.ORG

26 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 26 7/20/20 5:34 PM


ARMY/MULTIDOMAIN OPERATIONS

that’s worth taking a hard look. Given that we’ve basically rather than telling them, “Here’s your shopping papers. Now
been developing most of our rocket fuel ourselves, that’s go out and find someone,” Jette says. He emphasizes, how-
pretty impressive.” ever, that he is not criticizing the other approaches.
Lumineye, the winner of the second challenge, offered “I can’t tell you I have 200 companies on contract because
a system known as Lux. It is a handheld radar for detect- I don’t. I have a number of companies that we’ve funded to
ing people behind walls. It can be used in urban combat mature to the point of a contract, and we’re doing so with a
environments but also is handy for firefighters, law enforce- focused approach against potential opportunities within the
ment and search and rescue teams, the company’s website Army instead of letting them go try to figure it out on their
indicates. own,” he offers.
The concept is not entirely novel, but the solution is. “Lots Speaking of numbers, the program has received 1,350
of other companies have tried this. They were able to do it proposals over the course of all the challenges. xTechSearch
with some very low-cost components and had great suc- 5 alone drew 350 proposals, which have come from 1,000
cess,” Topolosky states. “They’re now entering into a Small different companies.
Business Innovation Research grant with the Army as well as The Army has completed the first two challenges, along
with the Air Force. This will enable them to take their device with a specialized challenge to find low-cost COVID-19
and start developing networks of systems so you can have ventilators. Officials are considering the possibility of addi-
multiple handheld devices being used at once and get some tional special challenges, along with a combined effort with
3D imagery.” the Army’s Ground Vehicle System’s Center that will focus
Matthew Willis, director for laboratory management, on lowering the weight and improving the survivability of
Office of the Deputy Assistant Secretary of the Army for the Next-Generation Combat Vehicle. Jette says he is con-
Research and Technology and xTechSearch program direc- sidering other possible specialized challenges, such as one
tor, says the program’s surprise element is a core tenet of aimed at advanced antenna technologies.
MDO. “The Army doesn’t know what we don’t know. There
are many technologies out there that might contribute to our
ability to be agile and responsive in a multidomain opera-
tions environment, but we can’t possibly know the spectrum
of technologies that exist out there. We can try to drive
innovation by relying on the private sector to potentially
point us in new directions.”
contact: George I. Seffers, gseffers@afcea.org
Topolosky agrees. “We’re now looking at fighting across
all these domains, and typically our development cycles have
been more siloed into different commodity areas where sys-
tems and fighting units are operating independently, so mul-
tidomain operations will rely on a lot of different technology
solutions to link all these together.”
Jette notes that xTechSearch offers the service some flex-
For a look back at the future,
ibility in MDO solutions. “Multidomain operations is a very visit SIGNAL’s searchable
complicated set of requirements, particularly in the com-
munications-electronics side of things. We’re always looking
online archives at
for those technologies which can give us an advantage or
address some challenges that may be unique to the military.”
www.afcea.org/
The traditional process does not offer the same access to
those unconventional, nondefense-related companies that
content/archives
may well have great ideas. “Particularly in communications-
electronics there is a large demand for innovative technolo-
gies outside of just the military’s needs,” Jette adds.
The xTechSearch challenge also differs from other innova-
tion programs. Rather than awarding contracts at the end of a
challenge, xTechSearch funds development along the way. “We
set the bar low at the beginning with an opportunity for people
to build as they come along. We’re funding that construction
from A to B to C to D,” Jette says. “If you’re a small business,
cash flow is king. If [a small business] can get involved and it’s
going to take a while to get from point A to point B, then hav-
ing someone to help me with the funding is a really important
aspect of whether I want to go down this path.”
The xTechSearch program also connects entrepreneurs
to the Army organizations and personnel most able to help

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 27

Signal0820.indd 27 7/20/20 5:34 PM


A SpaceX Falcon 9 rocket lifts off, carry-
ing the company’s StarLink low-earth-
orbit networking satellites. Flooding
near-earth space with hundreds of
satellites is the future of orbital activities
as satellite construction expenses and
launch costs continue to come down.

Technology Drives New Satellite


Communications Capabilities
The democratization of space is
underway in orbit above the Earth.

T
he next era of satellite communications is upon us replaced or upgraded relatively easily, as opposed to complex
in the form of low-earth-orbit constellations aiming and expensive platforms that last many years but take just as
to revolutionize personal connectivity, according to long to design and, if necessary, replace.
satellite experts. These new satellite swarms are being The result is a spurt in the number of low-earth-orbit satel-
driven by technology innova- lites that introduce new capabilities for SATCOM services.
tions simultaneously with the growth BY ROBERT K. Their constellations in turn will spawn innovative technologies
of less-expensive launch services. ACKERMAN that can be applied both on orbit and on the ground. Both the
The result will be an explosion in the military and the private sector soon will have at their disposal
number and type of orbiters serving their earthbound hosts large constellations of communications satellites offering a
while raising the bar for support technologies on the ground. variety of capabilities.
With the overall satellite communications (SATCOM) field “Low-earth-orbit megaconstellations will disrupt legacy
becoming more dynamic, companies are compelled to be providers and bring new services online to connect the
more flexible as uncertainties increase. Accordingly, they are unconnected world,” says Grant Bonin, senior vice president
hedging their bets and exploring the use of orbiters that can be of business development at Spaceflight, a rideshare launch

28 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 28 7/20/20 5:37 PM


DISRUPTIVE SATCOM

services company based in Seattle. He notes a downturn trend role. In less than a decade, the satellite industry has moved
SpaceX

in the traditional geostationary satellite communications mar- away from bespoke spacecraft with vertically integrated sub-
ket. While that downturn has recently reversed, no indication systems built along strict lines from limited suppliers at sig-
has yet emerged as to whether that reversal will turn out to be nificant expense. Instead, the industry has seen that model
a true rebound. He also sees a reluctance to invest long-term disrupted by small startups creating systems that can be used
in the satellite sector when technologies and application areas in a number of different areas. The result is a robust supply
are changing so rapidly. chain fed by versatile companies able to maintain their niche
“The changes are coming,” says Bonin’s colleague Philip production at high rates. Even testing costs are coming down,
Bracken, vice president of engineering for launch services at he adds.
Spaceflight. “It’s actually quite a vibrant mix between the tradi- “You used to have to wait a year or longer and spend an
tional geocommunications [firms], the smaller geocommuni- exorbitant amount of money to go out and buy a radiation-
cations startups and the low-earth-orbit constellations trying tolerant processor that would have all the capabilities of
to gain market share. The next two to five years are going to be your calculator,” Bonin says. “Now, you can go [online] over-
very interesting to watch.” The likely outcome is
a mix of all of these types of systems, he offers.

SpaceX
Bonin relates that their launch services com-
pany sees increasing interest in small geocom-
munications satellites as well as in pathfinder
or demonstrator missions that can secure fre-
quency or reduce risk for low-earth-orbit con-
stellations. “The uncertainty in how SATCOM
is going to evolve is actually making it one of the
most exciting times to be in the services busi-
ness, getting satellites of all sizes up there,” he
states. The pressure on buyers to be more agile is
generating interest in smaller satellites that can
be replaced more easily as conditions warrant.
Bracken emphasizes that satellite technology
is the greater driver of the orbital revolution,
not launch services. Satellite buses aren’t chang-
ing to match new launch vehicles as much as A cluster of StarLink satellites stands ready for individual deployment into
the vehicles are adapting to the surge of new orbit. More commercial and even government launch customers will be
orbiters. taking advantage of less costly space access for a variety of missions.
Bonin reports that the miniaturization of
technology and the prevalence of software-defined capabili- night and buy something that has all the capabilities of your
ties have enabled the rapid building of satellite hardware. More smartphone.”
spacecraft are being built in a way that allows them to be Another major technological change is taking place on
reconfigured across the board by software—a development the ground. Bonin cites the proliferation of user terminals to
that Bonin describes as exciting. enable low-earth-orbit constellations as both an opportunity
These capabilities also compress the talent pool necessary and a challenge. Their progress is bottlenecked by how per-
for satellite development. What used to take 10 engineers now vasive the terminals can be after they are miniaturized, made
takes only one, he says. And an increased emphasis on produc- convenient and distributed to end users. This technology has
tion also is changing the state of the art. “Most of the history lagged a bit, he offers.
of spacecraft has been the story of the bespoke spacecraft “The miniaturization of technology allows the miniaturiza-
that usually are extremely labor-intensive,” he recalls. “They tion of satellites, and at the same time—historically—revenue
required a very high degree of talent and engineering, and varies with aperture,” Bonin allows. “Spacecraft need to have
they were usually one-offs. You built one or two, and then you certain parts that are big to make big money. That’s just the
launch the next highly tailored design.” physics of radio frequency and earth observation, so it’s an
This stands in marked contrast to what companies such as interesting balancing act that a lot of people are trying to play.”
SpaceX are doing with its StarLink, which is defined by a vol- And this is having a ripple effect across the industry. As
ume-produced spacecraft, Bonin continues. “More and more the megaconstellations of satellites are taken seriously, they
companies are placing an increasing emphasis not on their are generating market traction that has led to component
R&D [research and development] capabilities but on scaling and device-level suppliers taking the market seriously, Bonin
and on producing. notes. They now are mass-producing radiation-tolerant parts,
“The nice thing about having textbook problems is they for example, that benefit the rest of the small spacecraft indus-
have textbook answers,” he notes. “More and more, lessons try as well as other areas.
from other industries are being pulled into the satellite world.” One key technology that will improve SATCOM capa-
Bracken points out that the supply chain also plays a crucial bilities is flat-panel antennas. Bonin offers that electronically

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 29

Signal0820.indd 29 7/20/20 5:37 PM


steered phased array antennas with no moving parts can smaller spacecraft with a huge amount of capabilities is a fun-
provide high gain with omnidirectional coverage. “It’s a dif- damental enabler for our U.S. Defense Department and intel-
ferent playground if I can have something like a mousepad ligence community customers across the board,” he states.
on top of my car or on a base station that can scan the sky While Bonin offers that the SATCOM world is like the Wild
and interconnect with a satellite,” he says. “That’s a game- West, he and Bracken do not expect legacy SATCOM provid-
changer on the satellite side as well, compared with the way ers to go away. “It really will be the era of the communication
antennas are built and deployed now.” megaconstellation,” Bonin states while admitting that no one
The military can expect to benefit from these new satellite knows which companies will emerge dominant or even sur-
technologies. “We’re heading down a remarkable near-term vive. What will remain is the ability of customers to have a
future for military communications technology, whether variety of choices—such as lower latency or mesh networks—
space-to-space or space-to-ground,” Bracken declares. “We’re whether in isolated locations or industrialized areas.
seeing more RFPs [requests for proposal] and RFIs [requests These capabilities are likely to spawn many spinoff tech-
for information] come out about this … companies are look- nologies as part of their development, Bracken adds. Ulti-
ing at different ways to get military satellites out there quickly. mately, as the different types of satellite orbits—low-earth,
They [the military] are going to benefit a lot from this very mid-earth and geostationary—establish their prevalence
unique time, especially as things privatize more. and respective niches in SATCOM, they will be connected
“It’s a big time for military communications,” he contin- together into a single layer that provides dramatically
ues. “I think it’s going to be substantial.” increased capabilities for their customers. And these capa-
Bonin observes a significant focus on resiliency, which is bilities will be transparent to the end user.
helped by greater numbers of smaller, more capable space- Bonin offers that the launch vehicle market is bifurcating
craft. Rather than relying on a small number of big assets on into either the Uber and Lyft of the world that can accom-
which an adversary easily can focus, the space force would modate the individual passenger at greater expense, or
have a disaggregated large number of smaller spacecraft that subway systems that are wholesalers but not retailers that
cannot be simply nullified en masse. “The proliferation of address the specific needs of a user. His firm sees custom-
ers that want to try out ideas more quickly and need help
engaging both types of launch providers to obtain either
the dedicated ride they need or a ticket on the subway sys-
tem that will take them to the right place, often with other
customers. The goal is to make booking a satellite launch as
transparent as setting up cellphone data service, he says.
Bracken suggests that the satellite and launch service
manufacturers and providers are changing the way they
view the business model and interact with customers. The
Keep Up With AFCEA satellite launch industry, fueled by innovation in both sec-
tors, will transition to where it is less like global moving
News and Professional companies and more of a container ship approach. The sub-
sequent step will be to embrace a model like that of delivery
Networking Opportunities services that are transparent to the customer.
Ultimately, all these advances should lead to an environ-
The AFCEA Weekly Digest is the primary ment in which everyone is connected anywhere in the
communications channel between world, and any spacecraft in cislunar space can be connected
AFCEA and its members. The brief at any time, Bonin offers. These capabilities would enable
users to have high-bandwidth connectivity that would func-
e-newsletter includes highlights from tion transparently.
the emails that AFCEANs received Bracken foresees high-bandwidth, low latency communi-
during the week as well as news from cations, even with spacecraft heading to the moon. Spacefar-
chapters and association headquarters. ers will be able to interact with people on Earth and with
other vehicles with links that are better than with today’s
U.S. Air Force photo by Michael Peterson

The calendar columns feature links cellphones, he predicts.


to local and regional networking
opportunities in the areas AFCEA serves.
Be sure to read the AFCEA Weekly
Digest each Friday to learn about
more ways to take full advantage
of your AFCEA membership.
contact: Robert K. Ackerman,signalnews@afcea.org

30 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 30 7/20/20 5:37 PM


DISRUPTIVE SATCOM

Military Aims to
Urgently Provide Disruptive
Satellite Capabilities
The year-old Space Development Agency emphasizes
speed in pursuing innovative space capabilities.

T
he threats to the U.S. military and BY KIMBERLY “And we should not ever try to slip sched-
the nation are such that additional UNDERWOOD ule to add more requirements,” the direc-
space-based capabilities must be tor emphasizes.
rapidly fielded. A proliferated low- Specifically, the SDA is looking to field
earth-orbit constellation of satellites and advancements across the transport, battle
sensors will connect to the military’s management, tracking, custody, deter-
tactical legacy datalinks and weap- rence, navigation and support layers of
ons systems to deter against advanced the NDSA. The agency also is address-
threats. In particular, beyond-line-of- ing capability gaps in the military’s space
sight targeting capabilities and enabling solutions, including providing space
the detection, tracking and fire control situational awareness in extended space
of advanced missile threats will be a to cislunar between the Earth and the
part of the system that the Space Devel- moon’s orbit.
opment Agency deploys as part of its First off, the agency is providing a back-
National Defense Space Architecture, bone transport layer, made up of hundreds
or the NDSA, says the agency’s director, of satellites in low-earth orbit (LEO) that
Derek Tournear. will all be optically connected to form a
“The architecture is focused on deliv- mesh network in space, the director states.
ering the initial capabilities of beyond- As part of the first deployment of capabili-
line-of-sight targeting for time-sensitive ties in the next year, in Tranche Zero, the
targets, both ground and maritime,” SDA will fly about 20 transport satellites to
Tournear states. “We need to get that up form the network and enable communica-
there as rapidly as possible. And because The United Launch tions to legacy tactical datalinks.
more advanced missiles are being fielded Alliance Delta IV Heavy “In addition to being able to talk to
[by adversaries], we need to have a space rocket lifts off from Van- each other, that data transport layer also
sensing layer that can detect, track and denber Air Force Base on can talk directly via existing tactical data-
then set down fire control information to January 19, 2019. With links, such as Link 16, and down to weap-
its rapid fielding pace,
be able to take out those targets. So that’s ons systems that are already fielded and
the Space Development
what drives us. That’s why it’s important. Agency plans to launch already have that capability,” Tournear
We believe that these threats are in exis- initial capacity of its says. “We are working very closely with
tence now, and we believe that we need new network in 2021. the Army to ensure that we can talk from
the capabilities fielded as soon as we can.” our transport satellites down to their
U.S. Air Force photo by Michael Peterson

The Space Development Agency’s TITAN ground system, so they could then
(SDA’s) effort to create and sustain resilient, afford- further disseminate the data to other weapons sys-
able and lethal space-based capabilities as part of tems that aren’t connected via Link 16. And we’re
the NDSA for the military also includes providing working with the Navy for similar systems to do that
the space-based backbone for the services’ Joint all- over their CEC comm channels.”
domain command and control, or JADC2. Three sensing layers will feed data to the trans-
The agency’s speed-priority approach is to roll out port layer: (1) a tracking layer made up of over-
minimum viable products in tranches starting in head persistent infrared (OPIR) sensors to detect
fiscal year 2022 and then every two years thereafter. and track adversarial advanced missiles; (2) a

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 31

Signal0820.indd 31 7/20/20 5:37 PM


and a better fire control solution
U.S. Air Force photo by Senior Airman Aubree Owens

for these hypersonic glide vehicles.


And again, that data would then go
either directly to the ground or to the
ground via the transport satellites.”
For the custody layer, the SDA
will rely on mission partners—the
Army, Air Force and other agencies—
to build out ISR satellites to provide
the beyond-line-of-sight targeting
capability.
In Tranche Zero, the SDA is work-
ing to show that it can move data to
the ground from the mission part-
ners, send data from the partners
directly back up to the SDA transport
satellites, and then send that data over
the mesh network to other areas of
interest.
“For example, if the Army had one
of their TITAN ground stations and
they have that located in Germany,
they could download the data to that
system in Germany, send it back up
to transport, where then we could use
the transport satellites to go down to
an F-35 in the INDOPACOM Theater
via Link 16,” Tournear clarifies. “That’s
one example that we’re going to dem-
onstrate in Tranche Zero.”
For the third sensing layer, the SDA
is conducting studies on how to best
design a deterrence solution that pro-
vides detection and tracking beyond
A United Launch Alliance barge delivering the Delta IV Heavy rocket boosters docks at Van-
geosynchronous orbit out to cislunar
denberg Air Force Base, California on April 5; and (above) the boosters are offloaded on May 4.
Commercial launch operations will be a key part of the Space Development Agency’s mission.
space. And that sensing would feed data
back into the transport layer. “Anything
operating in that environment has his-
custody layer that would allow military users to send target torically been ignored just due to a lower priority over items
location information in real time directly to weapons systems; that are in LEO or geosynchronous, so we want to look in that
and (3) a deterrence layer for space situational awareness. area to make sure that there are no activities going on there
“The sensing satellites will detect the missile, send the that we’re unaware of,” the director states.
track to the transport layer where that data could be fused A battle management layer of the NDSA architecture
with other data and then send [it] down to the ground to would tie all the layers together and would be where
the actual weapon systems that would engage the threat,” onboard processing, algorithms for autonomous operations
he explains. and any automatic target recognition algorithms would run.
The SDA will fly eight wide field-of-view sensors in “In order to do those missions, essentially the autonomous
Tranche Zero to demonstrate the traceability that will be used detection and tracking, and targeting of time-sensitive tar-
for hypersonic glide vehicle detection over the entire globe, as gets and missiles, there is a lot of processing that needs to be
well as for passing the data either directly to the ground or to done,” he clarifies. “That processing will reside ultimately on
the transport satellites. board the sensing satellites as well as the transport satellites.
“Shortly after, but still part of Tranche Zero, we’re work- That’s our battle management layer.”
ing with the Missile Defense Agency to fly the hypersonic Moreover, the position, navigation and timing (PNT)
ballistic tracking space sensor satellites, or HPTSS, either data of the NDSA transport layer offers an additional PNT
one or two for what we call our medium field-of-view sen- signal to individual users that are tied into the associated
sor,” Tournear says. “Our goal is that our wide field-of-view comm network. “We’re not going to broadcast like GPS
sensor will tip the medium field-of-view sensor and that does, but folks that are on our comm channel can get navi-
sensor will allow us to actually even get more sensitivity gation using our backbone,” Tournear offers.

32 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 32 7/22/20 9:53 AM


DISRUPTIVE SATCOM

To help enable the military’s JADC 2 operations, the He clarifies that the USDR&E “will still always have the role
NDSA platform would connect to all of the services’ with the assistant director of space, whose role is to ensure
ground and air networks tied into JADC2. For example, the that the overall Department of Defense space architecture
Air Force’s Advanced Battle Management System, Aper- fits together and has some sort of unity and a road map that
ture One and Radio One networks would link to the SDA’s makes technical sense.”
transport satellites. “We would be the backhaul for that data The NDAA 2020 also called for the establishment of a
across our mesh network,” he says. new assistant secretary of the Air Force for Space Acquisi-
In the rest of this fiscal year and next, the agency is con- tion and Integration, which will have purview over the
ducting a set of demonstrations focused on the communi- Space and Missile Systems Center, the Space Rapid Capabil-
cations backbone technology to demonstrate the function- ities Office and the SDA, Tournear adds. “That design and
ality of the optical connectivity. construct is still being developed, primarily by the Space
Additionally, there will be experi- Force in conjunction with others, and any final construct
mentation of the OPIR tracking would be a design that General Raymond and Secretary
layer, collecting IR data over a Barrett and Secretary Esper would all have to decide upon,”
wide range of infrared bands, to he shares. “And exactly how that construct looks on an org
see which band will best perform chart is still being determined.”
background light rejection with
the missile detection system in
a LEO environment, Tournear
states. The agency also is prepar-
ing the related software and algo-
rithms to show that their custody
satellites can run the algorithms contact: Kimberly Underwood,
that operate the flight electron- kunderwood@afcea.org
ics and can perform sensor and Speed in deploying
data fusion to tie all of the signals the National Defense
together. Space Architecture
The director also will be work- is a priority, says
ing on growing the SDA. The Space Development CUSTOMIZED MICROWAVE
agency started with less than five
employees when it was created
Agency Director
Derek Tournear. DATA LINK SOLUTIONS
in March 2019, and there were UHF-Ku Analog
about 12 people when Tournear took over, including a mix Band Transmitters & Digital
of contractor and government employees. “We’re just now Frequencies Receivers Video Links
up to 60, including contractors, FFRDC [federally funded
Full Duplex
research and development center] support, government Transceivers
career civilians and military personnel that are detailed to
SDA,” he shares. “Eventually, we’ll get to about 200. [We Solid State
Power
are all working] to get the capabilities out as rapidly as Amplifiers
possible.”
Multiple Low Noise Low SWaP
Notably, the SDA is slated to move into the U.S. Space Waveforms
Force by 2022, as dictated by the National Defense Autho- Amplifiers
rization Act of 2020. The SDA began as a defense agency
under the Office of the Undersecretary of Defense for
Tunable Audio or
Research and Engineering (USDR&E) and the agency will Data Subcarriers
retain ties with OUSDR&E, the director notes.
“In our role, we have enough autonomy and authority to
essentially establish what we need to put in place to deliver Land/Sea/Air
the capabilities and deliver these satellites,” Tournear offers. LOS and BLOS
“And our plan is to continue to push forward and deliver
Broad Design and
that tranche at the end of FY 2022, at which point, once we Manufacturing
start to fly and operate those satellites that are doing our Capabilities
data transport mission, as well as our missile tracking mis-
sion, then the new architecture will show that it has military 13741 Danielson Street, Suite J
utility. And at that point, the intention is to roll out from Poway, CA 92064
underneath USDR&E, where we then become the innova-   s&!8  
tion arm of the U.S. Space Force, and we will continue to do www.RamonaResearch.com
the same mission, but underneath the U.S. Space Force.”

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 33

Signal0820.indd 33 7/20/20 5:37 PM


The Naval Research Lab’s Blossom
Point satellite tracking facility
is fully automated, reducing
manpower and costs. Now, the
research lab is extending those
capabilities with autonomous
antennas in California and Hawaii.

NRL Extends Autonomous


Satellite Tracking Ability
The Navy’s Blossom Point site adds remote antennas.

B
y year’s end, U.S. Navy researchers intend to add operations in all orbits and complements and supports the
one of two remote autonomous antennas to its NRL’s skills in space systems by providing compatibility
satellite tracking architecture, enhancing its abil- testing, pre-launch, launch, and post-launch support,
ity to collect strategic satel- flight operations, and mission data processing, according
lite data and support space-related BY GEORGE I. to an NRL fact sheet.
research and development. SEFFERS The facility supports an advanced suite of ground
The first antenna will be located equipment in a resource pool that includes antennas,
at a secure, undisclosed and unmanned site in California front-end processors, command encoder units, receivers,
and will extend the tracking capabilities from Blossom amplifiers and all of the other equipment necessary to per-
Point, Maryland. The second is planned for Hawaii. form satellite command and control functions in a secure
Blossom Point is located south of Washington, D.C., and environment.
is owned and operated by the Naval Research Laboratory The systems there are fully automated, reducing man-
(NRL). It is considered a state-of-the-art command and power and costs. The foundation for this broad range
control facility capable of supporting satellite spaceflight of capabilities is the NRL-developed and government-
missions from launch through end-of-life. owned  Neptune software system, according to an NRL
The facility provides command, control, communica- website. The NRL has optimized the hardware and soft-
tions, network engineering, and management of new ware architectures over many years to maximize flexibil-
and on-orbit assets. Blossom Point supports spacecraft ity in integrating new spacecraft programs and ground

34 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 34 7/20/20 5:39 PM


DISRUPTIVE SATCOM

systems while minimizing manning for the engineers to go in and actu-


Emanuel Cavalarro

requirements and costs. ally test the whole architecture from


Blossom Point produces high-level Blossom Point end to end. And right now, it’s just
military mission data. “We support the
strategic layer where we provide lots of
At a Glance limited conditions with the COVID-
19 virus—limited by the number of
information in a much less expensive Number of Antennas people we can have on-site and what
but more robust manner,” says Robert at Blossom Point we can actually do with fewer people
Ritter, an NRL system engineer sup- (without extension): 10 at one time.”
porting the antenna expansion. Asked if it might be completed by
But for military purposes, they Highly automated support August, Cox suggests it’s possible.
see a high demand for weather data. for both operational and “There is a chance. There might be
“One of the really important ele- experimental spacecraft, with a really good chance. Either way, it
ments of data that we gather from eight simultaneous downlinks should be this year,” he adds. L-3
Blossom Point to mission is weather. and seven simultaneous satel- Harris Communications Systems
Being able to get weather over areas lite uplinks with future expan- West is the prime contractor on the
without coverage that a weather sta- sion on and off site planned extension effort.
tion doesn’t necessarily have but the Support for LEO, MEO, The final testing includes live sat-
spacecraft has, being able to get that HEO and GEO orbits ellite contact with the remote site
data more quickly, more reliably, out acting as a relay station. During the
to the field is very beneficial for the Command and control in UHF, contact, officials will transmit infor-
military,” adds Andrew Cox, who L, S, C, X, USB and SGLS bands mation to the satellite and download
heads NRL’s Satellite and Communi- mission data from the satellite. That
cations section. Simultaneous tracking information will then be processed
The site also supports experimenta- and data acquisition at Blossom Point, now referred to as
tion and space-related research and Health and status monitoring the hub site.
development for the military services, Live contact during final testing
the Defense Advanced Research Proj- Dedicated satellite operations also will include checking the health
ects Agency (DARPA) and others. center on the Air Force of the spacecraft. “A satellite will pass
They turn to Blossom Point because Satelite Control Network overhead, and we will be able to com-
“we’re good at it, because we’re effi- municate with the satellite and get
Support for all spacecraft
cient, and it saves them money for the status and health—what the bat-
phases of life from concept
these research and development satel- tery level looks like, how the satel-
definition and design to
lites that they have,” Cox offers. lite’s doing, whether it’s reporting
flight operations and
Now Blossom Point’s capabili- any anomalies or errors. It could be
eventual disposal
ties will be extended with the remote overheating, could be underheating, it
antennas in California and ultimately Quick response and on-call could be any number of things,” Cox
Hawaii as well. “Obviously, cover- capabilities to ensure mission explains.
age of a spacecraft on the ground is success at reduced costs He emphasizes the importance of
not always consistent. Extending that automation. “We can do all the testing
ground coverage gives us quicker Fully redundant ground we want without anybody being out
access to data from ground to a space- infrastructure with there. Nobody has to be there to do
craft by having more deployments of backup power onsite anything because we can do whatever
ground assets,” Ritter says. we want from Blossom Point.”
The Blossom Point location was The schedule for the Hawaii site is
originally chosen because it was a little less certain. The design is 95
remote enough not to receive a lot of electrical interfer- percent complete, Cox reports, but the effort “hit a little
ence, but having multiple sites offers additional advan- bit of a roadblock because the funding for that one kind
tages, Cox notes. “A number of years ago, we worked with of fell apart recently.”
the Pentagon, which funded us to extend our architecture The NRL has, however, fielded a temporary antenna
to California and Hawaii, to locations where we can and is delivering racks of associated computer equipment,
expand the footprint of the parts of the Earth that we can so the site should be operational to some degree this
cover in a more real-time fashion.” That funding began in month. “The permanent antenna is on order and will be
2017, he clarifies. done in January. We just have no concrete to put it on yet.
The California site has been undergoing final testing, The temporary antenna will be operational with limited
but officials couldn’t predict exactly when that testing operations until we find the funding and finish that part
might be completed. “If COVID wouldn’t have happened, of the work,” Cox indicates.
it would have been done right now. It’s really, really While antennas at both extension sites will be fixed,
close right now,” Cox says. “It’s just that we need time the NRL officials allow, when asked, that it is technically

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 35

Signal0820.indd 35 7/20/20 5:39 PM


DISRUPTIVE SATCOM

U.S. Naval Research Laboratory/Jamie Hartman


The Blossom Point Tracking Facility (BPTF) campus, located south of Washington, D.C., consists of a satellite
mission operations center, multiple antennas and an existing infrastructure capable of providing space system
command, control and management for all customer classes. The facility, operated by the U.S. Naval Research
Laboratory, is in continuous 24-hour, seven-day operation and, at present, supports numerous on-orbit spacecraft.

feasible to place antennas on a mobile platform. “There is “Ground networks, even though they seem like they’re
absolutely nothing preventing that,” Cox acknowledges. really, really good … get spotty sometimes.”
The officials tout the automation capabilities at both the And when the connections get spotty, synchronization
Blossom Point hub site and the Pacific region extension. is key. “It’s a matter of getting everything very tightly
“They’re completely autonomous remote facilities. The synchronized between the assets. We’re able to deploy
only time you visit them is to do maintenance, either for equipment that does that synchronization so that we have
preventive maintenance or upgrades or whatever you may reliable, error-free synchronous communications between
want to do. But there is no requirement to have people Blossom Point and those remote stations. That allows us
located at both sites,” Cox states. to have a variety of data rates, of mission data, and health
However, human intervention is possible. Typically, and status data go across this network extremely reliably,”
that is only done if a satellite is having issues, which is Ritter elaborates.
rare. “People can sit at a keyboard at Blossom Point, dis- The extension antennas are satellite agnostic, meaning
able the automation on the software with one click of a they will work with any kind of satellite in any orbit, Cox
button, and then when you do that, you’d better have a points out. “The remote antennas are universal. They’re not
person sitting there and getting ready to do something dedicated to any particular mission. You could do one mis-
with the satellite because now you’ve stopped the automa- sion for the Air Force, and 20 minutes later, you do one for
tion,” Cox points out. the Army or DARPA or NASA or whoever. They are not at
Even in times of trouble, automation often is preferable. all hard coded to a particular satellite or agency.”
“Having an automated system can help recover the space-
craft easier and faster than a person sitting in a seat,” Cox
adds.
Whether operations are automatic or manual, ground
networks play a critical role in connecting the remote
sites to Blossom Point, Ritter explains. “We have to condi-
tion the equipment that’s remote and the communication
link between that equipment so that we can transport contact: George I. Seffers, gseffers@afcea.org
data reliably across these ground networks,” he offers.

36 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 36 7/20/20 5:39 PM


CYBER

Leaders Seek a Grand Strategy


for Cybersecurity
Geopolitics in an online world are defined
by what’s changed and what hasn’t.
Photo by courtesy of S4

Former NSA hacker Dave Aitel speaks


at the S4 security conference in Miami.

W
hen the first Solarium Commission con- define illegitimate behavior online. And the third pro-
vened in 1953, it had the task of help- poses imposing costs on U.S. adversaries who violate
ing Former President Dwight D. Eisen- those norms through defending forward and persistent
hower and his cabinet colleagues assess engagement.
the threat from the Soviet Union after the death of Unlike its predecessor, however, the 2018 Cyber-
Joseph Stalin and agree on a stra- space Solarium Commission chose an all-of-the-above
tegic U.S. response. Three teams of BY SHAUN approach. It opted for a strategy it calls layered deter-
policy experts put together three WATERMAN rence that weaves together all three methods to dis-
competing policy models: contain- suade adversaries from trying to use cyber attacks
ment, confrontation and roll-back. Former President against the United States.
Eisenhower famously chose containment, a strategy But in cyberspace, deterrence means something very
based on the deterrence of Soviet military power and a different than it meant for the first solarium commission.
norms-based alliance with Western Europe. “In nuclear deterrence,” explains commission member
The Cyberspace Solarium Commission that Con- and former Department of Homeland Security Under-
gress chartered in 2018 says in its March 2020 report secretary Suzanne Spaulding, “it’s really binary. You either
that it also looked at three policy approaches. The first have deterred someone from using a nuclear weapon or
is denial and defense at home to strengthen the United you haven’t. There’s really no shades of gray there.”
States against online attacks. The second advises using Conversely, conflict is persistent in cyberspace,
networks of alliances to promote global norms and to pervasive and almost always conducted in shades of

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 37

Signal0820.indd 37 7/20/20 5:39 PM


gray. “There is cyber malicious activity taking place every unquestionably changes the geopolitical equation between
single day,” Spaulding says. And much of it is happening the United States and its adversaries: It abolishes geography.
below the threshold of armed conflict. “We needed a new An attacker can reach across the world online and strike
focus because many bad actors were going unchallenged a connected target in the U.S. heartland as easily as they
when they acted under that threshold,” she adds. could shoot across the street—and more clandestinely, if
And that means, in the cyber context, “When we talk about they’re any good.
deterrence, we’re not talking about a strategy that will cause For almost two centuries after 1815, the continental United
States, protected by thousands of miles of
ocean, remained inviolate to its foes. “For
Photo courtesy of 10 Downing St.

all those years, we didn’t think we needed


to invest in protecting our infrastructure,”
Adm. Montgomery says.
The terrorist attacks of 9/11 “were an
inflection point,” he says. For the first time
in modern history, an attacker reached
into mainland America, highlighting the
many vulnerabilities of the nation’s immi-
gration and aviation systems.
But even terrorists can be stopped at the
border—or at the airport. The threat from
cyber warfare is “more comprehensive,”
the admiral says, holding at risk any piece
of national infrastructure connected to the
Internet, which is pretty much all of it.
“After 9/11, we hardened our aviation
The UK cabinet holds a meeting using Zoom. and border infrastructure ... Now we have
to harden the rest of it,” he says.
malicious actors to entirely give up on using cyber activity to To do so, the commission recommends drawing on a con-
achieve their desired goals,” Spaulding relates. cept originally developed by the emergency management
Instead, layered deterrence uses all the elements of national community charged with responding to natural disasters:
power to change the strategic calculation of U.S. adversaries. resilience.
“We’re looking at how can we change their calculus to reduce “Resilience is something the national security community
the level and the impact of cyber activity to put us in a better started to think seriously about after 9/11,” says Spaulding,
position at the end of the day,” she says. “You want to increase who is a commission member. “It’s about reducing the con-
their costs and reduce their benefits.” sequences.” That’s important in the disaster context because
Indeed, as Atlantic Council Cyber Statecraft Initiative Director extreme weather events can’t be prevented. But it’s just as
Trey Herr observes, layered deterrence is better understood in important in the cyber context, where the defender’s axiom is
criminological terms. “Deterrence in the context of cybersecurity “assume you’ve been compromised.”
looks much more like what we think about when we think about In the context of a natural disaster, resilience means things
policing: trying to create change in a complex system to either like having a diesel generator on hand in case the power
incentivize or disincentivize certain behaviors.” goes out. In the cyber context, Spaulding explains, resilience
That difference is partially explained by the much larger means making society less reliant on computer networks that
numbers of players in the cyber arena as compared to the can be manipulated or brought down entirely. It means hav-
nuclear one, which was limited to a handful of nation-states. ing redundant backup systems.
In cyber, many more states have pieces on the board, and their “Obviously, you do everything you can to dissuade your
significant nonstate players include organized crime groups or adversary from attacking in the first place, and everything
ideologically motivated hacktivists. you can to secure your crucial systems ... but at the end of
These players often overlap, too. States will use criminal or the day, you may have to deal with a successful attack, and
hacktivist groups as proxies, fronts or cutouts to hide their resilience means reducing the consequences of that attack,”
hand. Intelligence services will reuse malware created by oth- she states.
ers for the same reason. In an election, for instance, resilience means having an
“Cyber undermines the fundamental principles of [classic auditable, recountable offline record like paper ballots.
Cold War style] deterrence because it enables malicious actors Online tabulation or reporting systems might be successfully
to operate ... in a gray zone where they enjoy plausible deni- attacked, but the paper ballots backstop those systems, thus
ability,” explains Rear Adm. Mark Montgomery, USN (Ret.), reducing the damage from the attack, Spaulding says.
executive director, Cyberspace Solarium Commission. But Dave Aitel, one-time NSA hacker and founder of the
But a different concept of deterrence also is needed cybersecurity firm Immunity, points out that hardening sys-
because there is one way in which the new connected world tems—deterrence by denial, as the commission calls it—isn’t

38 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 38 7/20/20 5:39 PM


CYBER

as simple as it might seem, given the hugely complex supply grid in a warning to President Vladimir V. Putin.” And U.S.
chains for computer software and hardware. “To do deter- intelligence agencies have a long and, to some observers,
rence by denial properly … you have to get your supply chain inglorious history of interfering in foreign elections, though
security exactly correct,” he says. not by cyber means.
The problem is the globalization of supply chains, both for The United States is not on the same page even with some
computer components like microchips and motherboards, of its closest allies when it comes to cyber issues like privacy
and for software itself because U.S. companies often out- and data protection, for instance. “The Europeans view pri-
source their code development offshore. And at least one vacy in a very different way than Americans do,” Aitel con-
link in almost all of those chains is in China, one of the larg- tends. “If we think that they believe the same thing we do,
est manufacturers of information technology products and we are fooling ourselves.
software development services in the world. “We want to be special,” he says of the United States. “We
That means that U.S. companies are often using compo- want the rest of the world to live by a set of rules that we’re
nents made, or software developed, in a country that has not necessarily willing to live by ourselves.”
one of the most aggressive cyber-espionage programs in the Libicki agrees, noting that, “We’ve paid some very smart
world, too. people in this country to do unto other countries the sort of
Aitel ridiculed the decision by the British government to things we don’t like being done unto us.”
hold cabinet meetings on Zoom, a video conferencing tool To avoid the charge of hypocrisy, he adds, “The sorts
that bases its engineering team in China and uses Chinese of things that we are wanting to prohibit [through global
servers to generate the mathematical keys utilized in its norms] should be the sorts of things that we’re willing to
encryption. “When you’re doing national grade work, how forego or never wanted to do in the first place.”
secure your supply chains are and where they’re coming But, Libicki observes, swearing off certain categories of
from becomes a major national security issue,” he points out. cyber attack might mean limiting the activities of top-tier
“Deterrence by denial involves really hard decisions about U.S. hackers to the detriment of national security. “Maybe
platforms,” Aitel adds. And those decisions are made even you shouldn’t give up things that we’re very good at even if
more difficult when the national software and hardware pro- [the adversary is] very good at them too, because that will
duction base has eroded because it was undercut by much end up favoring them,” he offers.
cheaper products from China and elsewhere. “When you’re Aitel notes that states generally don’t forgo such advan-
not the producer of any of the software you rely on, you are tages. “A lot of the pushing of cyber norms runs into the
essentially beholden to the people that do produce the soft- sand because state cyber interests are all conflicting.”
ware,” he says. It gets more complex still when you consider that the
But Martin Libicki, professor of cybersecurity studies principal U.S adversaries see cybersecurity in a very different
at the U.S. Naval Academy, says beyond the supply chain way than the United States where it’s a technical issue.
issues, some cyber strategy scholars see other problems with “China and Russia view cybersecurity issues inside their
the concept of deterrence by denial. “There’s no evidence country primarily in terms of if they can control informa-
that it works,” he says. Indeed, he adds, “the evidence is that tion, if they can protect the regime,” Aitel says. Their norms
hardening systems doesn’t stop anybody from trying any- center on censorship and surveillance, he explains, and those
thing,” though it might protect systems from compromise concerns about the integrity of national information ecosys-
when they do. But that’s not deterrence, argues Libicki. “If tems and regime survival are widespread in other countries,
I’m wearing armor and you swing a sword at me, I may be too. “I think their cyber norms ring pretty true to a lot more
unharmed. But were you deterred? No!” countries than we would prefer,” he states.
The commission’s vision of layered deterrence also depends
on successfully promulgating international norms of cyber
This is the first of two articles addressing the Cyberspace
behavior, something that has been one of the central principles
Solarium Commission’s proposed strategy of layered deter-
of U.S. global cyber strategy for at least a decade.
rence. The second article will look at persistent engagement
These norms, articulated most recently in a 2017 G7 decla-
and defending forward.
ration, don’t have the authoritative status or the exactitude of
international law. In theory, they represent a set of commit- Shaun Waterman is an award-winning reporter and editor
ments broad enough to have impact if widely respected but who has worked for the BBC, UPI and POLITICO. He is
fuzzy enough that states don’t feel like they’re tying their own currently freelancing covering federal information technol-
hands too tightly. They include actions such as not attacking ogy, cybersecurity and homeland security.
or using Computer Emergency Response Teams (CERTs) as
attackers; not engaging in commercial cyber espionage such
as intellectual property theft; and not damaging civilian infra-
structure such as the power grid or elections systems.
But Aitel argues that there’s a level of hypocrisy in U.S.
endorsements of these principles. Last year, for example, The
New York Times reported that U.S. Cyber Command was contact: WatermanReports@gmail.com
“stepping up digital incursions into Russia’s electric power

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 39

Signal0820.indd 39 7/20/20 5:39 PM


SPECIAL INTEREST EDITORIAL

Getting the Whole Picture


with Next Generation 911
Mobile device capabilities make first responders
more efficient, situationally aware.
BY HENRY S. KENYON Leveraging smartphone other nearby mobile devices to get its
location in relation to them.
Mapping and location finding technology
technologies common to every This technology is now used to cover
smartphone are making their way The current global pandemic situation, 911 calls by roughly 90 to 95 percent of
to 911 emergency calls, letting first with many people staying at home and the U.S. population. It allows compa-
responders know exactly where to go working remotely, created a unique nies like Avaya to notify an enterprise
and saving precious time that can be situation for NG911 that wasn’t present when a cell-based 911 call is made from
used to save lives. one or two years ago, Anderson says. an associated physical location like a
Older, more static technologies can’t corporate campus or office.
These capabilities are emerging in really track remote workers’ cellphone
what’s known as Next Generation locations, but next-generation SIP- An example would be a large
911, or NG911. They represent a based systems can do this. government facility like an Army base.
fusion of mobile device applications If someone is injured in an accident or
and services that are being overlaid Besides allowing users to automatically has a medical emergency on the base,
or built into these new emergency report their locations every time they when they call 911, the NG911 system
telecommunications systems that let log into their work laptops or their would also notify base authorities—
police, paramedics and firefighters get cellphones, SIP-based technology also something current 911 systems can’t
to exactly where they need to be. lets 911 immediately detect a person’s do, Anderson says. Besides not being
location when they call. This is vastly aware of an emergency on the facility,
Part of the change to NG911 tech- different from older systems that even base personnel would only have a
nology is reflected by the major one or two years ago required users to vague idea where the call came from,
telecommunications carriers shifting submit a location change request and whereas the new technology essentially
away from their legacy databases and then wait 48 to 72 hours for it to go creates a Google Maps view of where
systems to session initiation protocol into effect, Anderson says. the caller is located.
(SIP)-based systems. SIP is a signaling
protocol used for initiating, maintain- One of the reasons NG911 technology However, there are still some issues with
ing and ending real-time sessions works with a variety of mobile devices NG911’s use on facilities such as military
including voice, video and messaging is thanks to the work of a company bases, such as security considerations
applications. SIP is used for signaling called RapidSOS, which approached when connecting into an IP-based com-
and controlling multimedia commu- Apple and Google with software mercial network, Anderson says.
nication sessions in Internet telephony code for smartphones and tablets
applications for voice and video calls, that greatly increased the accuracy of Avaya’s NG911 system is designed to
private IP telephone systems, instant the data coming from those devices. work within set geographic boundaries,
messaging over Internet Protocol net- Because 80 percent or more of 911 such as a military facility or corpo-
works and mobile telephone calls. calls come from mobile devices, rate campus. Any mobile devices on
Anderson notes that this created an that covered terrain are automatically
While the shift to SIP is ongoing, the opportunity for expanding the reach of detected and connect to the system
technology itself is over a decade old NG911 capabilities. when they make a 911 call because they
and is very mature, says Brian Ander- go through the customer’s defined Rap-
son, director of public safety at Avaya. RapidSOS’s technology was included idSOS Geo-Fence.
He adds that although public safety in recent Apple and Google Android
lags behind in this area, nations like devices where it allows their location At the same time, when the informa-
Canada lead the world in mandating information to be transferred between tion for a 911 call is going out to the
NG911 and the U.S. is close behind other devices. This means that a 911 center, the NG911 service also noti-
in that migration as telecom carriers smartphone won’t just gather GPS fies the facility’s government or private
move away from wireline services and and WiFi data to get its geographic enterprise as part of Avaya’s subscrip-
regional pockets move to NG911. position, but also communicate with tion service, Anderson says.

40 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 40 7/22/20 1:10 PM


SPECIAL INTEREST EDITORIAL

About NG911 device or to subscribe to a service. He temperature to detect anyone with a


adds this makes little sense because all a fever, or to search for weapons. In either
Avaya has sold a Next Generation 911 person should do is call 911 when they case, he notes that they are prevented
product called SENTRY for some years, need it, without any additional worries. from entering the main facility, either
Anderson says. SENTRY is made for being isolated or directed to a side entry
Avaya by a company called 911Secure. “If I were to pass out and my kid picks where their status can be determined.
up my phone next to me, they’re going
While this product has been on the to call 911. There’s no reason to have any For its enterprise customers, Avaya’s
market for a while, what is happening kind of app or app to unlock my phone NG911 system is designed to be highly
now is the addition of more data- to get an app for emergency response, automated, allowing it to run in the
based solutions, capable of reporting just dial 911. The technology is there— background on a corporate network
location data from cellphones calling all the hooks and handles in terms of until its needed. This approach differs
911 using the 911inform application. finding data, finding location, all that for government customers such as intel-
Additionally, the latest applications kind of stuff is already there in the back- ligence community organizations with
allow multimedia files detailing a ground,” Anderson says. high security requirements. In these situ-
caller’s location to be sent to first ations, where most mobile devices are
responders and those using the public Such automation could also be used either locked down or not permitted to
safety answer point (PSAP), he says. for other Internet of Things and mobile move freely around a facility, Avaya gives
devices, from individual medical those customers more fine-grained con-
“The real difference over the last two aid devices that send out an alert if a trol over how the system interacts with
years is we’re getting much more from person is having a health emergency, to them and what information is shared
911 callers based on an enterprise PBX shot-spotter devices police departments with the commercial network. This often
system that we can deliver [data] to as use to detect and locate gunfire. This boils down to less automation and more
well as cellphones,” Anderson says. data from a variety of devices can human-based management, he says.
potentially be fused to create maps
On the enterprise side, what is and overlays in police department and Anderson expects the technology to
important is the data that NG 911 can emergency services command centers, become more sophisticated and even
supply. This includes the nature of the allowing first responders to quickly more automated in time. In a commer-
emergency, a person’s location down to respond to incidents. cial environment, when a person calls an
one meter outdoors and three meters airline to make a reservation, the system
indoors. This is different from cell Depending on the size of an enterprise, can recognize a repeat customer or an
tower triangulation that is only accurate NG911 systems like Avaya’s allow individual, potentially directing them to
to somewhere between 100 and 200 organizations to layer on services, such reservations or some other service. None
meters, Anderson explains. as providing automatic notification of this happens in public-domain sys-
calls to key personnel when a 911 call is tems such as 911 today, he says.
These new capabilities provide made from a facility, or also including
emergency responders with highly building security camera feeds and Emergency dispatching is still done
accurate location information and paging services that can be shared with manually today, meaning that an
potentially other data, such as a person’s first responders. operator looks for the radio tags of
health status and floor plans with a police officers in the area to direct them
marker of the 911 caller’s location on it. If there is a building fire, for example, to an incident, Anderson explains. In
after the 911 call is made first the near future, such systems may be
Avaya is working with partner com- responders could get an interactive floor integrated with NG911 technologies
pany Synergem Technologies Inc., on plan of the facility that allows them to that can use algorithms and navigation
a product that will answer 911 calls in click on cameras to directly view their tools to more efficiently direct police
the PSAP, the call center that receives feeds. If the fire is on the north side of and medical teams to incidents,
911 calls. This will take advantage of a building, then first responders could navigating them around traffic and
existing infrastructure used by Avaya’s access the paging system to direct the other delays to get there more efficiently.
Communication Manager tool, allowing people in the structure to evacuate to
the company to provide additional func- the south side, possibly by following The main goal is to do more with
tionality “that’s fully NENA i3” compli- emergency strobe lights activated automation to decrease dispatch and
ant without heavy modification to the during the emergency, Anderson says. response times, which is attractive to
existing infrastructure, he says. cash-strapped law enforcement agencies
A near-future goal for the technology is and municipalities, Anderson says.
Automation is key to use artificial intelligence tools to make
automated decisions for facility own-
An important aspect of Avaya’s NG911 ers. Such a product could be used by a
technology is ease of use and automa- school district and consist of a two-door,
tion. Anderson notes that many mobile two-stage entry into a facility where peo-
911 applications and products require ple coming in are scanned by cameras. For more information,
the user to download software onto their This can be to either detect their body visit www.avaya.com

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 41

Signal0820.indd 41 7/22/20 1:10 PM


SPECIAL INTEREST EDITORIAL

Multi-Domain Secure Systems


Aid Remote Government Workers
Devices let at-home workers securely access classified data.
BY HENRY S. KENYON Traditionally, intelligence community “Their data, applications and
or other government personnel with operating systems all run within
Intelligence community and access to classified information cannot headquarters or their protected
government personnel who work work from home at all. The select few data centers, and all that’s being
with classified or sensitive that are allowed require a specialized sent to the user is a redisplay or
information often use multiple setup. This often consists of a safe the view of those applications
computers on their desks, each one to store one or more secure laptop running remotely,” Kamis says.
connected to a separate network computers and encryption devices
based on the security level of the that allow their computers to securely When users log into their computers,
information being accessed. connect to classified networks. This they don’t really log into the Trusted
can be impractical to scale in special Thin Client Remote; instead they
This can create a variety of IT and conditions, like working in a COVID indirectly log into a computer running
logistical challenges for workers pandemic. This also does not scale for in the customer’s data center and any
onsite, but as ongoing COVID-19 those individuals, who might need to programs, such as Microsoft Outlook,
pandemic and other circumstances access dozens of secure networks that they access all reside in that data
force more people to work remotely, during the workday, Kamis says. center. Display data is sent to the
managing all of this equipment and remote user, but Kamis notes that no
their security requirements from This can now be done in a more sensitive data ever is stored on their
a private home can be difficult or streamlined manner with a system laptops at any time. When the user
nearly impossible without multilevel like Forcepoint’s Trusted Thin Client: logs out of the system, no data resides
secure systems capable of doing the Remote, which allows remote users on their laptop, Kamis says.
job of multiple desktops in a single to securely access unclassified and
secure station. classified networks using technology This is a great benefit for personnel
developed in compliance with the working remotely who need to access
Although such systems have been National Cross Domain Management information on multiple secure
used for years, the pressing need for Strategy Office and National Security networks. The Trusted Thin Client:
staff to work securely from home Agency’s Commercial Solutions Remote eliminates the need and
opens new opportunities for cross- for Classified (CSfC) program. The security headache of keeping multiple
domain solutions because while technology leverages cross-domain laptops in a safe or maintaining an
they are useful in eliminating excess technology and off-the-shelf virtual encryption device, he adds.
infrastructure and physical space private network technology to make
requirements in an onsite, enterprise A big challenge government
a secure network connection to a
setting, they are ideally suited for agencies face when setting up
classified network, protecting any
meeting the surge in home telework remote workers is being able to
information in transit between the
created by the pandemic. scale up large numbers of end
worker and the enterprise, Kamis says.
points and their security levels.
One big advantage of systems like Besides providing secure For commercial solutions in this
Forcepoint’s Trusted Thin Client connectivity to a variety of space, scalability and the ability to
is that in an institutional setting, networks at different classification support it from a range of different
“it eliminates the need for person- levels, he notes that it also makes products is a key requirement that
nel like analysts to have multiple use of the CSfC-developed Forcepoint can meet, Kamis says.
computers linked to different secure encryption technology to secure the
networks on their desks. This allows data while it’s in transit and at rest.
workers to access different networks
with varying security levels from a Forcepoint also leverages a virtual
single endpoint device by clicking desktop infrastructure that allows Forcepoint’s cross domain solutions
on a menu on their desktop,” says users to access a variety of work envi- are included on the US NCDSMO
George Kamis, chief technology offi- ronments, both classified and unclas- baseline list for TSABI, SABI, meet NSA’s
cer for Forcepoint Global Govern- sified, from standard government- Raise The Bar guidelines, and are on
ments and Critical Infrastructure. issued laptop computers. the CDM Approved Product List (APL)

42 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 42 7/22/20 1:11 PM


When Multi-Domain Access is
Mission Critical, 3 Things Matter
FORCEPOINT
OTHER
TRUSTED THIN
VENDORS
CLIENT REMOTE

Scalable Endpoints
Scalable Classification Levels
Scalable Management

Forcepoint Trusted Thin Client Remote provides secure, desktop access across multiple domains of different
classification levels on a single device. It’s running on more than 160,000 devices with proven deployments
at scale often connecting numerous classification levels and deployed around the globe by the DOD,
DOJ, IC, and other agencies. It is highly scalable, with the ability to easily add more classification levels and
endpoints at any time through centralized management. This is the scalable, easy-to-manage, multi-domain
access technology you need.

For more information https://bit.ly/3ecnj3B Scan with camera

When-Remote-Access-is-Mission-Critical-Print-Ad-8.25x10.875in-15July2020.indd 1 7/16/20 4:32 PM


Signal0820.indd 43 7/22/20 1:11 PM
ACCESS THIS FREE WEBINAR
www.afcea.org/signal/webinar

What to Consider When Purchasing


an Unmanned Aerial System
SPEAKER:
JEFF
HENDERSON
Strategic Account
Manager, Army/
Special Services,
Panasonic

SPEAKER:
RYAN
ENGLISH
CEO and
Co-founder,
Militaries worldwide are investing in UAV/UAS technol- FLYMOTION
ogy to survey and conduct strategic offensive measures
to protect and defend. Small unmanned aircraft systems
(sUAS) provide a fast, simple and beneficial tool for C4ISR
scenarios. Equipping the UAV with various sensors such
as infrared or high-powered zoom cameras allows for the MODERATOR:
collaboration of important information that may not nor- ROBERT K.
mally be attained through other methods. sUAS allow for ACKERMAN
a quick deployment by an individual or team and does Editor in Chief,
not require the manpower or resources necessary to op- SIGNAL Magazine
erate larger systems. The sUAS are also orders of magni-
tude less expensive than their larger counterparts. The
technology is advancing at such a rapid rate that smaller
systems provide the capabilities previously only available
to larger vehicles. There are a number of systems that can
meet the needs of those who are down-range and those
at home. Ground control stations and viewing terminals
are critical components of successful capture and ex-
ecution efforts. In this webinar, we’ll discuss the role that
Panasonic TOUGHBOOKs play as part of numerous UAS
deployments and how FLYMOTION provides end-to-end HOSTED BY
UAV technology to government and defense, incorporat-
ing TOUGHBOOKS to users in the field.

Signal0820.indd 44 7/20/20 5:40 PM


ProductQuest

Advanced Computing
Escondido, California-based One
Stop Systems Inc. is offering a com-
puting expansion system that sup-
ports NVIDIA A100 Tensor Core
graphics processor units (GPUs).
The company claims that it can
improve computing performance by
up to 20 times of previous levels and
allows developers to scale up servers by adding up to eight of the GPUs. The sys- Improved Position,
tem works with computing-intensive applications such as artificial intelligence
(AI) training, AI inference, video analytics and mixed-reality rendering. Navigation
For more information, visit www.onestopsystems.com. and Timing
GridGain Systems is providing enterprise-grade in-memory computing solu-
Neûchatel, Switzerland-based Orolia is offer-
tions that offer high performance, scalable applications that leverage digital
ing a low size, weight, power and cost min-
integration hubs, hybrid transaction/analytical processing and other strate-
iaturized rubidium oscillator, known as the
gies. The company, headquartered in Foster City, California, suggests that
Spectratime mRO-50. The mRO-50 provides
common use cases for their platform include application acceleration and as
accurate frequency and precise time syn-
a digital integration hub for real-time data access across data sources, as well
chronization to mobile applications, includ-
as legacy and greenfield applications.
ing military radio-pack systems in global
For more information, visit gridgain.com. navigation satellite system- (GNSS-) denied
environments. Its improved operating

Artificial Intelligence temperature of -10°C to 60°C—extended


to -40°C to 75°C in the military version—
Data-to-knowledge company Babel Street recently announced it acquired is also ideal for unmanned aerial vehicles
patented technology from the software firm Dunami that leverages advanced and underwater applications, the com-
artificial intelligence and machine learning to conduct relationship analysis pany says.  Orolia also has partnered with
of associated networks and audiences.  According to the Washington, D.C.- Granada, Spain’s Seven Solutions, which
based company, the technology automatically identifies the intersection of builds sub-nanosecond time transfer and fre-
key trends and influential patterns from audiences from publicly available quency distribution tools for industrial and
information across more than 200 languages. scientific applications. The partners intend to
develop additional systems that help protect
For more information, visit babelstreet.com. 
against the disruption and manipulation of
New York-based ResoluteAI has launched a platform called Conceptual Attribute positioning, navigation and timing services,
Search, or CAtS, designed to enhance scientific search capabilities. The platform including global positioning system and
uses artificial intelligence and scientifically focused machine learning to provide GNSS jamming, spoofing and outages.
key results for researchers involved in long, highly-technical search queries.  For more information,
For more information, visit resolute.ai visit orolia.com or sevensols.com

Find. Download. Solve.


The SIGNAL Media Resource Library
provides you with content that
is relevant to your job.
SEARCH THE LIBRARY TODAY!
www.afcea.org/signal/resources

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 45

Signal0820.indd 45 7/20/20 5:42 PM


Membership in
AFCEA Delivers
AFCEA connects great ideas, vital solutions and innovative
people to advance the global security mission. 

Learn
AFCEA members receive SIGNAL Magazine each month. This
award-winning, premier publication, along with SIGNAL
Online and The Cyber Edge, covers the latest cyber
technologies, communications, electronics, intelligence,

ENGAGE
and information systems, equipping you for success.

Your Network is
Never Down
Through our chapters worldwide, you are part of an

with decision makers extensive network of government and industry


professionals in the fields of cyber, IT, communications, and
intelligence. You have an instant connection through the
local AFCEA chapter network, wherever you travel or work.

Engage With Military,


Government and
Industry Leaders 

EXPAND
As a member, you’re eligible for discounted rates to
participate in AFCEA’s acclaimed national and international
exhibitions, conferences and symposia. 

Get and Stay Smart


your market reach
Corporate members engage.
AFCEA’s events also include dozens of sessions that have
been approved as qualified continuing education
sessions —all included in your member-discounted
registration. In addition, your attendance documentation is
provided directly to members.
Learn more about corporate memberships at: www.afcea.org/membership.

Be Seen
AFCEA’s Corporate Directories are seen by over 5,000 key
executives each month. Corporate Members get a listing in
any of directories for Cybersecurity, Education, Health IT,
Homeland Security, or Intelligence Community, and can
use the directory’s power search tools using keywords or
NAICS codes.

Save
On tuition through Preferred providers of education, as well
as through CompTIA discounts on Certification Vouchers.

AFCEA International Media Build Your Future


With awards and scholarship programs recognizing your
JOIN TODAY! www.afcea.org/membership professional and academic accomplishments.

Signal0820.indd 46 7/20/20 5:42 PM


Association News
AFCEA Website www.afcea.org • Online Directories www.afcea.org/directories • SIGNAL Online www.afcea.org/signal
AFCEA Main Number (703) 631-6100 • For a full list of AFCEA contacts, visit http://url.afcea.org/contacts

New
AFCEAN of the Month Corporate
Master Sgt. Heath Curless, USAF Members
Listed below are the latest
KAISERSLAUTERN MILITARY CHAPTER organizations to become
corporate members of

M
aster Sgt. Heath Curless, USAF, has been contributing to AFCEA International. A
the Kaiserslautern Military Community (KMC) Chap- capabilities statement for each
ter since 2018, when he decided it was time to get more new member will be published
involved. He competed for a board position and was elected to in this issue or in the future.
the Events Committee, a role that he still holds today. A complete list of corporate
Sgt. Curless is responsible for coordinating chapter events to members is available online at
include two Tech Expos and a Sports Day event each year. The www.afcea.org/membership/
KMC Tech Expos have averaged more than 500 attendees and corporate/corporates.jsp.
50 vendors per event over the past two years, with the most
Boone Group
recent Tech Expo held February 12, 2020, at Ramstein Air Force Base, Germany.
During his tenure, he has led three Tech Expos and two Sports Day events. BSEt LLC
Additionally, Sgt. Curless is involved with the Cycle 4 STEM team. In 2018, Coder
his team of 20 riders rode 250 kilometers over three days while raising $36,000 Document Storage
in donations. All donations went toward scholarships in the KMC area for Systems Inc.
those entering STEM career fields. He enjoyed it so much that he led the team FedLearn Inc.
in 2019, raising another $32,000. Fraym
Furthermore, Sgt. Curless organized the most recent KMC AFCEA Golf Information Partners Inc.
Tournament. This event capped off the Expo Week and directly contributed JETCOOL Technologies Inc.
$5,800 for STEM scholarships. Precision Procurement
Sgt. Curless works for Headquarters U.S. Air Forces in Europe-Air Forces Solutions
Africa, Communications Directorate, where he is a command satellite com- Resecurity Inc.
munications manager. He will soon be moving back to the states and hopes to RSBG ICT GmbH
continue to serve on the board at his next chapter.
Security Centric Inc.
In recognition of his dedication to the association, AFCEA proudly names
SES S.A.
Master Sgt. Heath Curless, USAF, AFCEAN of the month.
Wealth Management
Information Security

SIGNAL’s newest
online section and
e-newsletter dedicated
to all things CYBER. news.afcea.org/TheCyberEdge

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 47

Signal0820.indd 47 7/20/20 5:43 PM


ACCESS THIS FREE WEBINAR
www.afcea.org/signal/webinar

Identity Governance in
Multi-Cloud Environments
These days, more than three out of four agencies use multiple cloud platforms. This gives them
the freedom to match the requirements of each use case to the unique strengths of each cloud
platform, whether it’s AWS, Azure or Google Cloud Platform. What these agencies lack, however,
is a way to effectively and securely govern access across these multi-cloud environments. These
challenges leave businesses open to the risks and costs of non-compliance, cyber attacks and
simple human error. Some may use native tools with basic identity and access management
for a single platform, but this is not governance.
This lack of governance also stifles productivity and growth—if users can’t get the access they
need when they need it, work doesn’t get done. Managing who has access to what and with
which privileges is a real challenge in the cloud due to rapid change and large scale. SailPoint
Identity and Cloud Access Governance allows IT and security teams to back control of cloud
access by providing 360-visibility across the enterprise and cloud infrastructure and adds a
critical layer of security and governance. Cloud security is a journey not a destination.
Join us in this informative session to begin
plotting the course to your successful
SPEAKER:
and secure cloud journey. Discussion Topics:
• Understand the three key questions of
FRANK
governance: Who currently has access? BRIGUGLIO
Who should have access? Global Public
How is the access being used? Sector Strategist,
• Discover access relationships, patterns and SailPoint
improve the application of access controls.
• Manage and control access to your
hybrid cloud infrastructure including
MODERATOR:
AWS, Azure and Google Cloud.
• Enforce access to cloud infrastructure with GEORGE I.
predefined policies and credential cycling. SEFFERS
• Leverage out of the box compliance guardrails Executive Editor,
to monitor for adherence for NIST SP 800-53. SIGNAL Magazine

HOSTED BY

Signal0820.indd 48 7/20/20 5:43 PM


Greenspan Wins AFCEAN of the Year
Award for Exemplary Service
BY CHUCK GRIFFITH participated in numerous events, but says. “We also provide our members

T
working with the Women in NOVA with more intimate settings to connect
he essential qualities of a good (WIN) Committee was her first expe- one-on-one with industry and govern-
leader include integrity, account- rience with volunteering.  The WIN ment leadership, including Small Busi-
ability, humility, vision and posi- Committee provides a forum for ness Breakfasts, Annual Golf Outing,
tivity, and AFCEA is an excellent women in government, military and Women in NOVA speaker series and
environment to grow leadership skills, industry, offering them the opportu- our popular Young AFCEAN social
according to Tamara Greenspan, this nity to prepare, promote, support and events.”
year’s winner of The General James M. mentor senior and emerging leaders The chapter’s monthly luncheons,
Rockwell AFCEAN of the Year. “The within the STEM fields. IT Days, breakfasts and special
world is always changing, and a strong “There are so many amazing leaders events allow members access to gov-
leader needs to be able to adapt to in AFCEA International and AFCEA ernment speakers who are experts
changes in the environment and work- NOVA,” Greenspan says. “Becoming in current policy and possess insight
force and consistently look to improve, co-chair of that [WIN] committee into future objectives. “[We] have
adjust and innovate,” she suggests. was how I was exposed to the AFCEA the Pentagon in our back yard, the
The Rockwell award is AFCEA’s NOVA board.” nation’s capital right next door and
premier award given for exemplary Greenspan has always been passion- the backbone of the Internet at our
service to AFCEA over the past year. ate about helping women in the work- center,” Greenspan says.
Greenspan, from the Northern Vir- force, and WIN was the perfect way Greenspan advises AFCEA mem-
ginia Chapter (NOVA) and group for her to engage with AFCEA NOVA. bers interested in becoming chapter
vice president of public sector appli- After joining the leadership team, she leaders to “get involved, engage and
cations, Oracle, exemplifies commit- was elected to the board and eventu- find your passion.” She recommends
ment, humility and dedication. As the ally became president, a position in that members reach out to their local
chapter underwent changes for the first which she has excelled for the past two chapter, volunteer and offer assistance.
time in a few years, Greenspan dedi- years. “I think the best way to get involved
cated time and energy to helping the With over 6,500 members, the chap- is to join a committee and help with a
board weather the storm by providing ter’s mission is to connect membership program or event. You will understand
leadership and guidance. “I was pas- with the government through a variety how the chapter works and how best
sionate about working with our board of meetings and events. These include your skill sets can support the chapter.”
on innovation and encouraged new popular monthly luncheons that run Greenspan champions AFCEA’s
ideas and making changes if that was September through June and feature rewarding leadership opportuni-
the best for our membership,” she says. leading government speakers giv- ties, and she has taken advantage of
“I have had the privilege of support- ing presentations about information as many as possible. “It has been an
ing the DOD for more than 30 years, technology and its relationship with amazing experience, and I have truly
and I love working in the public sector national security, as well as other rel- enjoyed my time as president and look
industry. I am lucky to work with an evant U.S. Defense Department topics. forward to engaging and helping as a
amazing AFCEA NOVA board with “We hold larger full-day IT Day past president.”
many different backgrounds, leader- conferences, featuring speakers …
ship skills and DOD experience.” from the Army, Navy, USMC [U.S. Chuck Griffith is the vice president of
Greenspan has been an AFCEA Marine Corps], Air Force, DOD and information for the Northern Virginia
member for many years and has other federal agencies,” Greenspan Chapter.

Connect with AFCEA JOIN our LinkedIn Group to discuss


best practices, ask questions, share

on Social Media
concerns and highlight news.
LIKE us on Facebook to access
important AFCEA updates.
AFCEA is dedicated to encouraging conversations FOLLOW us on Twitter for real-time
and providing valuable information where it’s news that fits your busy schedule.
most convenient for you. Connect and engage Find links to these pages and more under
with us on your favorite social platform. “Connect with Us” at www.afcea.org

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 49

Signal0820.indd 49 7/20/20 5:45 PM


Corporate Capability Statements
The following new AFCEA corporate members have recently completed online capability listings.
See the full profiles of these and other AFCEA corporate members in searchable form at www.afcea.org/directories.

ATLAS SOLUTIONS PLUS Products/Services: Fraym has best-in-class capabilities in the


928 S 201st Street, Elkhorn, NE 68022  following areas: geospatial data, predictive analytics, machine
(402) 782-1774 • Email: gtaylor@atlassolutionsplus.com learning and artificial intelligence GIS mapping software
Website: www.atlassolutionsplus.com development
Owner: Glenn Taylor Business Type: Small business.
Business Focus: Atlas Solutions Plus is the premier disabled
veteran-owned and operated company specializing in training, MERRITT GROUP
education and consulting. Atlas Solutions Plus offers superior 8251 Greensboro Drive, Suite 600, McLean, VA 22102
cyber certification, soft-skill training and unparalleled consulting (703) 390-1500 • Email: info@merrittgrp.com
services. Courses are taught by experienced professionals who Website: www.merrittgrp.com
are singularly-focused on their customers’ needs and success. CEO: Alisa Valudes Whyte
The use of mobile training teams enables tailored training Business Focus: Be audacious, and we will triumph together.
opportunities at the local level to organizations nationwide. Every goal. Every time. There is great power in the right blend
Atlas Solutions Plus is dedicated to engaging minds and of marketing PR and creative grounded in industry expertise—
empowering success. it means that Merritt Group’s strategy is always connected to
Products/Services: Bootcamp certification training focusing on market and business goals. Merritt Group empowers others
CompTIA and EC Council courses, as well as custom training to join in disrupting the status quo and changing the world.
created to meet customer needs. This belief makes Merritt Group bold in helping clients chart
Business Type: Service-disabled, veteran-owned small a course. Forge ahead with Merritt Group and discover a rare
business. find—data analytics, cutting-edge digital, smart creatives, big
ideas and great storytelling—in one agency.
CIS SECURE Products/Services: Marketing, public relations, creative and
21050 Ashburn Crossing Drive, Suite 145, Ashburn, VA 20147 content development.
(703) 996-0500 • Email: sales@cissecure.com Clients: Deloitte; Samsung; Unisys; BAE Systems; Booz Allen
Website: www.cissecure.com Hamilton; CACI; CrowdStrike; and Microsoft.
Business Focus: CIS Secure is the leading supplier of secure Business Type: Woman-owned small business.
communications products, with the leadership and expertise
to provide best-in-class security solutions that meet the MONTREAT COLLEGE
highest and strictest government standards. Its customers PO Box 1267, Montreat, NC 28757 
include organizations within the defense, intelligence, law (828) 413-2311 • Website: www.montreat.edu
enforcement and homeland security communities whose CEO: Paul Maurer
missions depend heavily on the ability to communicate and Business Focus: Montreat College is a private, Christian
securely exchange information and to operate in challenging liberal arts college founded in 1916 and offering associate,
physical environments. CIS Secure’s diverse product portfolio bachelor’s and master’s degree programs for traditional and
of advanced, emerging and custom-built technologies are adult students. Montreat College’s main campus for four-year
developed by collaborating with the industry’s leading OEMs to traditional students is located in Montreat, North Carolina,
deliver high-quality, dependable and cost-effective solutions. in the foothills of the Blue Ridge Mountains just outside
Products/Services: CIS Secure’s portfolio of secure and Asheville, North Carolina. The college’s School of Adult and
custom communications technologies includes TEMPEST, Graduate Studies also has locations in Asheville, Charlotte and
TSG, plus a broad portfolio of tactical and custom products. Morganton, North Carolina, and online.
Its mission is to meet the most demanding requirements for
government and commercial security-conscious customers. SECURITY CENTRIC INC.
Business Type: Small business. 689 Splitrail Court, Livermore, CA 94551
(925) 292-4309 • Email: info@securitycentric.net
FRAYM Website: securitycentric.net
7900 West Park Drive, Suite A160, McLean, VA 22102 CEO: Sean Hulbert
Email: info@fraym.io • Website: www.fraym.io Business Focus: Security Centric Inc. is a cybersecurity
CEO: Ben Leo enablement company that specializes in hardened, secure
Business Focus: Fraym is a geospatial data company that uses virtualization technology. It offers cutting-edge cybersecurity
proprietary machine learning algorithms to deliver precise, courseware development, security assessments and cyber risk
local-level information about people in Africa, Asia and Latin management consulting. Security Centric has designed custom
America. Fraym helps fast-growing companies, government cybersecurity solutions that are actively being used around
agencies and development organizations succeed in places the world. The company develops hands-on cybersecurity
where data has been traditionally hard to access. Fraym’s high- programs that map to leading industry certifications and are
resolution data goes down to 1km^2, and adds an entirely new now focusing on professional skills gap closure.
dimension to strategic and operational planning discussions. Products/Services: Courseware development; cybersecurity
Previously unanswerable questions like, “Where are my target services in penetration testing; risk management; secure cloud
populations?” and “What services are they interested in?” can environments; cybersecurity training; and digital forensics.
now be answered quickly and confidently using Fraym data. Business Type: Federally-designated small business.

50 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 50 7/20/20 5:46 PM


AFCEA Sustaining Members*
A.M. Fadida Consulting Cisco Systems Inc. IBM Federal Northrop Grumman
Abacus Technology Cole Engineering Services Insperity Corporation
Corporation Inc. Intelsat General Corporation NTT DATA Federal Services
Accenture Collins Aerospace Jet Propulsion Laboratory Inc.
Aerospace Corporation, The Comcast Business Services L3Harris Technologies Oracle America Inc.
Artel LLC CommScope Leidos Parsons
AT&T Government Dell Technologies Lockheed Martin Perspecta
Solutions Deloitte LLP Corporation Poly
Avaya Government Elastic Federal ManTech International Raytheon Company
Solutions Ernst & Young (EY) GPS Corp. SAIC
BAE Systems FedData Technology McAfee Inc. Samsung Electronics
Bechtel National Inc. Solutions Micro Focus US Inc. America
BeyondTrust Inc. Fortinet Inc. Microsoft Corporation SAP Public Services
Boeing Company, The General Dynamics IT MITRE Corporation, The Serco Inc.
Booz Allen Hamilton General Dynamics Mission Motorola-U.S. Fed. Gov’t Sev1Tech LLC
CA Technologies Systems Markets Div. Telos Corporation
CACI Inc. General Micro Systems Inc. NEC Corporation of Teradata Government
Carahsoft Technology Corp. Google Inc. America Systems
CenturyLink Government Guidehouse NetApp USAA
CGI Hewlett Packard Enterprise Netscout Systems Verizon
Chenega MIOS HP Inc. Noblis ViON Corporation

* List is current as of June 8, 2020. A complete list of AFCEA’s corporate members is available at www.afcea.org/membership.

TechNetCyber
Webinar Channel
Leading up to AFCEA’s TechNet Cyber event, SIGNAL Media Scheduled webinar dates are:
is hosting four webinars featuring experts from within DISA
August 5, 1 p.m. EST
talking about new leadership, emerging technology, DISA’s Small
Business Office and Procurement Service Directorate and virtual August 19, 1 p.m. EST
recruiting. This series will keep the conversation going leading September 2, 1 p.m. EST
into AFCEA’s TechNet Cyber event, December 1-3 in Baltimore. September 16, 1 p.m. EST

Register at https://signal.afcea.org/TechNetCyberChannel

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 51

Signal0820.indd 51 7/21/20 3:23 PM


JOIN US FOR THIS FREE WEBINAR
TUESDAY, AUGUST 11, 2020 • 1:00 PM EDT

The Evolution of
Data Protection:
From Legacy Backup to
Continuous Data Protection.
Tired of periodic backups that don’t
meet the availability demands SPEAKER:
of your agency? Worried about GIJSBERT
JANSSEN
recovering quickly from an outage or VAN DOORN
ransomware? Concerned about your Director Technical
ability to prove you can recover during Marketing, Zerto
annual compliance audits? It’s time
to rethink your backup strategy with
continuous data protection. Join this SPEAKER:
webinar to learn how Zerto can help GREG
you execute your day-to-day data BUTLER
Sales Engineer,
protection strategy and streamline the Zerto
number of tools you need to do so.
See firsthand how Zerto’s journal-
based recovery, coupled with
continuous replication, recovers files, MODERATOR:
VMs, applications and entire data GEORGE I.
centers. Learn how you can quickly SEFFERS
resume operations with the industry’s Executive Editor
SIGNAL Magazine
best RTOs and RPOs using Zerto.

HOSTED BY

Signal0820.indd 52 7/21/20 4:56 PM


INTERNATIONAL

CHAPTER
NEWS Edited by Megan Lee
EDITORIAL POLICY: Chapter News must
be received by the 20th of the month
two months prior to publication date.

ArkLaTex
Chapter Provides a Unique
ARKLATEX—In May, KTBS TV host Rick Rowe asks Chapter President Lt. Col. Michael Harris,
Scholarships Presentation USAF, about the chapter’s annual scholarship program and the 2020 recipients.
This May, the chapter held two signifi-
cant events recognizing the tremendous
achievements of 14 high school seniors.
These events would normally be held within
a large banquet setting, allowing parents,
grandparents, teachers, school counselors,
sponsors and elected officials to attend. Due
to the health crisis, this was not possible
this year, so other alternatives were explored
and executed flawlessly. The chapter first
recognized the students during a live broad-
cast by local television station KTBS. This
broadcast was hosted by local television per-
sonality Rick Rowe, and was filmed at the
Cyber Innovation Center, one of the area’s
most preeminent locations for technologi-
cal collaboration amongst government, pri-
vate industry and academia. The theme for
this first event was “The Best and Bright-
est,” and during this live broadcast, the 14
students were presented with a check for
$2,000 through the generosity and support
of local and national sponsors, some of them
giants in aviation. In addition, each student ARKLATEX—In May, founding chapter member Barbara Schleben presents a $2,000
gave remarks on their respective scholastic scholarship check to one of the 14 winners of 2020 made possible by generous local and
journey, plans for the future and goals to international sponsors.
be trailblazers. The second event was a vir-
tual scholarship presentation held via Zoom.
The guest speaker was AFCEA International
President and CEO Lt. Gen. Robert M. Shea,
USMC (Ret.), who talked about the history
of the association and the global security ini-
tiatives undertaken by AFCEA International.
He stressed the importance of maintaining
competitive advantage with representatives
in over 130 countries. He also mentioned the
importance of the relationships built over the
years with the Pentagon and the challenges
presented by the changing world order and
countries that do not play by established
norms. The chapter was grateful to have
Gen. Shea speak to the scholarship recipi-
ents, and they appreciated his insight and
congratulations. The chapter is glad to be
able adapt to the environment and contin-
ue to give scholarships to deserving local ARKLATEX—Scholarship winners, chapter staff, sponsors and news crew gather in the
students while providing new and unique renowned Cyber Innovations Center for the scholarship presentation broadcast live on KTBS
opportunities for their recognition. 3 ABC in May.

Professional AFCEA has two pathways for professional development – Onsite courses taught for your
organization at your location and academic institutions in our Preferred Provider network
Development for both organizations and individuals. AFCEA members can receive continuing education
with AFCEA! attendance documentation. For more information go to www.afcea.org/site/Education AFCEA PROFESSIONAL
DEVELOPMENT CENTER

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 53

Signal0820.indd 53 7/20/20 5:47 PM


New Ecuador Chapter Holds First Virtual Event
In June, members of the first AFCEA chapter. The Argentina Chapter offered guidance and support
chapter in Ecuador and the second
in Latin America (after Argentina),
Ecuador during the planning and formation stages. Both chapters plan to
expand this collaboration as the two AFCEA representatives for
enjoyed a virtual meeting. The fes- South America. Silicon Valley Chapter also provided assistance
tivities began with the Ecuador National Anthem and a memo- and cooperation. During the virtual meeting, Glenn Kesselman,
rial to Col. Marco Ernesto Miño Montalvo, who recently passed chapter president of Silicon Valley, spoke about continuing that
away. Col. Montalvo was a military and academic leader and partnership. The chapter is dedicated to promoting a culture of
a devoted member of AFCEA. Tina Jordan, vice president of digital transformation within the military, government, indus-
membership, AFCEA International, delivered the welcome mes- try, academia and community sectors with the support and
sage. Brenda Puch, corporate development coordinator, AFCEA assistance of AFCEA International. As the chapter moves into
International, gave the AFCEA International Headquarters the future, it will pursue a mission of strengthening academic
message in Spanish. María Dolores Santos Vidal, chapter presi- and scientific development in the fields of information technol-
dent, also gave a welcome message and presentation. A group of ogy, intelligence, communications, national defense and security
distinguished speakers followed, including Dra. Rosalía Arteaga, and technological innovations in the community. The chapter
former acting president of Ecuador and current executive presi- hopes to become a national intercultural educational platform
dent of the FIDAL Foundation, and Luis Lenin Recalde Herrera, by expanding research in the following areas: multidimensional
director of the Center for Scientific and Technological Investiga- security, geopolitical strategy, virtual learning, cybersecurity and
tions of the Army and dean of the School of Electronic Engi- cyber defense and intelligence. The chapter is passionate about
neering at the Universidad de las Fuerzas Armadas (ESPE). Juan engaging Ecuadorian youth through STEM programs for stu-
Carlos Fondevila Sancet, regional vice president for the South dents and empowering women through education and technol-
America region, received a certificate of gratitude. Sancet pro- ogy. The virtual meeting ended with beautiful Ecuadorian music
vided tremendous support to the leadership team for this new and a toast to the bright future of the chapter.

ECUADOR—Chapter members pose


for a photo. Sitting from l-r: Rafael Tenor
Linares, Grad. (SP) Roque Apolinar
Moreira Cedeño, Grad. (SP), Carlos
Modesto Rodríguez Arrieta, María
Dolores Santos Vidal, Valentina Estefania
Almeida Terán, Francisco Javier Delgado
Villarreal, David Villacis and Col. E.M.T.
Avc. (SP) Patricio Roberto Salazar
Benavides. Standing from l-r are Capt.
de Navío Juan Oscar Mariscal Pérez,
Mayor (SP) Patricio Eduardo Chacón
Mejía, Mayor (SP) Luis Lenin Recalde
Herrera, Jaime H. Endara, Luis Pazmiño,
Francisco Reyes Mena and Bruce
Schulte. In June, members of the new
chapter met online for a virtual event.
Photo taken at a previous meeting.

ECUADOR—In June, the new chapter participates in a virtual meeting.


Appearing in the screenshot are María Dolores Santos Vidal, chapter
ECUADOR—The chapter enjoyed presentations from president; Juan Carlos Fondevila Sancet, regional vice president for
distinguished members of the Ecuadorian community the South America region; Tina Jordan, vice president of membership,
as well as messages from AFCEA International AFCEA International; Glenn Kesselman, Silicon Valley chapter president;
representatives at the chapter’s virtual meeting in June. and Brenda Puch, corporate development coordinator, AFCEA

54 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 54 7/20/20 5:47 PM


Dayton-Wright in Intelligence, National, Homeland and
Cyber Security at American Military
monitor products. Over 50 attendees par-
ticipated in the session. While chapter
Chapter Education Opportunity: University, and the author of the recent members missed breaking bread with other
book, Intelligence Operations: Understand- like-minded professionals, the delivery by
Intelligence Analytic ing Data, Tools, People, and Processes, dis- Red Hat exceeded expectations, making the
In May, the chapter partnered with cussed and presented methods for adapt- chapter’s first virtual event a success.
AFCEA International for another continu- ing intelligence to more effectively evaluate
ing education program with the Ameri- these models.
can Public University System to provide
members with a 60-minute webinar titled
Evaluating COVID-19 Models Using Intel- Oklahoma City
ligence Analytic Methods. During this Virtual and Agile
COVID-19 crisis, leaders from the presi-
dent to local school boards have had to Meet Members’ Needs
make some very tough decisions based National pandemic activities didn’t
on available information and analysis, stop the chapter from spreading technical
including a variety of models used to track knowledge to its members. The organiza-
and predict the severity of the outbreak. tion leveraged Google to provide an online
Unfortunately, many of these models have meeting that enabled Red Hat to demon- OKLAHOMA CITY—Mike Conigliaro from
proved to be inaccurate and misleading. strate their vision on the future of Open- Red Hat provides his technical experience to
In this webinar, Erik Kleinsmith, associ- Shift and the adoption of CNCF-Compliant compliment the leverage of OpenShift at the
ate vice president for strategic relations infrastructure to host, build, deploy and chapter’s virtual event in May.

Advertiser Index
ADVERTISER PAGE WEBSITE
Avaya 40 www.avaya.com/en/solutions/government/
Cloudera cover 4 https://signal.afcea.org/cloudera
Crystal Group 2 www.crystalrugged.com
Forcepoint 42 www.forcepoint.com
OKTA 16 http://okta.com/ZeroTrustModel
Ramona 33 www.RamonaResearch.com
TrellisWare 5 www.trellisware.com
ViaSat 1 https://viasat.com/batsd-2
Advertising Director, Jennifer Deuterman (703) 631-6181 This index is printed as a complimentary
service to our advertisers. While care is
Washington Area (VA, MD, DC) and South Eastern U.S. (805) 217-6026 taken to ensure the accuracy of the listings,
Western & Mid-Western U.S., New England and Northeastern Territories (925) 648-3101 SIGNAL Magazine does not accept
Regions Not Listed (703) 631-6181 responsibility for omissions or errors.

AFCEA BrandLink is your


toolbox to optimize the
marketing, communications
and networking power of AFCEA.
AFCEA BrandLink is a marketing portal that connects your
brand to the AFCEA world in a unique and customized way.

The AFCEA BrandLink Director is here to assist with individual


media purchases or to develop a custom plan that works for you.
Contact Jennifer Deuterman: 703-631-6181 • jdeuterman@afcea.org
url.afcea.org/AFCEABrandLink

SIGNAL, AUGUST 2020 | Official Publication of AFCEA 55

Signal0820.indd 55 7/22/20 1:55 PM


Incoming

How to Prime the Innovation Pump


W
hen global positioning system (GPS) devices investments in research and development that have never
entered the consumer marketplace, they were been done before. The Manhattan Project, the Apollo
big, clunky and not user friendly. To reach a program, the Human Genome project and mobile
location, users had to input waypoints and then device development kicked off numerous downstream
be sure to stay on the line connecting each one. Despite innovations.
their difficulties, early GPS receivers represented a typi- Second, leaders must remain committed to a long-term
cally incremental pathway for period of research, development, testing and production.
innovation: evolving from an There is little instant gratification in the innovation jour-
early military application to ney, and the culture must encourage scientists and other
becoming extremely useful on participants to continue despite inevitable failures. Even
a commercial basis when con- when there is not a specific problem to solve, funding and
nected to digital maps. policies need to facilitate creative environments in agen-
Now, GPS connectivity is stan- cies and companies.
dard in cars, smart phones and Third, rolling out an innovation requires a phased
fitness devices, and the innova- approach so that users become accustomed to it. Position-
tion continues with applications ing innovation as a valuable asset, providing training for it
for autonomous farming equip- and refining it must be included in a strategy that accom-
ment, online cargo tracking and modates both early adopters and laggards. Each group has
smart munitions. different slants on its value and distinct inclinations for
What has powered so much BY MAJ. GEN. using it.
innovation in the United States JENNIFER Today’s COVID-19 pandemic highlights the risk of
is the access to raw materials, an NAPPER, neglecting innovation. Just when growth in the number of
educated and productive work- USA (RET.) positive cases accelerated, it became evident that primary
force and investments in scien- manufacturing sources of personal protective equipment
tific programs. This has allowed (PPE) were overseas. This means there is little control over
the nation to pursue policy objectives and maintain its supe- the direction of research for the nation’s requirements for
rior position and influence for many decades. gloves, gowns and masks, and fewer industrial resources
But innovation is ravenous, and there is a risk of falling for production.
behind without continual focus on better systems, processes In effect, the decisions surrounding PPE production
and the ability to execute policies within every organization. were built around minimum requirements and lower cost,
That risk is evident when you consider the volume of legacy not innovation. In the fragmented PPE industry, this can
organizational, business and military systems that are still present challenges such as the quality of materials used,
in use today. Instead of meeting challenges posed by adver- supply disruption due to global politics, not enough facto-
saries and the speed of change, these relics serve as today’s ries to repurpose assembly lines in a crisis and susceptibil-
Maginot Line. ity to unknown vulnerabilities.
In the meantime, according to the Information Tech- Fortunately, there has been a silver lining of innovation
nology and Innovation Foundation, China is closing the amid the pandemic. Forward-thinking automobile manu-
innovation gap with the United States. According to a 2019 facturers have been able to retool their plants and produce
study, which measured 36 indicators such as investment in necessary ventilators for hospital patients. Eager drug
research and development, China has increased its propor- companies have sped up vaccine research with political
tion of the world’s supercomputers in the preceding decade. support. And community-centric organizations and indi-
That nation also filed for more patents at a rate totaling 81 viduals have made face shields with 3D printers.
percent of U.S. patents, up from 10 percent. The seeds of innovation are present and growing. Strong
What will it take to offset this trend and reinvigorate the incentives from the government will sustain that momen-
U.S. stance toward innovation? tum, and part of that must include striking a balance
First, there’s a need to stay grounded in what defines between domestic and overseas manufacturing to avoid
innovation. Improvements to existing solutions such as future shortages of critical solutions. There is just too
GPS are vital, but in parallel, the country needs to make much risk in maintaining the status quo.

Maj. Gen. Jennifer Napper, USA (Ret.), is a vice president in Perspecta Inc.’s Defense Group. She previously served as director
of cybersecurity plans and policy for the U.S. Defense Department Cyber Command, and she led the U.S. Army’s Network
Enterprise Technology Command (NETCOM). To share or comment on this article go to http://url.afcea.org/August20

56 SIGNAL, AUGUST 2020 | www.afcea.org/signal

Signal0820.indd 56 7/20/20 5:59 PM


2020 INTELLIGENCE &
NATIONAL SECURITY
SUMMIT
September 17–18, 2020, Online Virtual Event

The nation's premier intelligence and national security conference is going virtual!

The 2020 Intelligence and National Security Summit, presented by AFCEA


International and the Intelligence and National Security Alliance (INSA), features
powerful plenaries with senior IC leaders, engaging breakout sessions with top
industry, academic, and government experts, and a virtual exhibit hall where you
can learn about the latest technology innovations.

INTEGRATION
INNOVATION
Co-hosted by COLLABORATION

INSS-Cover3-AUG20.indd 1 7/20/20 5:28 PM


DLT-Cover4-AUG20.indd 1 7/23/20 8:50 AM

You might also like