Professional Documents
Culture Documents
Signal August 2020
Signal August 2020
SA Dis
TC ru
O pti
M ve
Ri
se
AFCEA’S INTERNATIONAL JOURNAL • AUGUST 2020 • $5.00 s
ARMY/MULTIDOMAIN
OPERATIONS
Collaborative Combat From the Ground Up
For information on sponsoring the next issue of SIGNAL Kids, contact Bodil Lund, blund@afcea.org
FEDERAL
IDENTITY
FORUM AND EXPO • 2020
September 8 – 11, 2020 • Virtual Collaboration Event
Tactical Edge
Multidomain
Maneuvering
The U.S. Army has a
big stake in reshaping
the force to conduct
multidomain
operations.
PAGE 14
On the Cover
se
AFCEA’S INTERNATIONAL JOURNAL • AUGUST 2020 • $5.00 s
11
By Maj. Ryan Kenny, USA
11 NewsNet
12 Career
Progressions
13 President’s
Commentary
Cyber Resilience
Looms Large Everywhere
By Lt. Gen. Robert M. Shea,
USMC (Ret.)
45 ProductQuest
47 Association News
47 AFCEAN of
the Month
53 International
Chapter News
55 Advertiser Index
56 Incoming
53
How to Prime the
Innovation Pump
By Maj. Gen. Jennifer Napper,
USA (Ret.)
SIGNAL (ISSN-0037-4938) (USPS 496-300) is published monthly by AFCEA International at 4114 Legato Road, Suite 1000, Fairfax, Virginia 22033-4002, (703) 631-6100. Toll-free
(800) 336-4583. For direct-dial numbers to specific departments, see Association News. Subscription rate to nonmembers of AFCEA, 1 year (12 issues) $59. To foreign post
offices, $82. Single copies: $5 each, plus postage. Domestic postage: $2.00 for the first issue; $1.00 for each additional. AFCEA membership dues: $50 per year, $20 of which
is for a subscription to SIGNAL; student rate is $15, $7 of which is for subscription to SIGNAL. Periodicals postage paid at Fairfax, Virginia, and at additional mailing offices. Posted under
Canada Post Publications Mail Agreement #40612608. GST No. 87364 3266 RT0001. Canada returns to be sent to IMEX Global Solutions, P.O. Box 25542 London, ON N6C 6B2. POSTMASTER:
Send address changes to SIGNAL, AFCEA Service Center, 4114 Legato Road, Suite 1000, Fairfax, Virginia 22033-4002. Authors are entirely responsible for opinions expressed in articles appearing
in AFCEA publications, and these opinions are not to be construed as official or reflecting the views of AFCEA International. The name SIGNAL ® and The Cyber Edge® are registered in the U.S.
Patent and Trademark Office. All rights reserved. Copyright 2020 by AFCEA International. Copyright is not claimed in the portions of this work written by government employees within the scope of
their employment. Reproduction in whole or in part prohibited except by permission of the publisher. The publisher assumes no responsibility for return of unsolicited manuscripts or art. Change of
mailing address: by email, include subscriber name, old and new addresses, to service@afcea.org, by phone at (703) 631-6158, or online by accessing your profile at www.afcea.org/portal. See login
instructions on screen under “Public Message.” Allow 3 weeks for delivery of first copy. Microfilm copies of SIGNAL may be obtained from National Archive Publishing Company, www.napubco.com,
300 N. Zeeb Road, Ann Arbor, MI 48106. Article reprints can be purchased through the editorial department, signal@afcea.org.
A
Senior Director, SIGNAL Media
rmies always have been at the center of mili- Editor in Chief
tary operational planning, as nations have Robert K. Ackerman
defined victory in battle by the occupation
Director, Content Development
of land using their own forces. But today’s
Executive Editor
U.S. Army is more than just a land force. As with the George I. Seffers
other services, it operates in more than one domain.
And now, multidomain operations are redefining Senior Editor
modern militaries. Kimberly Underwood
This new paradigm goes beyond simply dipping Contributing Editors
a toe into a new body of water. Instead of using Maj. Gen. Jennifer Napper,
other domains to support its operations, the Army USA (Ret.)
is melding all other domains into a single entity.
Here a Sat, This multidomain approach is designed to exploit all
Henry S. Kenyon
Learn and network while exploring and experiencing the latest platforms,
leading-edge technologies and state-of-the-art networking capabilities
that support the Sea Services' operations. The Western Conference and
Exposition (WEST), co-sponsored by AFCEA International and the U.S.
Naval Institute, presents government, military, industry and academia
senior leaders who gather to discuss emerging systems, platforms and
technologies that will impact all areas of operations. Registration is free for
military and government personnel.
#WEST2021
Photo FIREWORK
of the DISPLAYS
Month A firework display goes off at
the Washington Monument
in Washington, D.C., in July.
The display was part of the
Salute to America event.
HOSTED BY
A
recent posting of a satellite image
from the U.S. National Training
Center by Col. Scott Woodward, BY MAJ. RYAN KENNY, USA
USA, raised a lot of eyebrows. The Maj. Ryan Kenny, USA, created an online
image shows a cluster of electromagnetic forum to foster discussions on emerging tech-
signals emitted from a battalion-sized nologies at www.militarycommunicators.org.
unit participating in a large-scale training The views expressed here are his alone and do
event. These signals were captured as part not represent the views and opinions of the
Defense Department, U.S. Army or other orga-
of the exercise from more than 10 kilome-
nizations with which he has had an affiliation.
ters away. This picture showed what many
of us already know: we have an electro-
contact: Maj. Ryan Kenny, ryankenny@militarycommunicators.org
magnetic emission discipline problem.
Because we did not fear large-scale
attacks on known command posts in Afghanistan and detection. Military communicators and electromagnetic
Iraq, we did not worry about blaring electromagnetic experts should be integral members of any planning effort
signals from satellite terminals, tactical radios or the doz- to revise doctrine or develop new tactical approaches.
ens of locally purchased cellphones our forces used. Nor To minimize signals, the military will need industry’s
did we worry about an adversary using unmanned aer- help. To ensure we always plan for the next contest, we
ial vehicles to deploy sensors from afar. However, times should assume the worst when it comes to signal detection,
have changed. As we prepare for the next fight, we must and system requirements should have safeguards baked in.
demand a strategy to protect our forces from signal By masking the electromagnetic signature of our units,
detection. in-depth, we can challenge an adversary to find the high-
Sophisticated long-range sensors paired with powerful est-value assets during the first volley. Presenting layers of
new data analytics tools increase the likelihood of long- noise may help hide the signals that matter most and pre-
range detection. Any device that emits electromagnetic serve combat power for response efforts. Every long-range
energy presents detectable patterns of fluctuations and shot matters, and counter-battery tactics will be critical in
pulses within a given radio frequency range. Engineers the early phases of most fights.
design antennas to propagate radio waves omnidirec- To fight and win in a contested electromagnetic domain
tionally, or focused into a directional beam. What affords will require new tactics to confuse an adversary’s sensors
long-range communication also enables long-range and analytical tools continuously. The future of the elec-
detection. tromagnetic fight will also demand the ability to adapt new
Machine learning systems that detect signals from means of detecting ever-evolving signal patterns rapidly.
electromagnetic noise have proven their worth. From Likewise, avoiding detection requires new techniques and
radiologists searching for anomalies to credit card com- tactics for deploying, operating and maneuvering emitters.
panies looking for fraud, these tools have taken signal We may still own the night, but we may be losing the
detection to a level previously unimagined. These same electromagnetic domain. The risk of detection is real, and
methods can find and target radio-frequency emissions. countermeasures are increasing due to advances in sen-
Because of these new signal detection capabilities, the sor proliferation and machine learning. To adapt to and
military must develop a whole-of-force strategy to pro- overcome these challenges, the Defense Department needs
tect combat forces from electromagnetic detection and a plan to dominate the electromagnetic domain, minimize
targeting. I believe this effort will require four essential emissions, mask signals and continuously present patterns
goals: dominate the spectrum, minimize signals, mask in of emission that confuse our adversaries’ detectors. The
depth and continuous passive obfuscation. time has come to raise the noise floor.
To dominate the electromagnetic domain, the best
defense may be a great offense. We cannot allow an adver- Disruptive by Design explores innovation and
sary to detect signals from our high-value targets. Tacti- ideas with the potential to expand capabilities
cal planners should know the ranges of adversary signal and revolutionize products, services and behaviors.
detection capabilities and the offset required to prevent For more information, visit url.afcea.org/YoungAFCEAN.
Moving Forward
with Agile Combat
The U.S. Air Force is moving forward
with its concept of Agile Combat
Employment as a way to increase its
force generation capabilities in a con-
tested environment. The Pacific Air
Forces (PACAF) under Gen. Charles
Q. Brown, USAF, who is moving into
his role as the chief of the Air Force
on August 6, replacing a retiring Gen.
David Goldfein, USAF, began looking
at how to engage small groups of multi-
functional airmen to increase capabili-
LLNL Breaks Ground ties in the Indo-Pacific region last year.
PACAF has already conducted train-
on Exascale Computing ing of airmen in this so-called Agile
Combat Employment concept, which
Facility Modernization Project is designed to shift operational-level
Industry
USA, has been assigned as Maryland.
commanding general, 82nd Airborne
Division, Fort Bragg, North Carolina. Brig. Gen. Mark H. Landes, USA, has
been assigned as commanding general, Redhorse Corporation,
Brig. Gen. David S. Doyle, USA, First Army Division East, Fort Knox, Washington, D.C., has
has been assigned as commanding Kentucky. named John Zangardi
general, Joint Readiness Training as president.
Center and Fort Polk, Fort Polk, Maj. Gen. David W. Ling, USAR,
Louisiana. has been assigned as commanding
general (Troop Program Unit),
Maj. Gen. Scott L. Efflandt, USA, 79th Theater Sustainment Command, SES, Luxembourg, has named Thai
has been assigned as commanding Los Alamitos, California. Rubin as chief legal officer.
general, 1st Armored Division and
Fort Bliss, Fort Bliss, Texas. Col. Julie L. Nethercot, USMC, DTS, Arlington, Virginia, announces
has been nominated for appointment Col. Brian Sims, USAF (Ret.), as direc-
Col. Kyle B. Ellison, USMC, to the rank of brigadier general. tor of operations and Derek Kernus
has been nominated for appointment to support business development and
to the rank of brigadier general. Brig. Gen. Frederick M. O’Donnell, information technology operations.
F
tional partners if we are to grasp the full meaning of cyber
or many, the issue of cyber resilience conjures up resilience.
thoughts of conducting military operations in a denied Industry and government must rise to the task with fresh
environment. But the COVID-19 pandemic has added thinking on partnerships, perhaps going as far as govern-
another dimension. The importance of cyber resil- ment investing in key private sector technologies to ensure
ience to everyday activities we remain competitive in the information domain. Ulti-
has been illustrated through the mately, for their part, industry and academia will continue
changes wrought by the corona- to develop the necessary new technologies. To reiterate, a
virus. As the need for online tele- strategic planning approach across government, industry
work and related efforts continues and academia is vital.
to expand, so do the attack vectors The cyber-resilient network must be ubiquitous with
leveraged by cyber marauders. the ability to rapidly identify, isolate and withstand attacks
Any organization must have using multiple tools and techniques. It must avail itself of
the ability to perform its mission machine learning that enables the network to identify and
despite adversity, especially in a respond quickly to anomalies with limited human involve-
work environment threatened by ment and allows new technologies to be rapidly inserted.
cyber attacks or lack of informa- A pair of studies conducted by the National Security Tele-
tion technology network resiliency. communications Advisory Committee (NSTAC) over the
These challenges need not be brought about exclusively by past two years could provide the framework for a valuable
nefarious actors. As an example, adverse network effects can path forward. The 2018 NSTAC Report to the President on
be the result of shortcomings in network design, engineer- a CyberSecurity Moonshot and the 2019 NSTAC Report on
ing and implementation. In parts of the United States, the Advancing Resiliency and Fostering Innovation in the iCT
productivity of teleworkers is diminished and schools can- Ecosystem lay out sound ideas for moving forward with a
not effectively conduct remote classes because of the lack carefully designed cyber infrastructure that is both resilient
of sufficient bandwidth. Emergency responders and law and secure. It is time to revisit these studies and implement
enforcement also are affected by the efficacy of cyber opera- many of their recommendations.
tions. In short, many people cannot access the bandwidth If information is to be the dominant strategic asset
they need for daily life. we expect, we need to rally to this ideal at all levels of
In the aggregate, these shortcomings affect national secu- national power. This effort needs to include identifying
rity through their economic, societal and educational rami- the key technologies in which we must invest. We have
fications. The impact of COVID-19 has given us reason to done this before. President Dwight D. Eisenhower ral-
reconsider the critical nature of the telecommunications lied the necessary expertise and organization to build the
and computing infrastructure. interstate highway system and the St. Lawrence Seaway,
Overall, COVID-19 has awakened the public to the fact that and President John F. Kennedy mobilized the engineering
we are not where we need to be in terms of cyber resilience. and scientific communities nationally to land a man on
We remain highly vulnerable, and we need a strategic plan the moon in less than a decade. All were bold efforts with
going forward to address the shortcomings. Our information strong leadership.
networks often have evolved without broad national security Just as those endeavors generated invaluable spinoffs,
and economic considerations. We must develop a coordinated so too can the design and development of a new network
strategy with integrated actions to fix the problem. focused on security and resilience. Our technology expertise
Additionally, the threat from rogue actors and nation- gives us what we need to accomplish this, and it will produce
states continues to expand. They persist in exploiting lucra- rapid and worthwhile benefits. We cannot tolerate the alter-
tive targets that fail to exercise proper cyber hygiene. Even native. Now is the time to stop talking and start doing.
government cyber efforts are disjointed. You cannot sepa-
rate the Defense Department from the rest of government
and industry, if for no other reason than the interrelation-
ship of the commercial supply chain and the global trans-
portation network demand a more assimilated approach to
developing the needed resiliency. To share or comment on this article
The hard truth about cyber resilience is that it remains go to http://url.afcea.org/August20
elusive without vision and strong leadership. We need
T
he message from the intelligence community and top operating concepts and informing doctrine. In supervising
leaders of the U.S. military is clear. The nation is in near- those activities, Gen. Wesley reports directly to Gen. John
peer competition, just underneath the level of outright “Mike” Murray, commander, Army Futures Command.
war. As such, the U.S. military is investing in aligning its “For the last 30 years, we have been the dominant pre-
capabilities and functionality to fight as a Joint force seamlessly eminent force in the world, and we’ve had luxuries during that
across the sea, air, land, space and cyberspace. Along with the time that are now waning,” Gen. Wesley explains. “In the early
other services, the U.S. Army is work- 2000s, when we went to modularity, we became much more
ing to shape the approach of how the BY KIMBERLY BCT-centric in our design methodology and BCTs in the
military will fight in the future under UNDERWOOD COIN [counterinsurgency] environment were fully sufficient
Joint all-domain operations. because they had sufficient power relative to the threats we
For the Army, it may mean a shift from solely a brigade were facing. But in doing that, we got rid of our capability to
combat team, or BCT, focus that worked well in a counterin- add echelon, and we lost to some degree the ability to conduct
surgency environment, to a more flexible force structure above campaign-level operations across the theater.”
the brigade level that enables multidomain operations, says Lt. To address the gaps, the Army has set a goal of achieving
Gen. Eric Wesley, USA, director, Futures and Concepts Center multidomain operations by the year 2028. While it is a tall
(FCC), and deputy commanding general, U.S. Army Futures order, the service is making key strides to achieve this oper-
Command. The FCC is responsible for divining the Army’s ational vision, the director contends. Led by the FCC, the
future operating environment and then deriving the related process starts with designing the conceptual components
of multidomain operations, which the Army released in Nonetheless, to achieve that level of convergence, “there
U.S. Air Force photo by Senior Airman Kevin Tanenbaum
December 2018, and then defining the practices that will is still a lot of work ahead to get that aligned,” the general
guide warfighters across an all-domain battlefield. This suggests. The Air Force’s Advanced Battle Management
would be the doctrine for multidomain operations, which System (ABMS), which the Air Force, Army and Navy
the Army is in the process of creating, he states. first tested last December in a three-day exercise with the
As part of that effort, the general’s team at the FCC is build- U.S. Northern Command, is a start, the general says, “but
ing the operations and organizations, known as ONOs, and the next step is what’s under the hood. And what we aren’t
is coordinating that development with the Combined Arms clear on is how the Air Force systems connect with ours
Center (CAC), which is led by Lt. Gen. James
Rainey, USA, who also is the commander of
Fort Leavenworth.
“We’re starting with those things that we
have the capability to do and moving it into
the doctrine so that we can start training at the
right level for these capabilities of the future,”
he explains. “We want to make sure what we
are writing as doctrine is consistent with what
is in multidomain operations, and that they are
writing a doctrine that is within the realm of
the possible. It’s a give and take, and it’s a pro-
cess which takes a while, but by the end of this
year you’re going to see some decisions on the
rate at which we move concept into doctrine.”
However, an overarching component of that
process is the Army’s contribution to how the
entire U.S. military will engage across the air,
sea, land, cyber and space warfighting domains, The Army is working at the Joint level to form a multidomain operations concept
or Joint all-domain operations, also known as for the military, says Lt. Gen. Eric Wesley (l), USA, director, Futures and Concepts
JADO. Center, and deputy commanding general, U.S. Army Futures Command,
“You just can’t have different services have speaking with Retired Col. Kenyon Gill (USMC) at MILCOM 2019.
their own MDO concepts and federate them
together,” Gen. Wesley clarifies. “It’s the unique nature of and how our systems connect with the Air Force, and that’s
MDO, integrating all the domains of warfare: space, cyber, the hard work that has to be done. What we are advocating
electromagnetic warfare, land, maritime, and air. And it’s for is that it is incumbent on the Air Force’s ABMS system
the integration of those things such that the total is greater to connect to our capabilities, that it has got to be designed
than the sum of the parts that creates overmatch against your to enable our capabilities, because it is at the edge where
opponent. But because those domains all come from different these capabilities must bring their effects.”
services and in some cases are parts of the interagency, you In addition to the challenge of bringing the services
quickly realize that this has to be a top-down effort.” together on a collective technical understanding of what
The military also is organizing the joint approach to must be built for JADC2, the services also need the tech-
command and control for that future operating environ- nology required to conduct multidomain operations, Gen.
ment, or the functional concept of joint all-domain com- Wesley ventures. Here, the Army’s communication, com-
mand and control, known as JADC2. “And we have a key puting and tactical network capabilities will be crucial to
role in shaping and influencing the requirements and achieving all-domain operations, the general continues.
description of what that is,” he notes. “To create overmatch, you have to be able to continually
The Army is engaging with the Air Force, Space Force, and rapidly integrate domains in the theater of war, not
Navy and the Marine Corps to develop the JADO concept just at one point but across the theater,” he states. “That
by November and has been conducting exercises to test means you’re trying to integrate the air, cyber, space, land
initial JADC2 functionality with the Air Force at its JADC2 and maritime for effect rapidly and continuously, within
center at Nellis Air Force Base, Nevada. So far, the general minutes or seconds. The network becomes the backbone
is optimistic regarding the progress towards JADO from a of your ability to conduct convergence, and your ability
conceptual perspective. to integrate these domains will be dependent on the vital-
“In the last year, we’ve gone from the services not com- ity of our network. That is where you will truly converge
municating at all on a joint MDO concept, for all intents effects at the tempo we will have to have in the future.”
and purposes, to being months out from exercising a In the meantime, the Army’s Project Convergence—
concept,” he states. “We are negotiating that with the other which features a technology demonstration still planned
services to make it fit at the joint level. It is a joint effort despite the pandemic for late August at the Globally Inte-
and a joint design.” grated Wargame—will test the design of the integrated
Zero Trust
you are going to integrate all domains that cross all services
and reach into the interagency, and you have to be able to
Security
integrate those very rapidly and continuously, you can see
that you’ll need to have echelon responsibilities to integrate
some of those capabilities for the right effect. So, it’s restor-
ing a campaign-level quality Army to be able to fight in the
Because People are future.”
the New Perimeter The service chief has already signed off on developing
The traditional four walls that protected an
a Theater Fires Command to integrate the fires across
organization’s data no longer exist: More the theater, and he is building multidomain task forces
people are accessing more resources, and intended to enable theater operational commanders
from more locations, than ever before.
Learn how government agencies can utilize
to penetrate any adversarial anti-access/area denial, or
Okta as the foundation for a successful Zero A2AD, capabilities.
Trust program now, and in the future. Over the next few months, the general’s main focus
Learn More at remains helping to finalize the JADO concept. “The joint
okta.com/ZeroTrustModel concept, from an FCC perspective, is my number one
priority,” Gen. Wesley states. “We’ve got to get that under-
stood because that is going to define how the Joint Force
fights. The Army thinks we know how we’re going to fight
in the future, but we’ve got to get consensus across the
Joint Force.”
T
he U.S. Army has spent the last two years pursuing a Cross-Functional Team (CFT), we are aligning Capability
modernized integrated tactical network, or ITN, that Set (CS) development to JADC2 objectives and are seeking
supports increased mobility, resiliency and capabili- to optimize experimentation and existing program efforts
ties. Now, the service has a focus toward making sure to enhance JADC2 capabilities.”
that the modernization of that network can enable joint all- As part of the Army’s contribution to JADC2, in par-
domain command and control, or the concept of JADC2. ticular, the PEO C3T and the Network CFT—the mod-
The service is preparing to fight ernization team—are supporting ground domain data
seamlessly across the sea, land, BY KIMBERLY and network transport capability, Gen. Collins says. “For
air, space and cyberspace, or mul- UNDERWOOD example, mobile and expeditionary network transport
tidomain operations, by 2028. systems, such as small aperture terminals, gateways,
“Our network modernization efforts will enable JADC2 cross-domain guards and secure waveforms, are needed
capability,” states Brig. Gen. Robert Collins (USA), program to support MDO [multidomain operations] and pro-
executive officer for Command, Control, Communica- vide transport of sensor to shooter data in the JADC2
tions-Tactical (PEO C3T). “Working with the Network construct,” he states. “We must also be able to carefully
In addition, Welch says that fielding base bands and Gen. Collins also recommends that more attention be
very small aperture terminals, or VSATs, will allow for paid to the nonkinetic capabilities for MDO, both cyber and
additional mobility and expeditionary use. electronic warfare, which are needed to confront the enemy
Moreover, the PEO C3T and the Network CFT will anti-access/area denial, or A2AD, environment. “And across
be conducting additional prototyping efforts over the all those capabilities, we’ve got to make sure that they are not
next fiscal year, given the alignment of Army resources only survivable but expeditionary and can rapidly transition
focused just on the development of tactical communica- from competition to conflict,” he advises. “Moreover, open
tions and networking solutions. systems and modular architecture approaches will continue
“We have put on contract 17 prototyping efforts to to enable adaptive and innovative technology that are key to
get after CS 23 and CS 25,” Gen. Gallagher clarifies. This supporting all domain operations.”
includes three rapid prototyping initiatives from the In addition to the material side, the service also needs to
Office of the Secretary of Defense; eight efforts from the address how its training and equipping is synchronized with
Combat Capabilities Development Command’s C5ISR its organizational force structures for MDO formations, the
Center; and six efforts resulting from the team’s technical PEO C3T offers.
exchange with industry in Austin, Texas, last year. The “We’ve got to make sure that the force structure and
emerging technologies that they select from the various equipping are closely aligned, because of the complexities
prototyping efforts will transition to a program, if feasi- of the multidomain operations environment,” Gen. Collins
ble, or, if not ready, will continue to prototyping in CS 25. states. “Partnering with the CFTs has really strengthened our
Welch and Gen. Gallagher spoke to the industry as part ability to refine concept of operations and requirements.”
“Our network modernization efforts will enable JADC2 [joint all-domain command
and control] capability. Working with the Network Cross-Functional Team, we are
aligning Capability Set development to JADC2 objectives and are seeking to optimize
experimentation and existing program efforts to enhance JADC2 capabilities.”
—Brig. Gen. Robert Collins (USA), program executive officer for Command, Control, Communications-Tactical
of Aberdeen Proving Ground’s virtual Advance Planning As the prior lead of PEO Intelligence Electronic Warfare
Briefing to Industry in June and reminded companies of and Sensors (IEW&S)—which is now being led by acting
the next technical exchange meeting scheduled for Sep- PEO IEW&S Mark Kitz—Gen. Collins worked closely with
tember in Nashville, and also virtually. CFTs and counterparts, including the Assured Position,
In addition, the team plans on spending the next year Navigation, and Timing CFT, the Network CFT and the
fielding the new equipment and conducting related intelligence surveillance and reconnaissance (ISR) task force,
training for CS 21, and delivering technologies to bri- in pursuing MDO. He suggests that sensing capabilities will
gades and multiple expeditionary signal battalions. continue to be crucial in achieving comprehensive warfare.
Then, following the prototyping for CS 23, the parties “Deep sensing needs to be a big focus for MDO, leverag-
will start the planning stage for CS 25, identifying tech- ing both national and commercial capabilities, specifically
nological need areas. in space, and manned and unmanned aerial ISR, and col-
Part of PEO C3T’s efforts include a functional realign- lectively taking that synthesizing [of information] to inform
ment of the office to ensure program officers are aligned mission command,” he notes.
with the modernization lines of effort, Welch says. “We And although he is just two months into the role as PEO
are standing down the Network Enablers Program Office C3T, Gen. Collins will continue to focus on JADC2.
and standing up a new program office, the I2S Program “We certainly are looking toward focusing on MDO and
Office, or Integration, Interoperability and Services, which large-scale combat operations,” Gen. Collins says. “Whether
will enable much more focused activities closely related to it’s demonstrations, experimentation or prototyping of con-
the Network CFT,” he notes. PEO C3T also is standing up cepts, or even as we shape touch points, we absolutely are
a CS development office. “So, you will see some change to making sure that we’ve got a solid road map that gets us to
our org chart,” he adds. MDO, and enabling an MDO-capable force.”
That realignment is necessary, given the threat “of very
lethal peer adversaries,” Gen. Gallagher emphasizes. “We
have to be able to move, and move with speed, so we are
looking at formation-appropriate platforms, reduced sig-
natures, increased speed and an increased ability to sepa-
rate the forces, and really making sure we can reduce our
electronic signature,” he says. “There is a lot of work being contact: Kimberly Underwood,
done in that space.” kunderwood@afcea.org
Architecting
a Cloud Data
Management Strategy
There’s a lot involved when migrating to cloud, so it’s important to know
what tools and technologies can make a difference for mission success.
Design your hybrid cloud to accelerate capabilities and deliver the
highest level of data protection for mission-critical systems.
This session will cover:
• Managing and protecting data across the hybrid cloud
• Increasing cloud readiness through APIs and automation
• Architecting cyber resilience and the importance of immutable backups
SPEAKER: MODERATOR:
REBECCA HOWARD
FITZHUGH WAHLBERG
Director of Developer Correspondent,
Relations, Rubrik SIGNAL Media
Rebecca is the Director of Developer Relations Howard Wahlberg has been involved
at Rubrik, Inc. She focuses on enabling cus- with content strategy and content
tomer API adoption through the Rubrik Build creation at AFCEA international
community. Rebecca began her career as a data for more than 5 years. He is an experi-
analyst in the US Marine Corps. Prior to joining enced communicator, moderator and
Rubrik, she was an enterprise architect where public speaker and has done voice
she worked with various federal agencies, overs for a variety of videos, podcasts
foreign governments, enterprise, and service and training sessions for AFCEA as
provider customers across multiple verticals. well as other organizations.
Shutterstock/Gorodenkoff
Army Gears Up To
Battle for Cyber Resilience
ARL research taps existing areas while breaking new ground.
BY ROBERT K. ACKERMAN areas of research that have been given vulnerable to a variety of attacks,” he
T
greater emphasis reflecting the more states. These run the gamut from com-
he U.S. Army is attacking defen- urgent need for cyber resilience. plex assaults to unsophisticated attacks.
sive cyber operations from the Alexander Kott, chief scientist of the With so many mobile assets, devices
laboratory. It is focusing new ARL and Army ST—senior research and systems are increasingly vulner-
research efforts, including auton- scientist—for cyber resilience, has able to cyber attacks. He points out that
omous network agents, on ensuring just begun reshaping ARL research to most assets on which people rely, such
cyber resiliency in the battlespace. reflect this new mission. What comes as cellphones and tablet devices, are
Some of this work builds on related out of the lab could have significant relatively disadvantaged. Many people
efforts long underway at the Com- ramifications to the civilian world as do not realize that they tend to be in
bat Capabilities Development Com- well as the military. close proximity to cyber adversaries, so
mand Army Research Laboratory “This is a whole world of interesting it is relatively easy for both parties to
(ARL). Other thrusts aim at exploiting opportunities,” Kott says. achieve some form of contact.
capabilities that are within reach but “Most of the cyber assets and net- Most of all, people generally are
not yet ready to field. Still more are works in our society are highly not trained cyber defenders, Kott
T
how to measure cyber resilience,” Kott
he COVID-19 pandemic brings with it a new set of cyber vulner- states. He adds that no engineering dis-
abilities built around lifestyle changes throughout society, and cipline ever has achieved any degree
these vulnerabilities cry out for new means of cyber resiliency. of maturity and sophistication without
“It’s quite possible that historians will remember COVID-19 as determining how to measure its prop-
one of the very important civilizational turning points,” says Alexander erties. Yet, no one seems to have any
Kott, chief scientist of the Army Research Laboratory and Army ST for method for measuring or even quanti-
cyber resilience. “COVID-19 is acting as a forcing function. It forces us fying cyber resilience. “It will be cyber
to accelerate the transition to a more virtual society than we were before, resilience engineering when we learn
and it is accelerating the trend that was occurring before COVID-19 but how to measure cyber resilience,” he
was happening more slowly and less noticeably.” declares. “That means we need rigorous
He continues that even if a reliable vaccine appears and alleviates fears tools that can measure cyber resilience.
of the virus, a large fraction of the workforce will never return to full- Only then can we actually improve our
time office life. Recent experiences have shown that virtual offices can cyber resilience.
be effective and can save a lot of money for both workers and businesses. “Once we have the means for measur-
Society will rely to a much greater degree on distributed work locations ing how good our cyber resilience is, we
such as home offices as well as mobile locations. will be able to make much more impact-
But this flexibility means that physical security will not be as good ful progress in it,” he warrants.
as in a formal office environment, which is rife with dedicated security The second big hurdle facing cyber
services and arrangements, Kott points out. Networks and computer resilience is the need for autonomous
security in particular are less secure with fewer controls. Even if a busi- artificially intelligent agents to execute
ness provides support personnel for home workers, it will be facing chal- actions for resisting, observing and
lenges inherent in serving multiple virtual customers. recovering from cyber compromises,
“What all this means is that the cyber attacker will have many new Kott says. He offers that the reliance
opportunities to get into our systems,” he posits. on human cyber defenders is eco-
Achieving cyber resilience in this new atmosphere is all the more nomically and technically inefficient.
important, Kott emphasizes. “The question now becomes, how do we This is not to imply that highly intel-
make it so that penetrating our systems is of little value to the attacker? ligent humans are unnecessary for cyber
Can we make it a fool’s errand for the attacker? Can we prevent that defense, he emphasizes. Rather, peo-
attacker from gaining any meaningful value for all the hard work they ple need to be reinforced with greater
have to invest in compromising our network and our system? numbers of autonomous artificial cyber
“COVID-19 made the importance of cyber resilience much greater defense agents. Industry is moving in
than it was before,” he declares. this direction, he notes, albeit “slowly
and hesitantly.”
Security orchestration, automation
and response (SOAR) technologies are
observes. This applies to both civilian “Hoping for some kind of a cen- an integrated collection of tools that
and military personnel. tralized continuous monitoring and help human defenders respond in a
Kott points out that cyber resilience is defense by a third party is often centralized manner to security com-
especially important for the Army as the unrealistic,” Kott observes. “One of promises. Yet, these are not foolproof,
service relies on cyber operations to an the first things a sophisticated cyber Kott says, adding that a more aggres-
increasing degree. The Defense Depart- attacker will do is disable the ability sive move in that direction is neces-
ment describes cyber resilience as the to communicate reliably with those sary. This would include making SOAR
ability of systems to resist, absorb and third-party defenders.” This applies tools more intelligent, so they could
recover or adapt to an adverse occur- to managed cyber defense services address unpredictable combinations,
rence during operation, so accordingly, providers, both in the civilian and and making them available locally on
the Army must be able to continue to military worlds, and they are comple- sub-networks.
carry out its mission when its cyber sys- mented by commercial software sup- One ARL effort focuses on tactical
tems are compromised or under attack. pliers that send upgrades and secu- autonomous intelligent agents for cyber
This includes being able to return a sys- rity patches. “A successful cyber attack defense. The overwhelming majority of
tem to “a reasonable degree of perfor- would make sure that those third- today’s cyber defense tools are “watch-
mance” as soon as possible, he notes. party remote services will not be easily ers,” Kott says. If they see an anomaly,
U.S. Army
degree of autonomy, via artificial intel-
ligence, to be able to respond rapidly to
a compromise. They also must be able
to absorb the compromise, and at least
partially recover from it—and quickly,
Kott adds. The speed necessary for these
actions often requires “the absence
of human involvement at time scales
humans cannot support,” he points out.
This mandates intelligent analysis of
risks and ramifications of the actions
the agents are trying to take, Kott says.
He adds that research into these types
of agents is beginning to emerge, but
again it is “somewhat hesitant.” This
hesitance comes from the inability to
guarantee that the actions of an auton-
omous intelligent cyber defender will
not cause undesirable ramifications. A Stryker Brigade combat team equipped with Warfighter Information Network-Tactical
“Anyone doing something inevitably Increment 2 (WIN-T 2) prepares to move out during a Network Integration Evaluation. Army
takes risks, and there is a risk that the Research Laboratory scientists are exploring new methods of ensuring cyber resiliency so
actions of [this type of] agent will do enemy operations cannot fully deny U.S. forces the use of their cyber assets in wartime.
TechNetCyber
Rescheduled from June with more DISA content than ever! Adversaries have taken to cyberspace to
wage continuous campaigns against political, economic and security interests. Protecting cyber assets
that connect people to information requires more than a single entity. At TechNet Cyber, multiple
partners will network, collaborate and create a formidable united front more powerful than individual
efforts can achieve alone.
WWW.CYBERSECURITYEXPO.ORG
Army Adds
Element of Surprise
to Technology Search
Officials never know what they
will get with xTechSearch.
BY GEORGE I. SEFFERS
B
eing surprised on the battlefield is never a good never done business with the Army. Some may have never
thing, but Army officials, who are focused on worked with other parts of the military or the federal gov-
modernizing the force, welcome industry—espe- ernment. Ultimately, finalists receive awards of $120,000
cially small businesses—to offer solutions they each and will be invited to demonstrate proofs of concept
didn’t know existed and didn’t know they needed. of their dual-use technologies to a panel of Army judges.
The xTechSearch competition seeks novel, disruptive The program is a departure from traditional develop-
concepts and technologies to support the Army’s top ment and procurement practices in a number of ways,
modernization priorities, all of which contribute to the including being open to never-before-considered tech-
service’s vision of multidomain operations, or MDO. The nologies, capabilities, concepts or solutions, rather than
MDO concept describes how the U.S. Army, as part of defining requirements down to the size of nuts and bolts
the joint force, can counter and defeat a near-peer adver- or the number of lines of code. “In some cases, the Army
sary in all domains in the 2025-2050 timeframe. doesn’t even know that the solution’s out there, but also in
The xTechSearch program provides cash prizes to some cases, companies are developing technologies that
selected small businesses to proceed through four phases they don’t realize could solve an Army problem,” says Zeke
of the technology competition. The focus is primarily Topolosky, chief, Strategic Partnerships Office, at the Com-
on so-called nontraditional companies that may have bat Capabilities Development Command Army Research
WWW.AFCEA.ORG
that’s worth taking a hard look. Given that we’ve basically rather than telling them, “Here’s your shopping papers. Now
been developing most of our rocket fuel ourselves, that’s go out and find someone,” Jette says. He emphasizes, how-
pretty impressive.” ever, that he is not criticizing the other approaches.
Lumineye, the winner of the second challenge, offered “I can’t tell you I have 200 companies on contract because
a system known as Lux. It is a handheld radar for detect- I don’t. I have a number of companies that we’ve funded to
ing people behind walls. It can be used in urban combat mature to the point of a contract, and we’re doing so with a
environments but also is handy for firefighters, law enforce- focused approach against potential opportunities within the
ment and search and rescue teams, the company’s website Army instead of letting them go try to figure it out on their
indicates. own,” he offers.
The concept is not entirely novel, but the solution is. “Lots Speaking of numbers, the program has received 1,350
of other companies have tried this. They were able to do it proposals over the course of all the challenges. xTechSearch
with some very low-cost components and had great suc- 5 alone drew 350 proposals, which have come from 1,000
cess,” Topolosky states. “They’re now entering into a Small different companies.
Business Innovation Research grant with the Army as well as The Army has completed the first two challenges, along
with the Air Force. This will enable them to take their device with a specialized challenge to find low-cost COVID-19
and start developing networks of systems so you can have ventilators. Officials are considering the possibility of addi-
multiple handheld devices being used at once and get some tional special challenges, along with a combined effort with
3D imagery.” the Army’s Ground Vehicle System’s Center that will focus
Matthew Willis, director for laboratory management, on lowering the weight and improving the survivability of
Office of the Deputy Assistant Secretary of the Army for the Next-Generation Combat Vehicle. Jette says he is con-
Research and Technology and xTechSearch program direc- sidering other possible specialized challenges, such as one
tor, says the program’s surprise element is a core tenet of aimed at advanced antenna technologies.
MDO. “The Army doesn’t know what we don’t know. There
are many technologies out there that might contribute to our
ability to be agile and responsive in a multidomain opera-
tions environment, but we can’t possibly know the spectrum
of technologies that exist out there. We can try to drive
innovation by relying on the private sector to potentially
point us in new directions.”
contact: George I. Seffers, gseffers@afcea.org
Topolosky agrees. “We’re now looking at fighting across
all these domains, and typically our development cycles have
been more siloed into different commodity areas where sys-
tems and fighting units are operating independently, so mul-
tidomain operations will rely on a lot of different technology
solutions to link all these together.”
Jette notes that xTechSearch offers the service some flex-
For a look back at the future,
ibility in MDO solutions. “Multidomain operations is a very visit SIGNAL’s searchable
complicated set of requirements, particularly in the com-
munications-electronics side of things. We’re always looking
online archives at
for those technologies which can give us an advantage or
address some challenges that may be unique to the military.”
www.afcea.org/
The traditional process does not offer the same access to
those unconventional, nondefense-related companies that
content/archives
may well have great ideas. “Particularly in communications-
electronics there is a large demand for innovative technolo-
gies outside of just the military’s needs,” Jette adds.
The xTechSearch challenge also differs from other innova-
tion programs. Rather than awarding contracts at the end of a
challenge, xTechSearch funds development along the way. “We
set the bar low at the beginning with an opportunity for people
to build as they come along. We’re funding that construction
from A to B to C to D,” Jette says. “If you’re a small business,
cash flow is king. If [a small business] can get involved and it’s
going to take a while to get from point A to point B, then hav-
ing someone to help me with the funding is a really important
aspect of whether I want to go down this path.”
The xTechSearch program also connects entrepreneurs
to the Army organizations and personnel most able to help
T
he next era of satellite communications is upon us replaced or upgraded relatively easily, as opposed to complex
in the form of low-earth-orbit constellations aiming and expensive platforms that last many years but take just as
to revolutionize personal connectivity, according to long to design and, if necessary, replace.
satellite experts. These new satellite swarms are being The result is a spurt in the number of low-earth-orbit satel-
driven by technology innova- lites that introduce new capabilities for SATCOM services.
tions simultaneously with the growth BY ROBERT K. Their constellations in turn will spawn innovative technologies
of less-expensive launch services. ACKERMAN that can be applied both on orbit and on the ground. Both the
The result will be an explosion in the military and the private sector soon will have at their disposal
number and type of orbiters serving their earthbound hosts large constellations of communications satellites offering a
while raising the bar for support technologies on the ground. variety of capabilities.
With the overall satellite communications (SATCOM) field “Low-earth-orbit megaconstellations will disrupt legacy
becoming more dynamic, companies are compelled to be providers and bring new services online to connect the
more flexible as uncertainties increase. Accordingly, they are unconnected world,” says Grant Bonin, senior vice president
hedging their bets and exploring the use of orbiters that can be of business development at Spaceflight, a rideshare launch
services company based in Seattle. He notes a downturn trend role. In less than a decade, the satellite industry has moved
SpaceX
in the traditional geostationary satellite communications mar- away from bespoke spacecraft with vertically integrated sub-
ket. While that downturn has recently reversed, no indication systems built along strict lines from limited suppliers at sig-
has yet emerged as to whether that reversal will turn out to be nificant expense. Instead, the industry has seen that model
a true rebound. He also sees a reluctance to invest long-term disrupted by small startups creating systems that can be used
in the satellite sector when technologies and application areas in a number of different areas. The result is a robust supply
are changing so rapidly. chain fed by versatile companies able to maintain their niche
“The changes are coming,” says Bonin’s colleague Philip production at high rates. Even testing costs are coming down,
Bracken, vice president of engineering for launch services at he adds.
Spaceflight. “It’s actually quite a vibrant mix between the tradi- “You used to have to wait a year or longer and spend an
tional geocommunications [firms], the smaller geocommuni- exorbitant amount of money to go out and buy a radiation-
cations startups and the low-earth-orbit constellations trying tolerant processor that would have all the capabilities of
to gain market share. The next two to five years are going to be your calculator,” Bonin says. “Now, you can go [online] over-
very interesting to watch.” The likely outcome is
a mix of all of these types of systems, he offers.
SpaceX
Bonin relates that their launch services com-
pany sees increasing interest in small geocom-
munications satellites as well as in pathfinder
or demonstrator missions that can secure fre-
quency or reduce risk for low-earth-orbit con-
stellations. “The uncertainty in how SATCOM
is going to evolve is actually making it one of the
most exciting times to be in the services busi-
ness, getting satellites of all sizes up there,” he
states. The pressure on buyers to be more agile is
generating interest in smaller satellites that can
be replaced more easily as conditions warrant.
Bracken emphasizes that satellite technology
is the greater driver of the orbital revolution,
not launch services. Satellite buses aren’t chang-
ing to match new launch vehicles as much as A cluster of StarLink satellites stands ready for individual deployment into
the vehicles are adapting to the surge of new orbit. More commercial and even government launch customers will be
orbiters. taking advantage of less costly space access for a variety of missions.
Bonin reports that the miniaturization of
technology and the prevalence of software-defined capabili- night and buy something that has all the capabilities of your
ties have enabled the rapid building of satellite hardware. More smartphone.”
spacecraft are being built in a way that allows them to be Another major technological change is taking place on
reconfigured across the board by software—a development the ground. Bonin cites the proliferation of user terminals to
that Bonin describes as exciting. enable low-earth-orbit constellations as both an opportunity
These capabilities also compress the talent pool necessary and a challenge. Their progress is bottlenecked by how per-
for satellite development. What used to take 10 engineers now vasive the terminals can be after they are miniaturized, made
takes only one, he says. And an increased emphasis on produc- convenient and distributed to end users. This technology has
tion also is changing the state of the art. “Most of the history lagged a bit, he offers.
of spacecraft has been the story of the bespoke spacecraft “The miniaturization of technology allows the miniaturiza-
that usually are extremely labor-intensive,” he recalls. “They tion of satellites, and at the same time—historically—revenue
required a very high degree of talent and engineering, and varies with aperture,” Bonin allows. “Spacecraft need to have
they were usually one-offs. You built one or two, and then you certain parts that are big to make big money. That’s just the
launch the next highly tailored design.” physics of radio frequency and earth observation, so it’s an
This stands in marked contrast to what companies such as interesting balancing act that a lot of people are trying to play.”
SpaceX are doing with its StarLink, which is defined by a vol- And this is having a ripple effect across the industry. As
ume-produced spacecraft, Bonin continues. “More and more the megaconstellations of satellites are taken seriously, they
companies are placing an increasing emphasis not on their are generating market traction that has led to component
R&D [research and development] capabilities but on scaling and device-level suppliers taking the market seriously, Bonin
and on producing. notes. They now are mass-producing radiation-tolerant parts,
“The nice thing about having textbook problems is they for example, that benefit the rest of the small spacecraft indus-
have textbook answers,” he notes. “More and more, lessons try as well as other areas.
from other industries are being pulled into the satellite world.” One key technology that will improve SATCOM capa-
Bracken points out that the supply chain also plays a crucial bilities is flat-panel antennas. Bonin offers that electronically
Military Aims to
Urgently Provide Disruptive
Satellite Capabilities
The year-old Space Development Agency emphasizes
speed in pursuing innovative space capabilities.
T
he threats to the U.S. military and BY KIMBERLY “And we should not ever try to slip sched-
the nation are such that additional UNDERWOOD ule to add more requirements,” the direc-
space-based capabilities must be tor emphasizes.
rapidly fielded. A proliferated low- Specifically, the SDA is looking to field
earth-orbit constellation of satellites and advancements across the transport, battle
sensors will connect to the military’s management, tracking, custody, deter-
tactical legacy datalinks and weap- rence, navigation and support layers of
ons systems to deter against advanced the NDSA. The agency also is address-
threats. In particular, beyond-line-of- ing capability gaps in the military’s space
sight targeting capabilities and enabling solutions, including providing space
the detection, tracking and fire control situational awareness in extended space
of advanced missile threats will be a to cislunar between the Earth and the
part of the system that the Space Devel- moon’s orbit.
opment Agency deploys as part of its First off, the agency is providing a back-
National Defense Space Architecture, bone transport layer, made up of hundreds
or the NDSA, says the agency’s director, of satellites in low-earth orbit (LEO) that
Derek Tournear. will all be optically connected to form a
“The architecture is focused on deliv- mesh network in space, the director states.
ering the initial capabilities of beyond- As part of the first deployment of capabili-
line-of-sight targeting for time-sensitive ties in the next year, in Tranche Zero, the
targets, both ground and maritime,” SDA will fly about 20 transport satellites to
Tournear states. “We need to get that up form the network and enable communica-
there as rapidly as possible. And because The United Launch tions to legacy tactical datalinks.
more advanced missiles are being fielded Alliance Delta IV Heavy “In addition to being able to talk to
[by adversaries], we need to have a space rocket lifts off from Van- each other, that data transport layer also
sensing layer that can detect, track and denber Air Force Base on can talk directly via existing tactical data-
then set down fire control information to January 19, 2019. With links, such as Link 16, and down to weap-
its rapid fielding pace,
be able to take out those targets. So that’s ons systems that are already fielded and
the Space Development
what drives us. That’s why it’s important. Agency plans to launch already have that capability,” Tournear
We believe that these threats are in exis- initial capacity of its says. “We are working very closely with
tence now, and we believe that we need new network in 2021. the Army to ensure that we can talk from
the capabilities fielded as soon as we can.” our transport satellites down to their
U.S. Air Force photo by Michael Peterson
The Space Development Agency’s TITAN ground system, so they could then
(SDA’s) effort to create and sustain resilient, afford- further disseminate the data to other weapons sys-
able and lethal space-based capabilities as part of tems that aren’t connected via Link 16. And we’re
the NDSA for the military also includes providing working with the Navy for similar systems to do that
the space-based backbone for the services’ Joint all- over their CEC comm channels.”
domain command and control, or JADC2. Three sensing layers will feed data to the trans-
The agency’s speed-priority approach is to roll out port layer: (1) a tracking layer made up of over-
minimum viable products in tranches starting in head persistent infrared (OPIR) sensors to detect
fiscal year 2022 and then every two years thereafter. and track adversarial advanced missiles; (2) a
To help enable the military’s JADC 2 operations, the He clarifies that the USDR&E “will still always have the role
NDSA platform would connect to all of the services’ with the assistant director of space, whose role is to ensure
ground and air networks tied into JADC2. For example, the that the overall Department of Defense space architecture
Air Force’s Advanced Battle Management System, Aper- fits together and has some sort of unity and a road map that
ture One and Radio One networks would link to the SDA’s makes technical sense.”
transport satellites. “We would be the backhaul for that data The NDAA 2020 also called for the establishment of a
across our mesh network,” he says. new assistant secretary of the Air Force for Space Acquisi-
In the rest of this fiscal year and next, the agency is con- tion and Integration, which will have purview over the
ducting a set of demonstrations focused on the communi- Space and Missile Systems Center, the Space Rapid Capabil-
cations backbone technology to demonstrate the function- ities Office and the SDA, Tournear adds. “That design and
ality of the optical connectivity. construct is still being developed, primarily by the Space
Additionally, there will be experi- Force in conjunction with others, and any final construct
mentation of the OPIR tracking would be a design that General Raymond and Secretary
layer, collecting IR data over a Barrett and Secretary Esper would all have to decide upon,”
wide range of infrared bands, to he shares. “And exactly how that construct looks on an org
see which band will best perform chart is still being determined.”
background light rejection with
the missile detection system in
a LEO environment, Tournear
states. The agency also is prepar-
ing the related software and algo-
rithms to show that their custody
satellites can run the algorithms contact: Kimberly Underwood,
that operate the flight electron- kunderwood@afcea.org
ics and can perform sensor and Speed in deploying
data fusion to tie all of the signals the National Defense
together. Space Architecture
The director also will be work- is a priority, says
ing on growing the SDA. The Space Development CUSTOMIZED MICROWAVE
agency started with less than five
employees when it was created
Agency Director
Derek Tournear. DATA LINK SOLUTIONS
in March 2019, and there were UHF-Ku Analog
about 12 people when Tournear took over, including a mix Band Transmitters & Digital
of contractor and government employees. “We’re just now Frequencies Receivers Video Links
up to 60, including contractors, FFRDC [federally funded
Full Duplex
research and development center] support, government Transceivers
career civilians and military personnel that are detailed to
SDA,” he shares. “Eventually, we’ll get to about 200. [We Solid State
Power
are all working] to get the capabilities out as rapidly as Amplifiers
possible.”
Multiple Low Noise Low SWaP
Notably, the SDA is slated to move into the U.S. Space Waveforms
Force by 2022, as dictated by the National Defense Autho- Amplifiers
rization Act of 2020. The SDA began as a defense agency
under the Office of the Undersecretary of Defense for
Tunable Audio or
Research and Engineering (USDR&E) and the agency will Data Subcarriers
retain ties with OUSDR&E, the director notes.
“In our role, we have enough autonomy and authority to
essentially establish what we need to put in place to deliver Land/Sea/Air
the capabilities and deliver these satellites,” Tournear offers. LOS and BLOS
“And our plan is to continue to push forward and deliver
Broad Design and
that tranche at the end of FY 2022, at which point, once we Manufacturing
start to fly and operate those satellites that are doing our Capabilities
data transport mission, as well as our missile tracking mis-
sion, then the new architecture will show that it has military 13741 Danielson Street, Suite J
utility. And at that point, the intention is to roll out from Poway, CA 92064
underneath USDR&E, where we then become the innova-
s &!8
tion arm of the U.S. Space Force, and we will continue to do www.RamonaResearch.com
the same mission, but underneath the U.S. Space Force.”
B
y year’s end, U.S. Navy researchers intend to add operations in all orbits and complements and supports the
one of two remote autonomous antennas to its NRL’s skills in space systems by providing compatibility
satellite tracking architecture, enhancing its abil- testing, pre-launch, launch, and post-launch support,
ity to collect strategic satel- flight operations, and mission data processing, according
lite data and support space-related BY GEORGE I. to an NRL fact sheet.
research and development. SEFFERS The facility supports an advanced suite of ground
The first antenna will be located equipment in a resource pool that includes antennas,
at a secure, undisclosed and unmanned site in California front-end processors, command encoder units, receivers,
and will extend the tracking capabilities from Blossom amplifiers and all of the other equipment necessary to per-
Point, Maryland. The second is planned for Hawaii. form satellite command and control functions in a secure
Blossom Point is located south of Washington, D.C., and environment.
is owned and operated by the Naval Research Laboratory The systems there are fully automated, reducing man-
(NRL). It is considered a state-of-the-art command and power and costs. The foundation for this broad range
control facility capable of supporting satellite spaceflight of capabilities is the NRL-developed and government-
missions from launch through end-of-life. owned Neptune software system, according to an NRL
The facility provides command, control, communica- website. The NRL has optimized the hardware and soft-
tions, network engineering, and management of new ware architectures over many years to maximize flexibil-
and on-orbit assets. Blossom Point supports spacecraft ity in integrating new spacecraft programs and ground
feasible to place antennas on a mobile platform. “There is “Ground networks, even though they seem like they’re
absolutely nothing preventing that,” Cox acknowledges. really, really good … get spotty sometimes.”
The officials tout the automation capabilities at both the And when the connections get spotty, synchronization
Blossom Point hub site and the Pacific region extension. is key. “It’s a matter of getting everything very tightly
“They’re completely autonomous remote facilities. The synchronized between the assets. We’re able to deploy
only time you visit them is to do maintenance, either for equipment that does that synchronization so that we have
preventive maintenance or upgrades or whatever you may reliable, error-free synchronous communications between
want to do. But there is no requirement to have people Blossom Point and those remote stations. That allows us
located at both sites,” Cox states. to have a variety of data rates, of mission data, and health
However, human intervention is possible. Typically, and status data go across this network extremely reliably,”
that is only done if a satellite is having issues, which is Ritter elaborates.
rare. “People can sit at a keyboard at Blossom Point, dis- The extension antennas are satellite agnostic, meaning
able the automation on the software with one click of a they will work with any kind of satellite in any orbit, Cox
button, and then when you do that, you’d better have a points out. “The remote antennas are universal. They’re not
person sitting there and getting ready to do something dedicated to any particular mission. You could do one mis-
with the satellite because now you’ve stopped the automa- sion for the Air Force, and 20 minutes later, you do one for
tion,” Cox points out. the Army or DARPA or NASA or whoever. They are not at
Even in times of trouble, automation often is preferable. all hard coded to a particular satellite or agency.”
“Having an automated system can help recover the space-
craft easier and faster than a person sitting in a seat,” Cox
adds.
Whether operations are automatic or manual, ground
networks play a critical role in connecting the remote
sites to Blossom Point, Ritter explains. “We have to condi-
tion the equipment that’s remote and the communication
link between that equipment so that we can transport contact: George I. Seffers, gseffers@afcea.org
data reliably across these ground networks,” he offers.
W
hen the first Solarium Commission con- define illegitimate behavior online. And the third pro-
vened in 1953, it had the task of help- poses imposing costs on U.S. adversaries who violate
ing Former President Dwight D. Eisen- those norms through defending forward and persistent
hower and his cabinet colleagues assess engagement.
the threat from the Soviet Union after the death of Unlike its predecessor, however, the 2018 Cyber-
Joseph Stalin and agree on a stra- space Solarium Commission chose an all-of-the-above
tegic U.S. response. Three teams of BY SHAUN approach. It opted for a strategy it calls layered deter-
policy experts put together three WATERMAN rence that weaves together all three methods to dis-
competing policy models: contain- suade adversaries from trying to use cyber attacks
ment, confrontation and roll-back. Former President against the United States.
Eisenhower famously chose containment, a strategy But in cyberspace, deterrence means something very
based on the deterrence of Soviet military power and a different than it meant for the first solarium commission.
norms-based alliance with Western Europe. “In nuclear deterrence,” explains commission member
The Cyberspace Solarium Commission that Con- and former Department of Homeland Security Under-
gress chartered in 2018 says in its March 2020 report secretary Suzanne Spaulding, “it’s really binary. You either
that it also looked at three policy approaches. The first have deterred someone from using a nuclear weapon or
is denial and defense at home to strengthen the United you haven’t. There’s really no shades of gray there.”
States against online attacks. The second advises using Conversely, conflict is persistent in cyberspace,
networks of alliances to promote global norms and to pervasive and almost always conducted in shades of
as simple as it might seem, given the hugely complex supply grid in a warning to President Vladimir V. Putin.” And U.S.
chains for computer software and hardware. “To do deter- intelligence agencies have a long and, to some observers,
rence by denial properly … you have to get your supply chain inglorious history of interfering in foreign elections, though
security exactly correct,” he says. not by cyber means.
The problem is the globalization of supply chains, both for The United States is not on the same page even with some
computer components like microchips and motherboards, of its closest allies when it comes to cyber issues like privacy
and for software itself because U.S. companies often out- and data protection, for instance. “The Europeans view pri-
source their code development offshore. And at least one vacy in a very different way than Americans do,” Aitel con-
link in almost all of those chains is in China, one of the larg- tends. “If we think that they believe the same thing we do,
est manufacturers of information technology products and we are fooling ourselves.
software development services in the world. “We want to be special,” he says of the United States. “We
That means that U.S. companies are often using compo- want the rest of the world to live by a set of rules that we’re
nents made, or software developed, in a country that has not necessarily willing to live by ourselves.”
one of the most aggressive cyber-espionage programs in the Libicki agrees, noting that, “We’ve paid some very smart
world, too. people in this country to do unto other countries the sort of
Aitel ridiculed the decision by the British government to things we don’t like being done unto us.”
hold cabinet meetings on Zoom, a video conferencing tool To avoid the charge of hypocrisy, he adds, “The sorts
that bases its engineering team in China and uses Chinese of things that we are wanting to prohibit [through global
servers to generate the mathematical keys utilized in its norms] should be the sorts of things that we’re willing to
encryption. “When you’re doing national grade work, how forego or never wanted to do in the first place.”
secure your supply chains are and where they’re coming But, Libicki observes, swearing off certain categories of
from becomes a major national security issue,” he points out. cyber attack might mean limiting the activities of top-tier
“Deterrence by denial involves really hard decisions about U.S. hackers to the detriment of national security. “Maybe
platforms,” Aitel adds. And those decisions are made even you shouldn’t give up things that we’re very good at even if
more difficult when the national software and hardware pro- [the adversary is] very good at them too, because that will
duction base has eroded because it was undercut by much end up favoring them,” he offers.
cheaper products from China and elsewhere. “When you’re Aitel notes that states generally don’t forgo such advan-
not the producer of any of the software you rely on, you are tages. “A lot of the pushing of cyber norms runs into the
essentially beholden to the people that do produce the soft- sand because state cyber interests are all conflicting.”
ware,” he says. It gets more complex still when you consider that the
But Martin Libicki, professor of cybersecurity studies principal U.S adversaries see cybersecurity in a very different
at the U.S. Naval Academy, says beyond the supply chain way than the United States where it’s a technical issue.
issues, some cyber strategy scholars see other problems with “China and Russia view cybersecurity issues inside their
the concept of deterrence by denial. “There’s no evidence country primarily in terms of if they can control informa-
that it works,” he says. Indeed, he adds, “the evidence is that tion, if they can protect the regime,” Aitel says. Their norms
hardening systems doesn’t stop anybody from trying any- center on censorship and surveillance, he explains, and those
thing,” though it might protect systems from compromise concerns about the integrity of national information ecosys-
when they do. But that’s not deterrence, argues Libicki. “If tems and regime survival are widespread in other countries,
I’m wearing armor and you swing a sword at me, I may be too. “I think their cyber norms ring pretty true to a lot more
unharmed. But were you deterred? No!” countries than we would prefer,” he states.
The commission’s vision of layered deterrence also depends
on successfully promulgating international norms of cyber
This is the first of two articles addressing the Cyberspace
behavior, something that has been one of the central principles
Solarium Commission’s proposed strategy of layered deter-
of U.S. global cyber strategy for at least a decade.
rence. The second article will look at persistent engagement
These norms, articulated most recently in a 2017 G7 decla-
and defending forward.
ration, don’t have the authoritative status or the exactitude of
international law. In theory, they represent a set of commit- Shaun Waterman is an award-winning reporter and editor
ments broad enough to have impact if widely respected but who has worked for the BBC, UPI and POLITICO. He is
fuzzy enough that states don’t feel like they’re tying their own currently freelancing covering federal information technol-
hands too tightly. They include actions such as not attacking ogy, cybersecurity and homeland security.
or using Computer Emergency Response Teams (CERTs) as
attackers; not engaging in commercial cyber espionage such
as intellectual property theft; and not damaging civilian infra-
structure such as the power grid or elections systems.
But Aitel argues that there’s a level of hypocrisy in U.S.
endorsements of these principles. Last year, for example, The
New York Times reported that U.S. Cyber Command was contact: WatermanReports@gmail.com
“stepping up digital incursions into Russia’s electric power
Scalable Endpoints
Scalable Classification Levels
Scalable Management
Forcepoint Trusted Thin Client Remote provides secure, desktop access across multiple domains of different
classification levels on a single device. It’s running on more than 160,000 devices with proven deployments
at scale often connecting numerous classification levels and deployed around the globe by the DOD,
DOJ, IC, and other agencies. It is highly scalable, with the ability to easily add more classification levels and
endpoints at any time through centralized management. This is the scalable, easy-to-manage, multi-domain
access technology you need.
SPEAKER:
RYAN
ENGLISH
CEO and
Co-founder,
Militaries worldwide are investing in UAV/UAS technol- FLYMOTION
ogy to survey and conduct strategic offensive measures
to protect and defend. Small unmanned aircraft systems
(sUAS) provide a fast, simple and beneficial tool for C4ISR
scenarios. Equipping the UAV with various sensors such
as infrared or high-powered zoom cameras allows for the MODERATOR:
collaboration of important information that may not nor- ROBERT K.
mally be attained through other methods. sUAS allow for ACKERMAN
a quick deployment by an individual or team and does Editor in Chief,
not require the manpower or resources necessary to op- SIGNAL Magazine
erate larger systems. The sUAS are also orders of magni-
tude less expensive than their larger counterparts. The
technology is advancing at such a rapid rate that smaller
systems provide the capabilities previously only available
to larger vehicles. There are a number of systems that can
meet the needs of those who are down-range and those
at home. Ground control stations and viewing terminals
are critical components of successful capture and ex-
ecution efforts. In this webinar, we’ll discuss the role that
Panasonic TOUGHBOOKs play as part of numerous UAS
deployments and how FLYMOTION provides end-to-end HOSTED BY
UAV technology to government and defense, incorporat-
ing TOUGHBOOKS to users in the field.
Advanced Computing
Escondido, California-based One
Stop Systems Inc. is offering a com-
puting expansion system that sup-
ports NVIDIA A100 Tensor Core
graphics processor units (GPUs).
The company claims that it can
improve computing performance by
up to 20 times of previous levels and
allows developers to scale up servers by adding up to eight of the GPUs. The sys- Improved Position,
tem works with computing-intensive applications such as artificial intelligence
(AI) training, AI inference, video analytics and mixed-reality rendering. Navigation
For more information, visit www.onestopsystems.com. and Timing
GridGain Systems is providing enterprise-grade in-memory computing solu-
Neûchatel, Switzerland-based Orolia is offer-
tions that offer high performance, scalable applications that leverage digital
ing a low size, weight, power and cost min-
integration hubs, hybrid transaction/analytical processing and other strate-
iaturized rubidium oscillator, known as the
gies. The company, headquartered in Foster City, California, suggests that
Spectratime mRO-50. The mRO-50 provides
common use cases for their platform include application acceleration and as
accurate frequency and precise time syn-
a digital integration hub for real-time data access across data sources, as well
chronization to mobile applications, includ-
as legacy and greenfield applications.
ing military radio-pack systems in global
For more information, visit gridgain.com. navigation satellite system- (GNSS-) denied
environments. Its improved operating
Learn
AFCEA members receive SIGNAL Magazine each month. This
award-winning, premier publication, along with SIGNAL
Online and The Cyber Edge, covers the latest cyber
technologies, communications, electronics, intelligence,
ENGAGE
and information systems, equipping you for success.
Your Network is
Never Down
Through our chapters worldwide, you are part of an
EXPAND
As a member, you’re eligible for discounted rates to
participate in AFCEA’s acclaimed national and international
exhibitions, conferences and symposia.
Be Seen
AFCEA’s Corporate Directories are seen by over 5,000 key
executives each month. Corporate Members get a listing in
any of directories for Cybersecurity, Education, Health IT,
Homeland Security, or Intelligence Community, and can
use the directory’s power search tools using keywords or
NAICS codes.
Save
On tuition through Preferred providers of education, as well
as through CompTIA discounts on Certification Vouchers.
New
AFCEAN of the Month Corporate
Master Sgt. Heath Curless, USAF Members
Listed below are the latest
KAISERSLAUTERN MILITARY CHAPTER organizations to become
corporate members of
M
aster Sgt. Heath Curless, USAF, has been contributing to AFCEA International. A
the Kaiserslautern Military Community (KMC) Chap- capabilities statement for each
ter since 2018, when he decided it was time to get more new member will be published
involved. He competed for a board position and was elected to in this issue or in the future.
the Events Committee, a role that he still holds today. A complete list of corporate
Sgt. Curless is responsible for coordinating chapter events to members is available online at
include two Tech Expos and a Sports Day event each year. The www.afcea.org/membership/
KMC Tech Expos have averaged more than 500 attendees and corporate/corporates.jsp.
50 vendors per event over the past two years, with the most
Boone Group
recent Tech Expo held February 12, 2020, at Ramstein Air Force Base, Germany.
During his tenure, he has led three Tech Expos and two Sports Day events. BSEt LLC
Additionally, Sgt. Curless is involved with the Cycle 4 STEM team. In 2018, Coder
his team of 20 riders rode 250 kilometers over three days while raising $36,000 Document Storage
in donations. All donations went toward scholarships in the KMC area for Systems Inc.
those entering STEM career fields. He enjoyed it so much that he led the team FedLearn Inc.
in 2019, raising another $32,000. Fraym
Furthermore, Sgt. Curless organized the most recent KMC AFCEA Golf Information Partners Inc.
Tournament. This event capped off the Expo Week and directly contributed JETCOOL Technologies Inc.
$5,800 for STEM scholarships. Precision Procurement
Sgt. Curless works for Headquarters U.S. Air Forces in Europe-Air Forces Solutions
Africa, Communications Directorate, where he is a command satellite com- Resecurity Inc.
munications manager. He will soon be moving back to the states and hopes to RSBG ICT GmbH
continue to serve on the board at his next chapter.
Security Centric Inc.
In recognition of his dedication to the association, AFCEA proudly names
SES S.A.
Master Sgt. Heath Curless, USAF, AFCEAN of the month.
Wealth Management
Information Security
SIGNAL’s newest
online section and
e-newsletter dedicated
to all things CYBER. news.afcea.org/TheCyberEdge
Identity Governance in
Multi-Cloud Environments
These days, more than three out of four agencies use multiple cloud platforms. This gives them
the freedom to match the requirements of each use case to the unique strengths of each cloud
platform, whether it’s AWS, Azure or Google Cloud Platform. What these agencies lack, however,
is a way to effectively and securely govern access across these multi-cloud environments. These
challenges leave businesses open to the risks and costs of non-compliance, cyber attacks and
simple human error. Some may use native tools with basic identity and access management
for a single platform, but this is not governance.
This lack of governance also stifles productivity and growth—if users can’t get the access they
need when they need it, work doesn’t get done. Managing who has access to what and with
which privileges is a real challenge in the cloud due to rapid change and large scale. SailPoint
Identity and Cloud Access Governance allows IT and security teams to back control of cloud
access by providing 360-visibility across the enterprise and cloud infrastructure and adds a
critical layer of security and governance. Cloud security is a journey not a destination.
Join us in this informative session to begin
plotting the course to your successful
SPEAKER:
and secure cloud journey. Discussion Topics:
• Understand the three key questions of
FRANK
governance: Who currently has access? BRIGUGLIO
Who should have access? Global Public
How is the access being used? Sector Strategist,
• Discover access relationships, patterns and SailPoint
improve the application of access controls.
• Manage and control access to your
hybrid cloud infrastructure including
MODERATOR:
AWS, Azure and Google Cloud.
• Enforce access to cloud infrastructure with GEORGE I.
predefined policies and credential cycling. SEFFERS
• Leverage out of the box compliance guardrails Executive Editor,
to monitor for adherence for NIST SP 800-53. SIGNAL Magazine
HOSTED BY
T
working with the Women in NOVA with more intimate settings to connect
he essential qualities of a good (WIN) Committee was her first expe- one-on-one with industry and govern-
leader include integrity, account- rience with volunteering. The WIN ment leadership, including Small Busi-
ability, humility, vision and posi- Committee provides a forum for ness Breakfasts, Annual Golf Outing,
tivity, and AFCEA is an excellent women in government, military and Women in NOVA speaker series and
environment to grow leadership skills, industry, offering them the opportu- our popular Young AFCEAN social
according to Tamara Greenspan, this nity to prepare, promote, support and events.”
year’s winner of The General James M. mentor senior and emerging leaders The chapter’s monthly luncheons,
Rockwell AFCEAN of the Year. “The within the STEM fields. IT Days, breakfasts and special
world is always changing, and a strong “There are so many amazing leaders events allow members access to gov-
leader needs to be able to adapt to in AFCEA International and AFCEA ernment speakers who are experts
changes in the environment and work- NOVA,” Greenspan says. “Becoming in current policy and possess insight
force and consistently look to improve, co-chair of that [WIN] committee into future objectives. “[We] have
adjust and innovate,” she suggests. was how I was exposed to the AFCEA the Pentagon in our back yard, the
The Rockwell award is AFCEA’s NOVA board.” nation’s capital right next door and
premier award given for exemplary Greenspan has always been passion- the backbone of the Internet at our
service to AFCEA over the past year. ate about helping women in the work- center,” Greenspan says.
Greenspan, from the Northern Vir- force, and WIN was the perfect way Greenspan advises AFCEA mem-
ginia Chapter (NOVA) and group for her to engage with AFCEA NOVA. bers interested in becoming chapter
vice president of public sector appli- After joining the leadership team, she leaders to “get involved, engage and
cations, Oracle, exemplifies commit- was elected to the board and eventu- find your passion.” She recommends
ment, humility and dedication. As the ally became president, a position in that members reach out to their local
chapter underwent changes for the first which she has excelled for the past two chapter, volunteer and offer assistance.
time in a few years, Greenspan dedi- years. “I think the best way to get involved
cated time and energy to helping the With over 6,500 members, the chap- is to join a committee and help with a
board weather the storm by providing ter’s mission is to connect membership program or event. You will understand
leadership and guidance. “I was pas- with the government through a variety how the chapter works and how best
sionate about working with our board of meetings and events. These include your skill sets can support the chapter.”
on innovation and encouraged new popular monthly luncheons that run Greenspan champions AFCEA’s
ideas and making changes if that was September through June and feature rewarding leadership opportuni-
the best for our membership,” she says. leading government speakers giv- ties, and she has taken advantage of
“I have had the privilege of support- ing presentations about information as many as possible. “It has been an
ing the DOD for more than 30 years, technology and its relationship with amazing experience, and I have truly
and I love working in the public sector national security, as well as other rel- enjoyed my time as president and look
industry. I am lucky to work with an evant U.S. Defense Department topics. forward to engaging and helping as a
amazing AFCEA NOVA board with “We hold larger full-day IT Day past president.”
many different backgrounds, leader- conferences, featuring speakers …
ship skills and DOD experience.” from the Army, Navy, USMC [U.S. Chuck Griffith is the vice president of
Greenspan has been an AFCEA Marine Corps], Air Force, DOD and information for the Northern Virginia
member for many years and has other federal agencies,” Greenspan Chapter.
on Social Media
concerns and highlight news.
LIKE us on Facebook to access
important AFCEA updates.
AFCEA is dedicated to encouraging conversations FOLLOW us on Twitter for real-time
and providing valuable information where it’s news that fits your busy schedule.
most convenient for you. Connect and engage Find links to these pages and more under
with us on your favorite social platform. “Connect with Us” at www.afcea.org
* List is current as of June 8, 2020. A complete list of AFCEA’s corporate members is available at www.afcea.org/membership.
TechNetCyber
Webinar Channel
Leading up to AFCEA’s TechNet Cyber event, SIGNAL Media Scheduled webinar dates are:
is hosting four webinars featuring experts from within DISA
August 5, 1 p.m. EST
talking about new leadership, emerging technology, DISA’s Small
Business Office and Procurement Service Directorate and virtual August 19, 1 p.m. EST
recruiting. This series will keep the conversation going leading September 2, 1 p.m. EST
into AFCEA’s TechNet Cyber event, December 1-3 in Baltimore. September 16, 1 p.m. EST
Register at https://signal.afcea.org/TechNetCyberChannel
The Evolution of
Data Protection:
From Legacy Backup to
Continuous Data Protection.
Tired of periodic backups that don’t
meet the availability demands SPEAKER:
of your agency? Worried about GIJSBERT
JANSSEN
recovering quickly from an outage or VAN DOORN
ransomware? Concerned about your Director Technical
ability to prove you can recover during Marketing, Zerto
annual compliance audits? It’s time
to rethink your backup strategy with
continuous data protection. Join this SPEAKER:
webinar to learn how Zerto can help GREG
you execute your day-to-day data BUTLER
Sales Engineer,
protection strategy and streamline the Zerto
number of tools you need to do so.
See firsthand how Zerto’s journal-
based recovery, coupled with
continuous replication, recovers files, MODERATOR:
VMs, applications and entire data GEORGE I.
centers. Learn how you can quickly SEFFERS
resume operations with the industry’s Executive Editor
SIGNAL Magazine
best RTOs and RPOs using Zerto.
HOSTED BY
CHAPTER
NEWS Edited by Megan Lee
EDITORIAL POLICY: Chapter News must
be received by the 20th of the month
two months prior to publication date.
ArkLaTex
Chapter Provides a Unique
ARKLATEX—In May, KTBS TV host Rick Rowe asks Chapter President Lt. Col. Michael Harris,
Scholarships Presentation USAF, about the chapter’s annual scholarship program and the 2020 recipients.
This May, the chapter held two signifi-
cant events recognizing the tremendous
achievements of 14 high school seniors.
These events would normally be held within
a large banquet setting, allowing parents,
grandparents, teachers, school counselors,
sponsors and elected officials to attend. Due
to the health crisis, this was not possible
this year, so other alternatives were explored
and executed flawlessly. The chapter first
recognized the students during a live broad-
cast by local television station KTBS. This
broadcast was hosted by local television per-
sonality Rick Rowe, and was filmed at the
Cyber Innovation Center, one of the area’s
most preeminent locations for technologi-
cal collaboration amongst government, pri-
vate industry and academia. The theme for
this first event was “The Best and Bright-
est,” and during this live broadcast, the 14
students were presented with a check for
$2,000 through the generosity and support
of local and national sponsors, some of them
giants in aviation. In addition, each student ARKLATEX—In May, founding chapter member Barbara Schleben presents a $2,000
gave remarks on their respective scholastic scholarship check to one of the 14 winners of 2020 made possible by generous local and
journey, plans for the future and goals to international sponsors.
be trailblazers. The second event was a vir-
tual scholarship presentation held via Zoom.
The guest speaker was AFCEA International
President and CEO Lt. Gen. Robert M. Shea,
USMC (Ret.), who talked about the history
of the association and the global security ini-
tiatives undertaken by AFCEA International.
He stressed the importance of maintaining
competitive advantage with representatives
in over 130 countries. He also mentioned the
importance of the relationships built over the
years with the Pentagon and the challenges
presented by the changing world order and
countries that do not play by established
norms. The chapter was grateful to have
Gen. Shea speak to the scholarship recipi-
ents, and they appreciated his insight and
congratulations. The chapter is glad to be
able adapt to the environment and contin-
ue to give scholarships to deserving local ARKLATEX—Scholarship winners, chapter staff, sponsors and news crew gather in the
students while providing new and unique renowned Cyber Innovations Center for the scholarship presentation broadcast live on KTBS
opportunities for their recognition. 3 ABC in May.
Professional AFCEA has two pathways for professional development – Onsite courses taught for your
organization at your location and academic institutions in our Preferred Provider network
Development for both organizations and individuals. AFCEA members can receive continuing education
with AFCEA! attendance documentation. For more information go to www.afcea.org/site/Education AFCEA PROFESSIONAL
DEVELOPMENT CENTER
Advertiser Index
ADVERTISER PAGE WEBSITE
Avaya 40 www.avaya.com/en/solutions/government/
Cloudera cover 4 https://signal.afcea.org/cloudera
Crystal Group 2 www.crystalrugged.com
Forcepoint 42 www.forcepoint.com
OKTA 16 http://okta.com/ZeroTrustModel
Ramona 33 www.RamonaResearch.com
TrellisWare 5 www.trellisware.com
ViaSat 1 https://viasat.com/batsd-2
Advertising Director, Jennifer Deuterman (703) 631-6181 This index is printed as a complimentary
service to our advertisers. While care is
Washington Area (VA, MD, DC) and South Eastern U.S. (805) 217-6026 taken to ensure the accuracy of the listings,
Western & Mid-Western U.S., New England and Northeastern Territories (925) 648-3101 SIGNAL Magazine does not accept
Regions Not Listed (703) 631-6181 responsibility for omissions or errors.
Maj. Gen. Jennifer Napper, USA (Ret.), is a vice president in Perspecta Inc.’s Defense Group. She previously served as director
of cybersecurity plans and policy for the U.S. Defense Department Cyber Command, and she led the U.S. Army’s Network
Enterprise Technology Command (NETCOM). To share or comment on this article go to http://url.afcea.org/August20
The nation's premier intelligence and national security conference is going virtual!
INTEGRATION
INNOVATION
Co-hosted by COLLABORATION