Welcome!

.NET Authors: Liz McMillan, Jim Kaskade, Lori MacVittie, Yeshim Deniz, Ivan Antsipau

Blog Feed Post

Anti-Access Area-Denial (A2AD) in Military Domains and in Cyberspace

By

220px-B-2_leading_Valiant_ShieldSince 9/11, the US has invested heavily in high-end technologies to counter military threats. We have all been amazed at some of the breakthroughs that have been made. Eleven years of fighting on multiple battlefields has given us the opportunity to test these new technologies in places and ways that were never possible before. Throughout these many campaigns however, we have had the luxury of constant, assured access to cyberspace. Sure – there was never enough bandwidth for data-thirsty military operations, but we were basically un-contested in the cyberspace domain throughout our wars and other military activities. Whatever we wanted to do, cybersapce was more or less always usable. As we wind down and try to move these bandwidth-intensive technologies and advancements to counter other potential adversaries, we should understand that owning the cyberspace domain will not always be possible. Our dependency on this connectivity might just be our Achilles heel.

Anti-Access Area-Denial or A2AD is just a fancy acronym for an old military priority: getting control of the area you are going to operate in (air, sea, cyberspace, etc.) and making sure you deny that area to your adversary. DoD’s entire Air-Sea Battle is an effort to identify how we will defeat our adversaries A2AD capabilities such as missiles, mines, or cyber attacks. Whether you are operating from a submarine or driving an unmanned vehicle, the domains – air, land, sea, undersea, space – are highly dependent on the cyberspace. And cyberspace is both an exponential force multiplier AND a critical vulnerability.

We can’t train without it and we can’t fight without it. But Cyberspace for DoD (defined as our interconnected information technology) has vulnerabilities. Professionals realize with any vulnerability, there are opportunities. But to take advantage of the opportunity we need clear, open analysis of the vulnerability and ways to mitigate them.

The following reviews some gaps and key emerging technologies that will help reduce critical shortfalls:

  • We must have a back up plan – the ability to operate in limited, degraded bandwidth environments. Years ago when I worked at one of DoD’s teleports, we scoffed at the idea of using HF to communicate; it was just too small a pipe for any meaningful communications. Now we are reexamining how HF might play in an A2AD environment.
    • The Navy is using a program called the Battle Force Tactical Network (BFTN) to develop a capability to use the HF and UHF radio spectrum to provide line of sight and beyond line of sight network capability in a SATCOM deprived scenario. In operational exercises with our allies, we are testing HFIP and Sub-Net Relay and experiencing data rates of 120kbps and 1.92Mbps, respectively. Not enough to do high-end imagery, for sure! But enough to keep us connected by chat, email and share a common operational picture, with some web-replications and a limited amount of VoIP and video. This isn’t really new technology; we have had these capabilities for a long time (although there are some neat new-tech enablers that are making this less painful than it used to be). The real interesting part about this is that we are actually testing it and exercising it with our allies again.

 

  • Backup plans also apply to infrastructure and data. This calls for well engineered solutions to fast data storage and access and recovery capabilities like those provided by Cleversafe. There are many other gaps that must be addressed to form holistic engineering solutions to backup and security needs for the enterprise. We will save those for a future post since there are so many elements to review, but it is important for any in industry to understand that the military needs your continued innovation in this area.

 

  • Understanding the state of the enterprise is so difficult that DoD has spent millions of dollars and years of effort and can only marginally show what networks are RED/GREEN/YELLOW in a way that is useful to the commander.
    • Tools are needed that show the health and status of these architectures and that will plug and play with existing networks.
    • Tools are needed that can show how these networks are connected in an operational sense. For example, if a network is down (RED), does it impact an existing mission? This is not easy, since it connects network status tools to complex OPLANS and changing Task Force designations.

 

  • The data sets are so large and complex it’s impossible to pull out critical insights with the current architecture. Tools that enable multilayered analysis will be of value, especially when using some of the limited bandwidth techniques discussed above. Any plan that depends on big-bandwidth to port huge amounts of data back to a common analysis center is fraught with problems in an A2AD scenario.
    • I like the technologies used by Thetus Corporation. They have a product called Savanna, which provides search, visualization, discovery, analytic and production tools. It also organizes the data in meaningful ways. I think that a test of how this could be distributed and synchronized across a tactical network with coalition or OGO would provide some interesting results. See a video of this at http://www.screencast.com/t/Ls0vo62IIM. To be able to do this type of analysis during an A2AD environment, we must practice it first and establish clear guidelines on how the analysis is performed when the bandwidth is degraded.
    • Other key technologies which can help address this need include those from MarkLogic, Cloudera, Cleversafe, and Terracotta.

 

  • “Pervasive Interoperability” will be a cornerstone to all future military campaigns. It’s hard to picture many scenarios where DoD would operate alone. Visualization tools are needed that clearly display a meaning across a coalition that includes numerous partners – including other Governmental organizations (OGO) or other nations.

 

  • Speed of decision and speed of action is also a key requirement in modern military campaigns. This means IT systems must be engineered to be fast and responsive. Expect much more use of modern in-memory and advanced caching solutions. This is also a strong point for Terracotta.

As we move forces and capabilities to new areas of operation, we need to view each one with the lens of “how will it work in a contested cyberspace”. Each new technology insertion should demand a complimentary review of how it works in A2AD environments. The smart technologist will be able to answer that question as new capabilities are rolled out. We cannot blindly assume the cyberspace will be ours for future campaigns.

Do you have technologies you believe can address key mission needs of the DoD? If so, let us know about them here.  Are you looking for new technologies to help architect solutions to these mission needs? Search for the latest technology here.  We also link to many of these tech leaders below and at CTOlabs.com

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley, former CTO of the Defense Intelligence Agency (DIA), is Founder and CTO of Crucial Point LLC, a technology research and advisory firm providing fact based technology reviews in support of venture capital, private equity and emerging technology firms. He has extensive industry experience in intelligence and security and was awarded an intelligence community meritorious achievement award by AFCEA in 2008, and has also been recognized as an Infoworld Top 25 CTO and as one of the most fascinating communicators in Government IT by GovFresh.

@ThingsExpo Stories
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Noted IoT expert and researcher Joseph di Paolantonio (pictured below) has joined the @ThingsExpo faculty. Joseph, who describes himself as an “Independent Thinker” from DataArchon, will speak on the topic of “Smart Grids & Managing Big Utilities.” Over his career, Joseph di Paolantonio has worked in the energy, renewables, aerospace, telecommunications, and information technology industries. His expertise is in data analysis, system engineering, Bayesian statistics, data warehouses, business intelligence, data mining, predictive methods, and very large databases (VLDB). Prior to DataArcho...
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have s...
The Internet of Things (IoT) is going to require a new way of thinking and of developing software for speed, security and innovation. This requires IT leaders to balance business as usual while anticipating for the next market and technology trends. Cloud provides the right IT asset portfolio to help today’s IT leaders manage the old and prepare for the new. Today the cloud conversation is evolving from private and public to hybrid. This session will provide use cases and insights to reinforce the value of the network in helping organizations to maximize their company’s cloud experience.
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize supplier management. Learn about enterprise architecture strategies for designing connected systems tha...
IoT is still a vague buzzword for many people. In his session at Internet of @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, will discuss the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. The presentation will also discuss how IoT is perceived by investors and how venture capitalist access this space. Other topics to discuss are barriers to success, what is new, what is old, and what the future may hold.
Whether you're a startup or a 100 year old enterprise, the Internet of Things offers a variety of new capabilities for your business. IoT style solutions can help you get closer your customers, launch new product lines and take over an industry. Some companies are dipping their toes in, but many have already taken the plunge, all while dramatic new capabilities continue to emerge. In his session at Internet of @ThingsExpo, Reid Carlberg, Senior Director, Developer Evangelism at salesforce.com, to discuss real-world use cases, patterns and opportunities you can harness today.
All major researchers estimate there will be tens of billions devices – computers, smartphones, tablets, and sensors – connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be!
Software AG helps organizations transform into Digital Enterprises, so they can differentiate from competitors and better engage customers, partners and employees. Using the Software AG Suite, companies can close the gap between business and IT to create digital systems of differentiation that drive front-line agility. We offer four on-ramps to the Digital Enterprise: alignment through collaborative process analysis; transformation through portfolio management; agility through process automation and integration; and visibility through intelligent business operations and big data.
There will be 50 billion Internet connected devices by 2020. Today, every manufacturer has a propriety protocol and an app. How do we securely integrate these "things" into our lives and businesses in a way that we can easily control and manage? Even better, how do we integrate these "things" so that they control and manage each other so our lives become more convenient or our businesses become more profitable and/or safe? We have heard that the best interface is no interface. In his session at Internet of @ThingsExpo, Chris Matthieu, Co-Founder & CTO at Octoblu, Inc., will discuss how thes...
Last week, while in San Francisco, I used the Uber app and service four times. All four experiences were great, although one of the drivers stopped for 30 seconds and then left as I was walking up to the car. He must have realized I was a blogger. None the less, the next car was just a minute away and I suffered no pain. In this article, my colleague, Ved Sen, Global Head, Advisory Services Social, Mobile and Sensors at Cognizant shares his experiences and insights.
We are reaching the end of the beginning with WebRTC and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) ir...
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of WebRTC adoption today, but the potential is limitless when powered by IoT. Attendees will learn rea...
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at Internet of @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, will share some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, deploy, and manage applications integrating voice, video and data. He is the co-founder ...
The Internet of Things (IoT) promises to create new business models as significant as those that were inspired by the Internet and the smartphone 20 and 10 years ago. What business, social and practical implications will this phenomenon bring? That's the subject of "Monetizing the Internet of Things: Perspectives from the Front Lines," an e-book released today and available free of charge from Aria Systems, the leading innovator in recurring revenue management.
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges.
There’s Big Data, then there’s really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at 6th Big Data Expo®, Hannah Smalltree, Director at Treasure Data, to discuss how IoT, Big Data and deployments are processing massive data volumes from wearables, utilities and other mach...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at Internet of @ThingsExpo, Erik Lagerway, Co-founder of Hookflash, will walk through the shifting landscape of traditional telephone and voice s...
While great strides have been made relative to the video aspects of remote collaboration, audio technology has basically stagnated. Typically all audio is mixed to a single monaural stream and emanates from a single point, such as a speakerphone or a speaker associated with a video monitor. This leads to confusion and lack of understanding among participants especially regarding who is actually speaking. Spatial teleconferencing introduces the concept of acoustic spatial separation between conference participants in three dimensional space. This has been shown to significantly improve comprehe...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, will discuss single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example...