Welcome!

Microsoft Cloud Authors: Kevin Benedict, Pat Romanski, Liz McMillan, Lori MacVittie, Elizabeth White

Blog Feed Post

Anti-Access Area-Denial (A2AD) in Military Domains and in Cyberspace

By

220px-B-2_leading_Valiant_ShieldSince 9/11, the US has invested heavily in high-end technologies to counter military threats. We have all been amazed at some of the breakthroughs that have been made. Eleven years of fighting on multiple battlefields has given us the opportunity to test these new technologies in places and ways that were never possible before. Throughout these many campaigns however, we have had the luxury of constant, assured access to cyberspace. Sure – there was never enough bandwidth for data-thirsty military operations, but we were basically un-contested in the cyberspace domain throughout our wars and other military activities. Whatever we wanted to do, cybersapce was more or less always usable. As we wind down and try to move these bandwidth-intensive technologies and advancements to counter other potential adversaries, we should understand that owning the cyberspace domain will not always be possible. Our dependency on this connectivity might just be our Achilles heel.

Anti-Access Area-Denial or A2AD is just a fancy acronym for an old military priority: getting control of the area you are going to operate in (air, sea, cyberspace, etc.) and making sure you deny that area to your adversary. DoD’s entire Air-Sea Battle is an effort to identify how we will defeat our adversaries A2AD capabilities such as missiles, mines, or cyber attacks. Whether you are operating from a submarine or driving an unmanned vehicle, the domains – air, land, sea, undersea, space – are highly dependent on the cyberspace. And cyberspace is both an exponential force multiplier AND a critical vulnerability.

We can’t train without it and we can’t fight without it. But Cyberspace for DoD (defined as our interconnected information technology) has vulnerabilities. Professionals realize with any vulnerability, there are opportunities. But to take advantage of the opportunity we need clear, open analysis of the vulnerability and ways to mitigate them.

The following reviews some gaps and key emerging technologies that will help reduce critical shortfalls:

  • We must have a back up plan – the ability to operate in limited, degraded bandwidth environments. Years ago when I worked at one of DoD’s teleports, we scoffed at the idea of using HF to communicate; it was just too small a pipe for any meaningful communications. Now we are reexamining how HF might play in an A2AD environment.
    • The Navy is using a program called the Battle Force Tactical Network (BFTN) to develop a capability to use the HF and UHF radio spectrum to provide line of sight and beyond line of sight network capability in a SATCOM deprived scenario. In operational exercises with our allies, we are testing HFIP and Sub-Net Relay and experiencing data rates of 120kbps and 1.92Mbps, respectively. Not enough to do high-end imagery, for sure! But enough to keep us connected by chat, email and share a common operational picture, with some web-replications and a limited amount of VoIP and video. This isn’t really new technology; we have had these capabilities for a long time (although there are some neat new-tech enablers that are making this less painful than it used to be). The real interesting part about this is that we are actually testing it and exercising it with our allies again.

 

  • Backup plans also apply to infrastructure and data. This calls for well engineered solutions to fast data storage and access and recovery capabilities like those provided by Cleversafe. There are many other gaps that must be addressed to form holistic engineering solutions to backup and security needs for the enterprise. We will save those for a future post since there are so many elements to review, but it is important for any in industry to understand that the military needs your continued innovation in this area.

 

  • Understanding the state of the enterprise is so difficult that DoD has spent millions of dollars and years of effort and can only marginally show what networks are RED/GREEN/YELLOW in a way that is useful to the commander.
    • Tools are needed that show the health and status of these architectures and that will plug and play with existing networks.
    • Tools are needed that can show how these networks are connected in an operational sense. For example, if a network is down (RED), does it impact an existing mission? This is not easy, since it connects network status tools to complex OPLANS and changing Task Force designations.

 

  • The data sets are so large and complex it’s impossible to pull out critical insights with the current architecture. Tools that enable multilayered analysis will be of value, especially when using some of the limited bandwidth techniques discussed above. Any plan that depends on big-bandwidth to port huge amounts of data back to a common analysis center is fraught with problems in an A2AD scenario.
    • I like the technologies used by Thetus Corporation. They have a product called Savanna, which provides search, visualization, discovery, analytic and production tools. It also organizes the data in meaningful ways. I think that a test of how this could be distributed and synchronized across a tactical network with coalition or OGO would provide some interesting results. See a video of this at http://www.screencast.com/t/Ls0vo62IIM. To be able to do this type of analysis during an A2AD environment, we must practice it first and establish clear guidelines on how the analysis is performed when the bandwidth is degraded.
    • Other key technologies which can help address this need include those from MarkLogic, Cloudera, Cleversafe, and Terracotta.

 

  • “Pervasive Interoperability” will be a cornerstone to all future military campaigns. It’s hard to picture many scenarios where DoD would operate alone. Visualization tools are needed that clearly display a meaning across a coalition that includes numerous partners – including other Governmental organizations (OGO) or other nations.

 

  • Speed of decision and speed of action is also a key requirement in modern military campaigns. This means IT systems must be engineered to be fast and responsive. Expect much more use of modern in-memory and advanced caching solutions. This is also a strong point for Terracotta.

As we move forces and capabilities to new areas of operation, we need to view each one with the lens of “how will it work in a contested cyberspace”. Each new technology insertion should demand a complimentary review of how it works in A2AD environments. The smart technologist will be able to answer that question as new capabilities are rolled out. We cannot blindly assume the cyberspace will be ours for future campaigns.

Do you have technologies you believe can address key mission needs of the DoD? If so, let us know about them here.  Are you looking for new technologies to help architect solutions to these mission needs? Search for the latest technology here.  We also link to many of these tech leaders below and at CTOlabs.com

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

IoT & Smart Cities Stories
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
SYS-CON Events announced today that IoT Global Network has been named “Media Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. The IoT Global Network is a platform where you can connect with industry experts and network across the IoT community to build the successful IoT business of the future.
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.