The Army must fix its approach to network modernization if it hopes to improve command post and mission command operations currently vulnerable to peer adversary threats, according to the leaders of two Army centers of excellence.
Updating to a standards-based, upgradeable network, while establishing new technical requirements that don’t hinder innovation from industry partners, is among the top priorities for Army network modernization, according to Maj. Gen. John Morrison, commanding general of the Cyber Center of Excellence and Maj.Gen. James Mingus, director of the Mission Command Center of Excellence.
“Unless we do some things to our network, unless we do some things to our command and control systems … our mission command systems, unless we do something to our command post infrastructure, it is our belief that our command posts and network will not survive against a near-peer or peer competitor,” said Mingus while speaking on a panel with Morrison at an Association of the United States Army conference Tuesday.
Army officials plan to end programs it can’t fix on the network, prioritize modernization efforts for the most critical, “fight tonight” systems, including command posts, and move to an adapt and buy approach with industry.
Last week, Army officials already proposed cutting its Warfighter Information Network-Tactical Increment 2 enhanced communications program, because of concerns the system can’t face near-peer adversary threats (Defense Daily, Sept. 28)
For its command posts, modernization efforts will center around a three-phased approach meant to improve survivability and mobility, according to Mingus.
The plan includes rapidly deploying improved wireless technology to several Army echelons, working with brigade combat teams to test integration of new command control systems, and prototyping new industry capabilities for a future use.
Modernization efforts for mission command systems on the network will center around establishing a common operating environment.
“The command systems were designed never to talk to each other in a serious way. We came up with patches, we came up with ways to make that all work,” said Mingus.
Establishing a defensible common operating environment involves converging various networks and data centers, while eliminating stovepiped systems.
Army officials must begin bringing their applications onto a standards-based common infrastructure, which would allow future capabilities to be more seamlessly deployed across the force, according to Morrison.
“When you operate with that many disparate networks it creates gaps. It allows the enemy to have an avenue to attack into our network,” said Morrison.
Alongside moving to a common operating environment, the Army hopes the removal of technical requirements fosters greater industry participation in eliminating network gaps.
“This is really about going out and finding those things that are available today, either in the commercial industry that’s out there or joint software solutions that we can apply now…what we can literally apply right now to the force,” said Mingus.
For potential industry partners, the Army is seeking capabilities to meet its new, streamlined technical requirements for the network. Modernization technology should help move towards increased situational awareness for all Army components, must be standardized, should ensure continuous joint interoperability and mitigate electronic signatures, according to the panelists.
“We built this to fight in a counterinsurgency environment, but over the last 15 to 16 years we’ve got some potential adversaries that have gone to school on how to do business. And quite frankly, we’ve let some of our capabilities degrade,” said Morrison. “Now we’ve got to build that resiliency inherently into the network so it is adaptive and flexible, and supports our mission command.”