An official website of the United States government
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Air Force leaders discuss need to control cyberspace

  • Published
  • By Chuck Paone
  • Electronic Systems Center Public Affairs
Military and industry leaders who gathered here Sept. 24 spoke about the tremendous warfighting value of controlling cyberspace - but they were just as clear about the inherent threats.

"If we lose our ability to use cyberspace, we lose out ability to war-fight," said. Col. Tony Buntyn, director of the Global Cyberspace Air Operations Center at 8th Air Force, Barksdale Air Force Base, La.

Speaking at the fifth annual Net-Centric Operations Conference at the Wentworth-By-The-Sea Hotel here, Colonel Buntyn and others shared ideas for making Air Force and Department of Defense computer networks safer and more effective. The conference was co-sponsored by the Air Force Electronic Systems Center, Hanscom AFB, Mass., and the Patriot Roost Chapter of the Association of Old Crows.

"We need to think about weapons of mass disruption, not just weapons of mass destruction," said Maj. Gen. William Lord, whom the Air Force recently announced as the incoming commander of its new, provisional Cyber Command at Barksdale AFB. "We're not going to give up our 2,000-pound JDAMS (Joint Direct Attack Munitions), but we've got to consider cyber options, too."

General Lord, who currently serves as director of the Information, Services and Integration Division of the Air Force's Warfighting Integration and Chief Information Office, said the U.S. needs to shift its collective mindset.

"We're not there yet, culturally, but we'll get there," he said.

Because lives can be saved and because terrorists and others are already exploiting cyberspace to America's detriment, officials say the United States and its military have little choice but to do so.

"When we went into battle in the past, it was the haves versus the have-nots," said Rich Byrne, vice president for Command and Control Programs at the MITRE Corp., stressing that the Air Force could then rely on simply having better pilots and equipment than its adversaries. "Now, it's much more a battle of wills versus will-nots. Terrorists use commercial technology all the time to fight, but we don't use it nearly as much."

Mr. Byrne said terrorist networks rely on common commercial items such as cell phones, camera phones and Global Positioning System devices. U.S. warfighters need to take advantage of these same technologies, too, he said, arguing that they can greatly enhance collaboration, which is the real key to information awareness.

"I'm not saying we should replace the sensors and communication systems we're using now, but that we should use these commercial technologies to supplement them," he said. He acknowledged that the military would have to ensure the security of such an expanded network, but thought the problem solvable.

Security was also a concern for Colonel Buntyn, whose presentation was 'interrupted' by what he called a distributed denial of service attack. Though the audience was unaware at first, the scenario was scripted. Nevertheless, it demonstrated the potential vulnerability of a network and the professional manner in which Airmen are now prepared to respond.

Even after the disruption had been eliminated and its source dealt with, however, a potential problem remained. The colonel used an innocuous Web page listing college football standings to demonstrate. The page looked normal at first glance, but one team's record had actually been changed to 0-100.

"What if the numbers that were changed had been target coordinates?" the colonel asked. "We'd have a real problem then."

While discussing the Xs and Os of secure and highly effective networked operations, several speakers spoke of using so-called service-oriented architectures to enable interoperability. Based on the engineering principle of loose coupling, SOAs manage software system interactions by using simple, generic interfaces. In this way, consumers and providers of information share a small set of universally available interfaces to use or provide information services.

This requires trade-offs, several speakers said. Developers can't optimize one system at the expense of the entire enterprise, by writing so much specific code that the system can't work compatibly with others.

Charles Riechers, principal deputy assistant secretary of the Air Force for Acquisition and Management, emphasized that system interfaces have to be interchangeable. He said the Air Force is even willing to pay a premium for systems designed with these "sub-optimized" interfaces.

"I'll give you 10 percent more for five percent less," he said, noting the greatly enhanced overall value of a system designed to interoperate with others rather than to maximize its own, stand-alone potential.

Mr. Riechers also stressed that the military has to be willing to work with commercial industry standards when it comes to information technology.

"DoD can't be the big gorilla in the room," he said. "In the grand scheme of things, we're relatively small." The entire federal sector, in fact, is a single-digit percentage of the commercial IT market.

"We have to be a player at the table, but we can't be in control," he said.

Conference participants discussed many other challenges, too, from service-specific policy differences to resource constraints. However, all seemed to agree that there are some clear steps that can be taken to enhance networked operations and to better exploit cyberspace as an asset right now.

"I think the conference really helped us achieve our goals, which were to raise issues and share insights regarding both net-centric operations and cyber warfare," said Senior Executive Service member Bruce Hevey, director of the 653rd Electronic Systems Wing and conference co-chair. "I think we've helped establish a clearer path forward on these important fronts."

Just how important are those fronts?

"If we control cyberspace, we can control warfare and peace," Colonel Buntyn said.