Army Cyber Institute
Permanent URI for this collection
Browse
Browsing Army Cyber Institute by Author "Arnold, Todd"
Now showing 1 - 12 of 12
Results Per Page
Sort Options
Item Assessing the Army’s Cyber Force Structure(The US Army War College Quarterly: Parameters, 2022) Fernandes, John; Starck, Nick; Shmel, Richard; Suslowicz, Charles; Kallberg, Jan; Arnold, ToddThe skill and capacity of Army cyber forces have grown in the decade since their creation. This article focuses on needed structural changes to the Army’s portion of the Cyber Mission Forces that will enable their continued growth and maturity since the Army’s past organizational and structural decisions impose challenges impacting current and future efficiency and effectiveness. This assessment of the current situation highlights the areas military leadership must address to allow the Army’s cyber forces to continue evolving to meet the needs of multi-domain operations.Item Assessing the Army’s Cyber Force Structure(Army War College Quarterly: Parameters, 2022-08-25) Fernandes, John ; Starck, Nick; Shmel, Richard ; Suslowicz, Charles ; Kallberg, Jan ; Arnold, ToddThe skill and capacity of Army cyber forces have grown in the decade since their creation. This article focuses on needed structural changes to the Army’s portion of the Cyber Mission Forces that will enable their continued growth and maturity since the Army’s past organizational and structural decisions impose challenges impacting current and future efficiency and effectiveness. This assessment of the current situation highlights the areas military leadership must address to allow the Army’s cyber forces to continue evolving to meet the needs of multi-domain operations.Item Government cyber breach shows need for convergence(Army Cyber Institute, 2021) Suslowicz, Charles; Kallberg, Jan; Arnold, ToddThe SolarWinds breach points out the importance of having both offensive and defensive cyber force experience.Item In Great Power Wars, Americans Could Again Become POWs(Defense One, 2021) Kallberg, Jan; Arnold, ToddWith the return of great power competition comes another renewed threat most of us probably have not thought about in a long time: American soldiers could become prisoners of war. To put it in perspective, the last conflict where America suffered hundreds of POWs was the Vietnam War. Today, after two decades of fighting non-state insurgents, Survival, Evasion, Resistance, and Escape, or SERE, training for U.S. service members has been tailored to match the counterinsurgency operational environment. But in a large-scale conflict between peer countries, aircrews bail out over enemy-controlled territory, wounded soldiers are captured by an advancing enemy, logistic convoys are ambushed, and the turmoil that comes with a moving battlefield creates risk for troops being captured by the enemy. If that is the more likely battlespace of the future, then there is a need to change once again how we prepare soldiers for being captured.Item POWs in the Age of the Internet(USMA, 2022) Kallberg, Jan; Visger, Mark; Hamilton, Stephen S.; Arnold, ToddThe emergence of deepfakes has challenged long-standing protocols concerning prisoners of war in the Geneva Conventions. The United States, its Allies, and partners must educate service members about the potential exploitation of any recorded media obtained if they become prisoners of war.Item Professionalizing the Army's Cyber Officer Force(Army Cyber Institute, 2013) Arnold, Todd; Harrison, Rob; Conti, GregoryThe emergence of cyberspace as an operational domain, accompanied by the Army’s realization that cyber operations are both a critical vulnerability and a massive opportunity, drives the need for an integrated and fully qualified Army cyber officer workforce to meet these challenges and opportunities. In this paper, we argue for a revolutionary step forward: the creation of a unified cyber branch that brings together the best from each of the stakeholder communities, fills critical gaps not currently provided by the current stakeholders, and discards vestigial remnants from cold-war era organizations, personnel structures, and human resource management approaches. We seek to design a cyber career path that is best for the Army while setting aside near-term parochial concerns for preservation of the status quo. This objective directly supports other transformational Army initiatives including the proposed formation of a Training and Doctrine Command (TRADOC) Cyber Center of Excellence (CCoE), the Army Cyber Center at West Point, Cyber Mission Forces, and Army Cyber Command (ARCYBER).2 We propose an actionable way forward to realize a professional cyber force by describing current obstacles, exploring multiple options for the creation of such a force, and finally proposing an accession-based branch and officer career progression which covers the entire career of a cyber leader from college undergraduate to post-retirement.Item Shaping the Army’s Cyber Operations Force: the Human Dimension(Cyber Defense Review, 2015) Conti, Gregory; Raymond, David; Harrison, Rob; Arnold, ToddBy declaring cyberspace an operational domain, the Department of Defense (DoD) acknowledged the criticality for successfully projecting combat power in the domain, and therefore directed all services to create a component command subordinate to U.S. Cyber Command (USCYBERCOM). Since the declaration of this entirely new operational domain, the Army has faced significant challenges such as determining the force structure requirements, capabilities, and the skills required of its cyberspace operators. In order to build a force capable of operating in cyberspace, the Army must determine how to recruit, assess, train, and retain those with the required talent. However, the Army is not the only organization seeking individuals with the ability to operate in cyberspace and it is widely recognized that there is a small talent pool from which to recruit. According to a recent Rand Institute Report, there already exists a shortage of qualified personnel in general, and that problem is exacerbated within the federal government. Such a dearth of talent potentially undermines the nation’s security in cyberspace. Despite this difficult recruiting environment and the heated competition for such talent, the Army needs to attract enough talented personnel to meet mission requirements. The Army also needs to realign skilled personnel who are already serving in different occupational specialties. Particularly now with the creation of a Cyber branch, the Army must man this branch with the right people in the right roles to achieve operational functionality as quickly as possible. In this article we will explore the fundamental skills needed, roles to be filled, and leadership attributes desirable for the Army’s cyber force.Item Sharing Cyber Capabilities within the Alliance - Interoperability Through Structured Pre-Authorization Cyber(USMA, 2022) Kallberg, Jan; Arnold, Todd; Hamilton, Stephen S.Sharing cyber weapon/cyber capabilities requires trust between the member states, becoming a high-end policy decision due to the concerns of proliferation and the investment in designing a cyber-weapon that has a limited ’shelf-life’. The digital nature of cyber weapons creates a challenge. A cyber weapon can spread quickly, either self-propagating such as worms or via disclosure (and subsequent reuse) by malware researchers or malicious actors, raising proliferation concerns. Additionally, a cyber-weapon can be copied by the adversary or reverse engineered. Once the weapon is released, the adversary will eventually address the vulnerability, and the opportunity is gone. These factors raise the threshold between member states to share cyber weapons and cyber capabilities. Alliances, like NATO, prepare for a unified multinational, multi-domain fight; meanwhile, the national cyber forces are still operating as solitaires with limited interoperability and sharing. There is a need in the collective defense posture to integrate the multinational cyber force to achieve interoperability.Item The Tactical Considerations of Augmented and Mixed Reality Implementation(Military Review, 2022) Kallberg, Jan; Beitelman, Victor; Mitsuoka, Victor; Pittman, Jeremiah; Boyce, Michael; Arnold, ToddThe U.S. Army, NATO armies, and other advanced nations actively seek to implement augmented reality (AR) and mixed reality (MR) support for their operational forces. These platforms are intended to improve tactical awareness, target acquisition, and situational awareness, and also to develop an information upstream for commanders to act upon.Item Towards A Career Path in Cyberspace Operations for Army Officers(Small Wars Journal, 2014) Arnold, Todd; Harrison, Rob; Conti, GregoryIn the past five years, the Department of Defense (DoD) recognized the emergence of cyberspace as an operational domain and created U.S. Cyber Command (USCYBERCOM). These events were the result of the realization that cyber operations are both a critical vulnerability and a massive opportunity. Within the Army, U.S. Army Cyber Command (ARCYBER) was created as the single command to conduct and oversee the Army’s operations in cyberspace. ARCYBER’s personnel and unit structure to carry out its mission within the Cyber Mission Forces (CMF) are still evolving. Critical to the Army’s success in cyberspace is the need for integrated career timelines for officers, warrants, and enlisted Soldiers. The need for a unified cyber career path is driven by operational necessity and a demand for efficiencies as our nation faces a critical national threat in cyberspace[i] coupled with a lack of sufficiently trained personnel. To properly face the numerous threats in cyberspace, the Army needs to invest in the development of ‘cyber leaders’ who will possess the technical acumen and strategic vision to build and lead its forces in cyberspace.[ii] Initial planning for career paths in cyberspace operations is in progress. In order to help assist current and future analysis, we propose a model for what a mature Army cyber officer career path may look like. This is an updated and condensed version of our earlier work.[iii]Item Towards a Cyber Leader Course Modeled on Army Ranger School(Small Wars Journal, 2014) Conti, Gregory; Weigand, Michael; Skoudis, Ed; Raymond, David; Cook, Thomas; Arnold, ToddSince 1950, the U.S. Army Ranger School has garnered a well-earned reputation as one of the most demanding military schools in the world. Graduates have served with distinction in special operations units including the Ranger Regiment and Special Operations Command as well as line units throughout the Army. With the emergence of cyberspace as an operational domain and the critical shortage of technically and operationally competent cyber[i] leaders, the time has come to create a U.S. Army Cyber Leader Course of equal intensity, reputation, and similar duration,[ii] but focused on cyber operations (see Figure 1). This article presents a model for the creation of such a school, one that goes far beyond just a tough classroom experience by using tactical close-access missions as a core component. What we propose is unique, demanding, immersive, and fills a necessary gap in Army cyber leader development. This article is a condensed form of a more detailed analysis and description of the proposed Army Cyber Leader Course.[iii]Item Using Virtual Machines to Improve Learning and Save Resources in an Introductory IT Course(ACM SIGITE conference on Information technology education (SIGITE '13), 2013) Stoker, Geoff; Arnold, Todd; Maxwell, PaulInformation technology courses often require the use of software and hardware to support classroom learning. These systems can assist in achieving the learning objectives for a course through classroom problems and laboratory exercises. The procurement and maintenance of these systems can be a challenge even for well resourced organizations. In this paper we discuss how virtual machines can relieve organizations of some of their resource burdens while effectively achieving course learning objectives and provide examples of how that is currently done at the United States Military Academy.