Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2012 2. REPORT TYPE 00-00-2012 to 00-00-2012 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Army Communicator. Volume 37, Number 3. Fall 2012 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION U.S. Army Signal Center of Excellence,Army Communicator,Signal REPORT NUMBER Towers (Building 29808), Room 713,Fort Gordon,GA,30905-5301 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF ABSTRACT OF PAGES RESPONSIBLE PERSON a. REPORT b. ABSTRACT c. THIS PAGE Same as 52 unclassified unclassified unclassified Report (SAR) Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 LAWARREN V. PATTERSON Signaleers, minds are on point in the midst As one Army Professional to of this on-going campaign and another, I sincerely thank each Greetings! First and foremost, it share some of their insights in Soldier, Army Civilian, sister is an honor to be your 36th Chief this edition. We have a 152-year service member and our Families of Signal. This edition of the track record of consistently for your commitment to our Army Communicator provides and unwaveringly “getting the Army and our nation. a frank evaluation of where we message through.” Through stand in the on-going struggle tough times and extraordinary Pro Patria Vigilans for dominance in the domain of transitions, the core values we For the Country! cyberspace. I encourage you to stand on have distinguished read this edition cover to cover. us as Army Professionals and assured our successes. Virtually everything in our environment from the power Today we are not only engaged grid that brings electricity to the “over there.” Cyberspace extends stove and refrigerator in your to every corner of our homeland. home to the ubiquitous cellular Even though the battlefield phones everyone carries depends has changed and continues on unencumbered cyberspace. changing, our core values have not and should not change. Everyday our military and I am confident that domestic networks are we will dominate in constantly under attack from cyberspace because adversaries who seek to disrupt every one of you— our use of cyberspace, deny our service members ability to use it or infiltrate our and civilians alike— networks for intelligence. know that we are involved as Army The single greatest threat to our Professionals in a ability to maintain dominance pursuit that is more in cyberspace is the education than a job. You are and training of our people. called on and serving Being unaware of safeguarding in a capacity steeped in a techniques leaves room for both deep moral obligation of internal and external threats duty for the defense of the to penetrate and disrupt our nation. critical cyberspace information infrastructure. Our motto Pro Patria Vigilans rings truer and more critically This fight over cyberspace now than ever before. Army includes every person who uses Signal Soldiers and Civilians are our networks, since we are only charged to take ownership of the as strong as the weakest link. networks and communications systems and the Profession of The critical element in the Arms. Continue thinking and equation is our people. I am acting in the highest ethical confident in the professionalism and professional tenets of our of our Signal Regiment members profession. When you continue to lead in this campaign to to do so, I know we will be dominate the cyberspace victorious in this struggle for environment and soundly defeat dominance in cyberspace. our adversaries. Our brightest U.S. Army SignAl Center of exCellenCe Worldwide web homepage address PB 11-12-03 fort gordon http://www.signal.Army.mil/ocos/AC/ Fall 2012 E-mail: [email protected] Vol. 37 No. 3 C ommand Chief of Signal MG LaWarren V. Patterson Regimental Chief Warrant Officer Voice of the Signal Regiment CW5 Todd M. Boudreau Table of Contents Regimental Command Sergeant Major CSM Ronald S. Pflieger Features E S ditorial taff 3 Cyberspace Doctrine Update Editor-in-Chief 34 Citizen Soldiers defending Larry Edmond 4 Chief of Signal Command changes cyberspace Wilson A. Rivera MAJ Aaron Munn Art Director/Illustrator John Galeotos Billy Cheney 6 Signaleer assumes four-star Photography Command 37 Redefining Information Billy Cheney, Marlene Thompson, Nick Spinelli, Assurance compliance Cotton Puryear 7 Operating on unconventional LTC Christopher Quick terrain LTC Michael Lanham 40 Certification hits the Jackpot 13 NetOps here we come LTC Jan Norris By Order of the Secretary of the Army CW5 Todd M. Boudreau 1LT Natasha K. Pennyfeather Raymond T. Odierno General, United States Army 15 Studying Computing Offense 42 Configuring battalion Chief of Staff MAJ T. J. O’Connor file servers CPT Ryan Hand CPT Matthew Sherburne CW3 Matt McDougall 44 Signal classrooms embracing 19 Combined Arms Approach high technology tools to network defense Nick Spinelli Authorization 1224009 Russell Fenton 49 Get the latest information Army Communicator (ISSN 0362-5745) (USPS 305- 470) is published quarterly by the U.S. Army Signal Center, 22 Five Key cyberspace on security training of Excellence at Signal Towers (Building 29808), Room 713 defense elements LandWarNet eUniversity Fort Gordon, Ga. 30905-5301. Periodicals postage paid by Jac W. Shipp LWN.ARMY.MIL Department of the Army (DOD 314) at Augusta, Ga. 30901 and additional mailing offices. 26 Engaging two domain POSTMASTER: Send address changes to Army warfare Communicator, U.S. Army Signal Center of Excellence, LTC Christopher R. Quick Signal Towers (Building 29808), Room 713, Fort Gordon, Ga. 30905-5301. 31 Rigorous cyberspace defense OFFICIAL DISTRIBUTION: Army Communicator is expert training advances Departments available to all Signal and Signal-related units, including CW4 Ivery Torbert staff agencies and service schools. Written requests 46 TCM Updates for the magazine should be submitted to Editor, Army Communicator, U.S. Army Signal Center of Excellence, Signal Towers (Building 29808), Room 713, Fort Gordon, Ga. 30905-5301. This publication presents professional information, but Cover: This edition covers cyber space the views expressed herein are those of the authors, not the Department of Defense or its elements. The content does not defense as a Join the Discussion necessarily reflect the official U.S. Army position and does critical issue At the end of articles where you not change or supersede any information in other official U.S. with Signal Army publications. Use of news items constitutes neither see this icon, you can weigh affirmation of their accuracy nor product endorsement. Regiment in and comment on-line. Army Communicator reserves the right to edit material. leaders CORRESPONDENCE: Address all correspondence to Army Communicator, U.S. Army Signal Center of assertively Excellence and Fort Gordon, Signal Towers (Building 29808), moving Room 713, Fort Gordon, Ga. 30905-5301. Telephone DSN 780-7204 or commercial (706) 791-7204. Fax number (706) forward to 791-3917. dominate Unless otherwise stated, material does not represent this mission official policy, thinking, or endorsement by an agency of the U.S. Army. This publication contains no advertising.U.S. critical Government Printing Office: 1984-746-045/1429-S. domain. Army Communicator is not a copyrighted publication. Cover by Billy Cheney Individual author’s copyrights can be protected by special arrangement. Acceptance by Army Communicator conveys the right for subsequent reproduction and use of published material. Credit should be given to Army Communicator. Army Communicator 1 Todd M. Boudreau Signaleers, ing team has an unlimited roster of players on the field and each has multiple pucks that can all be shot at the same time. What I have been looking forward to would you expect to happen? this edition of the Army Com- municator because there are We are working hard to ensure we create the best cyber defense some significant questions we experts possible. We must take more of a holistic approach need to engage openly and hon- through sound principles of Network Operations. estly. Even though we have a NetOps construct, are we really conduct- Everyone realizes that our Mis- ing, or even able to conduct true Network Operations? Could it sion Command and network be that we merely stage a transport and routing architecture and communications systems have then reactively optimize based on bandwidth demands? Could grown in magnitude and com- it be that we establish data services based upon a static model of plexity. It is not as apparent that Mission Command service expectations? Could it be that we sys- there has been a shift in advan- tematically employ Information Assurance measures based upon tage from the defensive to the forensics of successful CNE and/or CNA actions? What happens offensive. The historic degree of when the adversary moves from a CNE posture of data exfiltra- difficulty due to the complexity tion to a CNA posture to manipulate data and/or to disrupt, and cost of reverse engineering deny, and/or destroy our information systems due to political or communications systems that kinetic triggers? were mostly proprietary was a huge barrier for our potential Are we prepared to hunt for potential adversarial adversaries. That’s no longer activity in accordance with an established playbook true. Today we use a plethora of that includes immediate preemptive transport rout- commercial off the shelf equip- ing modifications; data screening, filtering, and ment in the same manner as the transition to alternate servers (e.g., COOP); and rest of the world. This allows ensure uninterrupted Mission Command Essential common universally applicable Capabilities while a near-peer adversary aggres- exploitation tools to be used sively attempts to disrupt and/or manipulate our against the U.S. Army. essential information and key Cyberspace terrain? In other words, can we conduct Because of this mas- NetOps? sive shift in favor of the offensive (i.e., This and many other aspects of cyber- toward our ad- space defense are addressed in this versary in com- edition. Additionally, we solicit your parison to our thoughts, expertise, and support in cyber defenders), taking back the advantage though can our cyber holistic, integrated, and synchro- defense experts nized NetOps functions. be expected to stop As always, thank you for your dedica- every attack? Think of it tion and service in being ever Watchful for like this: do you expect Our Country. even the best goalie to stop every shot at the Pro Patria Vigilans! goal? What if the oppos- 2 Fall - 2012 “We’re focused on providing a professional team of elite, trusted, precise, disciplined cyber warriors who defend our networks, provide dominant effects in and through cyberspace, enable mission com- mand, and ensure a decisive global advantage.” - LTG Rhett Hernandez Commanding General of U.S. Army Cyber Command, 2nd Army Army News Service, 26 July 2012 Over the past decade, the sisting of interdependent networks capabilities provided by Signal Sol- operational environment has of information technology infra- diers play a critical role in enabling changed dramatically and the structures, and includes the Inter- combat successes and prevailing in LWN has become a critical part of net, telecommunications networks, the information war. that change. The Army depends computer systems, and embedded FM 6-02 will provide the on cyberspace operations, the GIG, processors and controllers.” The tactics and procedures associated and LWN NETOPS to defend our GIG, as the DOD part of cyber- with NETOPS. FM 6-02 will also network. The defense of our net- space, links to national and global provide the doctrinal foundation work allows sustained operations cyberspace and interacts with the for the overall guidance and direc- in support of mission command national information infrastruc- tion pertaining to mission com- to enable unified land operations. ture, and global information infra- mand of Army communications The DOD Strategy for Operating in structure respectively. The LWN networks and information services Cyberspace established cyberspace is the Army’s portion of the GIG. across the range of military opera- as an operational domain which FM 6-02 will discuss NETOPS tions. impacts Signal support to military which is defined as the activities Future Signal Army Tech- commanders. As a relevant opera- conducted to operate and defend niques Publications will provide tional domain, cyberspace along the GIG and LWN which contrib- greater detail regarding how the with the GIG and LWN, must be ute to the defense of cyberspace. Signal Regiment will accomplish defended. The Signal Regiment’s core its mission. The Army Techniques The Signal Center of Excel- competencies define the Signal Publications will expand upon the lence is developing FM 6-02, Signal Regiment’s distinct, unique, and roles, responsibilities and support Operations as the primary Signal valuable contribution in support of discussed within FM 6-02. doctrine reference. FM 6-02 will mission command to unified land Questions, comments, and discuss how the Signal Regiment operations. NETOPS is the Signal recommendations related to Signal supports the Army’s mission Regiment’s core competency/criti- Doctrine can be provided via e- across the range of military opera- cal task which supports defense mail at usarmy.gordon.sigcoe.mbx. tions. FM 6-02 will establish the of the LWN. The components of [email protected]. Signal Regiment’s roles and re- NETOPS are: enterprise manage- sponsibilities of signal operations ment, network assurance, and providing the essential capabili- content management. ties that enable and support the Through the core competency ACRONYM QuickScan Army’s mission at all echelons. of NETOPS, the signal regiment This includes the responsibility provides geographical combatant DOD – Department of Defense to defend our network within the commanders the personnel and FM - Field Manual cyberspace domain. tools to collect, transport, process, GIG – Global Information Grid The DOD definition of cyber- protect, and disseminate informa- LWN - LandWarNet space is “the global domain con- tion. The NETOPS and defense NETOPS – Network Operations Army Communicator 3 By Wilson A. Rivera the lottery.” is with the U.S. Army Network During the ceremony, the Enterprise Technology Command, As the new Chief of Signal historic semaphore flag signaling in Fort Huachuca, Ariz. MG Pat- took command, the U.S. Army Sig- system relayed silent commands terson makes a short move into the nal Corps made history and paid from the adjutant and commander installation commander’s quarters tribute to it. Troops used histori- of the troops to present arms, order after relinquishing command of cal semaphore flags to relay com- arms, and parade rest on Barton 7th Signal Command (Theater) mands during the ceremony on Field. Semaphore flags have been headquartered at Fort Gordon. 25 July 2012 for outgoing com- used to communicate since 1914. MG Patterson says he plans mander, MG Alan R. Lynn, , and Signaleers stood next to the com- above all to take care of all Soldiers incoming commander, MG La- mander on the battlefield, getting and their families, and to make Warren V. Patterson. In front of the message though. sure the Signal mission is done so Soldiers, Sailors, Marines, Air- LTG David G. Perkins, U.S. that the Army can fight and win men, and community leaders from Army Combined Arms Center and the nation’s land battles. He added around the Central Savannah River Fort Leavenworth commanding that he quickly wants to get to Area, MG Patterson became the general, was the officiating officer know the community and be an 36th Chief of Signal. of the ceremony. LTG Perkins com- enhancement to the CSRA. “What Signaleer wouldn’t mented on the accomplishments “This is something I’ve wanted dream of one day being the next by MG Lynn and the way forward to do my whole life,” he said. “As Chief of Signal,” MG Patterson under MG Patterson. retired GEN Eric K. Shinseki once said. “It feels exciting, like winning MG Lynn’s next command said ‘The Army is a passion, … Photos by Marlene L. Thompson / Multimedia & Visual Information Center Soldiers from the the Fort Gordon Installation Support Detachment Cannon Salute Battery fire 13 rounds on 25 July 2012 during the change-of-command ceremony for MG LaWarren V. Patterson, incoming U.S. Army Signal Center of Excellence and Fort Gordon commanding general. 4 Fall - 2012 (Above) MG LaWarren V. Patterson, U.S. Army Signal Center of Excellence and Fort Gordon commanding general, passes the Signal Corps Regimental colors to CSM Ronald S. Pflieger, regimental command sergeant major, during the ceremony held 25 July 2012 on Barton Field. you’ve got to love it,’ I love the (Below) MG Patterson and the official party, are “piped aboard” by a Army, only second to my family,” cadre of sideboys at the start of the change-of-command ceremony. Fort said MG Patterson. Gordon has Navy, Air Force and Marine units stationed on the post. Wilson A Rivera is editor of the Signal Newspaper at Fort Gordon, Ga. “I will give you my utmost...I shall expect yours.” MG LaWarren V. Patterson 36th Chief of Signal Army Communicator 5 (Below) GEN Dennis L. Via, Army Materiel Command commanding general, passes the AMC guidon to CSM Ronald T. Riling, AMC command sergeant major, during the AMC change-of-command ceremony, 7 August 2012. (Right) During his promotion ceremony, GEN Via's sons, Brian (left) and Bradley, pin four- star rank on their father. Later in the day, GEN Via assumed command of the Army Materiel Command. GEN Via is the first Signal officer to be promoted to four-star general. AMC’s mis- sion is to develop, deliver and sustain materiel to ensure a dominant joint force for the United States and our allies. AMC serves as the focal point in the Army where superior technology, acquisition support, materiel development, logistics and power projec- tion/ sustain- ment are contracted and integrat- ed to assure current and future readi- ness. The U.S. Army Materiel Command is the Army’s premier provider of materiel readiness – technology, acquisition support, materiel development, logistics power projection, and sustain- ment – to the total force, across the spectrum of joint military operations. 6 Fall - 2012 Cyber defense planning LTC Michael Lanham nel, finance, maintenance, and strategic and tactical logistics) warfighting function does most of its work The question “How can the Army better plan and there? How concerned is the commander with threats execute effective cyber defense?” is too broad. to morale-oriented use of DoD cyber infrastructure We can craft more effective solutions if we narrow the compared to threats exploit such use as an avenue of question. And we can develop approaches that more approach to NIPRNet and shared infrastructure? closely align with traditional military vocabulary and Cyber defense planners need to know current symbology than does our current tendencies to ‘go threats (enemy, civilians, troops) as well as current geek.’ friendly situations two-levels-up and one-level-down The approach, is to use the military decision mak- (troops, commander’s intent). With that knowledge, ing process, augmented with doctrinal Joint and Army its extremely likely that COA recommendations for graphics, and treat cyber terrain approximately the the physical and cyber AORs will contain multiple same as we treat the land and air domains. decision and branch points. Examples of decision Using the points include: mnemonic whether to isolate of mission, (clear cyber fires) enemy, time, units in contact terrain, civil- against immedi- ians, we’ll ask ate/high impact some clarify- cyber threats ing questions, to other units; starting with whether and how “Better than to clear cyber fires what?” for units not in How will contact against we know slow-spreading when we are malware; whether ‘better’ (mis- to temporar- sion) and ily exempt some if the im- mission areas and provement is units (e.g. aero- enough? What medevac for com- resources bat theaters) from (troops, ter- anti-malware di- rain, time, Figure 1 U. S. Cyber Command as the Tier 1 CND-SP rectives; whether equipment) and how to react are avail- to a fast-moving able to become ‘better’? What are the constraints and threat, even with some units in direct fire contact; to restraints (mission, civilians, enemy, time, ROE)? Is whom can the Commander permanently or tempo- there a prioritized threats list or defended asset list rarily delegate such decisions. such as Air Defense Artillery creates/uses? Is the com- There are multitudes of other questions for which mander willing to conduct economy of force opera- we need, at least approximate, answers as well as tions in defending one or more cyber positions, routes, approximate first and second order effects. Asking or line of communication? for guidance and offering COAs to our commanders Is defense of the secure internet protocol net- is essential—or our commanders will discover they work, given its cryptographic separation from other have a set of defenses, on disadvantageous real and/ networks, one of those economies of force opera- or cyber terrain, that don’t adjust to enemy actions tions? Can our economy of force operation be all or as the commanders envisioned. They’ll also discover some of the non-secure internet protocol network positions—even though our sustainment (person- (Continued on page 8) Army Communicator 7