Military Review English Edition July-August 2016 | Page 23

CYBERSPACE UNDERSTANDING (Photo by David Vergun, U.S. Army) Cyberwarriors defend the network at the tactical operations center for the 2nd Armored Brigade Combat Team, 1st Armored Division, on Fort Bliss, Texas, during Network Integration Evaluation (NIE) 16.1. The NIE was conducted from 25 September to 8 October 2015. promise capabilities applicable to cyber SU. Though the Army Capabilities Integration Center (ARCIC) attempted to coordinate these disparate efforts, no significant economies have as yet been achieved. The assistant secretary of the Army for Acquisition, Logistics and Technology (ASA[ALT]) recently developed a coordinated approach to deliver cyberspace-related technologies.23 However, it appears to be focused more on cyberspace defense and offense, not on enabling capabilities like cyber SU.24 Although one of the ASA(ALT) goals is to create an integrated network operations capability that will increase understanding about the health of tactical networks, that capability appears to exclude other information pertaining to factors outside of friendly networks that might interest tactical commanders.25 And, although in 2014 ASA(ALT) responded to ten operational needs statements from Army Cyber Command addressing near-term requirements, the primary focus has been on reducing network vulnerabilities and not cyber SU.26 This top-down strategy is a positive step, but it has not MILITARY REVIEW  July-August 2016 yet translated into a coordinated cyberspace capabilities development effort at the bottom of the bureaucracy. A Simple Approach for Army Cyber SU Capability Developers You can observe a lot just by watching.27 —Yogi Berra The U.S. Army does not need a perfect cyber SU system ten years from now; rather, it needs a good enough cyber SU system right now. To achieve this, capability developers are advised to take a simple approach by answering three basic questions: What information do commanders need? How do we obtain and consolidate it? How should it be displayed? In a broader sense, to successfully acquire cyber SU (or any other future capability), the Army must think of ways to innovate and incrementally reform a constraining acquisition process. First, Army capability developers • • • 21