{"id":4673,"date":"2019-11-19T10:38:10","date_gmt":"2019-11-19T13:38:10","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=4673"},"modified":"2019-11-19T10:38:10","modified_gmt":"2019-11-19T13:38:10","slug":"operaciones-multidominio-guerra-electronica-ciberguerra-y-toma-de-decisiones","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=4673","title":{"rendered":"Operaciones multidominio: guerra electr\u00f3nica, ciberguerra y toma de decisiones"},"content":{"rendered":"<p>Con el recientemente creado \u201cIntelligence, Information, Cyber, Electronic Warfare and Space\u201d (I2CEWS) se desarrolla un ejercicio que incluye la experimentaci\u00f3n con el objeto de integrar la guerra electr\u00f3nica con la ciberguerra y el procesos de toma de decisiones en el combate. Bajo la etiqueta de \u201cejercicio de experimentaci\u00f3n\u201d se pueden probar nuevos procesos y procedimientos, y observar que decisiones se tomar\u00edan en tales condiciones.<!--more--><\/p>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\"><img loading=\"lazy\" class=\"image-lazy alignright\" src=\"https:\/\/www.armytimes.com\/resizer\/dIIWvnG8zhXYQA3jpNJn1soYwUc=\/1200x0\/filters:quality(100)\/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com\/public\/ZJ353MDIYFHS7PG3JUFHQBKEEA.jpg\" alt=\"\" width=\"462\" height=\"306\" \/>The Army\u2019s <a href=\"https:\/\/www.c4isrnet.com\/dod\/army\/2018\/10\/22\/how-the-army-is-improving-tactical-cyber-operations\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Blitz experiment<\/a> held in New Jersey this month was the first opportunity for a newly created Intelligence, Information, Cyber, Electronic Warfare and Space (I2CEWS) detachment to test equipment and concepts for multidomain battle.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">The detachment, which are often described as the brain of the Army\u2019s Multidomain Task Force, was formally created in January.<\/p>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Cyber Blitz was also conducted in conjunction with Orient Shield in Japan linking forces and operations with Army forces in Japan, Japanese defense forces and I2CEWS forces dispersed between the Pacific and New Jersey where the exercise was physically located.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">At the experiment, \u201cthey had capabilities operating across the entire electromagnetic spectrum, from [electronic warfare] EW attack, EW surveillance as well as defensive, offensive cyber as well as space control assets,\u201d Col. Tony Crawford, chief of strategy and innovation and director of futures at Army Pacific, told reporters at the annual Association of the U.S. Army conference.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">\u201cThey were able to play with all sorts of assets that the Cyber Center of Excellence, the Intel Center of Excellence, all the centers of excellence sent to Cyber Blitz and said \u2018experiment with this equipment,\u2019 tell us if it\u2019s expeditionary and tell us if it\u2019s going to be something you think we would want to field to the I2CEWS.\u201d<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">One example was the <a href=\"https:\/\/www.c4isrnet.com\/electronic-warfare\/2019\/10\/15\/a-new-electronic-warfare-system-for-the-army-is-getting-closer\/\" target=\"_blank\" rel=\"noopener noreferrer\">Electronic Warfare Planning and Management Tool (EWPMT)<\/a>. Forces in the Pacific linked with forces in New Jersey to pass information back and forth using the tool.<\/p>\n<p class=\"element element-paragraph\">\u201cThe intent of the I2CEWS is to give that commander on the ground the ability, if paired with the proper authorities, to execute offensive, defensive cyber operations,\u201d Crawford said. \u201cWe put these guys forward and operations and they may not be able to communicate for a while so they have to go with preexisting authorities and pre-scripted mission assignments, if you will, that they can execute if this happens, than this can occur, you have the authority to do this. You have to kind of be in the [area of operations] in order to do that.\u201d<\/p>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">These teams will help to shape the operational environment, monitor information streams such as social media, conduct information operations or cyber missions and prepare for war if a conflict were to break out.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">\u201cWe wanted to put it in an environment that would replicate how there would be some level of crisis and they would have to ramp up maybe stand the competition, maybe transition to phase 1 of an actual conflict where shots are being fired and then go back,\u201d Maj. Gen. Neil Hersey, commander of the Army Cyber Center of Excellence and Fort Gordon, told reporters at AUSA. \u201cNot waiting for a crisis to come up to turn your systems on or ask for capability, they\u2019ve got it. Ideally \u2026 a commander is not surprised by what\u2019s going on in their area and has the ability to potentially do something non-lethal that would avoid an armed conflict with a capability they haven\u2019t have before.\u201d<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Because the detachment doesn\u2019t have the right personnel to conduct offensive cyber operations yet, Cyber Blitz took some liberties in creating a testing environment.<\/p>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">\u201cWe tested the authorities that one thinks they would need in 2025-2028 versus the authorities we have today,\u201d Richard Wittstruck, associate director for field based experimentation and integration at the Army Combat Capabilities Development Command&#8217;s Command, Control, Communication, Computers, Cyber, Intelligence Surveillance and Reconnaissance Center. \u201cThat\u2019s the beauty of having an experiment integrated into the exercise \u2013 we can take some more liberty under the label of experimentation to try out new procedures and new processes and say let\u2019s assume for a minute that you had this authority, how would you execute that in an operation.\u201d<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">One of the takeaways for leaders was that even with a fair amount of latitude, operations took more time than originally anticipated.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">\u201cWe learned some things that we thought you could it overnight and it took two or three days to gain access to a target in an experiment closed form,\u201d Wittstruck said. \u201cIn a real-world operation, it could take weeks, months or even years to gain access. Those are things that we continued to teach ourselves again and again that our persistent and patient tactical patience, if you will, is required in order to get those kind of target sets. You\u2019re not going to prosecute them in a matter of hours unless the conditions have already been set weeks and months and possibly years in advance.\u201d<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Meanwhile, Cyber Blitz\/Orient Shield also marked the first-time joint Japan-U.S. defensive cyber operations were conducted.<\/p>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Teams also tested information operations.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Maj. Gen. Viet Luong, commander of Army Japan, said the Multidomain Task Force succeeded in finding target sets to influence, disrupt or delay adversaries\u2019 messaging.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">Information operations can help commanders visualize their environment.<\/p>\n<\/div>\n<div class=\" mco-body-item mco-body-type-text\">\n<p class=\"element element-paragraph\">\u201cBeing able to dispute and punch back on fake news and influence operations that are coming in to disrupt our own command and control, being able to see that coming in and being able to counter it and get the truth out quicker than the enemy can,\u201d Hersey said.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/show-reporter\/ausa\/2019\/10\/22\/what-the-army-learned-about-multidomain-operations-at-cyber-blitz\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Con el recientemente creado \u201cIntelligence, Information, Cyber, Electronic Warfare and Space\u201d (I2CEWS) se desarrolla un ejercicio que incluye la experimentaci\u00f3n con el objeto de integrar&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4673"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4673"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4673\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}