{"id":7721,"date":"2021-04-25T09:46:07","date_gmt":"2021-04-25T12:46:07","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7721"},"modified":"2021-04-25T09:46:07","modified_gmt":"2021-04-25T12:46:07","slug":"una-herramienta-de-comando-y-control-para-la-ciberguerra","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7721","title":{"rendered":"Una herramienta de comando y control para la ciberguerra"},"content":{"rendered":"<p>Una herramienta cibern\u00e9tica cr\u00edtica, que podr\u00eda ayudar a los comandantes militares a tomar mejores decisiones durante las operaciones cibern\u00e9ticas y que ha estado en desarrollo durante muchos a\u00f1os, ha pasado oficialmente al Comando Cibern\u00e9tico de EE.UU.<\/p>\n<hr \/>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">WASHINGTON \u2014 A critical cyber tool, one that could help military commanders make better decisions during cyber operations and has been in development for many years, has officially transitioned to U.S. Cyber Command.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\"><a href=\"https:\/\/www.c4isrnet.com\/dod\/2019\/11\/25\/cyber-warriors-lack-planning-tools-that-could-change\/\" target=\"_blank\" rel=\"noopener\">Project Ike<\/a>\u00a0is a prototyping effort that once got its start under the Defense Advanced Research Project Agency under the name Plan X in 2013. It was later moved to the Pentagon\u2019s Strategic Capabilities Office in\u00a0<a href=\"https:\/\/www.defense.gov\/Newsroom\/Contracts\/Contract\/Article\/1922486\/#ARMYtsl080119\" target=\"_blank\" rel=\"noopener\">July 2019\u00a0<\/a>with an award to contractor Two Six Labs for $95 million dollars. Then in early April, the program officially transitioned to a program under the Joint Cyber Command and Control (JCC2) program management office, a Department of Defense spokesperson told C4ISRNET. Ike, will be used to map networks, assess the readiness of cyber teams and command forces in cyberspace.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Project Ike was thought by many to be a precursor to JCC2, which is one pillar of Cyber Command\u2019s\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2020\/11\/19\/us-cyber-commands-capability-efforts-lack-clarity-says-government-watchdog\/\" target=\"_blank\" rel=\"noopener\">Joint Cyber Warfighting Architecture<\/a>, which will guide how Cyber Command leaders develop and procure capabilities. The Air Force is managing JCC2 on behalf of Cyber Command and the joint cyber force.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Few details about the work of JCC2 program have surfaced in recent years. The Department of Defense\u00a0<a href=\"https:\/\/www.c4isrnet.com\/dod\/2020\/02\/11\/which-cyber-programs-asked-for-more-money-and-which-didnt\/\" target=\"_blank\" rel=\"noopener\">requested $38.4 million for the initiative in the fiscal 2021 budget<\/a>\u00a0with efforts primarily dedicated toward developing new capabilities, expanding the program office, building up DevSecOps teams for pilot programs at combatant commands, creating a development environment and infrastructure and integrating situational awareness capabilities.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">According to the Government Accountability Office and government officials, the JCC2 program seeks to integrate data from a variety of sources to help inform and support commanders\u2019 decisions, measure readiness down to the individual level, visualize cyberspace and provide situational awareness of forces in operations at all echelons.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201c[JCC2] allows us to plan, synchronize and assess. How do you stich together your joint campaign plans with your campaign orders and of course your tactical orders and your missions,\u201d Col. Benjamin Ring, director of the Joint Cyber Warfighting Architecture Capability Management Office at Cyber Command, said during a March virtual event. \u201cHow do you stich together assessments and effects and successes from your tactical missions and then feed that back into your strategic planning so you can drive and become a learning organization.\u201d<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The GAO said in a November report that while the Air Force initiated the program in 2017, it had not yet formally entered the acquisition lifecycle.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">JCC2 will rely heavily on information from\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2020\/11\/01\/us-cyber-command-advances-on-platform-to-consolidate-its-myriad-tools-and-data\/\" target=\"_blank\" rel=\"noopener\">Unified Platform<\/a>, another key element of the Joint Cyber Warfighting Architecture.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The Strategic Capabilities spent two years with Two Six Labs building out Ike for Cyber Command, Jeff Karrels, vice president of Cyber and Electronic Systems at Two Six Labs, told C4ISRNET.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">When Plan X was transitioned to the Strategic Capabilities Office, it was a specific tactical capability, Karrels said. The Strategic Capabilities Office sought to scale it to the highest strategic levels to drive the visualizations that come from tactical data.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">JCC2\u2032s current acquisitions strategy is designed to ingest and integrate prototype, existing and new capabilities, to include Project Ike, an Air Force spokesperson told C4ISRNET.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201cJCC2 will leverage the Project Ike prototype as one of the baseline capabilities for battle management and continue to work toward an integrated joint cyber C2 solution.\u201d<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">With Ike is serving as the baseline architecture for JCC2, Karrels said Two Six Labs envisions JCC2 as an app-based model orchestration platform in which a user can access all types of information and data feeds from a single dashboard to provide better situational awareness and decision aids for commanders. That same information would require multiple systems today.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">In the future, he said, Two Six Labs plans to use machine learning to make recommendations for what courses of action a particular commander or cyber team should make. It also could recommend what a potential network could look like in several months from a bandwidth perspective or service interruptions. The system will also allow for a historical look at a network based upon how a previous team accessed and mapped it.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Moreover, from a strategic level, Ike allows commanders to see both offensive and defensive teams operating in cyberspace as well as friendly and adversary forces. This type of command and control in cyberspace is critical from a friendly perspective because multiple teams around the world need to be deconflicted.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Already, Ike is in use by operational forces, Karrels said. While he declined to offer specific numbers, he said it has seen thousands of users.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">At the same time, Two Six Labs is continuing to upgrade the program\u2019s software roughly every three weeks, Karrels said.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201cWe have what we call staging systems that are the next version of code,\u201d he said. \u201cWe always have the next version of code running in a staging environment on the proper networks. There\u2019s select members of the community that are interacting with the next version and on a daily basis providing value back of hey it would be nice if it did x, y and z .\u201d<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/cyber\/2021\/04\/20\/a-cyber-tool-that-started-at-darpa-moves-to-cyber-command\/?utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=C4ISRNET%204.21&amp;utm_content=Final&amp;utm_term=Editorial%20-%20Daily%20Brief\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Una herramienta cibern\u00e9tica cr\u00edtica, que podr\u00eda ayudar a los comandantes militares a tomar mejores decisiones durante las operaciones cibern\u00e9ticas y que ha estado en desarrollo&hellip; <\/p>\n","protected":false},"author":1,"featured_media":7722,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7721"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7721"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7721\/revisions"}],"predecessor-version":[{"id":7723,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7721\/revisions\/7723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/7722"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}