WWII enterprise approach applicable in cyber warfare

The Battle of the Atlantic was World War II’s longest military campaign and centered on U.S. merchant ships and German U-boats, but there are lessons from that battle that are applicable to the Defense Department’s enterprise approach to cyber warfare, according to the Defense Information Systems Agency’s second-in-command.

“Early on in the Battle of the Atlantic in 1942, you had a battle space that was spread out over a very extensive area, and you had an asymmetric force element in the U-boats that were able to take great advantage of that large battle space,” said Rear Adm. David Simpson, DISA vice director. “In many respects, in cyber that’s where we’re at today – we’ve got a very broad battle space that constitutes DOD’s cyberspace, surrounded by a broader, expanding Internet.”

Related coverage:

Future DOD cloud would repair itself after cyberattack

Reinstatement of CIO board first step in honing DOD IT strategy

Simpson spoke March 9 at an event sponsored by AFCEA’s Northern Virginia chapter.

Today, the cyber adversary has an advantage in technology that often evolves faster than defensive action. But, Simpson said, an enterprise approach can better forge a collective defense that covers more ground in cyberspace – like U.S. convoys did in the Battle of the Atlantic, a plan that turned the tide in favor of the Allies.

Those large convoys of 100 or more ships and aircraft helped control the large swaths of ocean and yielded critical intelligence, Simpson said.

“In cyberspace, by having an enterprise approach we essentially constrain the environment in the same way the convoys did in World War II. We’re able to identify key terrain and put sensors in and around that key terrain to spot adversary activity – which looks to us like anomalous activity,” he said.

For DOD cyber operations, the enterprise approach is a good start, but full-spectrum defense requires more, including skilled intelligence personnel.

“Like in World War II, we have to stitch that information together for cyber. The sensors aren’t just enough; you have to bring it together in a time-referenced space where you can bring analytical skill sets to bear – people that can correlate the anomalous events and determine what it means and generate response actions,” Simpson said.

About the Author

Amber Corrin is a staff writer covering military networks for Defense Systems.

Reader Comments

Thu, Apr 26, 2012

WOW! It has taken them this long to correlate the 2? That is why the U.S. has already lost the cyber war.

Wed, Mar 21, 2012 Countermeasures1 Miami

All true; however, think of what would/could have been if the electronic intelligence effort had the additional "advantage" of what has evolved since the internet - synergy at light speed - now part of each camps resources. The battlefield has taken on a new face - one in which Enigma's and Ultra's appear and disappear in nanoseconds. The solution? Revert to a one-time pad, dynamic and ever changing in as many parameters/references as possible, with no left over "genetic" material. Great challenge - great career opportunities but it looks like the commercial sectors will have to come to the aid of Uncle Sam for us to gain the ultimate advantage. I am reminded of the old addage: "In God we Trust - all others we [have to] monitor."

Wed, Mar 14, 2012 Ed K

1. The Battle of the Atlantic was fought from 1939-1945; the US was in it from 1942 onwards. 2. The Battle of the Atlantic was a technology war, fought with increasing scientific contributions in the form of rapidly improving radar, sonar,direction finding, code breaking, aircraft and ships, and adapting tactics to take advantage of the new capabilities. The German counter tactics and capabilities could not keep up (e.g. Naxos threat warning receivers). That being said, the Battle of the Atlantic is a great example of coalition warfare and an early form of cyberoperations.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Your Name:(optional)
Your Email:(optional)
Your Location:(optional)
Please type the letters/numbers you see above