LandWarNet 2008: Three days of defining the domain, building the enterprise and securing the data

LandWarNet 2008 began Monday evening in the shadow of Tropical Storm Fay, but as the storm moved north, the rays of sunshine that followed complemented the illumination of ideas taking place inside the Broward County Convention Center.

Slightly more than 5,600 general officers, command sergeant majors, Army personnel, senior executive service officials and industry executives attended this year’s event, breaking all prior records for both attendance and number of exhibitors on the show floor.

Between the keynote sessions, highlighted by a live video teleconference with Army Chief of Staff GEN George Casey and an in-person presentation by Gen. Kevin Chilton, commander of U.S. Strategic Command, and seven tracks of informational briefings and discussions, this year’s iteration of LandWarNet displayed several distinct themes. They include defining the domain, building the enterprise and securing the data.

The following highlights some of the interesting statements made on each of those subjects.

Defining the Domain

  • “The essence of the enterprise approach is people being able to accept common standards, which is better for everybody. Also, getting everybody to accept the notion that they don’t have to control the data in order to take advantage of it.”
    — Army Chief of Staff George Casey

  • “The cyber domain is not special, it’s like any other domain. The thing that separates this domain from the others is that it operates at the speed of light. “It’s not so unique that we don’t treat it like a warfighting domain that can be operated in, through and across, where we can deliver effects, and which can be supported by operations from other domains.”
    —USSTRATCOM Commander Gen. Kevin Chilton

  • “In the first Gulf War, commanders became networked; today, commanders are network dependent,”
    — Brig. Gen. Susan Lawrence, commanding general, Network Enterprise Technology Command/9th Signal Command

  • “Our information sharing enterprise is not about control, it is about partnership. We are in the midst of learning how to yield national power in a way we’ve never done before, specifically stability operations.

    “As a result we need to optimize for the unknown. It is [about] understanding how to move and share information. It is not just connecting with people, but helping them with the ability to make a decision.”
    — DISA Director Rear Adm. Elizabeth Hight

  • “The enemy is not coming through the wall jack, they’re coming through the electromagnetic spectrum. Our solutions aren’t working holistically on the whole problem because we don’t have a full description of what cyber is.”
    — COL Wayne Parks, director of the Army Computer Network Operations-Electronic Warfare Proponent, Fort Leavenworth

    Building the Enterprise

  • “My sense is that the hardest issue we have in cyberspace is operating the network. In this domain the hardest thing will be to fight through the attack. No defense is perfect and we will be attacked successfully, and how we fight through that will be vital to our success on the battlefield.”
    —USSTRATCOM Commander Gen. Kevin Chilton

  • “To do what we want the network must take the soldier from home station to training to operations and back, while maintaining the same identity and getting the soldier the information needed. It’s never been done to this level before.”
    — Brig. Gen. Susan Lawrence, commanding general, Network Enterprise Technology Command/9th Signal Command

  • “We continue to be confounded today with hardware and software integration in the field.”
    — Army CIO/G6LTG Jeffrey Sorenson

  • “It’s easy to get caught up in the hooah. It’s easy to get caught up in Army. Here’s the challenge, regardless of uniform. How do we optimize for all the services and come together to achieve a national goal?”
    — DISA Director Rear Adm. Elizabeth Hight

  • “The networking challenge is that e-mail addresses are always changing, telephone numbers change, collaborative tools change and file storage systems change. What you have is a constant adjustment and reconfiguration of everything that takes place. “The ideal end state is universal e-mail, one telephone number, universal file storage and a standard collaboration tool set … you want something like a BlackBerry.”
    — Army CIO/G6LTG Jeffrey Sorenson

  • “We are a CONUS-based Army; its relevance will be defined by responsiveness, and an expeditionary capability makes that possible.”
    — Brig. Gen. Brian Donahue

  • “You have to be worried about the consumer of information. If you’re just worried about development of an FCW [Future Combat System] capability for the Army, then shame on you. You should be worried about how FCS can work with information sources from many different sensors regardless of what service fielded the sensor.

    “It’s about consuming the information from an FCS standpoint, not about how you develop the sources of that information. What I’m talking about is thinking about something that is much larger than ourselves.”
    — DISA Director Rear Adm. Elizabeth Hight

    Securing the Data

  • “There’s a huge exfiltration of data, data that when pieced together can be detrimental to the United States of America, even when it comes from unclassified systems. The one thing that scares me the most is the doubt created in the force about its ability to trust in the data in the network.”
    — USSTRATCOM Commander Gen. Kevin Chilton

  • “We are not doing well securing our NIPRNET; we’re doing well with securing SIPRNET, but we do not have a robust NIPENET system. It is a sieve. Commanders must treat the network with the same level of security that they put elsewhere.”
    — Brig. Gen. Susan Lawrence, commanding general, Network Enterprise Technology Command/9th Signal Command

  • “We need to make defense of our network commander’s business. It’s not just the J6 or G6 or N6 business. People need to be held accountable.

    “If you open a vulnerability in our network are there consequences for that? When was the last time someone was called before the commander’s office, not the G6’s office, about opening a vulnerability. We need to teach people how to use the network and then hold them accountable.”
    — USSTRATCOM Commander Gen. Kevin Chilton

  • “Defense in depth is a crucial concept in securing information assets.

    ”It’s a proactive approach to thinking about security from the inside out. The best available information assurance products have inherent weaknesses; it is only a matter of time before an adversary will find and exploit a vulnerability.

    “An effective countermeasure is to deploy multiple defense mechanisms between the adversary and his target. Each of these defenses must present unique obstacles to the adversary. Each should include protection and detection measures, and complement while not duplicating each other.

    “Defense in depth is a process, not a product. Security continues to be an on-going process. Constant vigilance and user awareness play equally important roles in building the best security posture for the enterprise network.”
    — Lt. Col. Glenn Herrin, deputy commander, U.S. Army Network Operations and Security Center.

  • “First and foremost, never believe that you’ll be 100 percent accurate in addressing all IA [Information Assurance] threats. You want to look at IA for individual components and applications, the network it must work over and all devices it must work with. Often we’ve seen that IA is only focused on one aspect of that triad.”
    — Don Renner, vice president of enterprise technologies and service for CACI International
  • About the Author

    Barry Rosenberg is editor-in-chief of Defense Systems. Follow him on Twitter: @BarryDefense.

    Defense Systems Update

    Sign up for our newsletter.

    Terms and Privacy Policy consent

    I agree to this site's Privacy Policy.