Cyber will undoubtedly be part of any future conflict and the Army is looking to bolster the role of cyber in exercise scenarios.

Most notably, the National Training Center at Fort Irwin — working with Army headquarters, Training and Doctrine Command, as well as Forces Command — is experimenting with how to insert cyber capabilities at lower, tactical levels. This is done through a pilot program, sponsored by Army Cyber Command, called Cyber and Electromagnetic Activities Support to Corps and Below (CSCB).

In this role, the center provides the infrastructure to allow brigades to test their cyber exploits while accompanying small units on the ground. That means the center must be prepared to at least simulate capabilities during scenarios. With the Department of Defense now shifting to a great power competition, all rotations at the center are focused on what the Army calls “decisive action” scenarios — essentially a two-week campaign against a near-peer adversary with insurgents and civilian actors mixed in.

“We’re trying to make this the hardest fight that a brigade ever is going to fight,” Brig. Gen. Jeff Broadwater, the center’s commander, told Fifth Domain during a recent visit to observe the pilot.

“Not only are they fighting against a near-peer threat that has the most modern technology and equipment that some of our adversaries could have, we’re incorporating the cyberthreat there, we’re incorporating the chemical threat, we’ve got swarming drones.”

Broadwater added that the center is constantly trying to improve its infrastructure to make the scenarios as realistic as possible.

Today, the brigade interacts with a mock internet, one that includes a social media feed to include a specialized mock version of Twitter called “Tweeter.” They also can take advantage of CCTV cameras in the mock towns that the units will assault.

All these avenues are points to be exploited, but are also vulnerabilities.

“We want to make the brigades aware of this capability. Both how to defend against it and then how to potentially look for an opportunity to utilize that in a system where it might be being able to exploit something in a town through videos or cameras to help them set up or see inside an area prior to going in to attack the town,” Broadwater said.

“All that’s going on that sometimes we forget just the little things that we have to protect ourselves and that makes it easy for the enemy to get our systems or information from us as well.”

Despite the advancements made at the center, there are still limitations.

“Trying to replicate that particular capability in a training environment is tough,” Col. Robert Magee commander of 3rd Armored Brigade Combat Team, 1st Armored Division, the rotating brigade, told Fifth Domain.

“Normally, if I was doing this in a foreign area … there is infrastructure all around me that I can leverage, access and do things depending on what the team is capable of. At the National Training Center, when really it’s a closed network ... I don’t think [it’s] testing the [cyber and electromagnetic activities teams] … to its greatest capability because we can’t replicate it yet.”

In some cases, the effects of the new teams at the tactical edge are simulated.

“From a technical point of view, this is not the most challenging course for them,” Matt Funk, the CSCB exercise planner, told Fifth Domain regarding the offensive cyber teams. “They’ve got other places where they can test their cyber abilities.”

Funk said the pilot is more about testing integration of the cyber and EW capabilities with brigade staff and tactical units.

The center’s leadership is helping to simulate certain effects, especially remote capabilities.

“We’ll employ things to simulate effects and that’s mostly what we do to try to make sure that [the brigade] understand[s] there’s an end state that needs to be achieved from an operations perspective,” said Capt. Adam Schinder, expeditionary cyber support detachment commander.

Schinder added that the brigade combat team can see changes in the enemy’s posture. Many officials Fifth Domain interviewed explained how it’s important for the brigade to see the results of the effects as they integrate with the expeditionary cyber teams in order to build trust and confidence going forward.

Mark Pomerleau is a reporter for C4ISRNET, covering information warfare and cyberspace.

More In IT and Networks