New DOD cyber commander seeks better situational awareness

Army General Keith Alexander says common operating picture across DOD networks is needed

The U.S. military must bolster its ability to see and understand in real time what’s happening across its many computer networks, the head of the Defense Department’s Cyber Command said today.

Army Gen. Keith Alexander, the head of the new command that was activated May 21, said the Defense Department needs a common sharable, operating picture across its networks and to enable real-time response. Alexander said situational awareness across DOD’s networks is now often based on forensics generated after an incident has occurred. Alexander spoke at the Center for Strategic and International Studies in his first public remarks as head of the new command.

“We must first understand our networks and build an effective cyber situational awareness in real time through a common, sharable operating picture,” said Alexander, who also heads the National Security Agency. “We do not have a COP, a common operating picture, for our networks. We need to get there. We need to build that.”

DOD is responsible for protecting more than seven million machines, linked in 15,000 networks, with 21 satellite gateways and 20,000 commercial circuits, Alexander said. DOD’s systems are probed by unauthorized users approximately 250,000 times an hour or over six million times per day, he added.

The Senate approved Alexander to become a four-star general and lead the new command on May 7. The command is designed to integrate the military’s offensive and defensive cyber capabilities, and was ordered last June by Defense Secretary Robert Gates.

Related stories:

It's official: DOD Cyber Command activated

Cyber Command nominee lays out rules of engagement

Alexander acknowledged that his mission won’t be easy and said that, in addition to problems of unknown vulnerabilities, strong adversary capabilities, and weak situational awareness, officials also face a worrisome trend.

“A decade ago network penetration seemed targeted mostly at exploiting data, in the last few years we saw the bar of conduct lowered for computer network attacks,” he said citing distributed denial-of-service attacks in Estonia and Georgia that impeded government functions. “Now there are hints that some penetrations are targeting systems for remote sabotage.”

In response to a question following his remarks, Alexander said the need for greater situational awareness also applies to war zones such as Iraq and Afghanistan.

“In a war zone, a commander has to have confidence in his command and control system, increasingly our intelligence, our operations, our weapons platforms are all being brought together in cyberspace,” Alexander said. “We have to have confidence that that space is secure, and whoever is running that space for that commander in that area has to know" that it's secure.

Alexander also said it was important for the U.S. to establish clear rules of engagement for military action in cyberspace, an effort that’s underway. He said he thought engagement rules needed to be considered differently for wartime and peacetime situations.

Alexander said officials also should:

  • Share threat data at net speed.
  • Synchronize command and control of integrated defensive and offensive capabilities at net speed.
  • Leverage national power to ensure that the U.S. and other countries can benefit from free movement in cyberspace.
  • Continue to conduct international engagement and diplomacy efforts.
  • Review military doctrine for appropriateness and effectiveness.
  • Consider ways to keep people from exploiting cyberspace for illicit gain.
  • Recruit, educate and retain a cadre of cyber experts.
  • Be able to operate and adapt to situations at net speed.

Alexander said cyberspace is unique because it’s a man-made and increasingly contested domain. He also said staff from the Joint Functional Component Command for Network Warfare and the Joint Task Force-Global Network Operations were recently consolidated.

“Our Department of Defense must be able to operate freely and defend its resources in cyberspace,” he said. “We will do this as we do it in the traditional military domains of land, sea, air and space.”

About the Author

Ben Bain is a reporter for Federal Computer Week.

Reader Comments

Fri, Jan 27, 2012

Too many rice bowls serving different mission spaces. Put military leadership at the top of each one or give budget control to a centralized authority with firing authority. Problem is not technology, large business analytical tools can already address the need. His real problem is centralized control and common architecture. All boil down to leadership challenges, so I don't truly hear an industry challenge here IMHO.

Mon, Jun 7, 2010

I think situational awareness was a foundation of military training????

Fri, Jun 4, 2010

Here's a thought- maybe they have too many networks? Seems like every service/agency/command insists on having their own comms, instead of common-servicing where possible and logical. Maybe if it was only a plate of spaghetti, instead of a mountain of it, they could keep track of things more easily.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here


  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Our databases track awards back to 2013. Read More

  • Navigating the trends and issues of 2016 Nick Wakeman

    In our latest WT Insider Report, we pull together our best advice, insights and reporting on the trends and issues that will shape the market in 2016 and beyond. Read More

contracts DB

Washington Technology Daily

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.