search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
OPTIMAL REORGANIZATION


CREATION OF PM C&S Te establishment of PM Cyber and Space allows for more dedi- cated support to the Army cyber community. Te core mission at PM C&S is to acquire and field offensive cyber and tactical space capabilities to protect the Soldier, the nation and enable cyberspace superiority.


However, it’s important to note that it is crucial for the Army to recognize that these contributions to the joint cyber warfighting operations go further than Army Cyber Command, but also span throughout the entire Army acquisition community.


Initially, PM C&S will be comprised of Product Manager Infor- mation Warfare Cyber Development and Product Manager Information Warfare Cyber Infrastructure. Tis realignment includes the migration of various tools, including the Rapid Cyber Development Network—a remote accessible closed network supported by commercial-off-the-shelf (COTS) hardware and COTS/open-source software—to drive cyber capabilities devel- opment and testing for DOD equities and Joint Common Access Platform (JCAP), which supports U.S. Cyber Command by providing a protected, managed, orchestrated environment and common firing platform to coordinate and execute the deliv- ery of cyber effects against approved targets. JCAP enables the cyber mission forces’ ability to execute operations while manag- ing detection and attribution.


“Te days of the Army being a kinetic-only force are gone,” said Brig. Gen. Wayne ‘Ed’ Barker, program executive officer for IEW&S. “Our ability to operate in multiple arenas has become paramount with none more important than mastering the cyber warfare arena. … Te speed in which you must operate in this environment [cyberspace] is crucial. Tat’s why we felt the empha- sis on this domain is important enough to stand-up a dedicated organization. An organization with the agility, the mechanisms, the processes in place, the workforce, the culture to be able to respond quickly to threats.”


THE TRANSITION PM DCO transitioned to PEO IEW&S from PEO Enterprise Information Systems at the start of fiscal year 2024, on Oct. 1. Te transition occurred during a critical time because the digi- tal landscape continues to rapidly evolve.


“Te Army must contend with the constant evolution of advanced persistent threats, thus requiring the U.S. Army to remain vigilant and adaptive. DCO will continue to provide information domi- nance and decisive lethality with platforms and systems critical


84 Army AL&T Magazine Winter 2024


to defending the Department of Defense networks,” said Robert J. Zoppa, project manager for DCO.


With information dominance and decisive lethality, DCO analyzes data, monitors and detects insider threats, identifies malware and counters cyberattacks. Te threats posed by adver- saries in cyberspace are diverse and constantly evolving, requiring the Army to remain vigilant and adaptive.


Te primary focus within DCO within the next year is to align withU.S. Army Cyber Command priorities, starting with accred- itation. Tis includes a complete Risk Management Framework 2.0 continued package for use on DCO Suite of Complimentary Systems and continued authorization to operate on Department of Defense Information Network through U.S. Army Network Enterprise Technology Command.


A LOOK AT PM DCO Te Cyber Platforms and Systems (CPS) provides total life cycle management capability to the force. CPS focuses on the procurement and delivery of cyber platforms and cybersecurity tools for the armed forces. Te Defensive Cyberspace Opera- tions Tools Suite is the foundational piece of equipment used by cyber-Soldiers. Tese tools are used to effectively conduct cyber protection team missions.


Te Cyber Analytics and Detection (CAD) provides capabilities that help Soldiers analyze and detect external and internal cyber threats to the Army. CAD focuses on software-based programs that support mission command, planning, integration, analysis and execution at all levels.


INTERNAL MOVEMENT Another portion of the portfolio within PEO IEW&S is Project Manager Electronic Warfare & Cyber. Te PM EW&C mission is to acquire and field integrated electronic warfare, intelligence and cyber capabilities to enable spectrum and cyberspace supe- riority to support an Army equipped with upgradable, integrated and networked electronic warfare, signal intelligence (SIGINT), cyber capabilities to overmatch the threat in multi- and joint all- domain operations.


From this mission set, the Terrestrial Layer System (TLS) family of systems was developed.


TLS is a family of systems all supporting SIGINT, cyber and electronic warfare operations but each covers a slightly different piece of the battlespace. TLS Echelons Above Brigade is planned


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88  |  Page 89  |  Page 90  |  Page 91  |  Page 92  |  Page 93  |  Page 94  |  Page 95  |  Page 96  |  Page 97  |  Page 98  |  Page 99  |  Page 100  |  Page 101  |  Page 102  |  Page 103  |  Page 104  |  Page 105  |  Page 106  |  Page 107  |  Page 108  |  Page 109  |  Page 110  |  Page 111  |  Page 112