Stallion is designed to be quicker and easier to use than COLT. It allows users to edit scenarios on the fly, while the simulation is running. Being Web-enabled is also a big plus. “COLT resided on a hard drive on a server and couldn’t touch the outside closed LAN,” said Kevin Quinn, Stallion project manager at the Space and Naval Warfare Systems Center. “Stallion can be distributed through any browser-enabled interface.”
So far, so good, though nothing particularly cutting-edge in terms of simulation. However, things became more interesting when CID saw Stallion demonstrated last year to stimulate COBLU, the Cooperative Outboard Logistics Update.
That’s when CID had its “ah-ha“ moment. If Stallion could be used for COBLU, why couldn’t it be used for other information operations systems, which could desperately use a capability to quickly modify training scenarios? “With the old scenario generation capability, it cost me half a million dollars to add one event, because, oops, I forgot to put it in,” Dickinson said. “Now, we just go in, put it in there, load it up and we’re running.”
Instead of just training shipboard cryptologic operators, Dickinson said he sees Stallion being used for all levels of information operations training. “We were able to take a capability built for onboard training and say, ‘Wait a minute, we can use this across the entire spectrum of training,” he said.The Navy is also struggling to create sufficient cyber training capacity. “There is clearly a need for more trainers and simulators,” said Rich Voter, training and education director for Navy Cyber Forces, which oversees the service’s cyber training, personnel and equipment. At the same time, the feedback from the fleet is that “they want more realistic scenarios for our cryptologic and cyber training,” Voter said.
Captain Kevin R. Hooley, assistant chief of staff for readiness, training, maintenance and modernization for Navy Cyber Forces adds:
“I would say the jewels in the crown of this course are the Sailors achieving the skills associated with these certifications. Training must evolve rapidly to keep with changing cyber threats. Threats that pose the highest risk to our systems are the ones that we have to rapidly develop new technology and any attendant training for. Some of them we have to do on the fly. For example, a new software patch has to be developed to ward off that threat, and at the same time we have to put a new training package out over the Web because we know we can’t get everyone together in a classroom. Some threats we can offset with better personal practices and security practices. Some, the risk is lower so we can incorporate it into schoolhouse training. Some we have to respond to in a day and put out a training scheme overnight.”Training in cyberwarfare encompasses both defensive and offensive operations, though the Navy is far more skittish about discussing offensive ops. Hooley said the current training emphasis is on network defense.
Hooley, who started his career in cryptology in the 1970s, said cyber training has evolved over the last 10 years. Early training had to focus on Cyber 101 basics such as the fundamentals of computers and networks. Today’s sailors enter the service with much more computer savvy, so training can focus on applications.
“Sometimes the good-old-fashioned, podium-based instructor-led training is what you have to do for certain curriculum, such as radio wave propagation and signal characteristics. When you get into networks and routers, often the best way to train that is with simulated computer-based training that shows how you work your way around routers and networks.”
The full article is HERE.