Military Cyber Operators Train on Outdated Ranges That Don't Match Real Networks

defense+20 views
U.S. military cyber operators train on cyber ranges -- simulated network environments -- that are years behind the actual networks they must attack or defend. The Persistent Cyber Training Environment (PCTE) and service-specific ranges like the Army's Cyber Battle Lab use virtualized networks that approximate adversary infrastructure, but these environments are static snapshots that do not reflect the constantly changing configuration of real-world targets. An operator who trains for six months on a simulated Chinese telecom network arrives at their unit to find the actual target network has been reconfigured three times since the training scenario was built. This matters because cyber operations are exquisitely sensitive to environmental details. A penetration technique that works against Windows Server 2016 fails against 2019. An exploit that succeeds when a firewall rule is configured one way fails when it is changed. Training on the wrong environment builds false confidence and muscle memory for scenarios that do not exist in reality. The operational cost is that operators arriving at their units require months of additional on-the-job training before they are mission-capable. During this ramp-up period, they consume the time of experienced operators who must mentor them, reducing the unit's overall capacity. A Cyber National Mission Team that should have 39 fully qualified operators might have only 25 who can actually execute operations, with the rest still learning the real environment. Attempts to build more realistic ranges run into classification problems. Accurate representations of adversary networks contain intelligence about those networks that is classified at TS/SCI or above. Building a training range at that classification level restricts who can access it, where it can be located, and how it can be maintained. Most training ranges operate at the Secret level or below, which means they cannot accurately represent the targets operators will face. The structural cause is that the intelligence community and the operational community have different equities. Intelligence agencies want to protect sources and methods by restricting access to target network details. Operational commanders want their operators to train on the most realistic environment possible. There is no mechanism to efficiently declassify or sanitize target network intelligence for training use, so ranges default to generic, unclassified approximations.

Evidence

The Persistent Cyber Training Environment (PCTE) reached initial operating capability in 2020 but GAO-21-59 found it 'does not yet provide the realism needed for advanced collective training.' DOT&E 2023 Annual Report noted cyber ranges 'continue to lag behind the complexity of real-world operational environments.' Army Cyber Center of Excellence at Fort Eisenhower reported that newly assigned cyber operators require 4-6 months of additional unit-level training before achieving mission qualification. CYBERCOM Commander Gen. Timothy Haugh testified (2024) that 'training environment fidelity remains a gap.' Joint Staff J7 cyber training assessment (2022) found only 3 of 12 evaluated training scenarios accurately reflected current adversary TTPs.

Comments