Visit Gore-Tex Professional at Modern Day Marine

Archive for the ‘Cyber’ Category

TacJobs – US Army 17A Cyber Warfare Officer

Thursday, March 28th, 2024

US Army Cyber Warfare Officers are responsible for carrying out cyber security operations in conjunction with an organized plan by targeting adversary activities and capabilities.

Specialized Skills Learned:

-Cyber Operations

-Intelligence & Surveillance

-Systems & Networks

Earn up to 46 Nationally Recognized Certifications


-U.S. Citizen or Permanent Resident

-18 to 34 Years Old

-Accepted to College, In College, or Graduate of a Four-Year Degree Program

-Basic Officer Leadership Course (or Additional Special Courses/Qualifications)

-Eligible for a Secret Security Clearance

-Medically and Physically Fit

-In Good Moral Standing

For more information on how YOU can become a 17A, head to

Iowa Guard’s 132d Cyber Range Hosts Training Event

Tuesday, March 26th, 2024

DES MOINES, Iowa – The 132d Wing’s Cyberspace Range Squadron hosted its first training event at the 132d Wing, Iowa Air National Guard, Feb. 29-March 3.

The 132d RANS is a first-of-its-kind cyber range provider for the Air National Guard, focusing on certifying cyberspace capabilities to the joint force.

Members of the 168th Cyberspace Operations Squadron, also attached to the 132d Wing, were the first clients of the range and used the training to hone their skills on the weapon system.

“The event hosted by the RANS provided an opportunity for our operators to train in a realistic and holistic manner that is not present in other training platforms,” said Capt. Joseph Wilburn, 168th COS team lead. “The RANS team and their weapon system simulator possess the flexibility to adapt to the operator’s specific training needs in real time that ensures skill improvement remains consistent throughout the event. The training event demonstrated by the RANS represents a significant force multiplier for Air National Guard cyber protection teams.”

The exercise aimed to increase the proficiency of the 168th COS in detecting, validating and responding to cyber threats. The exercises improve Cyber Mission Force mission readiness by providing scenarios as a service, meeting the annual training requirements of cyber units.

“Our first range event was significant because it proved to the cyber community that we are capable of providing this service and why Iowa is the right choice for the Range Squadron,” said Lt. Col. Kevin Taylor, 132d RANS commander.

Capt. Chad McDonnell, 132d RANS director of operations, said the training events offer more than just a virtual range environment where cyber operators can practice. The RANS provides all the required roles for evaluating teams, opposing force teams, cyber intelligence and a mission partner to serve as the organization the team is defending. Additionally, they build the range environment so their customers can deploy their physical cyber weapon system.

“This is not only important because it allows them to train like they fight, but it allows their maintenance team the opportunity to receive crucial training as well by physically deploying their equipment to an alternate location, configuring it to connect to the mission partner’s network, and providing weapon system maintenance for the operators during the event,” said McDonnell.

At the end of the event, exercise facilitators provided the 168th COS’s training, standards and evaluation shop with a document that identified every task and event they accomplished to maintain their operator currencies and proficiencies.

“We’re able to do all of this because we have fully qualified cyber operators with real-world mobilizations under their belt, in addition to the years of experience in the civilian sector,” said McDonnell. “Our Airmen and the experience they bring is truly our greatest asset to this unit.”

By MSgt Michael Kelly, 132d Wing, Public Affairs, Iowa Air National Guard

Top Army Generals for Cyber, Space and Special Ops Convene

Tuesday, February 13th, 2024

PETERSON SPACE FORCE BASE, Colo. — The U.S. Army’s top generals for cyber, space and special operations forces met to discuss the Triad partnership and how they can further develop, operationalize and institutionalize the collaboration.

Commanding Generals Lt. Gen. Maria B. Barrett, U.S. Army Cyber Command; Lt. Gen. Jonathon P. Braga, U.S. Army Special Operations Command; and Lt. Gen. Sean A. Gainey, U.S. Army Space and Missile Defense Command, met Jan. 31, 2024, for the third Triad 3-Star General Officer Steering Committee at USASMDC headquarters at Peterson Space Force Base.

Members of the committee emphasized the importance of the Triad due to the ever-changing character of warfare. Along with this evolution, the threats and the nature of deterrence are changing for the United States. The Triad looks to develop innovative and comprehensive solutions.

“The Cyber-Space-SOF Triad provides one of these solutions,” Braga said. “It is a ‘Modern-Day Triad’ designed to converge unique accesses, capabilities, authorities, understanding and effects in many of the same ways we have implemented combined arms operations. Additionally, the Triad provides operational and strategic advantage during active campaigning, crisis and conflict, while presenting options to senior leaders that are less escalatory than current strategic deterrence options.”

Gainey said that they must continue building upon the significant progress the Triad has already made in the development of concepts, capabilities and formations that enable exquisite operational preparation of the environment. The commands have already developed a unified exercise, experimentation and engagement plan for fiscal year 2024 and fiscal year 2025.

“We are working with the Theater Special Operations Command to ensure they know the space and high-altitude capabilities we can provide and to develop the operational concepts of employment,” said Gainey.

“(The Triad) is developing real-world employment concepts designed to enable Army and joint force objectives anywhere in the world at a time and place of our choosing,” Gainey said. “Additionally, the Triad will enable ‘Left of Launch’ trans-regional missile defeat and active campaigning to ensure the ability of our nation’s adversaries to strike the United States, as well as its partners and allies is prevented.”

The Triad is a major way we can contribute to multi-domain operations and for us, the potential it provides our Missile Defeat efforts, as well as the access, understanding, and effects it can enable for the Joint Force are undeniable, Gainey said.

“As such, the Triad provides flexible deterrent options that can shape the threat environment in ways our adversaries are unaware of and can provide flexible response options if they choose to break international norms and escalate tensions into conflict,” he said.

Braga said the Triad has an outsized impact against the adversary’s capabilities as it relates to SOF, space and cyber.

“That is why it is inherent we work together, experiment together and learn together,” Braga said.

Barrett said the Triad is coming up with solutions and tools together as a team.

“Triad operations disrupt adversary actions, demonstrate resolve, shape the adversary’s perceptions and gain advantage for warfighters when deterrence fails,” Barrett said. “ARCYBER has a track record of integrating cyber, electronic warfare and influence operations and can now deliver that to triad partners.”

By Dottie White, USASMDC

US Army Releases TC 3-12.2.98 HUNT Operations

Monday, February 12th, 2024

At the beginning of February, the US Army published TC 3-12.2.98, “Hunt Operations” which provides tactics, techniques, and procedures for defensive cyber forces conducting hunt operations as part of defensive cyberspace operations.

The tactics, techniques, and procedures contained in this publication are intended to be used as a guide and are not prescriptive.

The principal audience for this publication is cyber professionals in the United States Army Cyber Protection Brigade who conduct defensive cyberspace operations and the commanders and staffs of units who request and receive defensive cyberspace operations support from the cyber protection brigade.

Get your copy at

Chief Digital, Artificial Intelligence Office to Host Hackathon in Hawaii

Friday, December 29th, 2023


The Office of the Secretary of Defense Chief Digital and AI Office, Defense Innovation Unit, U.S. Indo-Pacific Command, U.S. Army Pacific Command and the U.S. Air Force will host a multi-classification hackathon open to all U.S. citizens, Feb. 5-9, 2024.

A hackathon is an innovation event commonly employed by technology companies in which teams develop prototypes in response to enterprise challenges associated with data. The BRAVO 11 Bits2Effects hackathon will occur at one of the DOD AI Battle Labs on the island of Oahu, Hawaii.

Any American citizen is eligible to apply, regardless of whether they currently work for the federal government or possess a security clearance. Applications, available online here, will be accepted on a rolling first-come-first-serve basis with the first group of acceptances taking place in mid-December. Due to past events exceeding 400 participants, BRAVO has secured an over-flow room, although organizers still expect demand to exceed supply.

Attendees are not required to hold a security clearance. However, certain spaces, use-cases and datasets may require a U.S. secret security clearance or higher. Applicants may apply as an employee for the U.S. government, a U.S. government contractor working on behalf of a federal contract or as U.S. citizen either affiliated or unaffiliated with a company. Any U.S. federal employees or federal contractors are eligible to submit potential use-cases and proposed collaborations within the application process. Sourcing a use-case to these hackathons often results in an operational prototype and feedback for the sourcing organization.

Starting in 2021, the U.S. Air Force began organizing multi-service prototyping events, known as BRAVO hackathons, to expedite learning and capability development from classified and protected operational data. This year’s BRAVO 11 Bits2Effects, the fourth BRAVO hackathon and first-held inside a combatant command, is seeking to produce solutions to combatant command challenges utilizing Indo-Pacific operational theater data. BRAVO utilizes a permissive software development environment that permits the co-mingling of classified and protected data with untrusted open-source and commercial software otherwise not approved for production systems within minutes.

Prior hackathons have produced prototypes influencing major Defense Department programs in areas including large language models, space launch, flight telemetry and biometrics, unmanned systems, personnel recovery, security classification, sensing and targeting and battle damage assessment among others.

“In the early 1920s, Army Col. Billy Mitchell assessed battleships, a top military funding priority of the Department of War, could be sunk by bombers just 1/80th the cost,” said Stuart Wagner, Chief Digital Transformation Officer for the Department of the Air Force and BRAVO AI Battle Labs Executive Agent. “To disprove widely held resourcing beliefs of senators, four-star generals and the Secretary of War, Mitchell organized the Project B exercises where bombers repeatedly sunk German-captured battleships, changing warfare by turning investments to airpower in the leadup of World War II.

The BRAVO DoD AI Battle Labs are again seeking to change how warfare is conducted by enabling innovators to develop and employ data driven effects during competition and conflict.”

Applicants looking to participate may do so in one of three roles:

The “Hacker” role is open to all applicants and expects project builders with varying skill sets and experience, including operational and warfighter expertise, software development, data science, machine learning, design and user interface/user design, data visualization and product management. Hackers may optionally supply a use case during the application process.

The “Hacker Subject Matter Expert” role is open to government and government contractors who lead one or more teams with specific expertise about a use case or dataset or supplies and administers infrastructure utilized at the hackathon. HackerSMEs will be required to supply a use case during the application process.

The “Supporter” role, open to government and government contractors, provides administrative support to the event by running security, facilitating supplies delivery, organizing social events and facilitating the delivery of science fair materials and attendee check-in.

Any federal government organization (contractor or government) is eligible to submit a use case, dataset, infrastructure or potential collaboration with the hackathon by submitting a Hacker/HackerSME application to the event. Further clarification can be obtained via U.S. citizens and industry not leveraging an existing DoD contract for their proposed collaboration are encouraged to contact the Defense Innovation Unit at

Story by U.S. Department of Defense

Air Force Reserve Component Launches Direct Commission Program; Constructive Service Credit for Cyberspace Warfare Operations Career Field

Wednesday, November 22nd, 2023

By Secretary of the Air Force Public Affairs


The Department of the Air Force has announced that the Air Reserve component has initiated a direct commission and constructive service credit program memo for people interested in serving in the cyber security and cyberspace warfare operations career fields.

Brig. Gen. Terrence Adams, deputy principal cyber advisor to the Secretary of Defense and senior military advisor for Cyber Policy, made the announcement on behalf of the Air Force at the Aspen Institute Cyber Summit in New York.

“As our nation faces tough challenges in the cyberspace warfighting domain, the Air Force Reserve needs the best talent America has to offer,” Adams said. “The Cyber Direct Commission program is designed to attract highly skilled cyber professionals from industry and enlisted career fields who want to serve their nation in a part time capacity.”

Enlisted personnel and civilians qualified to serve as Air Force Warfighter Communications Operators (17D) and Cyberspace Effects Operators (17S) can earn a direct commission as an Air Force officer. Also eligible are personnel who are qualified to earn a cyberspace engineer/agile software developer – Cyberspace Engineering “Z” prefix as outlined in the Air Force Officer Classification Directory.

“This program will allow the service to access cutting edge talent and leverage private sector skills to make us more competitive in the changing world environment,” said Alex Wagner, assistance secretary of the Air Force for Manpower and Reserve Affairs.

A review board will determine if candidates are eligible for constructive service credit for prior commissioned service, advanced education, and special training or experience.

Constructive service credit is used to determine initial grade, rank and service for promotion eligibility and is usually granted in year-long increments.

Applicants must meet the following criteria:

·?? Be eligible for a commission in the Air Force, including physical standards for entrance

·?? Possess or be eligible for a top secret/sensitive compartmented information security clearance

·?? Have a quantifiable record of leadership, management or supervisory experience in academia, civilian and/or military organizations (preferred)

·?? Have qualifying advanced education, specialized training and/or experience in cyber-related fields as outlined in the memo

Candidates will incur an initial four-year Selective Reserve obligation from the date of appointment or commission and an additional four-year Inactive Ready Reserve obligation. They will also be required to complete the U.S. Air Force Officer Training School program. Their monthly reserve obligation will depend on the needs of their units, training requirements and mission requirements.

This program follows a regular Air Force pilot program for direct commissioning into cyber career fields and constructive service credit launched in 2020.

This is the first time the reserve component has opened direct commissions to career fields other than lawyers, chaplains and medical personnel. The service may consider expanding the direct commission program to other reserve and Guard career fields in the future.

Career fields that may be considered are operations analyst, intelligence, security forces, chemist, nuclear chemist, physicists, nuclear physicists, developmental engineer and acquisition manager.

Regional Cyber Centers Help Secure, Operate, Maintain Army Networks

Thursday, November 16th, 2023

FORT HUACHUCA, Ariz. — Everything the U.S. Army Network Enterprise Technology Command does supports an Army Unified Network based on zero-trust principles.

NETCOM is a global organization, and it’s a 24/7/365 team effort incorporating continuous improvement strategies to support the Army’s digital modernization efforts. Regional Cyber Centers are game-changers around the command and hold the key to helping NETCOM and its customers, attain mission success.

During the inaugural Regional Cyber Center Summit held Oct. 23-27, 2023, RCC leadership from around the globe gathered at Greely Hall to collaborate with NETCOM senior leaders and subject matter experts. Leaders discussed the importance of streamlining future RCC operations and the organizational structure changes needed to enable better AUN operations and services, orchestrated under a Global Cyber Center.

Since their inception roughly ten years ago, Regional Cyber Centers have been crucial for the Army, NETCOM and the warfighter.

“Regional Cyber Centers are our most important asset in NETCOM,” said Patrick Dedham, NETCOM deputy to the commanding general. “Because they are securing, operating and maintaining the network day to day, and also improving it.”

RCCs are a critical part of the NETCOM enterprise and are key enablers to current operations, as well as continuous improvement of the Army Department of Defense Information Networks activities.

NETCOM must ensure RCCs are properly resourced and synchronized to support the Army’s priorities.

“Our number one priority when it comes to transformation is the network,” said Army Chief of Staff Gen. Randy George at this year’s annual meeting of the Association of the United States Army.

Modernizing the network has been one of the Army’s top modernization priorities, and the RCC’s continuous improvement efforts will be crucial in shaping the Army of 2030.

The summit presented leaders with the opportunity to look at past practices to help shape future operations.

“I don’t think the mission set we gave you almost ten years ago is the same mission set you do today,” explained NETCOM Commanding General, Maj. Gen. Christopher Eubank.

With the role RCCs play in securing, operating and maintaining the network, having global representatives from all six unique centers in one place helped gain a shared understanding of how a Global Cyber Center concept can help better synchronize and streamline RCC operations and efforts.

“Every RCC is different across theaters,” said RCC-Continental United States Director, Lt. Col. Victor Yinh. “Getting all the directors together to talk RCC specifics helped us understand our differences to help standardize how we operate.”

Through leader breakout sessions, question and answer engagements with subject matter experts and engaging dialogues, those present were able to collectively set the conditions for increased efficiencies and effectiveness for 2023 and beyond.

“We got a shared understanding of where we want efforts to move to get us to our end state faster,” said RCC-C Sergeant Major, Sgt. Maj. Jonathan Davis. “This was great because the RCCs needed their own forum for securing, operating and maintaining the network on behalf of NETCOM.”

NETCOM is a two-star operational command with global responsibilities that is in competition, crisis, and conflict 24/7/365. The collective RCC missions are no-fail in nature. As they continue building off the success of the inaugural summit, their continued collaborations and collective efforts will be needed on a grand scale.

“The Army is relying on us,” Eubank said. “Let’s not let them down.”

Story by SFC Kelvin Ringold

U.S. Army graphic by Amanda Pearson

SOFWERX- USSOCOM Innovation Foundry Event: SOF Aspects of Cyber Security in 2035

Thursday, October 12th, 2023

SOFWERX, in collaboration with USSOCOM’s Directorate of Science and Technology (S&T) Futures, will host the fourteenth Innovation Foundry (IF14) Event in Tampa, FL, 12-14 December 2023, which intends to bring together Special Operations Forces (SOF), industry, academia, national labs, government, and futurists in an exploration, design thinking, facilitated event to assist USSOCOM in decomposing future scenarios and missions.

Political, social, and technological developments will have an increasing impact on the future of world societies. Organizations, militaries, governments, and entire economies rely on complex digital infrastructures for their operations. The safety and reliability of these information systems are of significant concern to organizations around the world, while malicious actors seek to exploit vulnerabilities to achieve their ends. Because of this, cyber security has been a focus of increasing attention and will be of critical importance in the future operational environment.

The theme of IF14 is SOF Aspects of Cyber Security in 2035. The event seeks to explore the nature of cyber security operations and infrastructure in 2035 and SOF’s role in this environment.

Specific areas of interest include the growth of digital infrastructure for civilian and military systems; the impact of artificial intelligence technologies in the design, implementation, exploitation, and securing of information systems; the impact of innovative communications, networking, and control systems on future cyber infrastructure; advancements of quantum computing and encryption tools; as well as offensive and defensive approaches including prevention, pre-emption, detection, isolation, defeat, and the exploitation of digital vulnerabilities.

In this effort, S&T Futures is working with the Next-Generation Effects (NGE) and Network and Data Management (NDM) Capability Function Areas, in conjunction with echelons of intelligence and operational staff.

S&T Futures has developed and refined a unique process, the Innovation Cycle, to engage technology pioneers and leaders, and to discover and develop high risk, innovative, and disruptive technologies for future on-boarding. This Innovation Foundry is the first phase of the Innovation Cycle and will be focused on idea generation. Deliverables for the IF14 event will include preliminary capability concepts targeting the defined problem areas which may impact SOF forces and operations in the 2035 timeframe in cyber security. This event will be followed by: 1) a Rapid Capability Assessment (RCA) to further develop the preliminary capability concepts and, 2) a series of Integrated Technology Sprints (ITS) to demonstrate proofs of concept.

For more information, visit

Submit NLT 30 October 2023 11:59 PM ET.