SIG SAUER - Never Settle

Archive for the ‘Cyber’ Category

Air Force Special Operations Command Demonstrates Ability to Support Joint Force Readiness and Resilience Through Real-Time Onboard Data Collection

Saturday, June 22nd, 2024

AFSOC Public Affairs

HURLBURT FIELD, Fla. —  

Air Force Special Operations Command gathered members of Special Operations Forces Acquisition, Technology, and Logis tics, AFSOC Staff, Cyber Mission Defense Teams (MDTs), and maintenance personnel here to demonstrate its latest capability to collect and analyze onboard data from an operational MC-130 aircraft, detect cybersecurity and maintenance anomalies in real-time, and stream data and anomalies into a Department of Defense  cloud environment. This demonstrated AFSOC’s ability to support joint force readiness and resilience through real-time onboard data collection, detection, and alerting capabilities from the tactical edge.

The demonstration utilized commercial off the shelf observability platform which collected and analyzed aircraft data as it was generated during flight, revealing a set of simulated operational and cybersecurity anomalies which were streamed to the MDT ground station. Once received, the MDT streamed the alerts and corresponding data into a joint cloud instance in real-time for further analysis, enabling cybersecurity, maintenance, and intelligence analysis use across the joint force.

“To evolve and outpace the adversary, AFSOC must embrace change that will enable technical overmatch during high-end conflict and long-term strategic competition. Gaining real-time or near real-time observability into operational aircraft gives us the ability to develop countermeasures to overcome enemy cyber-attacks, generate force readiness, and improve mission capable rates,” said Col Alfredo Corbett, AFSOC Director, Cyber & C4 Systems.

AFSOC currently leverages equipment to gain observability into the onboard operational technology generated by the MC-130 aircraft. Hardware captures, analyzes, detects, and alerts on anomalies at the edge, enabling real-time maintenance and cybersecurity monitoring, insights and intelligence, and the ability to build and deploy new detections. By integrating the alerts and data into the DoD cloud environment, AFSOC demonstrates its ability to support DoD modernization efforts, enabling it to improve the readiness, survivability, and lethality of vehicles fleet wide.

U.S. Marines and Canadian Soldiers Plan to Defend Against Cyber Attacks

Saturday, May 25th, 2024

Montreal — U.S. Marines assigned to Defensive Cyberspace Operations-Internal Defensive Measures, Alpha Company, participated in joint training exercise Cyber Harmony 2024, with partner nation service members from the Canadian Army at the Royal Montreal Regiment, Quebec, April 27-28, 2024. Cyber Harmony is a force against force training event against simulated nations launching cyber-attacks at one another.

The role of DCO-IDM is to employ a set of protocols and strategies to protect and defend U.S. military networks, systems and information from unauthorized access, manipulation, or destruction by cyberspace hackers. Some of these measures include constant network monitoring, access control, encryption of these networks or sensitive data and regularly schedule security audits.

The goal of Cyber Harmony was for DCO-IDM to employ, maintain, and improve cyber capabilities and act as Defensive Cyberspace Operators. The exercise ushered Marines and joint NATO allies’ defensive cyber capabilities towards their training objectives via a digital capture the flag simulation.

This ensures readiness and adaptability to sudden cyber threats that may emerge as technology becomes more and more relevant every day.

“It strengthens our abilities by giving us a chance to work with our NATO partners in simulated cyber-attack scenarios and use tools we don’t usually use,” said Sgt. Justin B. Bryant, a cyberspace warfare officer attached to DCO-IDM, Alpha Company.

The exercise consisted of challenges presented on a web server that represented real-world systems. Each team was responsible for discovering vulnerabilities in the systems’ security and once accomplished, a flag would appear for them to “capture,” earning them points.

“We have servers and computers on different networks that are actively being attacked,” said Bryant. “Our job here is to utilize the toolset that has been provided to us to detect intrusions and neutralize any threats.”

The Marines served a multitude of jobs, including basic cyber operator and networking chief, –all with the goal of securing a more stable cyber security network for the U.S.

“The Marines that participated in Cyber Harmony 2024 will be leaving with an excellent example of what a real network attack on a protected system could look like,” said Bryant.

The Marine Corps Reserve provides trained units and individual Marines to augment and reinforce active forces for employment across the full spectrum of crisis and global engagement.

“In the world we live in today, technology is embedded in our society and dictates a huge aspect of everyday life,” said Bryant. “It is our responsibility to protect those systems and secure our data so that we may continue our way of life.”

Story by LCpl Juan Diaz 

Marine Forces Reserve (MARFORRES)

USAF Accepting Applications for Cyber Warrant Officers

Friday, April 26th, 2024

ARLINGTON, Va. (AFNS) —  

The Air Force is now accepting applications, from April 25 to May 31, for Airmen aspiring to become the inaugural cohort of warrant officers in the information technology and cyber career fields.

Plans to re-introduce warrant officers to the Air Force was announced by Secretary of the Air Force Frank Kendall at the Air and Space Forces Association’s 2024 Warfare Symposium in conjunction with the Department’s plan to Reoptimize for Great Power Competition.

“We need operational units with all the capabilities they need to deter and compete with our pacing challenges and ready to enter a conflict on short or no notice,” Kendall said. “In those units we need the right mix of skills necessary for high end combat and to ensure technological superiority, particularly in information technology and cyber.”

This announcement marks a significant milestone for the initiative and presents an opportunity for up to 60 selected candidates, who will play a crucial role in addressing the multifaceted challenges of today’s dynamic security landscape. This decision signifies a pivotal moment in Air Force history, representing a strategic shift towards bolstering technical proficiency and operational effectiveness.”

This announcement marks a significant milestone for the initiative and presents an opportunity for up to 60 selected candidates, who will play a crucial role in addressing the multifaceted challenges of today’s dynamic security landscape. This decision signifies a pivotal moment in Air Force history, representing a strategic shift towards bolstering technical proficiency and operational effectiveness.

“The reintroduction of the warrant officer career path reflects the Air Force’s commitment to expanding and retaining technical excellence, essential for maintaining a strategic advantage in an era defined by Great Power Competition,” said Air Force Chief of Staff Gen. David Allvin. “By investing in talent management programs that preserve proficiency and competence in our perishable and highly technical skills, the Air Force aims to ensure its readiness to stay ahead of rapidly advancing threats and safeguard national security interests effectively.”

The history and role of warrant officers
The Air Force dissolved its Warrant Officer Corps in 1958 following the creation of the senior master sergeant and chief master sergeant ranks, who took on warrant officer responsibilities. These SNCOs took on specific technical duties, but were never relieved of their institutional requirements.

The reintroduction of the Warrant Officer Corps career path in the Air Force aims to address critical operational needs, while maintaining highly perishable skills, and leverage the unique expertise and capabilities of warrant officers. They will serve as technical experts, functional leaders, advisors, professionals, and risk managers, contributing to the overall proficiency of their organizations.

Application Requirements

This first cohort of active duty, Air National Guard, and Air Force Reserve candidates must hold the rank of at least staff sergeant and have one year of active federal service. Notably, applicants must meet specific experience and proficiency requirements outlined for each warrant officer specialty, ensuring a highly skilled and capable cohort.

The Air Force created two new Air Force specialty codes for warrant officers, reflecting the critical role these officers will play in the realm of cyber and information technology. The first AFSC, 17W – Warfighter Communications & IT Systems Operations, designates individuals as subject matter experts and trusted advisors on the planning, deployment, employment, and securing of enterprise and warfighter communication systems.

These warrant officers will provide technical guidance to commanders and staff, ensuring the efficient operation and management of communication assets at all echelons. Additionally, they will play a pivotal role in mentoring and developing cyberspace personnel, contributing to the overall cybersecurity posture of the Air Force.

The second AFSC, 17Y – Cyber Effects & Warfare Operations, designates individuals as subject matter experts and trusted advisors on offensive and defensive cyber operations assets and personnel. These warrant officers will be responsible for orchestrating, managing, and integrating cyberspace technical capabilities, delivering critical technical recommendations across various military and inter-agency platforms. Their expertise will extend to integrating cyberspace capabilities into warfighting functions to enhance combat effectiveness and maneuvering strategically in the cyber domain.

Although Airmen in any AFSC can apply, they must meet specific functional technical experience to ensure these individuals possess the requisite skills and experience to excel in their duties, contributing significantly to the Air Force’s technical readiness and operational effectiveness in cyberspace operations.

For the Warfighting Communications & IT Systems Operations (17W) AFSC, applicants must possess a minimum of 24 months of documented operational experience with enterprise IT or warfighter communications systems in areas such as voice and data internetworking, local and wide area networks, including terrestrial, satellite, and aerial systems, as well as network planning. Additionally, all applicants much hold a minimum Department of Defense approved industry certification commensurate with the requirements for the Information Assurance Technical Level II certification or higher.

Similarly, candidates for the Cyber Effects & Warfare Operations (17Y) AFSC must hold senior level proficiency in one or more U.S. Cyber Command work roles as defined in the Commands Job Qualification System, or National Security Agency equivalent. Additionally, for those specifically interested in a Cyber Capability Developer work role, must be a certified U.S. Cyber Command Senior Cyberspace Capability Developer or a Computer Network Operations Development Program graduate or have three years of experience in system level programming, i.e. C, Assembly.

Members are encouraged to read the Personnel Service Delivery Memorandum in its entirety to ensure they qualify to apply.

After Applying

The selection board process, scheduled for June 24-28, will identify top candidates poised to assume critical roles as technical experts, functional leaders, and advisors within their specialized domains. Those selected for the first cohort will be notified in late July.

Candidates will undergo comprehensive training at the Warrant Officer Training School starting in the fall of 2024 or early 2025, which will be located at Maxwell Air Force Base, Alabama, and will focus on equipping them with the necessary skills to excel in their new roles.

Upon graduation from WOTS, candidates will be warrant officers and will be reassigned to operational units across the Air Force. Their assignments will align with operational requirements and member preferences to maximize their effectiveness in enhancing technical readiness and operational effectiveness.

“These are highly in-demand, and also extremely perishable, skills in today’s rapidly-evolving landscape,” said Chief Master Sgt. of the Air Force David A. Flosi. “As we navigate the complexities of Great Power Competition, our ability to adapt and innovate hinges on the expertise of our Airmen. Using our Airmen’s full potential is not just a strategic advantage; it’s a necessity for our Air Force’s readiness and effectiveness in the face of a challenging strategic environment.”

For additional information on the requirements of becoming a warrant officer, click here.

Courtesy of Secretary of the Air Force Public Affairs

TacJobs – US Army 17A Cyber Warfare Officer

Thursday, March 28th, 2024

US Army Cyber Warfare Officers are responsible for carrying out cyber security operations in conjunction with an organized plan by targeting adversary activities and capabilities.

Specialized Skills Learned:

-Cyber Operations

-Intelligence & Surveillance

-Systems & Networks

Earn up to 46 Nationally Recognized Certifications

Requirements:

-U.S. Citizen or Permanent Resident

-18 to 34 Years Old

-Accepted to College, In College, or Graduate of a Four-Year Degree Program

-Basic Officer Leadership Course (or Additional Special Courses/Qualifications)

-Eligible for a Secret Security Clearance

-Medically and Physically Fit

-In Good Moral Standing

For more information on how YOU can become a 17A, head to www.goarmy.com/careers-and-jobs/career-match/signal-intelligence/locations-stats-frequencies/17a-cyber-warfare-officer

Iowa Guard’s 132d Cyber Range Hosts Training Event

Tuesday, March 26th, 2024

DES MOINES, Iowa – The 132d Wing’s Cyberspace Range Squadron hosted its first training event at the 132d Wing, Iowa Air National Guard, Feb. 29-March 3.

The 132d RANS is a first-of-its-kind cyber range provider for the Air National Guard, focusing on certifying cyberspace capabilities to the joint force.

Members of the 168th Cyberspace Operations Squadron, also attached to the 132d Wing, were the first clients of the range and used the training to hone their skills on the weapon system.

“The event hosted by the RANS provided an opportunity for our operators to train in a realistic and holistic manner that is not present in other training platforms,” said Capt. Joseph Wilburn, 168th COS team lead. “The RANS team and their weapon system simulator possess the flexibility to adapt to the operator’s specific training needs in real time that ensures skill improvement remains consistent throughout the event. The training event demonstrated by the RANS represents a significant force multiplier for Air National Guard cyber protection teams.”

The exercise aimed to increase the proficiency of the 168th COS in detecting, validating and responding to cyber threats. The exercises improve Cyber Mission Force mission readiness by providing scenarios as a service, meeting the annual training requirements of cyber units.

“Our first range event was significant because it proved to the cyber community that we are capable of providing this service and why Iowa is the right choice for the Range Squadron,” said Lt. Col. Kevin Taylor, 132d RANS commander.

Capt. Chad McDonnell, 132d RANS director of operations, said the training events offer more than just a virtual range environment where cyber operators can practice. The RANS provides all the required roles for evaluating teams, opposing force teams, cyber intelligence and a mission partner to serve as the organization the team is defending. Additionally, they build the range environment so their customers can deploy their physical cyber weapon system.

“This is not only important because it allows them to train like they fight, but it allows their maintenance team the opportunity to receive crucial training as well by physically deploying their equipment to an alternate location, configuring it to connect to the mission partner’s network, and providing weapon system maintenance for the operators during the event,” said McDonnell.

At the end of the event, exercise facilitators provided the 168th COS’s training, standards and evaluation shop with a document that identified every task and event they accomplished to maintain their operator currencies and proficiencies.

“We’re able to do all of this because we have fully qualified cyber operators with real-world mobilizations under their belt, in addition to the years of experience in the civilian sector,” said McDonnell. “Our Airmen and the experience they bring is truly our greatest asset to this unit.”

By MSgt Michael Kelly, 132d Wing, Public Affairs, Iowa Air National Guard

Top Army Generals for Cyber, Space and Special Ops Convene

Tuesday, February 13th, 2024

PETERSON SPACE FORCE BASE, Colo. — The U.S. Army’s top generals for cyber, space and special operations forces met to discuss the Triad partnership and how they can further develop, operationalize and institutionalize the collaboration.

Commanding Generals Lt. Gen. Maria B. Barrett, U.S. Army Cyber Command; Lt. Gen. Jonathon P. Braga, U.S. Army Special Operations Command; and Lt. Gen. Sean A. Gainey, U.S. Army Space and Missile Defense Command, met Jan. 31, 2024, for the third Triad 3-Star General Officer Steering Committee at USASMDC headquarters at Peterson Space Force Base.

Members of the committee emphasized the importance of the Triad due to the ever-changing character of warfare. Along with this evolution, the threats and the nature of deterrence are changing for the United States. The Triad looks to develop innovative and comprehensive solutions.

“The Cyber-Space-SOF Triad provides one of these solutions,” Braga said. “It is a ‘Modern-Day Triad’ designed to converge unique accesses, capabilities, authorities, understanding and effects in many of the same ways we have implemented combined arms operations. Additionally, the Triad provides operational and strategic advantage during active campaigning, crisis and conflict, while presenting options to senior leaders that are less escalatory than current strategic deterrence options.”

Gainey said that they must continue building upon the significant progress the Triad has already made in the development of concepts, capabilities and formations that enable exquisite operational preparation of the environment. The commands have already developed a unified exercise, experimentation and engagement plan for fiscal year 2024 and fiscal year 2025.

“We are working with the Theater Special Operations Command to ensure they know the space and high-altitude capabilities we can provide and to develop the operational concepts of employment,” said Gainey.

“(The Triad) is developing real-world employment concepts designed to enable Army and joint force objectives anywhere in the world at a time and place of our choosing,” Gainey said. “Additionally, the Triad will enable ‘Left of Launch’ trans-regional missile defeat and active campaigning to ensure the ability of our nation’s adversaries to strike the United States, as well as its partners and allies is prevented.”

The Triad is a major way we can contribute to multi-domain operations and for us, the potential it provides our Missile Defeat efforts, as well as the access, understanding, and effects it can enable for the Joint Force are undeniable, Gainey said.

“As such, the Triad provides flexible deterrent options that can shape the threat environment in ways our adversaries are unaware of and can provide flexible response options if they choose to break international norms and escalate tensions into conflict,” he said.

Braga said the Triad has an outsized impact against the adversary’s capabilities as it relates to SOF, space and cyber.

“That is why it is inherent we work together, experiment together and learn together,” Braga said.

Barrett said the Triad is coming up with solutions and tools together as a team.

“Triad operations disrupt adversary actions, demonstrate resolve, shape the adversary’s perceptions and gain advantage for warfighters when deterrence fails,” Barrett said. “ARCYBER has a track record of integrating cyber, electronic warfare and influence operations and can now deliver that to triad partners.”

By Dottie White, USASMDC

US Army Releases TC 3-12.2.98 HUNT Operations

Monday, February 12th, 2024

At the beginning of February, the US Army published TC 3-12.2.98, “Hunt Operations” which provides tactics, techniques, and procedures for defensive cyber forces conducting hunt operations as part of defensive cyberspace operations.

The tactics, techniques, and procedures contained in this publication are intended to be used as a guide and are not prescriptive.

The principal audience for this publication is cyber professionals in the United States Army Cyber Protection Brigade who conduct defensive cyberspace operations and the commanders and staffs of units who request and receive defensive cyberspace operations support from the cyber protection brigade.

Get your copy at armypubs.army.mil/epubs/DR_pubs/DR_a/ARN40178-TC_3-12.2.98-000-WEB-1

Chief Digital, Artificial Intelligence Office to Host Hackathon in Hawaii

Friday, December 29th, 2023

WASHINGTON (AFNS) —  

The Office of the Secretary of Defense Chief Digital and AI Office, Defense Innovation Unit, U.S. Indo-Pacific Command, U.S. Army Pacific Command and the U.S. Air Force will host a multi-classification hackathon open to all U.S. citizens, Feb. 5-9, 2024.

A hackathon is an innovation event commonly employed by technology companies in which teams develop prototypes in response to enterprise challenges associated with data. The BRAVO 11 Bits2Effects hackathon will occur at one of the DOD AI Battle Labs on the island of Oahu, Hawaii.

Any American citizen is eligible to apply, regardless of whether they currently work for the federal government or possess a security clearance. Applications, available online here, will be accepted on a rolling first-come-first-serve basis with the first group of acceptances taking place in mid-December. Due to past events exceeding 400 participants, BRAVO has secured an over-flow room, although organizers still expect demand to exceed supply.

Attendees are not required to hold a security clearance. However, certain spaces, use-cases and datasets may require a U.S. secret security clearance or higher. Applicants may apply as an employee for the U.S. government, a U.S. government contractor working on behalf of a federal contract or as U.S. citizen either affiliated or unaffiliated with a company. Any U.S. federal employees or federal contractors are eligible to submit potential use-cases and proposed collaborations within the application process. Sourcing a use-case to these hackathons often results in an operational prototype and feedback for the sourcing organization.

Starting in 2021, the U.S. Air Force began organizing multi-service prototyping events, known as BRAVO hackathons, to expedite learning and capability development from classified and protected operational data. This year’s BRAVO 11 Bits2Effects, the fourth BRAVO hackathon and first-held inside a combatant command, is seeking to produce solutions to combatant command challenges utilizing Indo-Pacific operational theater data. BRAVO utilizes a permissive software development environment that permits the co-mingling of classified and protected data with untrusted open-source and commercial software otherwise not approved for production systems within minutes.

Prior hackathons have produced prototypes influencing major Defense Department programs in areas including large language models, space launch, flight telemetry and biometrics, unmanned systems, personnel recovery, security classification, sensing and targeting and battle damage assessment among others.

“In the early 1920s, Army Col. Billy Mitchell assessed battleships, a top military funding priority of the Department of War, could be sunk by bombers just 1/80th the cost,” said Stuart Wagner, Chief Digital Transformation Officer for the Department of the Air Force and BRAVO AI Battle Labs Executive Agent. “To disprove widely held resourcing beliefs of senators, four-star generals and the Secretary of War, Mitchell organized the Project B exercises where bombers repeatedly sunk German-captured battleships, changing warfare by turning investments to airpower in the leadup of World War II.

The BRAVO DoD AI Battle Labs are again seeking to change how warfare is conducted by enabling innovators to develop and employ data driven effects during competition and conflict.”

Applicants looking to participate may do so in one of three roles:

The “Hacker” role is open to all applicants and expects project builders with varying skill sets and experience, including operational and warfighter expertise, software development, data science, machine learning, design and user interface/user design, data visualization and product management. Hackers may optionally supply a use case during the application process.

The “Hacker Subject Matter Expert” role is open to government and government contractors who lead one or more teams with specific expertise about a use case or dataset or supplies and administers infrastructure utilized at the hackathon. HackerSMEs will be required to supply a use case during the application process.

The “Supporter” role, open to government and government contractors, provides administrative support to the event by running security, facilitating supplies delivery, organizing social events and facilitating the delivery of science fair materials and attendee check-in.

Any federal government organization (contractor or government) is eligible to submit a use case, dataset, infrastructure or potential collaboration with the hackathon by submitting a Hacker/HackerSME application to the event. Further clarification can be obtained via saf.cn.bravo@us.af.mil. U.S. citizens and industry not leveraging an existing DoD contract for their proposed collaboration are encouraged to contact the Defense Innovation Unit at onramp-hack-bravo@diu.mil.

Story by U.S. Department of Defense