The Cyber Edge

The Cyber Edge Home Page

May 1, 2019
By George I. Seffers
With about 300,000 vacant cybersecurity positions in the United States, some experts recommend the creation of a civilian cyber corps of volunteers who could be called to take action when needed. Credit: BeeBright/Shutterstock

Some military and civilian experts are calling on the United States to create a civilian cyber corps to help fill the gap in cybersecurity expertise in times of need. Such a corps could enhance state and local emergency response efforts, help protect Defense Department networks and other critical infrastructure or combat social media information warfare campaigns.

May 1, 2019
By Howard R. Bandler
While preparing for a command cyber readiness inspection (CCRI), Staff Sgt. Jerome Duhan, USAF, a network administrator with the 97th Communications Squadron, inserts a hard drive into the network control center retina server at Altus Air Force Base, Oklahoma. Air Force photo by Senior Airman Franklin R. Ramos, USAF

Thirty years after the Morris Worm, networks face a long and growing list of potential attack vectors employed by an almost limitless number of threat sources, including criminals, hacktivists and nation-state actors. In response to threats, the U.S. Defense Department has taken prudent measures to shore up vulnerable systems and networks. In accordance with the well-established practice of concentric rings of security, the most sensitive department data exists on its most secure and isolated networks.

May 1, 2019
By George I. Seffers
DISA’s Roger Greenwell manages operational and technical risks on one of the world’s most complex—and most critical—networks, the Defense Information Systems Network. Credit: geralt/Pixabay

When operating one of the most complex and critical networks on the planet, risk is a given. That risk comes in two forms, technical and operational, and managing both is a matter of balance.

Roger Greenwell, Defense Information Systems Agency (DISA) risk management executive and authorizing official, is responsible for maintaining that balance on the Defense Information Systems Network (DISN), a global enterprise network that enables information superiority and critical communications. The DISN is the core of the Department of Defense Information Network, a worldwide conglomeration of military networks.

April 22, 2019
By Jim Hansen
The amphibious assault ship USS Boxer transits the Pacific Ocean, Oct. 3, 2018. The Navy’s Combat to Connect in 24 Hours program may redefine the ability to quickly adapt to cyber combat. Credit: Navy Petty Officer 3rd Class Alexander C. Kubitza

The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program that has the potential to change naval warfare as we know it.

The program is designed to improve operational efficiency by automating the Navy’s risk management framework (RMF) efforts; providing sailors with near real-time access to critical data; and accelerating the Navy’s ability to deploy new applications in 24 hours rather than the typical 18 months.

April 8, 2019
By Maryann Lawlor
The Ghidra tool suite examines compiled code using disassembly, decompilation and graphing.

The National Security Agency is now sharing the source code of Ghidra, its reverse engineering tool developed by the agency’s Research Directorate in support of its cybersecurity mission. Ghidra, a suite of software analysis tools, examines complied code using capabilities such as disassembly, assembly, decompilation, graphing and scripting.

Ghidra helps analyze malicious code and malware and improves cybersecurity professionals’ understanding of potential vulnerabilities in their networks and systems. With this release, developers can now collaborate, create patches and extend the tool to fit their cybersecurity needs.

April 1, 2019
By Maryann Lawlor
System and information security can be measured in a number of ways, including how it affects the bottom line. Credit: Shutterstock

Senior executives are increasingly interested in objective measurements to determine the robustness of their organizations’ cybersecurity protections. However, measuring the adequacy of network and data security can be likened to verifying the amount of air in a room: A formula can ascertain how much air the room contains in theory, but does it take into account the leaky windows?

March 29, 2019
By Robert K. Ackerman
Maj. Gen. Garrett Yee, USA, military deputy to the Army Chief Information Officer(CIO)/G-6, offers potential solutions to the challenge of bringing innovative technologies to the force rapidly and equipping them with adequate cybersecurity.

The Army is approaching cybersecurity in “a systematic methodical way that takes into consideration that not all things have the same level of risk or threat involved,” states Maj. Gen. Garrett Yee, USA, military deputy to the Army Chief Information Officer(CIO)/G-6.

He cites as an example trying to secure a stand-alone device that is not connected to the network but has an information technology component, versus securing a device that is connected to the network. The stand-alone device offers a negligible risk, so efforts should focus on the connected device, he offers.

April 1, 2019
By Kimberly Underwood
Given that one of the water sector’s challenges in protecting infrastructure from cyber attacks is cost, research is needed into affordable security measures for control systems. Credit: Daniel Jedzura/Shutterstock

The water and wastewater treatment industry is facing cybersecurity threats. The risks affect the sector disproportionately compared to other utilities, given local-level water processing operations.

Along with physically securing its critical infrastructure, the water industry has to leverage available tools to protect against cyber attacks, an expert says.

April 1, 2019
By Kimberly Underwood
In preparation for the NATO Trident Juncture 18 exercise, a British Army convoy enters Malmo, Sweden in October after crossing the Oresund Bridge that connects to Denmark. Shared classified “federated” networks used during such exercises are a key allied tool, says Col. Jenniffer Minks, USAF (Ret.), coalition interoperability division chief, Deputy Directorate for Cyber and C4 Integration, Joint Staff J-6. Photo courtesy of NATO

The requirement to partner with allied nations and share a classified network will only grow in the coming years, leaders say. In combined exercises, engagements or missions, coalition partners need to be able to connect digitally to share communications, resources and information to strengthen defenses and partnerships. At the Pentagon, the Joint Staff is working to improve coalition systems and how the U.S. can connect securely to those networks outside of the national networks, one expert shares.

April 1, 2019
By Robert K. Ackerman
Soldiers participate in NATO’s multinational live-fire exercise Scorpions Fury 2018 in Romania last November. The alliance has declared cyberspace to be an operational domain on a par with land, sea and air, but it still must develop a policy to integrate cyber operationally with the kinetic effect domains. NATO photo

NATO is taking a comprehensive approach to building a cyber policy that would deter adversaries, defend its member nations and provide key capabilities in multidomain operations. This approach to the alliance’s cyberspace strategy takes into account resilience, counter-cyber activities and operational capabilities in both civilian and military elements.

Yet when it comes to NATO cyber policy, much remains to be established. With 29 member nations all having different needs and different approaches to cyber operations, the alliance has not yet arrived at a fully functional policy. It continues to seek input from its nations while incorporating necessary capabilities amid continuing changes in the cyber domain.

April 1, 2019
By Donara Barojan
While U.S. officials have focused on how Russia’s use of social media may have interfered with the 2016 presidential elections, Iran has been quietly using the platforms to forge a battle of its own. Credit: Milosz Maslanka/Shutterstock.com

Russia may have popularized the manipulation of social media to further its own agenda, but it was not the first country to do so, nor will it be the last. A number of other countries are engaging in similar tactics, but so far have flown largely under the radar. The Oxford Internet Institute found that at least 28 countries worldwide are exploiting social media to influence the public opinion of their own or foreign populations.

April 1, 2019
By Robert K. Ackerman

The growing interconnection among the elements of the critical infrastructure may hold the key to safeguarding it against an increasingly sophisticated threat picture. Many elements of the critical infrastructure depend on each other, and securing them in a coordinated endeavor holds promise for combatting adversaries who are targeting it on a daily basis.

April 1, 2019
By George I. Seffers
Marines train with communications equipment in the village of Hell, Norway, October 14, 2018, as part of Trident Juncture 18, a NATO exercise. Trident Juncture 18 marks the first time NATO is using data science in addition to traditional lessons learned processes following a major training exercise.  Photo By Marine Corps Lance Cpl. Scott R. Jenkins

Trident Juncture 2018, a large-scale NATO military exercise, wrapped up late last year. But in the weeks since, the alliance has been doing something it has never done before by using big data science to help inform lessons learned from the exercise.

April 1, 2019
By Lydia Snider
Although social media platforms appear to connect individuals in similar groups, analysis of social activities enables advertisers—and adversaries—to target specific messages to users who are most likely to be influenced by certain posts. Credit: metamorworks/Shutterstock

Many people have written marketing off as frivolous, but it is a field of constant data-driven experimentation, and in the past decade social media sites such as Facebook have become state-of-the-art laboratories for honing influence messaging. In the information revolution marketplace, the organization with the most data and the ability to utilize it wins.

April 1, 2019
By Cathy Hall
By employing the Zero Trust concept, organizations benefit from a stronger security posture, including decreased reputational risk with their customers and partners. Credit: JNE Valokuvaus/Shutterstock

In today’s environment, the network no longer can be considered a safe zone. Every asset an organization possesses and every transaction it conducts must be secured as if it were a standalone item continually exposed to the full range of cyber threats. The realization that perimeter protection alone is not sufficient has led to the security concept of Zero Trust. In this never-trust/always-verify approach, all entities and transactions rely on multiple solutions to work together and secure digital assets.

April 1, 2019
By Robert K. Ackerman

A 2018 exercise developed by the Army Cyber Institute at West Point and hosted by the city of Houston provided participants with a full view of potential critical infrastructure crises while also offering a path to security and resiliency. Known as the Jack Voltaic 2.0 Cyber Research Project, the exercise exposed critical infrastructure issues to 200 participants from 44 organizations.

April 1, 2019
By Kimberly Underwood
Maj. Gen. Wolfgang Renner (l), GEAF, commander, NATO CIS Group and deputy chief of staff cyberspace, SHAPE, and Col. Donald Lewis, USAF, deputy director, NATO CyOC, discuss the establishment of the alliance’s cyber operations at the CyCon U.S. conference in November 2018.

NATO’s longtime motto says that an attack on one NATO member is considered an attack on all the alliance. Today, this creed also applies to cyberspace, alliance leaders indicate. NATO’s new Cyberspace Operations Center, formed in August 2018, takes up the mantle of defending the alliance in the digital realm.

March 1, 2019
By Kimberly Underwood
 archy 13/Shutterstock

The vulnerabilities of machine learning models open the door for deceit, giving malicious operators the opportunity to interfere with the calculations or decision making of machine learning systems. Scientists at the Army Research Laboratory, specializing in adversarial machine learning, are working to strengthen defenses and advance this aspect of artificial intelligence.

March 1, 2019
By Kimberly Underwood
The Army is using current operations in Afghanistan, Iraq and Syria, and partnering with U.S. Cyber Command and the Army Cyber Command, to operationalize information into current cyber operations.

As the U.S. Army continues to evolve its newest warfighting domain, the cyber domain, information plays a key role. The service is working to incorporate information capabilities along with intelligence, electronic warfare, cyber and space, as well as with traditional fire capabilities.

In December, the Army released a doctrine guiding multidomain operations through 2028. The policy acknowledges that U.S. adversaries are contesting all domains, and that in the information environment American dominance is not guaranteed.

March 1, 2019
By George I. Seffers
The Air Combat Command, which is taking the lead for cyber operations from the Air Force Space Command, is building a new division that integrates cyber, intelligence, electronic warfare and information warfare capabilities. Artist’s depiction of a digitized F-22 based on a U.S. Air Force photo by Tech. Sgt. Michael Holzworth.

The newly created Cyber and Non-Kinetic Operations Division within the Air Combat Command is expected to reach full strength this summer. The new organization integrates multiple missions, including cyber, electronic warfare, intelligence and information warfare.

Pages