Cyber Operations

August 1, 2021
By Cmdr. Erika De La Parra Gehlen, USN
National security objectives can only be achieved when the government and private sector work together. NSA

As China continues to threaten U.S. national security through a whole-of-society warfare strategy, a government-private sector partnership must be a fundamental component of the U.S. government’s approach to information advantage and countering China’s attacks.

By Kimberly Underwood
The 67th Cyberspace Wing of the U.S. Air Force is examining the concept of software factory-as-a-service that could aid in cyber space operations, reports Wing Commander Col. Jeffrey Phillips, USAF.

The U.S. Air Force’s 67th Cyberspace Wing has been busy. The wing operationally acts as the execution arm of Air Forces Cyber, performing comprehensive cyber operations on a service and nation level. The wing has successfully proven its ability to operationalize on top of its duties to organize, train and equip, reported Col. Jeffrey Phillips, USAF, wing commander. The wing took action against Russia’s information warfare campaign over the last year, responded to the SolarWinds compromise and helped ensure the digital security of the 2020 election, Col. Phillips said during a May 18 presentation to the AFCEA Alamo Chapter.

February 4, 2021

Invictus International Consulting LLC, Alexandria, Virginia, has been awarded a $97,943,684 cost-reimbursement contract for Operational Simulated Cyber Environment Resiliency Software prototype/hardware. The contract provides for research and development of capabilities in modeling, simulation and testing cyber technologies across the full spectrum of cyber operations to aid the Air Force and the Department of Defense (DOD). Research and further development will provide the Air Force and DOD with next generation cyber tools and technologies that enhance cyber resiliency and can be rapidly transitioned and integrated to support Cyber Mission Forces.

February 7, 2020
By Kimberly Underwood
“Defensive cyber operations will be our number one priority,” says Brig. Gen. Joseph Matos, USMC, J-6, U.S. Space Command, speaking of the command’s vital role in defending U.S. space-based assets and operations.

Last August 30, the U.S. Space Command become the 11th unified combatant command of the U.S. Department of Defense. In that role, the command will be conducting defensive, and when necessary, offensive cyber capabilities to protect key space-based assets and guard its part of the military’s network, called the DODIN.

August 20, 2019
By George I. Seffers
Air Commodore Elanor Boekholt-O’Sullivan, Royal Netherlands Air Force, speaks about the cyber work force during a panel at AFCEA TechNet Augusta. Photo by Michael Carpenter

Members of an international panel of cyber experts recommend recruiting personnel some might consider misfits in the cyber realm.

June 1, 2019
By George I. Seffers
Cyber warriors with the National Guard are sometimes similar to colonial-era militiamen, fighting with whatever technological weapons they have at home or building the tools they need. Alexander Herasymchot/Shutterstock and U.S. Defense Department courtesy photo

National Guard members conducting cyber operations found themselves poorly equipped to meet some of the real-world challenges they faced, so they banded together and built the system they needed on a shoestring budget. That system detects anomalous behavior on the network, reduces the number of analysts and enriches network data provided to data scientists.

July 17, 2013
George I. Seffers

Booz Allen Hamilton Inc., McLean, Va.; CACI Technologies Inc., Chantilly, Va.; Computer Sciences Corp., Falls Church, Va.; General Dynamics One Source LLC, Fairfax, Va.; Honeywell Technology Solutions Inc., Columbia, Md.; Engility Corp., Mount Laurel, N.J.; Lockheed Martin Services Inc., Gaithersburg, Md.; Science Applications International Corp., McLean, Va.; Scientific Research Corp., Atlanta, Ga.; Secure Mission Solutions, Fairfax, Va.; STG Inc., Reston, Va.; Systems Research and Applications Corp., Fairfax, Va.; and URS Federal Services Inc., Germantown, Md., are each being awarded an indefinite-delivery/indefinite-quantity, cost-plus-fixed-fee, with provisions for fixed-price-incentive (firm target) and firm-fixed-price task orders,

March 28, 2012
By George Seffers

The U.S. military needs to develop a career field that will encompass the entire career of cyber warriors, said LTC Gregory Conti, USA, who directs the Cyber Research Center at the U.S. Military Academy.

"We need to create a career field from private all the way through general officer," Col. Conti suggested at the TechNet Land Forces conference in Tucson, Arizona. He added that cyber is not just a two or three-year assignment and that cyber warriors need to know they have a future in the military. Furthermore, military members with cyber expertise need to have leaders with greater expertise, and the military must grow those leaders.

August 1, 2011
By Rachel Eisenhower

In the midst of a global cyberspace crisis, the U.S. Defense Department faces many hurdles in its effort to protect and defend government computer networks. According to an unclassified version of a previously issued classified report from the U.S. Government Accountability Office (GAO), several cyberspace capability gaps exist. The U.S. Cyber Command is decentralized and spread across various offices, commands, and military services and agencies, which makes the supporting relationships necessary to achieve command and control of cyberspace operations unclear. In response to a major computer infection, the U.S.

January 29, 2010

Although the U.S. Navy has been in the cyber arena for many years, today the service officially moved into the operational cyber domain as Vice Adm. Barry McCullough, USN, took command of the U.S. Fleet Cyber Command/U.S. 10th Fleet. At the commissioning/re-commissioning of this new command and revitalized fleet, Adm. McCullough officially became the Navy's primary connection with the other armed services and joint community as well as the Navy's leader in the cyber operational and tactical realm. Prior to the Commissioning Orders and Assumption of Command ceremony, CNO Adm.

March 4, 2009
By Beverly Schaeffer

The networked world is beginning to discover that sharing is not always beneficial. Marauders always have been the bane of cyberspace, but now a new set of threats has emerged to imperil more than just the usual targets. Ordinary citizens now are menaced by sophisticated organizations seeking to damage society or to loot it of its funds-or both. And, as always, the network-centric military is under assault by increasingly frequent and effective cyberagents operating under foreign government control. In Launching Stealth Warfare, Maryann Lawlor returns to report on the possibility of the next major war being launched by a digital attack.

December 2011
By Rita Boland, SIGNAL Magazine


Earlier this year, cybercriminals spoofed the U.S. Air Force’s Web portal. Such attacks are on the rise across the Internet, and the various military branches are engaged in battling these phishing attempts.

Enhanced vigilance is required as defense Web pages face greater threats.

December 2011
By George I. Seffers, SIGNAL Magazine


To demonstrate information-hiding techniques, officials with Backbone Security embedded a 122-page extract from a terrorist training manual in a photograph. The alteration cannot be detected with the human eye, or with most network security tools.

December 2011
By Max Cacas, SIGNAL Magazine


The National Cybersecurity and Communications and Integration Center, Department of Homeland Security, is in Arlington, Virginia. Photo courtesy of Federal News Radio.

Global network technologies challenge the U.S. agency that must protect them.

May 2010
By Robert K. Ackerman, SIGNAL Magazine


The Naval Computer and Telecommunications Area Master Station, Pacific, in Hawaii, provides telecommunications support to naval, joint and coalition forces throughout the Pacific theater and the Indian Ocean. The U.S. Navy has combined its networking and intelligence functions as part of its thrust toward building an information-centric Navy.

March 2009
By Maryann Lawlor

A U.S. Air Force hot bench team at the Global Cyberspace Integration Center examines software and information systems for potential problems before they are delivered to warfighters. Cyberspace could be the first line of offense in future warfare.
Attacks in cyberspace may be prelude to future conventional conflicts.

March 2009
By Rita Boland

Investigating and prosecuting cybercrimes are diverse and fluid fields.