Saturday, January 05, 2008

Cyberspace Threat Management

Network Warfare Training
A new war on Al Qaeda’s intricate network of Web sites, sites used both to communicate with its agents in the field and to recruit new jihadis.

The U.S. Air Force is currently training 40,000 Cyber Warriors

The New Cyber General

During a media conference on November 2, 2007, Secretary of the Air Force Michael W. Wynne said the 8th Air Force would become the new Air Force Cyber Command. Now this statement has become reality. A three-star general, Lt. Gen. Robert Elder Jr. is the commander and will lead the Air Force's (AFCYBER) Cyber Command. AFCYBER will have over 20,000 personnel, and the Air Force is recruiting officers and airmen from all over for careers in Cyber War.

Thousands of existing air force electronic warfare specialists will be assigned, or offered, jobs in AFCYBER. This will include units operating in the full spectrum of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.


The U.S. Air Force is currently training 40,000 Cyber Warriors that make up this unique force. The cyber war training program will take from six to 15 months to complete. The first Undergraduate Network Warfare Training Class graduated Dec. 7, 2007. They are representing the Air Force's expansion into the lead role in cyberspace threat management.
It is estimated that it will take over seven years to get the full complement of staff trained. The training coupled with experience will combine to give them what they need to perform their critical mission. Not all of the people trained as Cyber Warriors will be in the 8th Air Force.
Many will be assigned throughout the Air Force to take care of Cyber War needs of their units. We are developing a new breed of soldier- cyber soldiers are ones who engage in cyber conflicts, wars, or espionage. They are armed with hackers' skill and knowledge and newly developed cyber weapons and stand ready to defend our nation against cyber threats.

---
Cyber Warfare: A New Doctrine and Taxonomy
Lt. Col. Lionel D. Alford, Jr., U.S. Air Force
Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system -- cyber warfare -- is a revolutionary method of pursuing war. This paper discusses the limitations of current doctrine and suggests new cyber warfare taxonomy
Related Link, read the rest here :www.stsc.hill.af.mil/.../2001/04/alford.html


A New Taxonomy of Cyber Terms

Cyber warfare (CyW) - Any act intended to compel an opponent to fulfill our national will, executed against the software controlling processes within an opponent's system. CyW includes the following modes of cyber attack: cyber infiltration, cyber manipulation, cyber assault, and cyber raid.

Cyber infiltration (CyI) - Penetration of the defenses of a software-controlled system such that the system can be manipulated, assaulted, or raided.

Cyber manipulation (CyM) - Following infiltration, the control of a system via its software that leaves the system intact, then uses the capabilities of the system to do damage. For example, using an electric utility's software to turn off power.

Cyber assult (CyA) - Following infiltration, the destruction of software and data in the system, or attack on a system that damages the system capabilities. Includes viruses, overload of systems through e-mail (e-mail overflow), etc.

Cyber raid (CyR) - Following infiltration, the manipulation or acquisition of data within the system that leaves the system intact and results in transfer, destruction, or alteration of data. For example, stealing e-mail or taking password lists from a mail server.

Cyber attack - See CyI, CyM, CyA, or CyR.

Cyber Crime (CyC) - Cyber attacks without the intent to affect national security or to further operations against national security.

Intentional cyber warfare attack (IA) - Any attack through cyber-means to intentionally affect national security (cyber warfare) or to further operations against national security. Includes cyber attacks by unintentional actors prompted by intentional actors. (Also see Unintentional Cyber warfare attack (UA).)

Intentional cyber actors (I-actors) - Individuals intentionally prosecuting cyber warfare (cyber operators, cyber troops, cyber warriors, cyber forces).

Unintentional cyber warfare attack (UA) - Any attack through cyber-means without the intent to affect national security (cyber crime).

0 Comments:

Post a Comment

<< Home