Cyberspace Threat Management
During a media conference on November 2, 2007, Secretary of the Air Force Michael W. Wynne said the 8th Air Force would become the new Air Force Cyber Command. Now this statement has become reality. A three-star general, Lt. Gen. Robert Elder Jr. is the commander and will lead the Air Force's (AFCYBER) Cyber Command. AFCYBER will have over 20,000 personnel, and the Air Force is recruiting officers and airmen from all over for careers in Cyber War.
Thousands of existing air force electronic warfare specialists will be assigned, or offered, jobs in AFCYBER. This will include units operating in the full spectrum of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
The U.S. Air Force is currently training 40,000 Cyber Warriors that make up this unique force. The cyber war training program will take from six to 15 months to complete. The first Undergraduate Network Warfare Training Class graduated Dec. 7, 2007. They are representing the Air Force's expansion into the lead role in cyberspace threat management.
http://littlegreenfootballs.com/weblog/entry=28470_Giuliani_Wants_a_Surge_in_Afghanistan#comments
Cyber warfare (CyW) - Any act intended to compel an opponent to fulfill our national will, executed against the software controlling processes within an opponent's system. CyW includes the following modes of cyber attack: cyber infiltration, cyber manipulation, cyber assault, and cyber raid.
Cyber infiltration (CyI) - Penetration of the defenses of a software-controlled system such that the system can be manipulated, assaulted, or raided.
Cyber manipulation (CyM) - Following infiltration, the control of a system via its software that leaves the system intact, then uses the capabilities of the system to do damage. For example, using an electric utility's software to turn off power.
Cyber assult (CyA) - Following infiltration, the destruction of software and data in the system, or attack on a system that damages the system capabilities. Includes viruses, overload of systems through e-mail (e-mail overflow), etc.
Cyber raid (CyR) - Following infiltration, the manipulation or acquisition of data within the system that leaves the system intact and results in transfer, destruction, or alteration of data. For example, stealing e-mail or taking password lists from a mail server.
Cyber attack - See CyI, CyM, CyA, or CyR.
Cyber Crime (CyC) - Cyber attacks without the intent to affect national security or to further operations against national security.
Intentional cyber warfare attack (IA) - Any attack through cyber-means to intentionally affect national security (cyber warfare) or to further operations against national security. Includes cyber attacks by unintentional actors prompted by intentional actors. (Also see Unintentional Cyber warfare attack (UA).)
Intentional cyber actors (I-actors) - Individuals intentionally prosecuting cyber warfare (cyber operators, cyber troops, cyber warriors, cyber forces).
Unintentional cyber warfare attack (UA) - Any attack through cyber-means without the intent to affect national security (cyber crime).
0 Comments:
Post a Comment
<< Home