5
5
0
I ask this question, because in the past, I always saw this as an IT piece of network security. Today, those lines are blurred. There are so many pieces of Security that tie in to Cyber Security. Think of social engineering and physical security. We need to physically have areas locked down and guarded so we don't have someone inserting a device somewhere and opening a port on a network.
In the military, we have Force Protection/Anti-Terrorism units that have Cyber Security sections. Many different areas of the civilian world have Cyber Security seperate from the IT departments altogether.
So where do you think this fits in the military, in our world today?
I'm also attaching an article I read:
http://www.defense.gov/news/newsarticle.aspx?id=128305
In the military, we have Force Protection/Anti-Terrorism units that have Cyber Security sections. Many different areas of the civilian world have Cyber Security seperate from the IT departments altogether.
So where do you think this fits in the military, in our world today?
I'm also attaching an article I read:
http://www.defense.gov/news/newsarticle.aspx?id=128305
Posted >1 y ago
Responses: 12
Where Cyber Security belongs depends upon how it is defined and visualized. These are important things that should be critically thought about along with DOTMLPF (doctrine, organization, training development, material, leader development, personnel, facilities) considerations. Some historical examples.
- Tank. The tank was introduced in 1917. The British and French saw the tank as an infantry support vehicle and thus developed their DOTMLPF to support this vision. The Germans saw the tank as an independent vehicle and thus developed their DOTMLPF to support this vision. End result: the Germans kicked the British and French butts within six weeks in May 1940 even though the British and French had more tanks and their tanks were better (more powerful and heavily defended but less mobile).
- Airplane. The plane was first seen in 1904 and used in WWI. The Germans created a separate Air Force but saw the purpose of that Air Force to be tactical (support the Army). This is one reason why the Germans were not able to set proper air conditions for the invasion of Great Britain during the Battle of the Blitz. The Americans kept the Air Force as part of the Army (Army Air Corps) during WWII but created both strategic and tactical capability. The Air Force split from the Army in 1947. End result: The US was able to set tactical and strategic air conditions for the invasions of Europe, Germany, and Japan.
- Machine guns. Originally heavy and immobile thus Machine Gun Battalions were created in WWI. Eventually became lighter and more mobile which allowed for infusion into all elements at the platoon level.
- Cyber Security. Short answer is that I do not yet know where Cyber Security belongs but I know the methodology I will use to answer that question were I passionate about it to pursue it. Cyber security includes many different elements including but not limited to: offensive capability, defensive capability, engineering aspects (physical structures), IT aspects, private and public implications, etc.
- Tank. The tank was introduced in 1917. The British and French saw the tank as an infantry support vehicle and thus developed their DOTMLPF to support this vision. The Germans saw the tank as an independent vehicle and thus developed their DOTMLPF to support this vision. End result: the Germans kicked the British and French butts within six weeks in May 1940 even though the British and French had more tanks and their tanks were better (more powerful and heavily defended but less mobile).
- Airplane. The plane was first seen in 1904 and used in WWI. The Germans created a separate Air Force but saw the purpose of that Air Force to be tactical (support the Army). This is one reason why the Germans were not able to set proper air conditions for the invasion of Great Britain during the Battle of the Blitz. The Americans kept the Air Force as part of the Army (Army Air Corps) during WWII but created both strategic and tactical capability. The Air Force split from the Army in 1947. End result: The US was able to set tactical and strategic air conditions for the invasions of Europe, Germany, and Japan.
- Machine guns. Originally heavy and immobile thus Machine Gun Battalions were created in WWI. Eventually became lighter and more mobile which allowed for infusion into all elements at the platoon level.
- Cyber Security. Short answer is that I do not yet know where Cyber Security belongs but I know the methodology I will use to answer that question were I passionate about it to pursue it. Cyber security includes many different elements including but not limited to: offensive capability, defensive capability, engineering aspects (physical structures), IT aspects, private and public implications, etc.
(11)
(0)
SFC Mark Merino
I was taking notes on this response. Great input COL Jason Smallfield, PMP, CFM, CM!
(2)
(0)
TSgt Joshua Copeland
Great answer and better history lesson to boot COL Jason Smallfield, PMP, CFM, CM!!
(2)
(0)
1SG(P) (Join to see)
That was exactly the answer I was looking for, Sir. I have worked in the private sector in IT sales for quite a few years and have seen that evolve. You hit the head right on the nail!
(0)
(0)
To see real time Cyber attacks, try: http://map.ipviking.com
Every second, Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries. The attacks shown are based on a small subset of live flows against the Norse honeypot infrastructure, representing actual worldwide cyber attacks by bad actors. At a glance, one can see which countries are aggressors or targets at the moment, using which type of attacks (services-ports).
(5)
(0)
1SG(P) (Join to see)
There are some other sites that collect and show this data in real time too, but this is my favorite. I work in IT Sales and when I ask a client how secure they are, I wait for their answer and then show them this site. Jaw dropping to say the least.
(1)
(0)
I think it is an emerging new area that fits in either on it's own, in IT or in traditional security just depending on the size, scope and mission of the organization. It is hard to be the master of all things. A large IT based firm would likely have a separate cyber security dept in addition to a traditional security dept. A very small company might have their IT dept handle it. A company with no "in house" IT would likely have their traditional security handle it.
(4)
(0)
I think it should be its own entity: Land, Sea, Air, Cyber.
I think the Cyber realm should have different PT, HT/WT, Test Scores, Mandatory Training, etc for their realm. This would enable us to bring in people that might not be the most physically fit for combat operations but are mentally fit for cyber operations.
I think the Cyber realm should have different PT, HT/WT, Test Scores, Mandatory Training, etc for their realm. This would enable us to bring in people that might not be the most physically fit for combat operations but are mentally fit for cyber operations.
(2)
(0)
There has got to be a meme for a new military service out there called the "Cyber Force"... It is comprised almost entirely of pimple ridden former basement dwellers...
All joking aside, Cyber Security and Information System Security are a large piece that do not only fit within one service. The use of the information domain as a weapon has been around for much longer than the advent of the cyber space. Exact details of which I wish I could speak to.
Each one of our weapon systems, whether they are controlled by the Army, Air Force, Navy or USMC will have a need for protection from intrusion and a quick method of detection that go far beyond inserting a "device" on a network. Compromising NIPRNet is as easy as someone opening up their Gmaill, or other free email account message and clicking on a link. It has happened before and it will happen again.
In short, cyber security belongs right where it is; as a component of each of the service's cyber security and information system security plans. Perhaps even standing up their own command dedicated solely towards Information System security protection and cyber attack. An example of this would be the Air Force's Cyber Command.
I could see a Cyber Command structure that is very similar in concept to the IC (Intelligence Community).
All joking aside, Cyber Security and Information System Security are a large piece that do not only fit within one service. The use of the information domain as a weapon has been around for much longer than the advent of the cyber space. Exact details of which I wish I could speak to.
Each one of our weapon systems, whether they are controlled by the Army, Air Force, Navy or USMC will have a need for protection from intrusion and a quick method of detection that go far beyond inserting a "device" on a network. Compromising NIPRNet is as easy as someone opening up their Gmaill, or other free email account message and clicking on a link. It has happened before and it will happen again.
In short, cyber security belongs right where it is; as a component of each of the service's cyber security and information system security plans. Perhaps even standing up their own command dedicated solely towards Information System security protection and cyber attack. An example of this would be the Air Force's Cyber Command.
I could see a Cyber Command structure that is very similar in concept to the IC (Intelligence Community).
(2)
(0)
As a signal NCO, I can easily see the 25D fitting in with our structure as a signal corps. However, the 35 series would fall up under the intel community. I see overlap and it would make the most sense to group them with the others.
(2)
(0)
One of the questions that need to be answered is at what level does cyber security need to be applied? I would postulate that it needs to be applied all through from company level and up. In garrison, the existing G6/NIST structure would work with oversight and training down to the individual service member. However, with our current distributed deployment posture where Companies might find themselves on isolated FOBs/COBs then the coverage needs to be there also. Social engineering and OPSEC threats dont stop when you leave garrison.
(2)
(0)
The simple answer, at the desktop/laptop/mobile device of EVERY Soldier, Sailor, Marine, Airman, Government Civilian, and Contractor that access any and all systems. That said, we need to get into the mindset that security has to be part of the build plan and not an after thought. How many people have physical access to your device? Until we can get buy-in from the USERS of the systems, security in the cyber realm will be a dream and this is one area where just one person who is careless can be party to a network compromise.
Ask yourself this question, how many of you have stepped away for "just a second" and left your computer logged in and not locked? Be honest, this isn't a graded exam (yet). How long does it take to craft an all-hands e-mail? What about exposing your's or someone else's PII?
Ask yourself this question, how many of you have stepped away for "just a second" and left your computer logged in and not locked? Be honest, this isn't a graded exam (yet). How long does it take to craft an all-hands e-mail? What about exposing your's or someone else's PII?
(1)
(0)
1SG(P) (Join to see)
App cut me off. What I was saying @TSgt W Williams is that even with having a CAC...how many may walk away from it even for a few minutes as you pointed out. Security has always been a reactionary step instead of a prebuilt proactive step.
Great answer!!!!
Great answer!!!!
(0)
(0)
SSG-
Excellent website.
Personally I don't think there's a right or wrong way of looking at it. It really just comes down what the military has a whole wants. Enforcing a decision by pulling rank would get something done, but culture is a hard thing to weed out and cyber warfare is just becoming accepted.
Excellent website.
Personally I don't think there's a right or wrong way of looking at it. It really just comes down what the military has a whole wants. Enforcing a decision by pulling rank would get something done, but culture is a hard thing to weed out and cyber warfare is just becoming accepted.
(1)
(0)
1SG(P) (Join to see)
That is true. And there is a HUGE difference between the military and civilian sectors. Civilian companies are startng to get it and are slowly making the change to have a seperate Security department. There are too many pieces to the way the military branches and the Fed are set up, so having everything under one roof will never happen. But the most important part is understanding that future attacks may not always be physical but cyber attacks.
There are many times when the attacks you may see coming from the U.S. are not actually from the U.S. They are computers hacked into by people in other countries and using our PC's to start attacks.
There are many times when the attacks you may see coming from the U.S. are not actually from the U.S. They are computers hacked into by people in other countries and using our PC's to start attacks.
(1)
(0)
SPC Angel Guma
I also think that at some level, people have to accept cyber insecurity as the new reality. There's only so much one individual can do with limited budgets to really encrypt his computer, and short of building individualized OS's from linux for every new computer you get, on top of making sure your crypto hasn't been broken yet by some foreign power, individuals are always going to be at a disadvantage. When a determined attacker has you targeted, there's little that could be done.
But then not doing anything and not getting up to speed on the issues is just as bad. And truly this is the greatest weakness we have. The enemy doesn't really need their own counter-intelligence, they can just troll around on facebook and gage our military preparedness from what idiots are leaving online. Its a never ending struggle with no clear winner in sight. The moment Big Brother gets to the point that all is controlled online, some major hack occurs, such as the Target hack, that destabilizes millions of people all from an oversight.
But then not doing anything and not getting up to speed on the issues is just as bad. And truly this is the greatest weakness we have. The enemy doesn't really need their own counter-intelligence, they can just troll around on facebook and gage our military preparedness from what idiots are leaving online. Its a never ending struggle with no clear winner in sight. The moment Big Brother gets to the point that all is controlled online, some major hack occurs, such as the Target hack, that destabilizes millions of people all from an oversight.
(0)
(0)
I like the one members description of a cyber community like the IC. There will have to be many cells within each of the services and probably units that will address different functions, deal with certain threats and have various tactics at their disposal. Tactical options should be at a lower level while more strategic responses are elevated. Which raises the question of who is only authorized to be defensive and who can actually respond with countermeasures. Domestically it should be homeland security with the NSA. Overseas it should be the military in my opinion.
(1)
(0)
Read This Next

Cybersecurity
Informational Security


