Cyberwarfare: Air Force to the rescue?

The 24th Air Force division is responsible for conducting U.S. defense cyber operations. Lt. Gen. Michael Basla, vice commander of the Air Force Space Command, said, “We can’t defend the whole network just like we can’t defend all the air domain. Instead we defend the portion we need to operate in. We’ve done it already to assure [support for] Predator [in Afghanistan and Iraq] and space launch operations.” But he’s worried about the multiple networks and systems employed by the military, even separate ones within the Air Force. He then went on to explain the need to integrate all U.S.-based cyberdefense. “We must reduce complexity and improve processes by … homogenizing these networks.” Now, if that doesn’t ring alarm bells, nothing should. During the crisis of 9/11, the police, FBI and firefighters could not even talk to each other, let alone the FBI, CIA, NSA, Mil. Intel, etc., etc. As Yogi Berra would say, “It’s déjà vu all over again.”u u uMeantime, American defense is not only military. There is a large company called Lockheed Martin that has a 24/7 manned cyberdefense operation staffed by some 400 employees tracking and monitoring Internet and cyber traffic. If you can, imagine the NASA mission control center, double it and add a couple of hundred monitors, workstations and dedicated nerds fighting off attacks every single day. Lockheed Martin sells time on their system to corporations, banks, U.S. government agencies. They are, after all, a defense contractor. They monitor 145,000 computers daily and 700 million emails a month, of which only 300 million make it past filters and need to be analyzed before employees can open them.Their system relies on intelligence analysis, according to Lt. Gen (Ret.) Charles Croom their VP for security solutions: “You see a pattern and begin to predict attacks.” He says you have to understand both attackers and employees in order to predict what they will do next. And there are seven steps3 to the cyber kill chain: “reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.” If you catch them early on, you can neutralize them, everything from the kid who’s trying to make a name by breaking into a major business’ computer database to the professional cybergangs wanting to steal to the enemy intent on destroying you.u u uHow sure are the experts at Lockheed Martin of their ability to thwart all attacks in the future? Not very, as they admit they are spending 20 percent of all revenue on research and development modeled after Silicon Valley think tank methods. What they really need to do is build automation, not human eyes glued to a screen hoping to spot an attack before it is too late. And the people they need to rely on for development are all, shall we say, mavericks. At the NextGen Center Lockheed shares such R&D with Cisco, Intel, Juniper Networks and Symantec. And the nerds thinking and planning are allowed iPads, iPhones and their precious Macs, definitely not mainframe access.Meanwhile Congress is bogged down, thinking we’re still in the 20th century, refusing to allow such cyberdefense operations to counterattack in pre-emptive ways to prevent an attack before it is too late. Think about Croom’s seven steps: If you can stop an intruder at reconnaissance before he advances to weaponization, you are more likely to stop an attack. If you see someone snooping around your house, inside your yard, call the cops. With cyberwarfare, calling the cops (who cannot talk to each other anyway) would be too late. Perhaps it is better to shoot to kill (at least electronically). Peter Riva, formerly of Amenia Union, lives in New Mexico. Resource3. www.military-information-technology.com/mit-home/288-mit-2010-volume-14-...

Latest News

Love is in the atmosphere

Author Anne Lamott

Sam Lamott

On Tuesday, April 9, The Bardavon 1869 Opera House in Poughkeepsie was the setting for a talk between Elizabeth Lesser and Anne Lamott, with the focus on Lamott’s newest book, “Somehow: Thoughts on Love.”

A best-selling novelist, Lamott shared her thoughts about the book, about life’s learning experiences, as well as laughs with the audience. Lesser, an author and co-founder of the Omega Institute in Rhinebeck, interviewed Lamott in a conversation-like setting that allowed watchers to feel as if they were chatting with her over a coffee table.

Keep ReadingShow less
Reading between the lines in historic samplers

Alexandra Peter's collection of historic samplers includes items from the family of "The House of the Seven Gables" author Nathaniel Hawthorne.

Cynthia Hochswender

The home in Sharon that Alexandra Peters and her husband, Fred, have owned for the past 20 years feels like a mini museum. As you walk through the downstairs rooms, you’ll see dozens of examples from her needlework sampler collection. Some are simple and crude, others are sophisticated and complex. Some are framed, some lie loose on the dining table.

Many of them have museum cards, explaining where those samplers came from and why they are important.

Keep ReadingShow less