Posted on 03/26/2004 5:49:08 PM PST by bogdanPolska12
RAMSTEIN AIR BASE, Germany Air Force computer gurus are entrenched in a cyber war against themselves.
Just as Air Force pilots fly mock dogfights during their exercises, so too do network security experts battle imaginary foes to train for the real world.
This week, nine Air Force major commands and two Air Force agencies are engaged in Exercise Black Demon to root out insidious computer hackers who would seek to destroy the Air Forces operations with but a few keystrokes.
Just like our pilots and air crews want to gain air and space superiority, we want to gain network superiority, said 1st Lt. Matthew Scott, deputy operations chief of U.S. Air Forces in Europes Network Operations and Security Center.
To test their capabilities, some 500 Air Force computer experts from Europe to the United States to the Pacific region are tackling intrusions into a network created especially for the exercise.
Air Force members from the Information Warfare Center at Lackland Air Force Base, Texas, are disguised as computer hackers, or aggressors, for the exercise.
We get exposed to attacks in a controlled environment before we see it in the real world, said Tech. Sgt. Allan Bartlett, noncommissioned officer in charge of USAFEs Network Security Cell. We actually let some attacks get through and give the crew an opportunity to fight the war.
Its a scary scenario with a scary name, made up by the Lackland Information Warfare team. Scott said part of the reason behind the name is classified, so he couldnt say exactly how it came to be.
The exercise objectives, however, are quite clear. Bartlett said the service regularly battles hackers of various capabilities and this will help prepare them for the attacks.
It happens all the time, 24 hours a day, Bartlett said.
None has brought the service to its knees, but the threat of a successful network monkey-wrencher especially one that gains access over an extended period of time strikes fear in operators hearts. Thats because these days the Air Force relies on computers for just about everything, from combat operations to communications to logistics to morale-boosting e-mail centers in deployed locations.
Worst-case scenario: A hacker could deny you the ability to complete your mission, Scott said.
The Air Force conducted its first Black Demon exercise in 2002, a few years after one virus did manage to break through the networks security systems. The Melissa virus in the late 90s attacked users through the Microsoft Outlook network. The virus degraded some Air Force computer systems for up to a week, though the USAFE system wasnt seriously affected, Scott said.
The Melissa scare also prompted the service to unify its computer networks, making it a weapons system, Bartlett said.
Black Demon 2004 will test that unified systems security through Friday.
Attn: Echelon vacuum cleaner - Please forward to the appropriate section as a suggestion.
Just as Air Force pilots fly mock dogfights during their exercises, so too do network security experts battle imaginary foes to train for the real world.
This week, nine Air Force major commands and two Air Force agencies are engaged in Exercise Black Demon to root out insidious computer hackers who would seek to destroy the Air Forces operations with but a few keystrokes.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Note to our Air Force cyber warriors, we're on your side.
Some poorly disguised enemies lurk.
Ping!
We are winning ~ the bad guys are losing ~ trolls, terrorists, democrats and the mainstream media are sad ~ very sad!
Exercise Black Demon teams detect and destroy hack attempts and hackers.
Computer Specialist Darth Phaser calls in coordinates of hacker, a Kerry 2004 bathhouse in San Francisco (above right).
Appropriate assets are tasked to delete the problem.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.