Military History | How To Make War | Wars Around the World Rules of Use How to Behave on an Internet Forum
Information Warfare Discussion Board
   Return to Topic Page
Subject: More Cyber Warriors Created
SYSOP    9/14/2014 2:35:38 PM
 
Quote    Reply

Show Only Poster Name and Title     Newest to Oldest
avatar3    High Time!   9/15/2014 6:56:35 AM
Finally! It took long enough to get 25D rolling. Hopefully the MOS will not get bogged down with forms or equipment problems, Obamanosis (the forbidden use of any statement that implies Islam is faulty), inter service fighting, tuff building, funding, promotional deadending, and lawyering. It makes no difference as to the size of the Bde, just so it functions smoothly and efficiently. GO ARMY!!
 
Quote    Reply

shep854A1       9/15/2014 8:50:57 AM
In keeping with the Special Forces model, a 'cyber-SOCOM' can be imagined where the various services' cyber units, after they have learned to deal with their unique issues, work closely together for full-spectrum threats.
 
 
Quote    Reply

joe6pack       9/15/2014 1:33:58 PM
Minor IT rant..
 
I think much of the success (or failure) here will depend on the skill of the contractors - delivering the tools (software and hardware).  Much of the standard security these days is left to automated software and hardware detection.. while the majority "network security" are aware of types of threats.. they depend heavily on the equipment to sniff them out.
 
 Per the article... I would hope most Army networks in need of securing are part of an internetwork or "internet" (small i) - multiple connected networks..  And not THE Internet (big I), of world wide web fame...
 
Some basic starting points might be locking down USB ports.. to prevent the "super genius"cyber criminals like PFC Manning.. from simply dumping large amounts of classified data onto a portable drive and walking off with it..
 
I'd also suggest, that the biggest weakness most networks face.. are their users.. social engineering (and simple dumb !%&itude.) along with disgruntled staff with too much access.. are the "typical" sources of major breaches..  Proper training in procedures for folks that have access to these networks.. would probably go a very long way.
 
Quote    Reply

tobiathan    Personnel   9/16/2014 4:22:45 PM
It would be highly effective to require all high-clearance personnel to enter and exit through giant magnetized portals that would destroy any undocumented hardware.
 
It's almost impossible to hide magnetic-proof gear in any small way AFAIK..
 
That, and enforcing security procedures.
 
 
Quote    Reply

joe6pack    magnets   9/16/2014 5:09:41 PM
I don't believe would be effective on current solid state drives. The day of the magnetic disk is coming to an end. Maybe one of the resident engineers will correct me.
 
Quote    Reply



 Latest
 News
 
 Most
 Read
 
 Most
 Commented
 Hot
 Topics