The Travelin' Librarian Uncategorized ICIW2008: Developing Cyber Warriors

ICIW2008: Developing Cyber Warriors

Jeff Boleng, US Sir Force Academy, Colorado Springs, CO

  • Cyberspace added to USAF mission in 2005
  • cyberspace is a warfighting domain
  • cyberspace covers all the other domains (air, land, sea, space)
  • different domains, different fucntions
  • recent threats & motivations
    • Hezbollah SIGINT attack on Israeli tanks
    • DNS Root Server attack 2007
    • Estonia 2007
    • pakistan youtube redirect 2008
    • IED jammers
    • F-22 flight over international dateline (avionics went black)
  • Broad requirements
    • USAFA graduates 1/4 of all new 2nd lieutenants
    • not “geek” focused
    • technical w/ a large dose of
      • ethics
      • legal studies
      • behavioral studies
      • military strategic studies
  • contrasting questions
    • how can we exploit adversary’s e-systems
    • what is the legal authority
    • what are the national security implications
    • is cyber attack an act of war
  • prep of graduates
    • well documented outcomes
  • currently underway
    • core curriculum
    • baseline content
    • new upper-level courses
    • ensure coverage of AF education and training requirements
  • training to reinforce education
    • “unlike a traditional college we own our students”
    • basic cadet training scenarios
    • global engagement integration
    • summer space program
    • summer UAV program
    • DHS sponsored Black Dart
  • CS – Cyber Warfare Track
    • 37 grads since 2004, 8 in 2008
    • offered to all CS majors
    • NSA & DHS recognized standards
    • 3 courses taken as major options
      • cryptography
      • Cs security & IW
      • network security
    • details on the three courses given
  • Research
    • Academy Center for Cyberspace Research
    • current projects
      • jam resistant communications
      • biometrics
      • security education
  • Community involvement
    • other front range colleges
    • cyber defense exercise
    • computer and network vulnerability assessment
Tags:

Leave a Reply

Your email address will not be published. Required fields are marked *

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.