Cyber Warriors - U.S. Army - 3-22-17

Scribe Notes:

Cyber Warriors Scribe Notes – Nick Krotine

Summary before talk
- Co.l Aslakson cyber school
- Lt. Mapp cyber ops – west point grad in mission force for a year
- Col. Matt Johnson ROTC
- ^ speakers Army US Army cyber space operations and cyber sec. in fed. Gov.
- Ft Gordon Georgia
- Cyber security’s role in fed gov
- Electronic warfare – counter drone ops – hacking vehicles/devices – jamming/protection from – lasers owned by Army
- Cyber space ops primary talking points
Main Talk
- What is Cyber in general?
- 3 Broad categories: 1. Domain (3 aspects – physical - hardware, logical, Persona – your presence on the internet) 2. Mission – scan for threats 3. Force – those who execute the mission throughout the federal government (people who configure firewalls and protection services – also threat focused and defense individuals)
- NSA function – ½ does foreign signals and intel. – through the internet. Other 1/2 develops standards by which we [civilians and government officials] operate securely over the internet (encryption and what not).
- Dep. Homeland Sec. – protects our own infrastructure
- D.O.D. (Dep. Of Defense) – hunt bad guys down through the internet
- NSA doesn’t have authority on collecting data from people unless given
- Defend constitution from foreign AND domestic enemies – oath Military takes
- Government networks heavily monitored – no private business on those systems
- Gov. collecting information question – they will collect some info, but any government site is heavily monitored so it will happen
- NSA monitoring citizens question – can’t collect data unless authorized
- NSA copying data from links question – heavy data collection (splitters) – NSA would provide difference between accessing and using data vs collecting (counter terrorism) – NSA needs to gather that data to effectively counter threats like ISIS. To then look for something specific, a warrant is then required.
- Collection of data give rise to threats questions? Yes, it can
- They need people with noble intentions to maintain integrity to keep a good connection (no pun intended) with the people
- Not just military able to take advantage of collection but also private companies question. Back to noble intent

- Lt MAPP section of the discussion
- US Africomm (or Africom not sure) – HQ in Germany and around the world
- Very careful about collecting
- CNDSPs – computer network defense service providers – make sure as many threats as possible don’t get through
- Software – Linux based distribution (Cally?) – powershell – C – python BOTH HUGE – BASH
- To join and help – Dep of the Army of Civilians – Contractors that work for threat intel agencies – close work with private industry (federally funded research and development corps – work with universities (Georgia tech etc.)) – many ways to work in mission space without becoming an officer in the US Army
- How big are civilian/contractor sectors question. Example – 3 civilians out of 24 person team for Mapp. Many certifications for civilians to get. Within DOD across military nationally – 6-7k work in this space (defense/offense). DOD active military 500k.
- NSA director – cyber is ultimate team sport – diff. types of tech and ways of thinking – no one entity has all of these things including authority – don’t have all the resources also (BIG task to handle) – Operation Inherent Resolve – ISIS takedown ops in Iraq
- Normal people can’t make arrangements with other countries to access their networks to detect threats (no authority to operate in a foreign country)
- Palmer question regarding mission – contrast between defending Americans and going into other networks to take actions
- What did Mapp learn at west point in cyber security? – combo of security methods and coding (python/C) – also specific classes on authorities they have to operate outside of US networks
- Need to find a balance between cyber offensive and defensive capabilities. No operation on civ. Networks, but number one priority is defense of DOD info networks to continue operations.
- Offensive capabilities are sparingly used to prevent anyone from being able to secure themselves against it after first use (which gives away the software created)
- DCO work – day to day cyber security work
- OCO work – not as often and more spread out

Lt. Col. Johnson – ROTC Dep at JCU

^ more information regarding U.S. Army Cyber School ^