Ask Lt. Col. John Bircher About Cyber Warfare Concepts 236
The Air Force is not the only U.S. military branch trying to come to grips with the electronic side of warfare, both current and future. The U.S. Army Computer Network Operations (CNO)-Electronic Warfare (EW) Proponent (USACEWP), located at Fort Leavenworth, Kansas — home to the U.S. Army's Combined Arms Center — serves as the Army's hub for cyber-electronic concepts and capabilities. This is the organization responsible for developing doctrine, materiel and training to prepare the Army for cyber-electronic engagements. For example, USACEWP has developed training teams to ensure that U.S. commanders and soldiers around the world are fully informed of cyber-electronic capabilities at their disposal. Leading the Proponent's Futures branch is Lt. Col John "Chip" Bircher; Bircher entered the Army in 1989 as an Infantry officer, then served in various command and staff positions, most recently Information Operations (IO). He was the IO Chief for the 25th Infantry Division (Light), Hawaii, and Director of IO for Combined Joint Task Force -76, Bagram, Afghanistan. If you want to know more about the realities and challenges that face an armed, global IT department in a time when electronic warfare is ever more important and dangerous, now's your chance to ask Lt. Col. Bircher some questions. We'll pass on the highest-moderated questions for Lt. Col. Bircher to answer. Usual Slashdot interview rules apply.
Re:Technique? (Score:3, Informative)
I have more doubts. (Score:2, Informative)
Materiel isn't a typo in the summary (Score:3, Informative)
Re:Why does the Army have a love affair with Windo (Score:2, Informative)
Yeah, I've always found it hilarious that the IA (Information Assurance) guys tout the glorious impenetrable securities of Windows, even though nothing missions critical runs on Windows.
Ironically, the reason they are pushing Windows is not the security. It's the control. With windows you can remotely disable pretty much anything within a Domain. A person could have administrative access on their Domain attached work station and still not be able to do anything beyond what the Domain administrator allows.
If you have root access on a Linux machine, they can't do anything short of removing your physical workstation to keep you from installing, or even compiling, your own software. And with Linux, you can manipulate network communication that, while possible, is extremely difficult in Windows.
Most importantly though, with regard to control, is that the DoD knows most of the backdoors in Windows. Linux is watched over by millions of people. Chances are, the DoD doesn't know any more backdoors in Linux than you or I.
Re:Interview Question (Score:1, Informative)
Re:Recruitment (Score:1, Informative)
I would definitely try for an Officer program considering that most IT/CompSci people have (or will have) a college education. The various services will pay differing amounts for your eduction costs depending on your chosen program (ROTC, etc). You will also receive a stipend for expenses as well. You then owe the Service a couple of years where you will be relatively highly paid (as an Officer) with many benefits.
After this Service, you can continue in the Reserves... I cant think of too many part-time jobs that beat it. You get paid for 2 days every drill day you preform, medical benefits, etc. Most states also have very nice benefits for Reservists and Vets (which you will be after your 1st tour) such as a reduction of property taxes on your home. Not to mention VA bennies...
Re:Recruitment (Score:1, Informative)
One of the primary purposes of military training is to instill discipline in an individual. Military discipline is the "instant obedience to orders," which is what that yelling and screaming is all about.
Re:Why so many directly connected networks at all? (Score:1, Informative)
If you read the DOD standards, all systems are classified as to what level of information is on them. So a low level system, which may have non-national information on it can be connected to the internet through a secure gateway. On the other hand, TOP SECRET systems are not connected to the internet due to the rammifications should the information be comprimised.
It is a risk based approach, and most places do it. Internet and email are only required when dealing with other agencies, media monitoring, HR systems etc.
I have never come accross any highly classified system that is not air gapped to the internet, let alone not locked in a bank vault style room or faraday cage. The closest you will get is secure systems at a mid level security classification, linked together over a secure network. Eg through Fibre cables, high grade encryption etc.