Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security The Military United States

Ask Lt. Col. John Bircher About Cyber Warfare Concepts 236

The Air Force is not the only U.S. military branch trying to come to grips with the electronic side of warfare, both current and future. The U.S. Army Computer Network Operations (CNO)-Electronic Warfare (EW) Proponent (USACEWP), located at Fort Leavenworth, Kansas — home to the U.S. Army's Combined Arms Center — serves as the Army's hub for cyber-electronic concepts and capabilities. This is the organization responsible for developing doctrine, materiel and training to prepare the Army for cyber-electronic engagements. For example, USACEWP has developed training teams to ensure that U.S. commanders and soldiers around the world are fully informed of cyber-electronic capabilities at their disposal. Leading the Proponent's Futures branch is Lt. Col John "Chip" Bircher; Bircher entered the Army in 1989 as an Infantry officer, then served in various command and staff positions, most recently Information Operations (IO). He was the IO Chief for the 25th Infantry Division (Light), Hawaii, and Director of IO for Combined Joint Task Force -76, Bagram, Afghanistan. If you want to know more about the realities and challenges that face an armed, global IT department in a time when electronic warfare is ever more important and dangerous, now's your chance to ask Lt. Col. Bircher some questions. We'll pass on the highest-moderated questions for Lt. Col. Bircher to answer. Usual Slashdot interview rules apply.
This discussion has been archived. No new comments can be posted.

Ask Lt. Col. John Bircher About Cyber Warfare Concepts

Comments Filter:
  • Re:Technique? (Score:3, Informative)

    by dreamchaser ( 49529 ) on Thursday June 12, 2008 @01:47PM (#23767207) Homepage Journal
    Good question, but I highly doubt he'll answer any questions directly relating to methods used.
  • I have more doubts. (Score:2, Informative)

    by khasim ( 1285 ) <brandioch.conner@gmail.com> on Thursday June 12, 2008 @01:54PM (#23767327)
    I doubt that he'll answer ANYTHING with any details. This will be a recruiting and PR piece. His "answers" will be vetted by at least 3 different agencies and any content will have been removed.
  • by Starlet Monroe ( 512664 ) on Thursday June 12, 2008 @02:22PM (#23767811) Journal
    There's a "material" tag on the story pointing out an apparent typo. I can't ever seem to get tags to behave for me, so I'll post a reply instead. In military talk, "materiel" is a specific term to refer to the stuff we need to fight a battle. It has specific and distinct connotations in supply management, and it used correctly in this article's summary.
  • by 0p7imu5_P2im3 ( 973979 ) on Thursday June 12, 2008 @02:48PM (#23768251) Journal

    Yeah, I've always found it hilarious that the IA (Information Assurance) guys tout the glorious impenetrable securities of Windows, even though nothing missions critical runs on Windows.

    Ironically, the reason they are pushing Windows is not the security. It's the control. With windows you can remotely disable pretty much anything within a Domain. A person could have administrative access on their Domain attached work station and still not be able to do anything beyond what the Domain administrator allows.

    If you have root access on a Linux machine, they can't do anything short of removing your physical workstation to keep you from installing, or even compiling, your own software. And with Linux, you can manipulate network communication that, while possible, is extremely difficult in Windows.

    Most importantly though, with regard to control, is that the DoD knows most of the backdoors in Windows. Linux is watched over by millions of people. Chances are, the DoD doesn't know any more backdoors in Linux than you or I.

  • by Anonymous Coward on Thursday June 12, 2008 @02:54PM (#23768341)
    I'll stay anonymous since I'm an Army Contractor but they would never ask such a question during the interview process. What they will do however is anyone at such level has to go through an extensive background check to gain Security Clearance, asking about each and everything you've done in the past 7 years. And when I say everything, I mean everything!
  • Re:Recruitment (Score:1, Informative)

    by Anonymous Coward on Thursday June 12, 2008 @04:35PM (#23769909)
    As a member of the Military (enlisted in the USMC, and now a Coast Guard Officer) I would have to disagree somewhat with the process you suggested.

      I would definitely try for an Officer program considering that most IT/CompSci people have (or will have) a college education. The various services will pay differing amounts for your eduction costs depending on your chosen program (ROTC, etc). You will also receive a stipend for expenses as well. You then owe the Service a couple of years where you will be relatively highly paid (as an Officer) with many benefits.

    After this Service, you can continue in the Reserves... I cant think of too many part-time jobs that beat it. You get paid for 2 days every drill day you preform, medical benefits, etc. Most states also have very nice benefits for Reservists and Vets (which you will be after your 1st tour) such as a reduction of property taxes on your home. Not to mention VA bennies... ... a decision I've never regretted... even with a tour in Iraq during college.

     
  • Re:Recruitment (Score:1, Informative)

    by Anonymous Coward on Thursday June 12, 2008 @04:42PM (#23770035)
    I would have to disagree about being yelled and screamed at... A someone who completed Marine Corps boot camp, and Officers Candidate School the physiological factors of the training were as just as or more important then the physical ones.

    One of the primary purposes of military training is to instill discipline in an individual. Military discipline is the "instant obedience to orders," which is what that yelling and screaming is all about.
  • by Anonymous Coward on Thursday June 12, 2008 @07:18PM (#23771923)
    Sensitive systems usually DONT have a connection to the internet. A lot of the time due to costs, systems are bundled into one framework or domain, but this only happens under low level security. Higher classified systems tend to have one function only due to the security required around them.

    If you read the DOD standards, all systems are classified as to what level of information is on them. So a low level system, which may have non-national information on it can be connected to the internet through a secure gateway. On the other hand, TOP SECRET systems are not connected to the internet due to the rammifications should the information be comprimised.

    It is a risk based approach, and most places do it. Internet and email are only required when dealing with other agencies, media monitoring, HR systems etc.

    I have never come accross any highly classified system that is not air gapped to the internet, let alone not locked in a bank vault style room or faraday cage. The closest you will get is secure systems at a mid level security classification, linked together over a secure network. Eg through Fibre cables, high grade encryption etc.

Today is a good day for information-gathering. Read someone else's mail file.

Working...