Official Site of the U.S. Air Force   Right Corner Banner
Join the Air Force

News > 460th Space Wing wraps up first Cyber Lightning exercise
 
Photos
Previous ImageNext Image
Cyber lightning Exercise
During the recent cyber lightning base exercise, Buckley Air Force Base Airmen were tested on the use of land mobile radio usage. (U.S. Air Force photo/Airman First Class Marcy Glass)
Download HiRes
460th Space Wing wraps up first Cyber Lightning exercise

Posted 10/29/2010 Email story   Print story

    

10/29/2010 - BUCKLEY AIR FORCE BASE, Colo (AFNS) -- Working under a carefully planned and escalating contested cyber environment on Oct. 15, members of the 460th Space Wing here successfully completed their first exclusively cyber-focused exercise.

"Exercise Cyber Lightning" was designed to test the wing' s capability to operate in a contested cyber environment," said Kevin Stocking, the 460th SW plans and programs chief.

Eight subject matter experts from outside the wing, ranging from the 688th Information Operations Wing and the Kansas Air National Guard -- both components of 24th Air Force -- to the Network Operations and Security Center and former "cyber aggressors" from Nellis Air Force Base, Nev., helped plan and execute the exercise. They also helped the wing' s exercise and evaluation team assess the wing' s performance and identify lessons learned.

"According to the SMEs we brought in, who are responsible for executing and evaluating cyber operations across the Air Force," Mr. Stocking said, "Cyber Lightning was certainly a first-of-its-kind wing exercise in Air Force Space Command, and as far as we know, across the entire Air Force too."

"This is not just an exercise or a game," Col. Trent Pickering, the 460th Space Wing vice commander, said during a wing briefing kicking off the day's events. "It's real! It gives us a peek under the tent on how we will command and control this base, and maintain our mission operations, in an environment where an adversary is attempting to deny us some of our key communications capabilities."

The exercise was centered around network degradation, outages and hacking activities; phishing and social engineering attempts to gain access to the base network and solicit information on the wing' s Critical Information List; and intermittent land mobile radio, email "pop-ups" and chat room capabilities while responding to an active shooter scenario and anti-terrorism injects. It also entailed some "dumpster diving" by people looking for personal or unit information that wasn't shredded properly, and office-by-office searches for common access cards left unattended in computers which could grant an adversary immediate access to the wing network

"The cyber aggressors came into my office attempting to log onto our computers," said Airman 1st Class Jessica Lopez, assigned to the 460 Mission Support Group. "I noticed the limited information and the situation seemed suspicious. I had remembered the briefings we had in the past on how not to let anyone on our computers due to cyber threats so I used my cyber awareness and stopped them from getting anywhere near our computers."

Other members of the wing were recipients of social engineering phone calls from an aggressor proclaiming to be part of the wing deployment team.

"They were trying to get me to give away information about an exercise deployment activity, and other information on our wing critical information list" said one recipient. "They were pretty slick, but due to all of our recent training I figured it out and reported them to our OPSEC team."

The wing policy is that any member who violates sound network practices -- e.g., falls prey to a phishing attempt or clicks on a link in an email without a digital signature -- is automatically locked out of his or her network account for a minimum of 24 hours and must be retrained on network security procedures before having network access restored.

"Overall the exercise went very well," Mr. Stocking said. "It met the intention of what (Col. Clint Crosier, the 460th SW commander) provided us as objectives. His basic direction was that we have to ensure we can continue to command and control the wing in an environment where all of our normal communications tools and processes were denied.

"So at various points in the exercise, we took them all away, from email, to chat rooms, to base radios," Mr. Stocking said, "and forced the wing to develop and implement back-up communications and operational procedures, while under fire no less. It identified areas where we need to refine our processes and procedures, but that was exactly the point."

According to Mr. Stocking, the base will continue to execute Cyber Lightning exercises in the future, and incorporate cyber type events in all of the wing' s standard exercise programs.

"These will become more a norm than an exception," he said.

"As an operational wing, we have become so dependent on e-mail, computers and the network to execute key missions and processes, this exercise was a reminder that we can't always depend upon them in today's environment," Colonel Crosier said. "Just as we have had to plan to operate through a contested space domain over the past decade, events you can read about in the newspaper every day have demonstrated we now have to learn how to operate through a contested cyber domain as well.

"During a loss or degradation of communication capabilities," he said, "we have to continue to perform our critical missile warning mission, provide support to the national command leaders, and protect the men and women of Buckley Air Force Base, and failure isn't an option."

In an American Forces Press Service story posted on Oct.18, Deputy Defense Secretary William J. Lynn III said, "With the creation of the U.S. Cyber Command in May and last week's cyber security agreement between the departments of Defense and Homeland Security, DOD officials are ready to add cyberspace to sea, land, air and space as the latest domain of warfare.

"Information technology provides us with critical advantages in all of our war fighting domains, so we need to protect cyberspace to enable those advantages," Secretary Lynn said. "Adversaries may be able to undermine the military's advantages in conventional areas by attacking the nation's military and commercial information technology, or IT, infrastructure

A lot of the planning, management and execution for this exercise was the direct result of Capt. Sarah Ford and Mr. Mike Hanke from Wing Plans and our EET team explained Mr. Stocking. "They deserve the credit for making this exercise successful," he said. "And we're going to do a lot more of them."

(Courtesy of the 460th Space Wing Public Affairs Office)



tabComments
No comments yet.  
Add a comment

 Inside AF.mil

ima cornerSearch

tabSubscribe AF.MIL
tabMore HeadlinesRSS feed 
KC-46 enters critical design review phase

Slideshow: Fifth-generation formation  1

Air Force Week in Photos

Chaplains provide support and comfort for families

IDS agencies team up to teach life skills to new Airmen

ANG director discusses way forward

Carter: Sequestration would have effect of 'hidden tax'

CMSAF: 'Be the best, know your Airmen, tell your story'  1

Carter urges stepped up progress on cyber defense

Partnerships develop Air Force youth  1

Air Force leaders offer perspectives at four-star forum

Dempsey: Insider attacks won't affect NATO's Afghan strategy  1

'Teammates wanted' to deliver future

Personnel chief: Road ahead for Airmen tough, but bright  3

tabCommentaryRSS feed 
Sept. 17: A day for Constitutional conversation  2

Losing Your Future to Sexual Assault   24


Site Map      Contact Us     Questions     Security and Privacy notice     E-publishing