Official Site of the U.S. Air Force   Right Corner Banner
Join the Air Force

News > 460th Space Wing wraps up first Cyber Lightning exercise
 
Photos
Previous ImageNext Image
Cyber lightning Exercise
During the recent cyber lightning base exercise, Buckley Air Force Base Airmen were tested on the use of land mobile radio usage. (U.S. Air Force photo/Airman First Class Marcy Glass)
Download HiRes
460th Space Wing wraps up first Cyber Lightning exercise

Posted 10/29/2010 Email story   Print story

    

10/29/2010 - BUCKLEY AIR FORCE BASE, Colo (AFNS) -- Working under a carefully planned and escalating contested cyber environment on Oct. 15, members of the 460th Space Wing here successfully completed their first exclusively cyber-focused exercise.

"Exercise Cyber Lightning" was designed to test the wing' s capability to operate in a contested cyber environment," said Kevin Stocking, the 460th SW plans and programs chief.

Eight subject matter experts from outside the wing, ranging from the 688th Information Operations Wing and the Kansas Air National Guard -- both components of 24th Air Force -- to the Network Operations and Security Center and former "cyber aggressors" from Nellis Air Force Base, Nev., helped plan and execute the exercise. They also helped the wing' s exercise and evaluation team assess the wing' s performance and identify lessons learned.

"According to the SMEs we brought in, who are responsible for executing and evaluating cyber operations across the Air Force," Mr. Stocking said, "Cyber Lightning was certainly a first-of-its-kind wing exercise in Air Force Space Command, and as far as we know, across the entire Air Force too."

"This is not just an exercise or a game," Col. Trent Pickering, the 460th Space Wing vice commander, said during a wing briefing kicking off the day's events. "It's real! It gives us a peek under the tent on how we will command and control this base, and maintain our mission operations, in an environment where an adversary is attempting to deny us some of our key communications capabilities."

The exercise was centered around network degradation, outages and hacking activities; phishing and social engineering attempts to gain access to the base network and solicit information on the wing' s Critical Information List; and intermittent land mobile radio, email "pop-ups" and chat room capabilities while responding to an active shooter scenario and anti-terrorism injects. It also entailed some "dumpster diving" by people looking for personal or unit information that wasn't shredded properly, and office-by-office searches for common access cards left unattended in computers which could grant an adversary immediate access to the wing network

"The cyber aggressors came into my office attempting to log onto our computers," said Airman 1st Class Jessica Lopez, assigned to the 460 Mission Support Group. "I noticed the limited information and the situation seemed suspicious. I had remembered the briefings we had in the past on how not to let anyone on our computers due to cyber threats so I used my cyber awareness and stopped them from getting anywhere near our computers."

Other members of the wing were recipients of social engineering phone calls from an aggressor proclaiming to be part of the wing deployment team.

"They were trying to get me to give away information about an exercise deployment activity, and other information on our wing critical information list" said one recipient. "They were pretty slick, but due to all of our recent training I figured it out and reported them to our OPSEC team."

The wing policy is that any member who violates sound network practices -- e.g., falls prey to a phishing attempt or clicks on a link in an email without a digital signature -- is automatically locked out of his or her network account for a minimum of 24 hours and must be retrained on network security procedures before having network access restored.

"Overall the exercise went very well," Mr. Stocking said. "It met the intention of what (Col. Clint Crosier, the 460th SW commander) provided us as objectives. His basic direction was that we have to ensure we can continue to command and control the wing in an environment where all of our normal communications tools and processes were denied.

"So at various points in the exercise, we took them all away, from email, to chat rooms, to base radios," Mr. Stocking said, "and forced the wing to develop and implement back-up communications and operational procedures, while under fire no less. It identified areas where we need to refine our processes and procedures, but that was exactly the point."

According to Mr. Stocking, the base will continue to execute Cyber Lightning exercises in the future, and incorporate cyber type events in all of the wing' s standard exercise programs.

"These will become more a norm than an exception," he said.

"As an operational wing, we have become so dependent on e-mail, computers and the network to execute key missions and processes, this exercise was a reminder that we can't always depend upon them in today's environment," Colonel Crosier said. "Just as we have had to plan to operate through a contested space domain over the past decade, events you can read about in the newspaper every day have demonstrated we now have to learn how to operate through a contested cyber domain as well.

"During a loss or degradation of communication capabilities," he said, "we have to continue to perform our critical missile warning mission, provide support to the national command leaders, and protect the men and women of Buckley Air Force Base, and failure isn't an option."

In an American Forces Press Service story posted on Oct.18, Deputy Defense Secretary William J. Lynn III said, "With the creation of the U.S. Cyber Command in May and last week's cyber security agreement between the departments of Defense and Homeland Security, DOD officials are ready to add cyberspace to sea, land, air and space as the latest domain of warfare.

"Information technology provides us with critical advantages in all of our war fighting domains, so we need to protect cyberspace to enable those advantages," Secretary Lynn said. "Adversaries may be able to undermine the military's advantages in conventional areas by attacking the nation's military and commercial information technology, or IT, infrastructure

A lot of the planning, management and execution for this exercise was the direct result of Capt. Sarah Ford and Mr. Mike Hanke from Wing Plans and our EET team explained Mr. Stocking. "They deserve the credit for making this exercise successful," he said. "And we're going to do a lot more of them."

(Courtesy of the 460th Space Wing Public Affairs Office)



tabComments
No comments yet.  
Add a comment

 Inside AF.mil

ima cornerSearch

tabSubscribe AF.MIL
tabMore HeadlinesRSS feed 
Missing for 46 years, air commando laid to rest

Air mobility response team readies for 'Sandy'

As Sandy closes in, Mobility Airmen stand ready

Air Force Week in Photos

U.K. F-35 fleet increases capability at Eglin AFB

Avon Park Air Force Range receives Interior Secretary award

Former Little Rock AFB commander and spouse receive 2012 O'Malley award

Reservist sets latest mark in battle for Schriever track record

CSAF shares perspective during AETC Senior Leader Conference

Thule boilers save big in first year

Life Extension Programs modernize ICBMs

SecAF visits basic military training

Through Airmen's Eyes: Airman battles breast cancer

Remains of two Airmen lost in 1969 identified, honored

tabCommentaryRSS feed 
Teal ropes to spotlight sexual assault response  37

Air Force Academy energy research will yield global benefits


Site Map      Contact Us     Questions     Security and Privacy notice     E-publishing