Tag Archive for: navy

DVIDS – News – Navy CTR Leaders Review and Update Occupational Standards



PENSACOLA, Fla. – Leaders in the Cryptologic Technician (Collection) (CTR) rating from around the world gathered at Corry Station to discuss the way-ahead and future of their rating, from Nov. 1 – 5, 2021.

Every two years subject matter experts from within the Navy’s varied ratings come together to validate and build the occupational standards that are trained to in order to meet the needs of the rating throughout the fleet.

Due to COVID-19, this is the first time in four years the CTRs have been able to conduct their review and update of their standards. This year they had a wide turn-out with representatives from around the globe including, the Center for Information Warfare Training (CIWT), Naval Information Forces (NAVIFOR), Navy Personnel Command, Navy Manpower Analysis Center, Information Warfare Training Center (IWTC) Corry Station, several Navy Information Operational Commands, Naval Special Warfare Command, U.S. Third Fleet and U.S. 10th Fleet.

CTRs serve as experts in intercepting signals and gathering information, and as technology advances the CTRs must adapt and evolve in order to continue to meet the Navy’s information requirements. Master Chief Cryptologic Technician (Collection) Chris Motley, CTR Training Lead for NAVIFOR, explained that the goal of the occupational standards review and update is to capture all the tasks that the rating performs to meet the operational mission. With the tasks accurately captured, adjustments can be made to training, advancement and promotion opportunities to ensure the direction the rating is evolving reflects what the Navy calls for in its CTRs.

“Cyber is a growing work role for our rating,” said Motley. “We have billets that are assigned to cyber teams, so we want to capture the work standards we do to support the cyber mission

Cryptologic Technician (Collection) 1st Class Marshall Shortman, a cryptologic fleet operating instructor at IWTC Corry Station, said, “For my contribution to the occupational standards, I am trying to ensure that the Sailors, both currently in and on their way to the…

Source…

Navy looks to build cyber resilience beyond RMF — FCW


Defense

Navy looks to build cyber resilience beyond RMF

U.S. Navy Photo by Mass Communications Specialist 2nd Class Joshua J. Wahl

The Navy wants to fortify its cyber resilience to keep pace with rapid software development needs, but changing workforce habits has to come first.

Vice Adm. Jeffrey Trussler, the deputy chief of naval operations for information warfare and director of naval intelligence, called the risk management framework (RMF) process a “laborious” but necessary step to “get in the door” that doesn’t guarantee protection against evolving cyber threats.

“You’ve got to do this if you want to walk through the door,” Trussler said during a panel on cyber threats at Sea Air Space on Aug. 3. “Is that going to protect you? No, these are just kind of the known things you need to take care of. Very simple.”

Trussler went on to say that once vulnerabilities from software and hardware vendors are known, the challenge is implementation across ships, planes and networked systems scattered globally.

“We do all of these things, but we still don’t know. And those things get blown up when you get some intelligence that tells you, ‘Oh [an adversary is] in the system or they’re really working hard [to hack into] this system,'” he said.

That problem is complicated when mission applications are being continuously updated. Rear Adm. Susan BryerJoyner, the director of the Navy’s cybersecurity division in the Office of the Chief of Naval Operations, said that as the Navy moves to embrace DevSecOps, which aims to incorporate security throughout the software development cycle, evolving RMF as part of that shift has proved challenging.

“Modernization and cybersecurity are my top two priorities. And I say that because I’ve got to modernize my infrastructure, where I can’t modernize the infrastructure, I’ve got to figure out how I apply these new technologies because they’re important and they give me visibility that I’ve never had before,” BryerJoyner said during a NAVWAR cybersecurity breakout session Aug. 4.

“And not only do we have to…

Source…

The Navy Wants You To Hack Into Its Systems. Here’s Why


In the 1983 movie WarGames, a young Matthew Broderick plays a high school-age hacker who unwittingly breaks into a United States military supercomputer from his bedroom. Broderick’s character thinks he’s found some unreleased computer games to play, with promising titles like “Global Thermonuclear War” and “Theaterwide Biotoxic and Chemical Warfare.” In reality, he’s accessed a war-simulation program that comes close to bringing about a conflict with the Soviet Union that would result in mutually assured nuclear annihilation.

Jump forward the best part of 40 years, and users can take a turn at this for themselves (well, kind of) — and it’s thanks, in part, to a man named Zac Staples. Staples spent 22 years serving his country in the United States Navy as a surface officer with a special interest in cyberwarfare. He retired in December 2017, took exactly two days off, then started a tech company called Fathom5. The Austin, Texas-based company’s website describes its line of work as “building secure pipelines and tools for industrial technology applications while reducing cyber vulnerability.”

With the approval and funding of the U.S. Navy, Fathom5 launched a hackathon called HACKtheMACHINE, an event that seeks to give lone hackers and small startups the ability to compete for prize money and military contracts by, among other things, hacking naval infrastructure.

Hack the Machine Graphic
HACKtheMACHINE

“When you look at [the cybersecurity landscape today], you have Advanced Persistent Threats — APT — which is kind of like cyber community speak for Russian and Chinese hacking that’s state-funded,” Staples told Digital Trends. “These are potential competitors in the global landscape who are actively funding offensive cyber teams. We have to be proactively thinking about how we’re going to defend against that. We’ve seen Russia use cyber as a precursor to kinetic operations a couple of times, including the invasion of Ukraine [and] Crimea. I don’t think there’s been a future battle that doesn’t either begin with cyber or is enabled by cyber, even if it’s just as a way to conduct espionage.”

Bug bounty for the Navy

Many tech companies today have what are called…

Source…