The document discusses plans for using a miniature city infrastructure called "CyberCity" to train cyber warriors. It describes CyberCity as a 1:87 scale physical model incorporating elements like a power grid, transportation systems and buildings that can be remotely controlled for offensive and defensive cyber missions. The goal is to demonstrate the kinetic impact of cyber attacks in a hands-on way and help trainees recognize real-world consequences. Initial missions discussed include disabling enemy weapons and manipulating traffic to support first responders. The document recommends starting with simpler missions and expanding complexity over time.
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
LTC Chris Wade, USA
The Office Chief of Cyber will provide a Cyber Personnel Overview focusing on the military occupational specialties (MOS) and areas of concentration (AOC) that enable Cyber Defensive and Offensive Operations.
The Elements of Offensive Cyber Warfare OperationsMikko Jakonen
This document defines a concept of operations for cyber warfare in targeting, accessing and running operations within allocated information space. Maneuvering offensive operations in such an information space requires a framework to handle operational tasks such as target recognition, payload delivery and execution. The joint requirements such as planning and tasking with other interoperable dimensions make
things very difficult without such a framework approach. In the worst case each of the elements is being
handled in un-coordinated manner, rendering effects of potential capabilities low and simultaneously
possessing a threat for manipulating organizations.
Based on the understanding shown, offensive cyber warfare operates quite differently compared to its
kinetic counterparts. It creates its own operational theory and models not directly aligned with others.
However, the need for tactical interoperability is obvious but quite controversial. Offensive capabilities in
the larger context up to a specific mission area for other domains and disciplines. This breaks the uniform
model.
Please note that this is excerpt from larger study related to maneuvering and tactics in cyber warfare. It
focuses only on elements that can be found in offensive capabilities
Defending Your Base of Operations: How Industrial Control Systems are Being T...AFCEA International
Mike Assante
Lead for Training for ICS and SCADA
SANS Industrial Control
We are used to taking the fight to the enemy, but we are entering into an age where it is expected that the enemy will be doing the same.
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
LTC Chris Wade, USA
The Office Chief of Cyber will provide a Cyber Personnel Overview focusing on the military occupational specialties (MOS) and areas of concentration (AOC) that enable Cyber Defensive and Offensive Operations.
The Elements of Offensive Cyber Warfare OperationsMikko Jakonen
This document defines a concept of operations for cyber warfare in targeting, accessing and running operations within allocated information space. Maneuvering offensive operations in such an information space requires a framework to handle operational tasks such as target recognition, payload delivery and execution. The joint requirements such as planning and tasking with other interoperable dimensions make
things very difficult without such a framework approach. In the worst case each of the elements is being
handled in un-coordinated manner, rendering effects of potential capabilities low and simultaneously
possessing a threat for manipulating organizations.
Based on the understanding shown, offensive cyber warfare operates quite differently compared to its
kinetic counterparts. It creates its own operational theory and models not directly aligned with others.
However, the need for tactical interoperability is obvious but quite controversial. Offensive capabilities in
the larger context up to a specific mission area for other domains and disciplines. This breaks the uniform
model.
Please note that this is excerpt from larger study related to maneuvering and tactics in cyber warfare. It
focuses only on elements that can be found in offensive capabilities
Defending Your Base of Operations: How Industrial Control Systems are Being T...AFCEA International
Mike Assante
Lead for Training for ICS and SCADA
SANS Industrial Control
We are used to taking the fight to the enemy, but we are entering into an age where it is expected that the enemy will be doing the same.
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015AFCEA International
Dale Manion and Phil Sines.
The Office Chief of Signal (OCOS) provides the strategic human resources planning and career programs management for approximately 60,000 Signal Enlisted, Warrant Officer and Officer’s that are critical to mission success of the Department of Defense Information Network (DoDIN) Operations worldwide.
The Concept of Network Centric Warfare feat. IndiaSubhasis Hazra
Network Centric Warfare (NCW) is military's response to the Information Age we live in. Various countries have adopted different approaches to implement this technology-based warfare. India is not far behind but has a long way to go. Gone are the days when Conventional Wars would be fought, NCW is the new doctrine/methodology of modern warfare.
This presentation is from the point of view of India with status as on Dec 2013.
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
My talk will be about drone threats in general and how you can assess drone based threats. I will show the comprehensive threat assessment methodology and the countermeasures you can take against the drone threat. The threat assessment is based on a catalog of about 140 items. Particularly interesting will be looking at the drone threats in relation to:
Planting payload at specific locations (i.e. hacking equipment transported to target location for instance)
Tampering communication equipment with the help of drones
Insider threat communicate with an insider with the help of a drone
Hacking the communication of a drone
Privacy violations
etc.
LTC Jonathan Long, USA
Assistant TRADOC Capability Manager for Network & Services (TCM N&S)
Capability Development Integration Directorate, U.S. Army Cyber Center of Excellence
Network Centric Warfare - An IntroductionD.A. Mohan
"Network Centric Warfare" (NCW) Is a new paradigm in how warfare is conducted in the 21st century. This presentation, made at the "Bangalore Science Forum", Bengaluru, India, in August 2015 by D.A.Mohan, CEO, DAC Intl.,an expert consultant in Defence & Aerospace explains NCW, Concepts, advantages and limitations.
Each week DroneSec releases a summary of the last week's incidents and reports regarding drone security.
This edition is free for public use. To receive similar reports like these, subscripe here: https://dronesec.com/pages/dronesec-notify
To view the Threat Intelligence platform, view more information here: https://dronesec.com/pages/notify
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...DroneSec
Evangelos Mantas (Infili Intelligence)
Talk Recording: https://www.youtube.com/watch?v=W0ZNpj7QZtM
The Global Drone Security Network (GDSN) is the only event of its kind focusing on Cyber-UAV security, Drone Threat Intelligence, Counter-UAS, and UTM security. Watch the full recording here: https://www.youtube.com/watch?v=vZ6sRr65cSk
Speaker: https://www.linkedin.com/in/evangelos-mantas-0aa82619a/
DroneSec is a cyber-uav security and threat intelligence company who hosted this second series of the GDSN community event.
https://dronesec.com/
business model, business model canvas, mission model, mission model canvas, customer development, hacking for defense, H4D, lean launchpad, lean startup, stanford, startup, steve blank, pete newell, bmnt, entrepreneurship, I-Corps, autonomy, NSIN,
Enhancing SatCom Capabilities For Effective Military Communications Across Asia-Pacific
26th May to 27th May 2016, Singapore
www.milsatcomasia.com/linkedin
SMi Group are delighted to announce the 6th annual MilSatCom Asia-Pacific, which convenes in Singapore on 26th-27th May 2016. This year's conference will provide national updates on space and MilSatCom programmes and how the development of these programmes is satisfying current critical regional requirements.
Space is becoming more apart of modern and political warfare and the current climate is rapidly evolving in Asia-Pacific. Japan have recently changed their overall defence policy and space will be a key component for national security and the likes of Malaysia and India are developing their national space programmes. In this backdrop, MilSatCom Asia-Pacific will prove to be a critical conference that will allow for greater regional collaboration to both combat external threats but also enhance disaster response with effective use of regional space assets.
Benefits of Attending:
• Meet and network with the Singapore Armed Forces
• Hear the latest developments in national MilSatCom and space programmes
• Learn how the US Armed Forces are optimising space assets in disaster response and ensuring a strategic advantage
• Discuss current allied partnerships and how these can be developed to maximise common goals and initiatives
REGISTER BY 29 FEBRUARY AND SAVE $800!
REGISTER BY 31 MARCH AND SAVE $400!
For more information and to register, please visit www.milsatcomasia.com/linkedin
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015AFCEA International
Dale Manion and Phil Sines.
The Office Chief of Signal (OCOS) provides the strategic human resources planning and career programs management for approximately 60,000 Signal Enlisted, Warrant Officer and Officer’s that are critical to mission success of the Department of Defense Information Network (DoDIN) Operations worldwide.
The Concept of Network Centric Warfare feat. IndiaSubhasis Hazra
Network Centric Warfare (NCW) is military's response to the Information Age we live in. Various countries have adopted different approaches to implement this technology-based warfare. India is not far behind but has a long way to go. Gone are the days when Conventional Wars would be fought, NCW is the new doctrine/methodology of modern warfare.
This presentation is from the point of view of India with status as on Dec 2013.
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
My talk will be about drone threats in general and how you can assess drone based threats. I will show the comprehensive threat assessment methodology and the countermeasures you can take against the drone threat. The threat assessment is based on a catalog of about 140 items. Particularly interesting will be looking at the drone threats in relation to:
Planting payload at specific locations (i.e. hacking equipment transported to target location for instance)
Tampering communication equipment with the help of drones
Insider threat communicate with an insider with the help of a drone
Hacking the communication of a drone
Privacy violations
etc.
LTC Jonathan Long, USA
Assistant TRADOC Capability Manager for Network & Services (TCM N&S)
Capability Development Integration Directorate, U.S. Army Cyber Center of Excellence
Network Centric Warfare - An IntroductionD.A. Mohan
"Network Centric Warfare" (NCW) Is a new paradigm in how warfare is conducted in the 21st century. This presentation, made at the "Bangalore Science Forum", Bengaluru, India, in August 2015 by D.A.Mohan, CEO, DAC Intl.,an expert consultant in Defence & Aerospace explains NCW, Concepts, advantages and limitations.
Each week DroneSec releases a summary of the last week's incidents and reports regarding drone security.
This edition is free for public use. To receive similar reports like these, subscripe here: https://dronesec.com/pages/dronesec-notify
To view the Threat Intelligence platform, view more information here: https://dronesec.com/pages/notify
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...DroneSec
Evangelos Mantas (Infili Intelligence)
Talk Recording: https://www.youtube.com/watch?v=W0ZNpj7QZtM
The Global Drone Security Network (GDSN) is the only event of its kind focusing on Cyber-UAV security, Drone Threat Intelligence, Counter-UAS, and UTM security. Watch the full recording here: https://www.youtube.com/watch?v=vZ6sRr65cSk
Speaker: https://www.linkedin.com/in/evangelos-mantas-0aa82619a/
DroneSec is a cyber-uav security and threat intelligence company who hosted this second series of the GDSN community event.
https://dronesec.com/
business model, business model canvas, mission model, mission model canvas, customer development, hacking for defense, H4D, lean launchpad, lean startup, stanford, startup, steve blank, pete newell, bmnt, entrepreneurship, I-Corps, autonomy, NSIN,
Enhancing SatCom Capabilities For Effective Military Communications Across Asia-Pacific
26th May to 27th May 2016, Singapore
www.milsatcomasia.com/linkedin
SMi Group are delighted to announce the 6th annual MilSatCom Asia-Pacific, which convenes in Singapore on 26th-27th May 2016. This year's conference will provide national updates on space and MilSatCom programmes and how the development of these programmes is satisfying current critical regional requirements.
Space is becoming more apart of modern and political warfare and the current climate is rapidly evolving in Asia-Pacific. Japan have recently changed their overall defence policy and space will be a key component for national security and the likes of Malaysia and India are developing their national space programmes. In this backdrop, MilSatCom Asia-Pacific will prove to be a critical conference that will allow for greater regional collaboration to both combat external threats but also enhance disaster response with effective use of regional space assets.
Benefits of Attending:
• Meet and network with the Singapore Armed Forces
• Hear the latest developments in national MilSatCom and space programmes
• Learn how the US Armed Forces are optimising space assets in disaster response and ensuring a strategic advantage
• Discuss current allied partnerships and how these can be developed to maximise common goals and initiatives
REGISTER BY 29 FEBRUARY AND SAVE $800!
REGISTER BY 31 MARCH AND SAVE $400!
For more information and to register, please visit www.milsatcomasia.com/linkedin
The Art of Cyber War [From Black Hat Brazil 2014]Radware
With cyber-attacks becoming a growing concern for organizations, availability-based attacks, also known as Denial of Service or Distributed Denial of Service attacks, have long moved from a form of cyber protest to a destructive weapon that is used by cyber criminals, hacktivists and even governments.
In 2013 we saw a growing use of a new type of attack where attackers used legitimate transactions to saturate application servers’ resources. In this presentation, Security Expert Werner Thalmeier demonstrates how such an advanced attack can be created from a laptop running in an anonymous public WiFi network. He also evaluates the attack landscape and its impact on organizations as well as shares the best practices to protect against such cyber-attacks.
Understand the current availability-based threat landscape and learn about new types of cyber-attacks that are being used to saturate resources. For more information on the state of Application and Network Security, please visit: http://www.radware.com/ert-report-2013/
While traditional cybersecurity defenses focus on prevention, there are many vulnerabilities and potential attacks against weapon systems. While weapon systems are more software dependent and networked than ever before, cybersecurity has not always been prioritized with regards to weapon systems acquisition.
Threat actors have advanced in their sophistication as they are well-resourced and highly skilled, oftentimes gathering detailed knowledge of the systems they want to attack. Ensuring stronger detection methods is imperative, but because these types of threats are very targeted and advanced, agencies need the capability to proactively hunt.
InfoSecurity Europe 2014: The Art Of Cyber WarRadware
With cyber-attacks becoming a growing concern for organizations, availability-based attacks, also known as Denial of Service or Distributed Denial of Service attacks, have long moved from a form of cyber protest to a destructive weapon that is used by cyber criminals, hacktivists and even governments.
In 2013 we saw a growing use of a new type of attack where attackers used legitimate transactions to saturate application servers’ resources. In this presentation, Security Expert Werner Thalmeier demonstrates how such an advanced attack can be created from a laptop running in an anonymous public WiFi network. He also evaluates the attack landscape and its impact on organizations as well as shares the best practices to protect against such cyber-attacks.
Understand the current availability-based threat landscape and learn about new types of cyber-attacks that are being used to saturate resources. For more information on the state of Application and Network Security, please visit: http://www.radware.com/ert-report-2013/
At ITASEC17, the first italian conference on Cyber Security, Giorgio Mosca, Strategy and Technology Director of Leonardo's Security & Information Systems Division presented the company's approach to the cyber business
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA International
Results from a one day, invitation only non-attribution session to discuss DHA current information technology and related issues and brainstorm to generate a list of potential priorities
and focus areas for a new incoming CIO.
List of participating organizations:
AFCEA International
Booz Allen Hamilton
Deloitte
DLT Solutions
Hewlett Packard Enterprise
Microsoft
Mitre
Noblis
Price Waterhouse Coopers
Wells Analytics
Mike Novak
Tellabs
This session will focus on the underlying GPON (Gigabit Passive Optical Network) and All-Secure PON infrastructure, the implications to the Layer-1 design, using Armored Interlocking Fiber to deploy NIPR/SIPR data and voice requirements.
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...AFCEA International
COL James P. Ross, USA
Military Deputy to the Armaments Research, Development and Engineering Center
Project Manager Tactical Radios
COL Michael J. Thurston, USA
Project Manager Mission Command
Paul Chernek
Deputy, TRADOC Capability Manager for Tactical Radios (TCM-TR)
Capability Development Integration Directorate, U.S. Army Cyber Center of Excellence
David Brown
Director of CyberTalent
SANS Institute
Jim Michaud
Director of HR Business Development
SANS Institute
The SANS Institute, in partnership with selected veteran-friendly employers, has established VetSuccess in Cybersecurity to match skilled U.S. military veterans with today’s most compelling cybersecurity-related jobs.
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOChristina Parmionova
The 2024 World Health Statistics edition reviews more than 50 health-related indicators from the Sustainable Development Goals and WHO’s Thirteenth General Programme of Work. It also highlights the findings from the Global health estimates 2021, notably the impact of the COVID-19 pandemic on life expectancy and healthy life expectancy.
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
Donate to charity during this holiday seasonSERUDS INDIA
For people who have money and are philanthropic, there are infinite opportunities to gift a needy person or child a Merry Christmas. Even if you are living on a shoestring budget, you will be surprised at how much you can do.
Donate Us
https://serudsindia.org/how-to-donate-to-charity-during-this-holiday-season/
#charityforchildren, #donateforchildren, #donateclothesforchildren, #donatebooksforchildren, #donatetoysforchildren, #sponsorforchildren, #sponsorclothesforchildren, #sponsorbooksforchildren, #sponsortoysforchildren, #seruds, #kurnool
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
9. Increasing numbers in the Nuclear club
Rising power of the micro forces
Increasing ability, enabled by technology, for individuals
and groups to cause mass violence and mass disruption
More nations and resourced groups possess the ability to
undermine/challenge the national and economic security of
nations via difficult to attribute cyber attacks [global cyber
campaigns
The Fog of More
Increasing use of violence as the ‘diplomatic tool of
choice’
Shifting identities
Racing for resources
The power of ideas.
Apologizing super power
Continued trend towards urbanization and combat
occurring in these urban areas
11. What is going on in the world?
What is the situation in the US?
What are our adversaries planning
next?
What should we be doing in DoD?
12.
13.
14. Stood up Cyber Command
Developed Cyber Commands in all four
services
Began developing training program for cyber
warriors
Created career paths for cyber warriors
Army stood up a new Branch
15. Our debt as a percent of GDP will continue to
raise and will force many difficult decisions
We will spend less in real dollars for defense
than we have over the past decade
Our military will be forced to innovate in order
to meet the requirements
The threats will continue to be there…
Our next engagement will likely be in an urban
environment
Our next engagement will certainly involve cyber
warfare
The US does not have a significant sustainable
advantage in Cyber Warfare.
16. What is going on in the world?
What is the situation in the US?
What are our adversaries planning
next?
What should we be doing in DoD?
17. "Leveraging inferior tactical or operational
strength against [the enemy’s] vulnerabilities
to achieve disproportionate effect with the
aim of undermining [their] will in order to
achieve the asymmetric actor's strategic
objectives.”
Kenneth McKenzie, NDU
18.
19.
20.
21.
22.
23.
24.
25.
26. Most of our adversaries simply cannot hope
to compete with our military on a
conventional battelfield
Economically they do not have the horse power
Militarily they are decades behind
Their only option is Asymetric Warfare
Looking for ways neutralize the effectiveness of
the most powerful navy and air force in the
world
ASBM with stand off range against carriers
Drones
Nuclear deterrent
Offensive Cyber Capability
27. Invest in finding and training their personnel for
effective operations in cyber space
Train for multiple levels of skills
Large numbers of intermediate to advanced skilled people
Small numbers of very, very highly skilled people
Resource your teams with the best tools and training
available – keep them in the battle
Aggressive network mapping; understanding the
battlespace
Planting embeds in critical systems, even down to the
firmware level
Organize as teams focused on different aspects of the US’s
critical infrastructure
Repeatability
Stealth
28. What is going on in the world?
What is the situation in the US?
What are our adversaries planning
next?
What should we be doing in DoD?
29. Ensure the integrity and
security of the US by
detecting, deterring,
preventing, or, if necessary,
defeating threats and
aggression against the United
States as early and as far
from its borders as possible
so as to minimize their
effects on U.S. society and
interest.
Quadrenial Roles and Missions
Review
30. Typically we prepare to fight the ‘last war’
It is what we know and what we are
comfortable with
Military tactics and strategy always lag
technological advancements
Our leaders cannot fully understand the
fundamental changes that the internet is
having on the future of warfare
We MUST adjust tactics and strategy quickly or
their will be a significant readjustment of
global powers that will not benefit the United
States
31.
32.
33.
34.
35.
36.
37.
38.
39. Iran's capture of the $6 million
Lockheed-made RQ-170 Sentinel spy drone,
reportedly monitoring Iran's nuclear program,
is a significant loss for the US.
Strategically, the US will suffer from the loss ...
it has radar, a fuselage, and coating that makes
it low-observable, the electronics inside are very high-tech. (Dec.
2011)
Iran claims that their engineers have reverse engineered the secrets of
the American stealth spy drone RQ-170 Sentinel. To prove it, they have
made public some of the encrypted information stored in the plane.
(April, 2012)
Iran making overtures to China on access to US drone technology.
(April 2012)
40. Getting the ‘right people’ in the training
Establishing solid training programs for:
Enlisted, warrant officers and officers
Standing up a new Branch
170
17C
17A
Collective Training
Need to conduct more thorough team based training
Individuals need to get advanced training in their
specialty
Integrate Cyber Training into warfare training
Currency training
42. Over the past 5 years, SANS has built, operated, and
refined the NetWars system to help develop hands-on skills
Our goals:
To evaluate current skills: “How good am I?” & “How broad is my
skill set?”
To reinforce existing skills: Practice, practice, practice
To develop new skills: A very hands-on learning tool
To work as a together in teams and as a community
To appeal to a broad range of participant skill sets (from intro up
to very advanced)
We’ve learned a lot in building and operating the NetWars
cyber range
43. Levels:
0) Q&A with tutorials – Do you know
the foundations?
1) Played on CD image (Lin or Win), no
superuser privs granted
2) Played on CD image (Lin or Win)
with superuser
3) Played across the Internet, attacking
DMZ
4) Played across the Internet, attacking
internal network from DMZ
5) Played across the Internet, attacking
other player’s castles
and defending your own
Scorecard for
each player
Score
Server
Enter captured
flags to advance
Gateway
Servers
DMZ
Target
DMZ
Target
DMZ
Target
Firewall
intran
et
Castle
1
Castle
2
Castle
N…
44. Customer requests: How can you train people to understand
the kinetic impact of cyber action in a safe & effective manner?
Our answer: NetWars CyberCity
Provides a hands-on cyber range to conduct defensive and offensive
training
Visibly demonstrates to participants and senior leaders the impact of
cyber missions
Supports our country and allies in helping to defend our critical
infrastructure
Teaches cyber warriors to recognize the kinetic impact of cyber missions
45.
46. Physical and cyber assets simulating a real city
Transit including airport, rail, roads, traffic lights
Utility services including electrical and water
Community services including hospital, bank, ISP, and social networking site
Residential and business services
CyberCity Population: 20,000 people (bank accounts, hospital records, social
networking site accounts, etc.)
Implemented at 1:87 scale
Controlled using SCADA and related
components for the greatest
possible realism for missions
Built with model train assets
(buildings, track, etc.) for realistic
look at miniature scale
Designed for remote access
47.
48.
49. CyberCity includes over 18 missions (defense and offense):
Reconnaissance mission for remote visibility of city assets
Disable enemy rocket launcher (to prevent hospital strike)
Stop weapon egress by controlling rail system
Support hostage rescue team by manipulating traffic systems
Recover control of a terrorist-compromised electric utility
Participants will remotely see:
Compromised cameras and CyberCity operation
Launch and directional aiming of rocket launcher
Moving train and drawbridge; derailment
Traffic light system manipulation
City "lights-out" demonstration by attackers
Demonstrating the kinetic effect of cyber attack through practical,
hands-on mission examples… building real-world warrior skills.
50. Currently focused on distribution, not generation (yet)
Each quadrant of CyberCity will have its own PLC
Allen-Bradley, GE, and Siemens
Controlling residential and industrial lighting, street lighting,
and railway switch junctions
Wonderware HMI running on Win7 and WinXP for
management
Protocols: Modbus/TCP, DNP3, Profinet, Ethernet/IP
Wireless carried across highly attenuated wires and/or
small-scale Faraday cage, for both the power grid and
Wifi at the coffee shop
51. CyberCity HOMELAND: Titles 10, 18, & 32
Missions aligned with US infrastructure for
infrastructure operators, law enforcement, National
Guard, & US military bases
CyberCity BLUE: Titles 10 & Title 50
Missions include response actions or other activities
aligned with DoD or IC operations in a friendly country
that has authorized US actions for defense or in
support of military objectives
CyberCity RED: Titles 10 & Title 50
Missions focused on military or intelligence operations
against a foreign adversary and its supporting
infrastructure
52. Over the past 12 months, we’ve been invited
to visit Camp Atterbury many, many times
We heard that it was an impressive MOUT Site,
but…frankly, we had some serious concerns
We knew it would be possible to leverage the
lessons learned building SANS CyberCity, but…
We doubted whether this was the best use of
our scarce resources
We were not sure this was in strategic
alignment with our training mission
53.
54.
55. DELETE THIS BOX OR ENTER
SUBTITLE HERE.
Provide additional information or
explanation here. Provide additional
information or explanation here.
Provide additional information or
explanation here. Provide additional
information or explanation here.
Provide additional information or
explanation here.
Delete text and place
photo here.
Sewage
Treatment
Prison Complex
Steam Plant
Water treatment
Embassy
Telephone Company (ISP)
56. • Coal-fired facility
•Industrial Control Systems
•Wide Range of Vendors
•Electrical grid infrastructure
Underground Tunnel Network
Coal-Fired Steam Plant
Complex Sensor and Control Arrays
Convergence of Cyber and Physical Domains
Human Machine Interface (HMI)
Facility Owned Grid Infrastructure
57. Prison/Jail
•Highly complex secure target
•Simulated Human Terrain
Building Management Control &
Security Systems
Tunnel Network Complete Jail Environment Integrated Security
59. Array of PLC devicesIn-line Flow Meters
Collocated GEN I, II, III Systems
HMI Interface
Water Treatment
60. Secure Fiber Backbone
Array of modern and
legacy telecom systems
Facility wide 2G/3G/4G
Cellular Capability
Telephone Co (ISP)
Complex layers of security
61. Develop and Monitor Training in real time
Highly experienced ROC staff
enhance all training activities Centralized Audio Simulation
Center
Customize and
Record AAR analysis
Citywide Audio System
Range Operations Center
62. Cyber City Traffic System
imulated software applications
Basic control with digital IO
Illustrative
Actual
Water Treatment
PLCs & HMI Application
Basic Control & Monitoring
Power Generation
DCS
Refinery
SCADA/EMS
Chemical
63. Ft Sam Houston
Ft Stewart/HAAF
Ft Campbell
Ft Bragg
Ft Polk
Ft Hood
Ft Lewis/YTA
JRTC
JCW
Ft Carson
Ft Irwin
NTC
Ft Bliss
Ft Riley
Ft Leavenworth
MCTP
ROK
Ft Shafter & Schofield Barracks
JMRC
Mission Scenario
Ft Sill
JKCP
UJTP
Camp Atterbury
PEOSTRI
Ft Drum
Nellis AFB
China Lake
63
64. Ft Sam Houston
Ft Stewart/HAAF
Ft Campbell
Ft Bragg
Ft Polk
Ft Hood
Ft Lewis/YTA
JRTC
JCW
Ft Carson
Ft Irwin
NTC
Ft Bliss
Ft Riley
Ft Leavenworth
MCTP
ROK
Ft Shafter & Schofield Barracks
JMRC
Mission Scenario
Ft Sill
JKCP
UJTP
Camp Atterbury
PEOSTRI
Ft Drum
Nellis AFB
China Lake
PHASE 1
1st Brigade
deploys to
Fort Polk
64
65. Ft Sam Houston
Ft Stewart/HAAF
Ft Campbell
Ft Bragg
Ft Polk
Ft Hood
Ft Lewis/YTA
JRTC
JCW
Ft Carson
Ft Irwin
NTC
Ft Bliss
Ft Riley
Ft Leavenworth
MCTP
ROK
Ft Shafter & Schofield Barracks
JMRC
Mission Scenario
Ft Sill
JKCP
UJTP
Camp Atterbury
PEOSTRI
Ft Drum
Nellis AFB
China Lake
PHASE 2
A Co
1/327th conducts
secondary mission
& deploys to FOB
Cobra
65
66. Ft Sam Houston
Ft Stewart/HAAF
Ft Campbell
Ft Bragg
Ft Polk
Ft Hood
Ft Lewis/YTA
JRTC
JCW
Ft Carson
Ft Irwin
NTC
Ft Bliss
Ft Riley
Ft Leavenworth
MCTP
ROK
Ft Shafter & Schofield Barracks
JMRC
Mission Scenario
Ft Sill
JKCP
UJTP
Camp Atterbury
PEOSTRI
Ft Drum
Nellis AFB
China Lake
PHASE 3
A Co
1/327th deploys
back to Fort Polk
and rejoins
main effort
66
67. Six groups of four teams, with ~10 people/team = 240
8 hours each team in CyberCity, Monday through Friday
Capstone: 4 teams with highest score, Saturday
Goals:
To learn technical skills in an applied way: Blue analysis and
eradication of adversaries in CyberCity’s infrastructure
To work as a team, operating together and spreading knowledge
Special thank you for support,
planning, and operations:
MAJ Mike Lass
Gary Deckard
Rob VanDevand
68. Hands-on skill levels vary widely among
individuals
Hands-on skill levels vary widely among teams
In CyberCity missions, team leadership is crucial
Teams with strong leaders did well
Walked around, sought input and consensus from team members, and were
decisive when required
Teams with two or three strong technical people and no
leadership did not do well
Teams with a strong technical person as the lead did not
do as well
Team coordination improved after we pushed for
identification of a team leader and briefed
leaders before start of the course
69.
70. Select missions that can be built at the ‘crawl’
level of difficulty
Select missions that easily tie Cyber and Kinetic
missions together
Design missions so that they can be completed
by a trained team in 1 day
Design missions so that they can be expanded
and made more complicated later
Leave complicated and risky missions for later
phases
71. DELETE THIS BOX OR ENTER
SUBTITLE HERE.
Provide additional information or
explanation here. Provide additional
information or explanation here.
Provide additional information or
explanation here. Provide additional
information or explanation here.
Provide additional information or
explanation here.
Delete text and place
photo here.
Sewage
Treatment
Prison Complex
Steam Plant
Water treatment
Embassy
Telephone Company (ISP)
72. Secure Fiber Backbone
Array of modern and
legacy telecom systems
Facility wide 2G/3G/4G
Cellular Capability
Mission 1a –Telephone Co
Complex layers of security
73. Mission 1b - Prison/Jail
•Highly complex secure target
•Simulated Human Terrain
Building Management Control &
Security Systems
Tunnel Network Complete Jail Environment Integrated Security
74. Array of PLC devicesIn-line Flow Meters
Collocated GEN I, II, III Systems
HMI Interface
Mission 2 -Water Treatment
75.
76.
77. Reconnaissance
Network packet
capture
Cameras
Telephone intercept
Prison / Jail
Water Treatment
Subway
Sewage Treatment
Steam
Power distribution
Hospital
School
Bank
• Air Field
• UAV
• Oil Refinery
• Distribution Center
• HVAC
• Smart House
• Water Tower
• Embassy
• Radio Tower
• Train
• Bus
78. Future wars will likely involve mega-cities
Future conflicts will certainly involve Cyber
Warfare
Commanders at the brigade and division level
will demand cyber capabilities
These capabilites must be integrated into
existing training centers in a realistic way
Remember… We are breaking new ground
We’ll make mistakes, but we are all going to
learn a lot