23 avril 2018 | International, C4ISR, Sécurité

States Turn To National Guard To Help Protect Future Elections From Hackers

In elections past, the integrity of the vote was protected by poll workers and election officials. But in 2018 and likely beyond, elections are being protected by people like the anonymous man who works in the basement of the West Virginia Capitol.

He's member of the West Virginia National Guard who is a cybersecurity specialist responsible for monitoring any computer-related threats to the state's elections. Since August of last year, he's been attached full time to the office of Secretary of State Mac Warner.

After Russian-backed hackers probed election-related systems in at least 21 states in 2016, election officials, whose focus has traditionally been on making sure that polling places run smoothly and that results are speedily reported, now have to focus on protecting their computer systems.

Oftentimes lacking those resources in-house, National Guard specialists have been called in to monitor vital election systems in a handful of additional states, including Colorado, Ohio and South Carolina.

Neither the West Virginia National Guard nor Warner's office would permit the soldier to speak on the record, but Warner emphasized how crucial the role is.

"We, just like every other government entity and people in business, are getting pinged all the time. Somebody is checking to see are there any open doors [or] open windows for targets of opportunity," Warner said.

Warner's current use of the National Guard builds upon his predecessor, Natalie Tennant, who enlisted their cybersecurity expertise to scan the state's election systems for vulnerabilities and patch them in the final stretch of the 2016 election.

In January 2017, the outgoing Obama administration designated elections as part of the country's critical infrastructure. That meant new federal resources and scrutiny.

The Department of Homeland Security is working to give security clearances to state officials so they can receive intelligence briefings and assessments. Warner, like other state-level election officials, is in the middle of a months-long process of getting cleared.

Using Guard soldiers who already have a high-level clearance, "is a way to bridge the gap without causing a problem in that security system process," said West Virginia National Guard Adjutant General James Hoyer.

State officials are trying to figure out how to prepare for a threat they had never before anticipated, said Eric Rosenbach, a former Defense Department official who now directs a program on election security at Harvard's Belfer Center for Science and International Affairs.

"These state election officials are the pointy tip of the spear for nation-state actors like the Russians trying to attack our democracy. That's never before been their job," said Rosenbach. "If part of [the National Guard's] responsibilities is to protect the things most precious to a state — it kind of makes sense that you would want them to support an effort like that."

While the regular military can't be involved in domestic law enforcement due to a post-Civil War federal law known as Posse comitatus, National Guard soldiers are under the jurisdiction of the governor unless they're activated by the federal government.

"The threat is new and we need to evolve with the times — as long as it still fits in the right legal framework and we're doing something that, you know, all Americans would agree are part of our democratic traditions," Rosenbach said.

Moving forward, Warner sees his office's partnership with the National Guard continuing.

"The cybersecurity arena is one of those where we as public officials have to get it right every time. The hackers only have to penetrate one time to do substantial damage," Warner said. "So, it's a foot race that we have to stay one step ahead and it never ends. It just goes on and on."

So far, the National Guard has monitored a few small local elections in West Virginia and Warner's office says they have yet to receive a threat that has risen to a level of what they called "actionable."

With the state's primary election slated for May 8, the Guard's first big election cybersecurity test is already underway.

https://www.npr.org/2018/04/11/601201517/states-turn-to-national-guard-to-help-protect-future-elections-from-hackers

Sur le même sujet

  • Did F-35 Testing for Extreme Weather Conditions Fall Short?

    21 juin 2019 | International, Aérospatial

    Did F-35 Testing for Extreme Weather Conditions Fall Short?

    By Oriana Pawlyk SALON DU BOURGET, PARIS -- More than 400 F-35 Joint Strike Fighters are operating from 17 bases worldwide. From the near-Arctic region of Ørland, Norway, to a recent deployment in the Middle East, the fifth-generation jet is expanding its reach. But a recent news report shows that weather conditions have some effect on the Pentagon's stealthy fifth-gen fighter, raising concerns about its performance in extreme climate locations. In a recent Defense News report series, the outlet obtained documents showing that cold weather triggered a battery sensor in an F-35 Lightning II in Alaska. While the battery was not affected, the weather "overwhelm[ed] the battery heater blanket" that protects it, prompting the sensor to issue a warning and causing the pilot to abort his mission and land immediately, Defense News said. "We have already developed an update to the software and the battery's heater control system to resolve this issue, and this updated software is available for users today to load on their aircraft in the event they will be conducting extreme cold weather operations," Greg Ulmer, vice president of Lockheed's F-35 aircraft production business, said in an interview with Military.com at the Paris Air Show, adding the update will be in new planes by 2021. The U.S. military anticipated taking the Lockheed Martin-made F-35 around the world, with partners and allies flying the plane in both hot and cold regions, including some that are changing. "The [F-22 Raptor] and plenty of other aircraft have flown out [to Alaska] just fine for decades," Rebecca Grant of IRIS Independent Research told Defense News. Grant is a former director of the Mitchell Institute for Airpower Studies at the Air Force Association. "The F-35 should have had all that sorted out in the climatic lab." Ulmer, however, said all necessary steps were taken in lab testing, and the issue identified was a normal part of the design and development process. "You do the best you can relative to the engineering, understanding of the environment, to design the part. And then you actually perform, and [you realize] your model was off a little bit, so you have to tweak the design ... to account for it," Ulmer said. An F-35A from Hill Air Force Base, Utah, was on static display here during the show. "We're confident in the F-35s performance in all weather conditions," he said. The battery issue was first discovered during extreme cold weather testing at -30 degrees and below at Eielson Air Force Base, Alaska, in February 2018, he added. Ulmer explained there are various tests points done before the plane heads to the McKinley Lab at Eglin Air Force Base, Florida, for robust experiments. The lab is responsible for high-range weather testing of military and commercial aircraft, munitions and weapons. The lab's refrigeration chamber can go as low as -70 degrees, lab chief Dwayne Bell told Military.com during a visit to the facility in 2017. He said at the time that the F-35 program had been one of the most expensive programs tested in the lab to date. There's a wide range of testing costs, but they average roughly $25,000 a day, he said. It cost about $7 million to test the Marine Corps' B-model from the Patuxent River Integrated Test Force, Maryland, over a six-month period, Bell said. The Lightning II was put through major weather testing -- the lab can do everything but lightning strikes and tornadoes -- such as wind, solar radiation, fog, humidity, rain intrusion/ingestion, freezing rain, icing cloud, icing build-up, vortex icing and snow. It handled temperatures ranging from 120 degrees Fahrenheit to -40 degrees, officials said in 2017. But even testing at McKinley is limiting, Ulmer said. "What doesn't happen is that they don't stay there a long time, so once we released [Block] 3F [software] capability, now the operational fleet can actually" test new extremes, he said, referring to both speed and temperature changes. Defense News also found that supersonic speeds caused "bubbling and blistering" on the JSF's low-observable stealth coating, and that hot environments impeded sufficient engine thrust to vertically land the Marine variant. "So they take it" to new environments "and they expose it more than flight test exposed the airplane. I'm an old flight test guy. You expect to learn in the operational environment more than you do in the [developmental test] environment because you don't necessarily fly the airplane [in that environment] all the time," Ulmer said. "So we learned a little bit, and you refine the design, and you solve it," he said, adding that the design and maintenance tweaks are ongoing. "The probability of the issue reoccuring on aircraft in the operational fleet is very low and with minimal impact to safety of flight or operational performance." Thirteen Category 1 deficiencies were found and reported by operators, according to the for-official-use-only documents Defense News obtained. Cat 1 is a label for problems that would directly impact safety or the mission. Those ranged from coating fixes; pressure anomalies in the cockpit that gave pilots ear and sinus pain; and washed-out imagery in the helmet-mounted display, among others. The Air Force, Navy and Marine Corps each fly a variant of the aircraft designed for different scenarios, from landing on conventional runways on land, to catching arresting cables on aircraft carriers, to landing like a helicopter on amphibious assault ships. Responding to the Defense News article series, Lockheed Martin said each deficiency "is well understood, already resolved or on a near-term path to resolution." "We've worked collaboratively with our customers, and we are fully confident in the F-35's performance and the solutions in place to address each of the items identified," the company said in a statement June 12. Growing pains with new planes and weapons programs are common. But the F-35 program has been under scrutiny since its inception, mainly for cost-effectiveness and functionality. A new estimate suggests that operating and supporting fighters for the next 60-plus years will cost the government $1.196 trillion. The older F-22 Raptor has had similar issues, especially with its stealth coating, which officials have said is more cumbersome to fix than the F-35, which was built with a more functional and durable coating in mind. "The [low-observable] system has significantly improved on the F-35 when compared to the F-22," Ulmer said Tuesday. "That's all lessons learned from F-22, applied to F-35." https://www.military.com/daily-news/2019/06/20/did-f-35-testing-extreme-weather-conditions-fall-short.html

  • German Cabinet approves new cybersecurity agency

    4 septembre 2018 | International, C4ISR

    German Cabinet approves new cybersecurity agency

    By: Sebastian Sprenger COLOGNE, Germany – Germany is one step closer to getting its own version of a Defense Advanced Research Projects Agency, as officials here seek to bolster the country's cybersecurity posture. The Cabinet of Chancellor Angela Merkel this week approved the new organization, to be headed jointly by the Defense and Interior ministries. The outfit is slated to get a budget of €200 million ($230 million) between 2019 and 2022. The new “Agency for Innovation in Cybersecurity” will eventually have 100 employees. The German parliament, the Bundestag, will debate the proposal in the upcoming months. Once the funding is cleared, analysts will begin their work in earnest next year. While the Pentagon's DARPA served as a model in creating the new organization, the American agency's funding and personnel commitment dwarfs that of new German effort. But the move is still a major step forward here because it shows a political commitment to cyberspace in the context of defense and security that officials said was previously lacking. Notably, one of the explicit goals is to speed up the acquisition cycle for cybersecurity technology. That puts Germany in the same boat as many governments around the world, where officials have found themselves perennially lagging behind sophisticated attack schemes employed by hackers. Full article: https://www.fifthdomain.com/global/europe/2018/08/31/german-cabinet-approves-new-cybersecurity-agency

  • Contracts for December 15, 2021

    16 décembre 2021 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Contracts for December 15, 2021

    Today

Toutes les nouvelles