The US Space Force Needs Help

Protecting US weapons systems is now a very important focus for the US Space Operations Command, however there aren’t enough cyber operators to monitor the many electronic platforms and systems. 

“We really need to worry about our weapons systems…because every weapons system talks to another weapons system that talks to another system. So we have to make sure that we are secure,” Maj. Gen. Douglas Schiess, the commander for US Space Command’s Combined Force Space Component Command, has announced.

Speaking at the US Air & Space Forces Association’s annual conference, Schiess said “I need to make sure my cyber systems are ready to go at a moment’s notice and that they’re not going to keep me from doing the mission that I need to do.” 

Space Command's mission is to defend protected satellite communications systems, including Advanced HF and Milstar and on GPS.  The importance of secure GPS communications for military use is amply demonstrated by the bitter criticism of Elon Musk following his recent action to withhold Starlink communications from Ukrainian forces in Crimea. 

Cyber workforce needs are a challenge felt across the US Defense Department, which published a strategy last month. Last week, the Pentagon released an unclassified summary of its cyber strategy, which highlights workforce needs and names China and Russia as adversaries, since both countries “have embraced malicious cyber activity as a means to counter US conventional military power.” 

The Pentagon’s cyber strategy document refers to the White House’s National Cyber Strategy and mentions weapons security twice, vowing to “modernize our cryptographic algorithms across weapons systems, data links, and networks” to deter malicious cyber activity and protect critical weapons systems by developing a holistic approach to “rapid information-sharing and analysis” of threats to the defense industrial base.

Schiess said Space Operations Command focuses its cyber efforts on mission defense and that cybersecurity must be ingrained in new systems as they are developed by Space Systems Command, instead of after the fact. 

Space Operations Command has also prioritized which systems they’d like to have cyber operators for. “As we bring on new systems, hopefully they come with the cyber defense package. But as we have legacy systems…we still have to defend those,” Schiess said. “

This presents Schiess with the challenge of finding adequate numbers of skilled personnel. "We are building up our cyber operators. We do not have enough, but over time, as we continue to grow in the Space Force, we will continue to bring” more on. The command is also looking at the delineation between space, intelligence, and cyber operators to ascertain whether they could essentially do the same job. 

“What's the difference between a cyber operator and a space operator, and can we have them do the same thing? What’s the difference between an intel and a cyber operator? So we will continue to look at that,”  Schiess said.

US Air & Sapce Forces:      US Government:     DefenseOne:     WhiteHouse:    DNYUZ:     Image: SpaceX

You Might Also Read: 

US Military Offers A Reward To Satellite Hackers:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Dealing With Security Incidents In The Enterprise Sector 
Navigating Priorities: Cloud vs Cyber For SMEs »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

Cohesity

Cohesity

Cohesity radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the data center, at the edge, and in the cloud.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

OpsHelm

OpsHelm

OpsHelm provides a Software-as-a-Service solution to help businesses ensure that all of their cloud environments have their security bases covered.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

ClearSky Cyber Security

ClearSky Cyber Security

ClearSky cyber security provides cyber solutions, focused on threat intelligence services, mainly for the financial sector, critical infrastructure, public sector and the pharma sector.

AI EdgeLabs

AI EdgeLabs

AI EdgeLabs is a powerful and autonomous cybersecurity AI platform that helps security teams respond immediately to ongoing attacks and protect Edge/IoT infrastructures.

Faddom

Faddom

Faddom is an agentless tool that visualizes your on-premises and cloud infrastructure, as well as their inter-dependencies.

FSP

FSP

FSP is a leading consultancy specialising in Digital, Security and AI solutions. We navigate the complexities of data sensitivity, confidentiality, governance and compliance.