US Air Force Launches First Cyberspace Weapon System
The US Air Force hit the "go" button on its first fully operational cyberspace weapon system, which acts as a massive firewall for its Air Force Information Network.
10 Government Innovations Your Business Can Use
(Click image for larger view and slideshow.)
The US Air Force has launched its first fully operational cyberspace weapons system in a move to protect Internet traffic transmitted over its Air Force Information Network.
This system, otherwise known as the Air Force Intranet Control (AFINC) weapon system, acts as a firewall for the military branch's network, which serves more than 1 million Air Force users across 237 sites worldwide.
In creating this layer of protection, the Air Force consolidated more than 100 regionally managed network entry points on the Air Force Information Network into 16 centrally managed points. These will channel all traffic, according to an announcement by the Air Force Space Command.
"As the first line of defense for our network, the 26th NOS team is responsible for more than one billion firewall web, and email blocks per week from suspicious and adversarial sources," Col. Pamela Woolley, 26th Cyberspace Operations Group commander, said in a statement. "Our network is under constant attack and it is a testament to the dedication of our 26th NOS team that our network reliability and traffic flow remains consistently high."
Indeed, the Joint Chiefs of Staff had their email system hacked last year, according to a CNN report. In 2013 the US Navy had its largest breach of unclassified documents in a cyberattack believed to have been carried out by hackers in Iran, according to a Wall Street Journal report.
The Air Force has been working on building up its cyberweapons capability for a number of years. In 2012, the Air Force issued a call to defense contractors to submit concept papers that would help the military build its offensive cyber weapons. It took the unusual step of outlining its needs in detail for cyberweapons.
In its request for concept papers, the Air Force asked for ideas on "the employment of cyberspace capabilities to destroy, deny, degrade, deceive, corrupt, or usurp the adversaries' ability to use the cyberspace domain to his advantage."
With the Air Force Intranet Control Weapon System fully operational, the Air Force has other cyberspace weapons systems it is working on, including the Air Force Cyberspace Defense Weapon System.
Rising stars wanted. Are you an IT professional under age 30 who's making a major contribution to the field? Do you know someone who fits that description? Submit your entry now for InformationWeek's Pearl Award. Full details and a submission form can be found here.
Dawn Kawamoto is a freelance writer and editor. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's News.com, TheStreet.com, AOL's DailyFinance, and The ... View Full Bio
Time to Reconsider Enterprise Email StrategyCost, time, and risk. It's the demand trifecta vying for the attention of both technology professionals and attorneys charged with balancing the expectations of their clients and business units with the hard reality of the current financial and regulatory climate. Sometimes, organizations assume high levels of risk as a result of their inability to meet the costs involved in data protection. In other instances, it's time that's of the essence, as with a data breach.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 18, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."