The US Space Force Needs Help

Protecting US weapons systems is now a very important focus for the US Space Operations Command, however there aren’t enough cyber operators to monitor the many electronic platforms and systems. 

“We really need to worry about our weapons systems…because every weapons system talks to another weapons system that talks to another system. So we have to make sure that we are secure,” Maj. Gen. Douglas Schiess, the commander for US Space Command’s Combined Force Space Component Command, has announced.

Speaking at the US Air & Space Forces Association’s annual conference, Schiess said “I need to make sure my cyber systems are ready to go at a moment’s notice and that they’re not going to keep me from doing the mission that I need to do.” 

Space Command's mission is to defend protected satellite communications systems, including Advanced HF and Milstar and on GPS.  The importance of secure GPS communications for military use is amply demonstrated by the bitter criticism of Elon Musk following his recent action to withhold Starlink communications from Ukrainian forces in Crimea. 

Cyber workforce needs are a challenge felt across the US Defense Department, which published a strategy last month. Last week, the Pentagon released an unclassified summary of its cyber strategy, which highlights workforce needs and names China and Russia as adversaries, since both countries “have embraced malicious cyber activity as a means to counter US conventional military power.” 

The Pentagon’s cyber strategy document refers to the White House’s National Cyber Strategy and mentions weapons security twice, vowing to “modernize our cryptographic algorithms across weapons systems, data links, and networks” to deter malicious cyber activity and protect critical weapons systems by developing a holistic approach to “rapid information-sharing and analysis” of threats to the defense industrial base.

Schiess said Space Operations Command focuses its cyber efforts on mission defense and that cybersecurity must be ingrained in new systems as they are developed by Space Systems Command, instead of after the fact. 

Space Operations Command has also prioritized which systems they’d like to have cyber operators for. “As we bring on new systems, hopefully they come with the cyber defense package. But as we have legacy systems…we still have to defend those,” Schiess said. “

This presents Schiess with the challenge of finding adequate numbers of skilled personnel. "We are building up our cyber operators. We do not have enough, but over time, as we continue to grow in the Space Force, we will continue to bring” more on. The command is also looking at the delineation between space, intelligence, and cyber operators to ascertain whether they could essentially do the same job. 

“What's the difference between a cyber operator and a space operator, and can we have them do the same thing? What’s the difference between an intel and a cyber operator? So we will continue to look at that,”  Schiess said.

US Air & Sapce Forces:      US Government:     DefenseOne:     WhiteHouse:    DNYUZ:     Image: SpaceX

You Might Also Read: 

US Military Offers A Reward To Satellite Hackers:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Dealing With Security Incidents In The Enterprise Sector 
Navigating Priorities: Cloud vs Cyber For SMEs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Exalens

Exalens

With deep roots in AI-driven cyber-physical security research and intrusion detection, at Exalens, we are enhancing operational resilience for cyber-physical systems at the OT edge.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

Mantodea Security

Mantodea Security

Mantodea Security is an industry-agnostic powerhouse backed by extensive experience and expertise in the realm of IT security.

TisOva

TisOva

TisOva is an innovative cybersecurity startup dedicated to addressing the growing issue of online scams targeting students.