The US Space Force Needs Help

Protecting US weapons systems is now a very important focus for the US Space Operations Command, however there aren’t enough cyber operators to monitor the many electronic platforms and systems. 

“We really need to worry about our weapons systems…because every weapons system talks to another weapons system that talks to another system. So we have to make sure that we are secure,” Maj. Gen. Douglas Schiess, the commander for US Space Command’s Combined Force Space Component Command, has announced.

Speaking at the US Air & Space Forces Association’s annual conference, Schiess said “I need to make sure my cyber systems are ready to go at a moment’s notice and that they’re not going to keep me from doing the mission that I need to do.” 

Space Command's mission is to defend protected satellite communications systems, including Advanced HF and Milstar and on GPS.  The importance of secure GPS communications for military use is amply demonstrated by the bitter criticism of Elon Musk following his recent action to withhold Starlink communications from Ukrainian forces in Crimea. 

Cyber workforce needs are a challenge felt across the US Defense Department, which published a strategy last month. Last week, the Pentagon released an unclassified summary of its cyber strategy, which highlights workforce needs and names China and Russia as adversaries, since both countries “have embraced malicious cyber activity as a means to counter US conventional military power.” 

The Pentagon’s cyber strategy document refers to the White House’s National Cyber Strategy and mentions weapons security twice, vowing to “modernize our cryptographic algorithms across weapons systems, data links, and networks” to deter malicious cyber activity and protect critical weapons systems by developing a holistic approach to “rapid information-sharing and analysis” of threats to the defense industrial base.

Schiess said Space Operations Command focuses its cyber efforts on mission defense and that cybersecurity must be ingrained in new systems as they are developed by Space Systems Command, instead of after the fact. 

Space Operations Command has also prioritized which systems they’d like to have cyber operators for. “As we bring on new systems, hopefully they come with the cyber defense package. But as we have legacy systems…we still have to defend those,” Schiess said. “

This presents Schiess with the challenge of finding adequate numbers of skilled personnel. "We are building up our cyber operators. We do not have enough, but over time, as we continue to grow in the Space Force, we will continue to bring” more on. The command is also looking at the delineation between space, intelligence, and cyber operators to ascertain whether they could essentially do the same job. 

“What's the difference between a cyber operator and a space operator, and can we have them do the same thing? What’s the difference between an intel and a cyber operator? So we will continue to look at that,”  Schiess said.

US Air & Sapce Forces:      US Government:     DefenseOne:     WhiteHouse:    DNYUZ:     Image: SpaceX

You Might Also Read: 

US Military Offers A Reward To Satellite Hackers:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Dealing With Security Incidents In The Enterprise Sector 
Navigating Priorities: Cloud vs Cyber For SMEs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Radisys

Radisys

Radisys offers software, products, integrated systems, and professional services for communication service providers and telecom solution vendors.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

North East Business Resilience Centre (NEBRC)

North East Business Resilience Centre (NEBRC)

The North East Business Resilience Centre is a non-profit organisation here to support businesses in the North East of England in protecting themselves from cyber crimes and fraud.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.

Moonsense

Moonsense

Moonsense is on a mission to level the playing field in the fight against online fraud.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

CelcomDigi

CelcomDigi

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building.