The US Space Force Needs Help

Protecting US weapons systems is now a very important focus for the US Space Operations Command, however there aren’t enough cyber operators to monitor the many electronic platforms and systems. 

“We really need to worry about our weapons systems…because every weapons system talks to another weapons system that talks to another system. So we have to make sure that we are secure,” Maj. Gen. Douglas Schiess, the commander for US Space Command’s Combined Force Space Component Command, has announced.

Speaking at the US Air & Space Forces Association’s annual conference, Schiess said “I need to make sure my cyber systems are ready to go at a moment’s notice and that they’re not going to keep me from doing the mission that I need to do.” 

Space Command's mission is to defend protected satellite communications systems, including Advanced HF and Milstar and on GPS.  The importance of secure GPS communications for military use is amply demonstrated by the bitter criticism of Elon Musk following his recent action to withhold Starlink communications from Ukrainian forces in Crimea. 

Cyber workforce needs are a challenge felt across the US Defense Department, which published a strategy last month. Last week, the Pentagon released an unclassified summary of its cyber strategy, which highlights workforce needs and names China and Russia as adversaries, since both countries “have embraced malicious cyber activity as a means to counter US conventional military power.” 

The Pentagon’s cyber strategy document refers to the White House’s National Cyber Strategy and mentions weapons security twice, vowing to “modernize our cryptographic algorithms across weapons systems, data links, and networks” to deter malicious cyber activity and protect critical weapons systems by developing a holistic approach to “rapid information-sharing and analysis” of threats to the defense industrial base.

Schiess said Space Operations Command focuses its cyber efforts on mission defense and that cybersecurity must be ingrained in new systems as they are developed by Space Systems Command, instead of after the fact. 

Space Operations Command has also prioritized which systems they’d like to have cyber operators for. “As we bring on new systems, hopefully they come with the cyber defense package. But as we have legacy systems…we still have to defend those,” Schiess said. “

This presents Schiess with the challenge of finding adequate numbers of skilled personnel. "We are building up our cyber operators. We do not have enough, but over time, as we continue to grow in the Space Force, we will continue to bring” more on. The command is also looking at the delineation between space, intelligence, and cyber operators to ascertain whether they could essentially do the same job. 

“What's the difference between a cyber operator and a space operator, and can we have them do the same thing? What’s the difference between an intel and a cyber operator? So we will continue to look at that,”  Schiess said.

US Air & Sapce Forces:      US Government:     DefenseOne:     WhiteHouse:    DNYUZ:     Image: SpaceX

You Might Also Read: 

US Military Offers A Reward To Satellite Hackers:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Dealing With Security Incidents In The Enterprise Sector 
Navigating Priorities: Cloud vs Cyber For SMEs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

Lumeta

Lumeta

Lumeta’s cyber situational awareness platform is the unmatched source for enterprise network infrastructure analytics and security monitoring for breach detection.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

InfoGuard

InfoGuard

InfoGuard is a leading Swiss company providing comprehensive cyber security and network solutions.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Saffron Networks

Saffron Networks

Saffron Networks is an ISO-certified company. We assure our clients of reliable solutions, specifically with the Security landscape and Enterprise Networking.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

Strategic Security Solutions (S3)

Strategic Security Solutions (S3)

S3 is a leading provider of Cybersecurity consulting services for Identity and Access Governance (IAG), Zero Trust, and Enterprise Risk and Compliance.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.