At Air Force Space Command, computer warriors no longer have laptops and mouses. They have "weapons systems."
In a bid to merge the techie world of computer security with the sharply creased world of the
"This is very real," explained Brig. Gen.
The command is four years into its venture into computer warfare, and leads
Buck said the network of computers, wiring, switches and people is seen as a "domain" - a place where the military will fight, like the air and sea.
That means the tools used to fight - as inane as an email - are "weapons."
There are some serious advantages to the weaponry designation. It makes it easier for the
The computer weaponry will get an estimated
The change also forces commanders to re-examine their computer systems the same way the
"It adds operational rigor," Buck said.
The weapons carry names only an information technology manager could love.
The definitions of what they accomplish is slightly more digestible.
One would probe the
Another looks for information leaks on
Most of the "weapons" manage and protect existing
A key system would cut the number of ties the
Most of the systems are in the testing phase now.
The "Cyberspace Vulnerability Assessment/Hunter System," used to probe internal weaknesses and take on threats, was deemed operational in June.
When the weapons become operational, they can be interwoven into
"We want to build and develop combat effects," Buck said.
But they're all being used now.
"We understand the cyber underpins every single operation in the military," Buck said.
Buck said the
"We get millions on the network every day," he said.
Along with the new weapons, the command is also building an eager computer warfare work force.
"They can legally play using their cyber tools," Buck said.
At Air Force Space Command, computer warriors no longer have laptops and mouses.
They have "weapons systems."