{"id":187589,"date":"2017-04-13T23:32:13","date_gmt":"2017-04-14T03:32:13","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-gives-military-students-a-leg-up-on-cyber-with-real-time-exercise-federalnewsradio-com\/"},"modified":"2017-04-13T23:32:13","modified_gmt":"2017-04-14T03:32:13","slug":"nsa-gives-military-students-a-leg-up-on-cyber-with-real-time-exercise-federalnewsradio-com","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-gives-military-students-a-leg-up-on-cyber-with-real-time-exercise-federalnewsradio-com\/","title":{"rendered":"NSA gives military students a leg up on cyber with real-time exercise &#8230; &#8211; FederalNewsRadio.com"},"content":{"rendered":"<p><p>    The National Security Agency is amping up its game when it    comes to challenging young, college-age students in military    academies on their cyber skills.  <\/p>\n<p>    The agency is hosting its 17th annual Cyber Defense    Exercise (CDX), but with a few new twists.  <\/p>\n<p>    The exercise challenges students at the U.S. Military, Naval,    Coast Guard and Merchant Marine academies, as well as    undergraduate and graduate students from the Royal Military    College of Canada.  <\/p>\n<p>    Their mission is to defend networks they have created from a    red team comprised of U.S., Canadian and industry cyber    warriors.  <\/p>\n<p>      White House ends hiring freeze, mandates workforce,      mission restructuring    <\/p>\n<p>    Along with defending the network, the teams have certain    challenges they need to secure as well.  <\/p>\n<p>    What this does is challenges them to look into forensics and    see where malware lies and where things happen, said James    Titcomb technical lead for CDX said April 12.  <\/p>\n<p>    The challenges consist of reverse engineering and malware    analysis, network forensics, offensive ethical hacking and    control of a simulated drone.  <\/p>\n<p>    The graduate students are testing two new challenges that    involve securing a space satellite and an unmanned ground    vehicle.  <\/p>\n<p>    This year whats new is we have two cadets from the Air Force    academy participating in the red team, said Shirley McMonigle,    CDX program lead. This is also the first year the    undergraduates will participate in the drone challenge.  <\/p>\n<p>    This year teams will have to deal with ransomeware as well. The    teams can either pay points to get out of the hack or try to    fix it.  <\/p>\n<p>      March TSP returns: In like a lamb, out like a      lion    <\/p>\n<p>    Teams are scored on network confidentiality, usability,    integrity and on the challenges.  <\/p>\n<p>    NSA uses a red team to interfere with students networks and    their ability to complete the challenges. Much of the    intrusions find their way into the students networks through a    gray team, which acts as a network user.  <\/p>\n<p>    The gray team may fall for social engineering tactics.  <\/p>\n<p>    Most of our access is done through the gray cell. We call it    the user that clicks on everything.  What we do is we    purposely throw things and have the gray cell open those links    so that we can own their work stations. [The teams] have to go    in and mitigate that, Titcomb said.  <\/p>\n<p>    The red teams are a way for those in the military to keep their    skills sharp too.  <\/p>\n<p>    Air Reservist Lt. Tim Li said he works in cybersecurity for    J.P. Morgan. He said acting as a hacker helps him understand    the other side of the cybersecurity coin.  <\/p>\n<p>    Its fun, its the opposite for me of what I do on the    outside.  Its learning what the attacker would do, so it will    definitely be beneficial for me once I return to my civilian    job, Li said.  <\/p>\n<p>    The students embedded this year with the red team said they    were taking in a lot from the experience.  <\/p>\n<p>    Nick Co, a 22-year-old midshipman, said he could see himself    working for U.S. Cyber Command or the NSA at some point in the    future.  <\/p>\n<p>    Thats good news for the military, which is strapped for people    with cyber talent in the service.  <\/p>\n<p>    I think for us some of it is trying to understand the basics    first. We are still hugely learning, but we know that the field    is really growing and we definitely know they could use some    officers out there, Co said. These guys are the real    professionals so its fun to really learn from them and take    this back and hopefully when we graduate implement this.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/federalnewsradio.com\/cybersecurity\/2017\/04\/nsa-gives-military-students-leg-cyber-real-time-exercise\/\" title=\"NSA gives military students a leg up on cyber with real-time exercise ... - FederalNewsRadio.com\">NSA gives military students a leg up on cyber with real-time exercise ... - FederalNewsRadio.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The National Security Agency is amping up its game when it comes to challenging young, college-age students in military academies on their cyber skills. The agency is hosting its 17th annual Cyber Defense Exercise (CDX), but with a few new twists.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-gives-military-students-a-leg-up-on-cyber-with-real-time-exercise-federalnewsradio-com\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-187589","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/187589"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=187589"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/187589\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=187589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=187589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=187589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}