Home / Tech News / Reservists and the National Guard offer untapped resources for cybersecurity

Reservists and the National Guard offer untapped resources for cybersecurity



Cyber threats have metastasized worldwide.

In the U.S., they have presented as security issues for critical infrastructure, such as industrial sites, and cast doubt on the integrity of crucial information technology systems used for elections –including many vulnerable voting machines themselves that are employed and managed at the state level.

Technological approaches to curbing or countering these cyber threats are proliferating, but they alone cannot offer adequate protection. What is needed is manpower: hundreds of thousands of information security professionals working in the private and public sectors to actively defend the cyber terrain on which America’s national security, prosperity, and democracy depend.

Like many private companies and public agencies in the U.S., the Department of Defense struggles with a shortage of information security professionals. But RAND research suggests that the armed forces, and the nation more broadly, might already have some of the personnel resources it needs — in the ranks of its Reserves and National Guard.

RAND researchers studying the skills of personnel in the Army National Guard and the U.S. Army Reserve in 2015 estimated, conservatively, that more than 100,000 of these men and women have some degree of cyber competence, including thousands with deep or midlevel cyber expertise.

Many of these soldiers, like their counterparts in the reserve components of other military services, perform information security functions in their civilian careers, often in high-tech sectors. Some are serving in newly created reserve component cyber formations.

A growing proportion of service members in the reserve components are also “digital natives” — part of the younger generations who grew up using a wide variety of technologies. Many want to leverage their tech skills as part of their military duties.

The Department of Defense — and individual states across the country — would do well to tap into this pool of trained, vetted, and often combat-experienced men and women available to extend the labor pool of information security professionals — personnel who could provide support to federal and state civilian authorities during times of crisis.

For example, the reserve component could be mobilized to help the Department of Homeland Security defend the industrial control systems of critical infrastructure experiencing an attack, especially the newest addition to the DHS list of critical infrastructure, the election system itself.

Other countries have begun to leverage civilian-acquired skills in their defense against cyber threats. In the wake of cyber attacks against its public and private Internet infrastructure in 2007, Estonia announced plans to develop the Estonian Defence League, a collection of volunteers—now numbering in the hundreds—who are prepared to help the country respond to emerging cyber crises and attacks.

The U.S. has different options for filling shortfalls in its arsenal of information security professionals. In March, for example, Rep. Ruben Gallego (D-AR) proposed the creation of a “cyber national guard” to attract talented civilians who do not want to serve in the military, but are willing to contribute to the nation’s cyber defense.

The reserve components of the U.S. military are uniquely positioned to attract, train, and manage a cadre of information security professionals who are able to operate both with the active components of the U.S. armed forces and with civilian authorities. Innovative approaches to recruiting, tracking readiness, and career planning of these professionals will be required, and new models of reserve component participation and training might prove necessary.

There is every reason to believe that nefarious actors, including powerful nation-states, will continue to target critical infrastructure, the U.S. election system as a whole and information technology systems in general.

This threat to American democracy and cyber way of life demands hands-on attention to the underlying machines and devices. Mitigating this threat with human resources will require the cyber equivalent of boots on the ground. The state of Ohio has already tapped its National Guard to defend its election system from hackers.

Time is running out to build an adequate nationwide defense for the next presidential election cycle, but many of the necessary personnel resources are right here—in the form of the Guard and the Reserves that are ready and willing to be called up to perform the mission.



Source link

About admin

Check Also

bitcoin-rainbow.jpg

Bitcoin just surged past $2,000 for the first time

The world’s most popular cryptocurrency is now worth over $2,000 per coin.  That’s according to ...

15 comments

  1. This site is known as a walk-through for all of the data you wanted about this and didn’t know who to ask. Glimpse right here, and also you’ll undoubtedly uncover it.

  2. I love your blog.. very nice colors & theme. Did you design this website yourself or did you hire someone to do it for you? Plz reply as I’m looking to create my own blog and would like to find out where u got this from. thanks

  3. Hmm it seems like your blog ate my first comment (it was extremely long) so I guess I’ll just sum it up what I wrote and say, I’m thoroughly enjoying your blog. I too am an aspiring blog blogger but I’m still new to the whole thing. Do you have any helpful hints for novice blog writers? I’d certainly appreciate it.

  4. Attractive section of content. I just stumbled upon your website and in accession capital to assert that I acquire actually enjoyed account your blog posts. Anyway I will be subscribing to your feeds and even I achievement you access consistently rapidly.

  5. I do not even know how I ended up right here, but I believed this post was once good. I don’t understand who you might be however definitely you are going to a famous blogger when you aren’t already 😉 Cheers!

  6. I finally found a good article. Thank you!

  7. I appeciate your point.Please give me more info on this!

  8. I just could not depart your site prior to suggesting that I actually loved the standard information an individual supply to your visitors? Is gonna be again steadily in order to check up on new posts

  9. Great post. I was checking constantly this blog and I am impressed! Very helpful info specially the ultimate part :) I maintain such information much. I was seeking this certain info for a long time. Thank you and good luck.

  10. There are some fascinating time limits on this article however I don’t know if I see all of them middle to heart. There may be some validity but I will take maintain opinion until I look into it further. Good article , thanks and we would like extra! Added to FeedBurner as effectively

  11. I like the helpful info you provide in your articles. I’ll bookmark your blog and check again here frequently. I am quite sure I will learn many new stuff right here! Best of luck for the next!

  12. I’m truly enjoying the design and layout of your website. It’s a very easy on the eyes which makes it much more pleasant for me to come here and visit more often. Did you hire out a developer to create your theme? Excellent work!

  13. I just want to tell you that I’m very new to weblog and absolutely savored your web-site. Probably I’m want to bookmark your blog post . You definitely have impressive posts. With thanks for sharing your web site.

  14. Very interesting way to put it! Thank you! Please give me more info on this! You can contact me at http://www.massageandalignment.com

  15. Very interesting way to put it! Thank you! Please give me more info on this! You can contact me at http://www.massageandalignment.com

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>