{"id":8563,"date":"2021-09-07T09:15:42","date_gmt":"2021-09-07T12:15:42","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=8563"},"modified":"2021-09-07T09:15:42","modified_gmt":"2021-09-07T12:15:42","slug":"los-desarrolladores-de-ciber-software-militar-corrigen-fallas-y-crean-herramientas-de-mision-mas-rapido","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=8563","title":{"rendered":"Los desarrolladores de ciber-software militar corrigen fallas y crean herramientas de misi\u00f3n m\u00e1s r\u00e1pido"},"content":{"rendered":"<p>El ej\u00e9rcito ha dependido en gran medida de los contratistas para el desarrollo de software, y lo sigue haciendo. Sin embargo el Ej\u00e9rcito, la Armada y la Infanter\u00eda de Marina han descubierto que los ingenieros y los desarrolladores de software propios son muy efectivos para crear r\u00e1pidamente capacidades ad hoc, mejorar los tiempos de respuesta a las amenazas y mejorar los resultados de la misi\u00f3n t\u00e1ctica. Cada elemento integrado al Comando Cibern\u00e9tico de EE. UU. ha organizado equipos de codificadores, ingenieros y desarrolladores de herramientas. Construyen prototipos r\u00e1pidos y nuevas soluciones, ampl\u00edan las plataformas existentes, realizan investigaciones de vulnerabilidades y an\u00e1lisis de malware, y prueban y eval\u00faan software.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">WASHINGTON \u2014 The military has relied heavily on contractors for highly technical work to develop software for cyber operators. But the Army, Navy and Marine Corps have found that in-house engineers and tool developers can quickly create mission capabilities to improve threat response times and mission outcomes.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">While industry software specialists continue to complement the military\u2019s internal efforts, each of the service cyber components that feed up to U.S. Cyber Command has organized teams of coders, engineers and tool developers. They build rapid prototypes and new solutions, extend existing platforms, conduct vulnerability research and malware analysis, and test and evaluate software.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">These personnel support the cyber mission force operations and provide wide expertise for their services on cyberspace and vulnerabilities.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">For example, Fleet Cyber Command said it provided requested developers to Naval Sea Systems Command to determine how adversaries might compromise a shipboard system. Within a week, the developers identified potential cyber vulnerabilities and suggested corrections.<\/p>\n<p>Army coders figure out how to best secure weapons systems and give combatant commanders effective options that align with their operations. Some examples include implementing systems designed to defend soldiers from small unmanned aerial system attacks and analyzing weapon systems\u2019 attack surface to patch vulnerabilities.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">The Marine Corps\u00a0<a href=\"https:\/\/www.c4isrnet.com\/dod\/cybercom\/2019\/05\/16\/cyber-command-is-decoding-how-to-best-reorganize-teams\/\" target=\"_blank\" rel=\"noopener\">combines a mix of personnel<\/a>\u00a0\u2014 developers, analysts and operators \u2014 to achieve mission outcomes, a Marines spokesperson said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">MARFORCYBER noted there isn\u2019t a set ratio for developers to operators, instead emphasizing adaptability. The Air Force and Navy declined to offer specifics on their ratios. Army Cyber Command explained it tries to ensure that a good percentage of developers provide direct support to several kinds of cyber teams:<\/p>\n<ul class=\"list__StyledUnorderedList-hx0rva-2 jGJWGg\">\n<li class=\"list__StyledListItem-hx0rva-0 sbKSM\"><b>Combat mission teams<\/b>\u00a0\u2014 conduct most offensive cyber operations on behalf of combatant commands.<\/li>\n<li class=\"list__StyledListItem-hx0rva-0 sbKSM\"><b>National mission teams<\/b>\u00a0\u2014 work against specific nation-states in defense of the nation.<\/li>\n<li class=\"list__StyledListItem-hx0rva-0 sbKSM\"><b>Expeditionary cyber teams<\/b>\u00a0\u2014 tactically focused teams that carry out cyber and radio frequency ground operations in support of ground commanders.<\/li>\n<\/ul>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">In fact, the Army recently\u00a0<a href=\"https:\/\/www.c4isrnet.com\/electronic-warfare\/2021\/07\/07\/us-army-to-test-electronic-warfare-coders-at-the-edge-during-upcoming-exercise\/\" target=\"_blank\" rel=\"noopener\">experimented with coders at the edge<\/a>\u00a0for these teams to reprogram electronic warfare and radio frequency systems.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Army Cyber Command said a mix of developers, analysts and operators support of the command\u2019s mission.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">16th Air Force acknowledged that it has its own software develop program associated with its cyber mission set, but declined to offer specifics citing operational security. In one known example, the 67th Cyberspace Wing is experimenting with an approach it describes as\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2021\/07\/14\/us-air-force-tests-embedding-software-coders-with-industry\/\" target=\"_blank\" rel=\"noopener\">software factory as a service<\/a>, renting commercial space for software factories \u2014 such as the LevelUP DevSecOps facility \u2014 to develop tools for the cyber mission force.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">For Army Cyber Command,\u00a0<a href=\"https:\/\/www.c4isrnet.com\/dod\/army\/2019\/09\/05\/the-army-wants-more-coders-alongside-operators\/\" target=\"_blank\" rel=\"noopener\">in-house software and tool-building personnel<\/a>\u00a0are more agile, a spokesperson told C4ISRNET, following the Defense Department custom of speaking to reporters anonymously.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">The command can rapidly reprioritize work around commanders\u2019 short schedules, and the personnel have expertise that provides commanders more options than previously existed. This makes the command less dependent on industry to perform its mission, and the spokesperson said getting intelligence in developers\u2019 hands is easier, and they can test capabilities against mission-relevant environments, which can be trickier with outside partners.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\"><a href=\"https:\/\/www.c4isrnet.com\/digital-show-dailies\/navy-league\/2018\/04\/11\/why-the-navy-wants-more-of-these-hard-to-find-software-developers\/\" target=\"_blank\" rel=\"noopener\">Navy cyber workforce<\/a>\u00a0teams, which have grown and matured, aren\u2019t easily replicated through the acquisition process, a Fleet Cyber Command\/10th Fleet spokesperson, told C4ISRNET.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cWhile contractors provide crucial support across the DoD, operational tempo and effective integration necessitate that many efforts are led and performed by government employees,\u201d the person said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Specifically, Fleet Cyber Command said developers have proved their ability to identify a capability gap during an operation, develop a solution in less than 24 hours and deliver a modified capability. Shorter timeframes for data science application creation saved thousands of hours of analysts\u2019 time that they can spend on higher-priority tasks.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">The services continue to used contractor support for larger efforts and platforms but have discovered the critical need for their own staff to perform these on-mission functions in a more timely manner.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">The Air Force noted that contractor developers and government personnel are not mutually exclusive.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cTool development lead by either Air Force organic teams, bleeding-edge Silicon Valley start-ups or the traditional large defense contractors is not a mutually exclusive answer in delivering timely and needed capability to our cyber forces,\u201d according to a spokesperson for 16th Air Force\/Air Forces Cyber. \u201cThe effectiveness of any of those groups is very dependent on the access to operators, and requirements and resources to develop capabilities at the speed of cyber. Each one of those groups bring different ideas, processes and experience to the cyber problem set. With the low cost of entry and number of cyber actors well beyond traditional nation state actors, Air Forces Cyber, and ultimately the United States cyber community at large, will require the expertise found in government, industry and academia to compete in the cyber domain.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Army Cyber Command noted it has sufficient numbers of billets to address critical missions today, noting it does rely on industry for specialized expertise, tools and platform development \u201cwhere the level of effort needed to obtain and sustain critical capabilities would be counterproductive or less cost effective than contracting for a limited period of time,\u201d according to a spokesperson.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Similarly, Fleet Cyber Command noted the role of government employees and contractors is complementary.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cIndustry are great partners to Fleet Cyber Command because they provide the expertise and scale that the Navy cannot generate internally. However, rapid agile development processes require a continuous and close synchronization with the operational elements, from requirements generation\/modification through testing and acceptance,\u201d a Fleet Cyber Command spokesperson said. \u201cEstablishing these processes with a single or handful of industry partners can be difficult from Defense Acquisition process perspective or prohibitively expensive. Additionally, if we outsource all of our capability development to industry, we lose the ability to develop a foundation for professional development and growth of our government employees into more advanced technical and leadership positions.\u201d<\/p>\n<div id=\"slot-wrapper-f0fELE1I5BnMbu1\" class=\"AdWrapper-sc-1cwvedt-0 ejETEL  dfp-ad dfp-ad--in-article \" data-state=\"viewable\" data-last-view-time=\"1631016894557\" data-view-count=\"1\">\n<div class=\"ad-slot\">\n<div class=\"adunitContainer\">\n<div id=\"ad-slot-f0fELE1I5BnMbu1\" class=\"adBox\" data-google-query-id=\"CLmSzanr7PICFe2HlQIdvPoN0A\"><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/cyber\/2021\/09\/03\/military-cyber-software-developers-fix-weaknesses-create-mission-tools-faster\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>El ej\u00e9rcito ha dependido en gran medida de los contratistas para el desarrollo de software, y lo sigue haciendo. Sin embargo el Ej\u00e9rcito, la Armada&hellip; <\/p>\n","protected":false},"author":1,"featured_media":8564,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8563"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8563"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8563\/revisions"}],"predecessor-version":[{"id":8565,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8563\/revisions\/8565"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/8564"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}