Cybersecurity

Air Force Space Command claims cyber testing milestone

Shutterstock image: cyber defense.

The Air Force Space Command announced that its tool for probing command networks for cyber vulnerabilities is fully operational.

The Cyberspace Vulnerability Assessment/Hunter weapon system detects threats and assesses compliance by combing IT assets such as data and applications. It became fully operational on Feb. 12, the command said in a statement that described the system as the "premier enclave defense platform for prioritized traffic in the Air Force Information Network."

CVA/H consists of a series of platforms, including the Mobile Interceptor Platform and the Deployable Interceptor Platform. The system is at the disposal of the Air Force Cyber Protection Teams that contribute to U.S. Cyber Command. Operators can use CVA/H to hunt on networks for cyberthreats that affect "critical links and nodes in support of theater or functional operations," according to the statement.

The milestone "underscores our commitment to the U.S. Cyber Command Cyber Protection Team mission and to the defense of prioritized cyberspace terrain in the Air Force portion of the Department of Defense Information Network," said Brig. Gen. Stephen Whiting, the command's director of integrated air, space, cyberspace and intelligence, surveillance and reconnaissance operations.

In this instance, "weapons system" does not refer to a weapon in the traditional sense but rather is a term for identifying large DOD assets backed by programmatic funding.

On Jan. 7, the Air Force Intranet Control Weapon System became the first fully operational Air Force cyber weapons system, according to the command. In addition, the Cyberspace Defense Analysis Weapon System collects and parses insecure telecommunications data for classified information.

Operationalizing CVA/H is part of a broader Air Force effort to secure its weapons systems. The initiative appears to have a long way to go: Of the $3 billion the command spent last fiscal year on cybersecurity, nothing was dedicated to defending software vulnerabilities in weapons systems.

About the Author

Sean Lyngaas is a former FCW staff writer.

Featured

  • Federal 100 Awards
    Federal 100 logo

    Nominations for the 2021 Fed 100 are now being accepted

    The deadline for submissions is Dec. 31.

  • Government Innovation Awards
    Government Innovation Awards - https://governmentinnovationawards.com

    Congratulations to the 2020 Rising Stars

    These early-career leaders already are having an outsized impact on government IT.

Stay Connected