You are at netAirspace : Forum : Air and Space Forums : Military Aviation

Solitary Genius Trumped By The Socially Adept

Your online Air Force Base.
 

miamiair (netAirspace FAA) 03 Aug 12, 08:34Post
Israel and the U.S. military have drawn similar conclusions about how to choose their cyberwarriors; however, the Israelis appear to be establishing a lead in identifying and training their electronic special forces.

The conundrum can be illustrated by a sports metaphor. It involves distinguishing the erratic, eccentric, superstars from the organized, focused geniuses. Both can be naturals. But only one type can lead a team in tackling a problem so huge that it requires many teams working simultaneously to solve its interrelated parts.

Neither Israeli nor U.S. officials will speak publicly about who developed the destructive Stuxnet cyberworm or the Flame intelligence-gathering malware that has been derailing Iran's nuclear weapons development. But the effort involved a specialized kind of team play. Background discussions further reveal an operation that was heavily U.S.-funded and -backed with Washington's intelligence resources. That strategy was applied to a long-term project developed by professionals from both countries whose activities were protected by Israel's unique laws for maintaining the nation's security.

However, both countries face hurdles in finding staff and conducting advanced training for such cyberops. Officials concede the need for a better, earlier, screening system to identify the right people to become cyberwarriors. There is at least one element on which both countries agree. The intellectually arrogant, lone-ranger hacker is not the gold standard for innovative, multi-faceted cyberoperations.

“You have natural, imaginative hackers that apply their brilliance in 360-degree shot patterns,” says U.S. Air Force Chief of Staff Gen. Norton Schwartz, who is slated to retire in August. “Then you have others, equally brilliant, that are more like engineers who apply [their unique skills] in a way that is more predictable, measurable and easier to manage.”

That analysis underlies a decision made four years ago to put cyberoperations into Air Force Space Command.

“The judgment is that space and cyber are fundamentally engineering disciplines and that there are real similarities,” says Schwartz. “We are less about innovative products than we are about outcome-driven capabilities. We will continue to lean in the direction of more engineering-focused talent. That's the path we'll stay on. The intelligence community might be in a different place.”

Link
And let's get one thing straight. There's a big difference between a pilot and an aviator. One is a technician; the other is an artist in love with flight. — E. B. Jeppesen
Coz 19 Aug 12, 23:34Post
I've read the same article elsewhere.

miamiair wrote:Israel and the U.S. military have drawn similar conclusions about how to choose their cyberwarriors; however, the Israelis appear to be establishing a lead in identifying and training their electronic special forces.


Yes, I attribute this to the consistent failure of the United States education system. It does not embrace the mentally handicapped, just as it does not foster the abilities of a genius.

If there's one easy way to exploit a system, it's through social engineering. A 'hacker' who hasn't the social exposure is at a distinct disadvantage to the one who has mastered the art of social trust as a method of infiltration.

miamiair wrote:The conundrum can be illustrated by a sports metaphor. It involves distinguishing the erratic, eccentric, superstars from the organized, focused geniuses. Both can be naturals. But only one type can lead a team in tackling a problem so huge that it requires many teams working simultaneously to solve its interrelated parts.


I would seriously not want to run any of these teams. I know the geek mentality well. It would be like herding cats. I would confine them to a small office to the point where they all fight like cats in a duffle bag. They'll need to establish their own hierarchy and methods of communication. Only then can they work under an established team leader.

miamiair wrote:Neither Israeli nor U.S. officials will speak publicly about who developed the destructive Stuxnet cyberworm or the Flame intelligence-gathering malware that has been derailing Iran's nuclear weapons development. But the effort involved a specialized kind of team play.


I get the feeling the 'team play' method in this effort included people who were unknowingly part of the team. It's quite possible that this team, as a whole, could have been composed by the thousands.
 

Who is online
Users browsing this forum: No registered users and 4 guests

LEFT

RIGHT
CONTENT