This page contains a Flash digital edition of a book.
By aligning with the 10 Federal


Cyber Shield 2016, at Camp Atterbury, Ind., is an Army Na- tional Guard exercise to develop and train cyber-capable forces.


Emergency Management Agency re- gions, the Guard also ensures cyber assets are available to governors at the state level if needed. According to Lt. Col. Vic Macias, ANG, a cyber planner on the NGB joint staff , “The National Guard continues to build robust cyber capabilities available for dual use in either federal or state status. By 2019, 34 states will have additional cyber capability in the form of cyber protection units, cyber squadrons, or other cyber mission el-


ements. The civilian-acquired skills of our men and women, coupled with their military training and patriotism, make them invaluable.”


Developing cyber warriors Guardmembers attracted to cyber duty often provide expertise on the systems and languages required to operate in cyberspace, including op- erating systems (UNIX, Windows, Mac, DOS), fi rewalls, networks, and open source code (LINUX). The Army and Air Guard, as well as active duty and reserve, train to a common individual and joint standard set by U.S. Cyber Command. For members of the Army Guard, in-


dividual training starts with the Cyber Technical Common Core course at the National Guard Professional Educa- tion Center in Arkansas and advanced training at the Fort Gordon Cyber Center of Excellence. Members of the Air Guard attend Undergraduate Cyberspace Training at Keesler AFB, Miss., and Hurlburt Field, Fla. After core training, cyber war-


The term “cyberspace” was first introduced in 1982 by writer William Gibson; he defined it in his award-winning and influential science fiction


novel Neuromancer as “a consensual hallucination experienced daily by billions of legitimate operators, in every nation.”


In 2016, more than 3 billion users are on the internet. See how fast users are joining the internet at www.internetlivestats.com/internet-users.


In 1995,


less than 1% of the world’s population was on theinternet.


54 MILITARY OFFICER AUGUST 2016 Today,


approximately 40% of the world’s population has an internet connection.


riors pursue expertise in areas such as forensics, penetration testing, and hacking. Qualifi cation also involves acquiring industry certifi cations, such as CISSP (certifi ed information systems security professional) and CEH (certifi ed ethical hacker). Both joint and unit-level certifi cations round out a cyber warrior’s training. As the cyber force grows, Guard


leaders face the challenge of develop- ing the nexus between citizen sol- diers and the ability to apply their IT skills to military operations. On the East Coast, members from


northeast region Guard units par- ticipated in the 2016 Cyber Yankee exercise, hosted by the Massachusetts Army National Guard last May. They included an Army Guard sergeant who works help desk support and network operations for a federal agency; an Air Guard captain who is a solutions architect and computer system de-


STATISTICS SOURCE, LEFT AND FACING PAGE: WWW.INTERNETLIVESTATS.COM


PHOTO: SGT. STEPHANIE A. HARGETT, USA


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88  |  Page 89  |  Page 90  |  Page 91  |  Page 92