Proceedings Of The Marine

WIN 2015

Proceedings magazine is a communication tool for the Coast Guard's Marine Safety & Security Council. Each quarterly magazine focuses on a specific theme of interest to the marine industry.

Issue link: https://uscgproceedings.epubxp.com/i/436751

Contents of this Issue

Navigation

Page 67 of 94

65 Winter 2014 – 2015 Proceedings www.uscg.mil/proceedings range of behaviors while they are contemplating, plan- ning, preparing, and executing an intrusion or attack in the cyber domain, the same way criminal organizations prepare for an illegal migrant or drug smuggling operation. What is Cyber Intelligence? Cyber threats are often regarded as technical challenges. It is easy to forget that there are people behind the keyboards. Individual actors and groups have intentions, motivations, objectives, knowledge, and capabilities. They engage in a Information Sharing and Intelligence Cyber Intelligence Operations More than just ones and zeroes. by RanDy BORuM, Ph.D. Professor and Coordinator for Strategy and Intelligence Studies School of Information University of South Florida JOhn felkeR, CaPTain usCG (ReT.) Director, Cyber Intelligence Strategy HP Enterprise Services lieuTenanT COlOnel sean keRn, usaf Joint Forces Staff College Joint Advanced Warfghting School Today's Coast Guard relies heavily on digital information and communication technologies. In fact, every aspect of Coast Guard operations and support relies upon network resources for function, sorting, analysis, storage, and communication. For example: ➤ Rescue 21, the Coast Guard's short range commu- nications, direction-finding tool is completely digital and connected to the Internet. ➤ National security cutters integrate engineering, weapons, communications, and intelligence and administration systems electronically and are connected to the Internet. ➤ Computer-driven acquisitions, stores, and replace- ment management powers logistics management service-wide, connected to the Internet. ➤ Regulated maritime critical infrastructure uses computers for cargo management and movement as well as physical security. These systems are Internet facing, if not connected. In short, the Coast Guard and infrastructure operators rely on digital information and communication technol- ogies. Because these systems are Internet-facing, the Coast Guard, like other government agencies and com- mercial enterprises, is threatened by malicious actors seeking to disrupt operations, steal information, and cause other bad things to happen in the cyber domain. Moreover, Internet-facing systems provide an attack sur- face through which these cyber threat actors can gain access to achieve their objectives. A computer-generated image of a Coast Guard search pattern chart. Increasingly, search planners rely on computer-generated search plan- ning and Rescue 21 communications, direction-fnding, asset tracking, and case fle management. If these systems are obstructed or the data altered through a cyber intrusion, there is considerable chance that not only will operational effectiveness be compromised, but lives may be lost. U.S. Coast Guard photo.

Articles in this issue

Links on this page

Archives of this issue

view archives of Proceedings Of The Marine - WIN 2015