177th Information Warfare Aggressor Squadron: Difference between revisions
reformatted, edited |
→Overview: edited and expanded |
||
Line 27: | Line 27: | ||
==Overview== |
==Overview== |
||
The mission of the squadron is to attack American military networks, to discover vulnerabilities before a real enemy does. |
|||
The Information Warfare Aggressor role is similar to the "tiger teams" commercial firms hire (and the air force pioneered) to test the defenses of corporate networks. The two aggressor squadrons have increased the quality and quantity of attacks that can be launched against U.S. systems, to see how well the defenses hold up. Members of the squadron then analyze the results of their attack. Finally, the aggressor hackers tell the sysadmins and other concerned personnel of the target unit what they did wrong, and why. |
|||
==History== |
==History== |
Revision as of 01:54, 10 October 2012
177th Information Warfare Aggressor Squadron | |
---|---|
Active | 1984-Present |
Country | United States |
Branch | Air National Guard |
Type | Squadron |
Role | Computer attack simulations |
Part of | Kansas Air National Guard |
Garrison/HQ | McConnell Air Force Base, Wichita, Kansas |
The 177th Information Warfare Aggressor Squadron (178 IWAS) is a unit of the Kansas Air National Guard 184th Intelligence Wing stationed at McConnell Air Force Base, Wichita, Kansas. The 177th is a non-flying squadron which trains in cyber warfare.
Overview
The mission of the squadron is to attack American military networks, to discover vulnerabilities before a real enemy does.
The Information Warfare Aggressor role is similar to the "tiger teams" commercial firms hire (and the air force pioneered) to test the defenses of corporate networks. The two aggressor squadrons have increased the quality and quantity of attacks that can be launched against U.S. systems, to see how well the defenses hold up. Members of the squadron then analyze the results of their attack. Finally, the aggressor hackers tell the sysadmins and other concerned personnel of the target unit what they did wrong, and why.
History
Lineage
assignments
Stations
Aircraft
References
This article incorporates public domain material from the Air Force Historical Research Agency