177th Information Warfare Aggressor Squadron: Difference between revisions

Source: Wikipedia, the free encyclopedia.
Content deleted Content added
Bwmoll3 (talk | contribs)
reformatted, edited
Bwmoll3 (talk | contribs)
→‎Overview: edited and expanded
Line 27: Line 27:


==Overview==
==Overview==
The mission of the squadron is to attack American military networks, to discover vulnerabilities before a real enemy does.

The Information Warfare Aggressor role is similar to the "tiger teams" commercial firms hire (and the air force pioneered) to test the defenses of corporate networks. The two aggressor squadrons have increased the quality and quantity of attacks that can be launched against U.S. systems, to see how well the defenses hold up. Members of the squadron then analyze the results of their attack. Finally, the aggressor hackers tell the sysadmins and other concerned personnel of the target unit what they did wrong, and why.


==History==
==History==

Revision as of 01:54, 10 October 2012

177th Information Warfare Aggressor Squadron
177th Information Warfare Aggressor Squadron emblem
Active1984-Present
CountryUnited States
BranchAir National Guard
TypeSquadron
RoleComputer attack simulations
Part ofKansas Air National Guard
Garrison/HQMcConnell Air Force Base, Wichita, Kansas

The 177th Information Warfare Aggressor Squadron (178 IWAS) is a unit of the Kansas Air National Guard 184th Intelligence Wing stationed at McConnell Air Force Base, Wichita, Kansas. The 177th is a non-flying squadron which trains in cyber warfare.

Overview

The mission of the squadron is to attack American military networks, to discover vulnerabilities before a real enemy does.

The Information Warfare Aggressor role is similar to the "tiger teams" commercial firms hire (and the air force pioneered) to test the defenses of corporate networks. The two aggressor squadrons have increased the quality and quantity of attacks that can be launched against U.S. systems, to see how well the defenses hold up. Members of the squadron then analyze the results of their attack. Finally, the aggressor hackers tell the sysadmins and other concerned personnel of the target unit what they did wrong, and why.

History

Lineage

assignments

Stations

Aircraft

References

Public Domain This article incorporates public domain material from the Air Force Historical Research Agency