Logo

American Security Council Foundation

Back to main site

Alan W. Dowd is a Senior Fellow with the American Security Council Foundation, where he writes on the full range of topics relating to national defense, foreign policy and international security. Dowd’s commentaries and essays have appeared in Policy Review, Parameters, Military Officer, The American Legion Magazine, The Journal of Diplomacy and International Relations, The Claremont Review of Books, World Politics Review, The Wall Street Journal Europe, The Jerusalem Post, The Financial Times Deutschland, The Washington Times, The Baltimore Sun, The Washington Examiner, The Detroit News, The Sacramento Bee, The Vancouver Sun, The National Post, The Landing Zone, Current, The World & I, The American Enterprise, Fraser Forum, American Outlook, The American and the online editions of Weekly Standard, National Review and American Interest. Beyond his work in opinion journalism, Dowd has served as an adjunct professor and university lecturer; congressional aide; and administrator, researcher and writer at leading think tanks, including the Hudson Institute, Sagamore Institute and Fraser Institute. An award-winning writer, Dowd has been interviewed by Fox News Channel, Cox News Service, The Washington Times, The National Post, the Australian Broadcasting Corporation and numerous radio programs across North America. In addition, his work has been quoted by and/or reprinted in The Guardian, CBS News, BBC News and the Council on Foreign Relations. Dowd holds degrees from Butler University and Indiana University. Follow him at twitter.com/alanwdowd.

ASCF News

Scott Tilley is a Senior Fellow at the American Security Council Foundation, where he writes the “Technical Power” column, focusing on the societal and national security implications of advanced technology in cybersecurity, space, and foreign relations.

He is an emeritus professor at the Florida Institute of Technology. Previously, he was with the University of California, Riverside, Carnegie Mellon University’s Software Engineering Institute, and IBM. His research and teaching were in the areas of computer science, software & systems engineering, educational technology, the design of communication, and business information systems.

He is president and founder of the Center for Technology & Society, president and co-founder of Big Data Florida, past president of INCOSE Space Coast, and a Space Coast Writers’ Guild Fellow.

He has authored over 150 academic papers and has published 28 books (technical and non-technical), most recently Systems Analysis & Design (Cengage, 2020), SPACE (Anthology Alliance, 2019), and Technical Justice (CTS Press, 2019). He wrote the “Technology Today” column for FLORIDA TODAY from 2010 to 2018.

He is a popular public speaker, having delivered numerous keynote presentations and “Tech Talks” for a general audience. Recent examples include the role of big data in the space program, a four-part series on machine learning, and a four-part series on fake news.

He holds a Ph.D. in computer science from the University of Victoria (1995).

Contact him at stilley@cts.today.

U.S. Air Force Successfully Hacked By ‘Battalion’ Of 60 Hackers

Friday, April 17, 2020

Categories: ASCF News Emerging Threats Cyber Security

Comments: 0

During four weeks towards the end of 2019, a total of 60 hackers managed to hack the U.S. Air Force.

Between October 23 and November 20, what was described as "a battalion of hackers" by Dr. Michael Parker, CIO, and deputy chief of U.S. Air Force staff for manpower, personnel and services, took aim at the Air Force Virtual Data Center.

This really is not as bad as it first seems. The hackers were of the white hat variety and taking part in the fourth Hack the Air Force challenge. A challenge, operated in partnership between the U.S. Department of Defense and the HackerOne hacking platform, designed to strengthen security posture rather than weaken it.

Hack The Air Force 4.0

Hack the Air Force 4.0 was, as the name suggests, the fourth hacker-powered challenge to probe the cybersecurity of U.S. Air Force assets. However, it is the tenth challenge in all that has been completed since the first Hack the Pentagon project was launched back in 2016 and led to the Department of Defense establishing a vulnerability disclosure policy.

A Hack the Army challenge first ran at the end of 2016, while the first Hack the Air Force one started in May 2017. Hack the Army 2.0 took place between October 9 and November 15, 2019. As I reported at the time, 52 hackers were able to find 146 security vulnerabilities and were rewarded with bounties totaling $275,000 (£220,000) for their efforts.

460 vulnerabilities revealed, $290,000 rewarded

During Hack the Air Force 4.0, the 60 hackers taking part managed to uncover 460 vulnerabilities and earned $290,000 (£232,000) in bounties. The vulnerabilities were found within the pool of cloud-based servers and systems known as the U.S. Air Force Virtual Data Center. "It is the U.S. Air Force’s goal to be leaders, innovators and warriors in air, space and cyberspace," Dr. Michael Parker said, "partnering with HackerOne will allow us to take the necessary risks to harden our defenses with the assurance of a battalion of hackers on our side."

12,000 vulnerabilities resolved by joint DoD and HackerOne programs

Since that first Hack the Army program, which found a total of 118 vulnerabilities, things have gone from strength to strength as far as these elite hackers are concerned. Thanks to the efforts of all the ethical hackers concerned down the years, the U.S. Department of Defense has managed to fix more than 12,000 vulnerabilities.

That is 12,000 vulnerabilities that might never have been found by the good guys and so potentially left open to be exploited by enemies of the United States instead. "The U.S. Air Force provides an example of the proven impact of collaborating with hackers to bolster security," Jon Bottarini, the federal technical program manager lead at HackerOne, said.

Photo: U.S. Air Force was hacked by 60 hackers over a four week period - GETTY

Link: https://www.forbes.com/sites/daveywinder/2020/04/16/us-air-force-successfully-hacked-by-battalion-of-60-hackers/#8dc199b39f95

Comments RSS feed for comments on this page

There are no comments yet. Be the first to add a comment by using the form below.