An official website of the United States government
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Home : News : Article View
NEWS | Jan. 22, 2019

Guard cyber units evolve as cyber threats continue

By Sgt. 1st Class Jon Soucy National Guard Bureau

ARLINGTON, Va. – Just as the cyber threat has continued to evolve and grow, so too have the National Guard’s cyber teams and cyber capabilities, said Guard officials during a cyber roundtable discussion at the Pentagon.

“The cyber domain is constantly changing and it’s very dynamic,” said Air Force Brig. Gen. Jeffrey Burkett, the vice director of domestic operations with the National Guard Bureau.

That changing cyber domain also means looking differently at where cyber operators come from within the ranks.

"We tend to be very linear in our thinking sometimes,” said Air Force Col. Jori Robinson, vice commander of the Maryland Air National Guard’s 175th Wing and former commander of a cyber operations squadron and group. “You have to have a computer science degree, you have to come from a computer background and that is what makes a good cyber operator."

Turns out, said Robinson, some of the best cyber operations specialists may come from the aircraft maintenance field.

An Air Force study, she said, looked into elements that make an individual have the capacity to understand cyber networks, even if the specific computer network abilities aren’t there.

“That person over in maintenance who has been turning wrenches on a jet for the past 15 years, has the capacity and innate ability to understand networks and get a better idea, and they are turning out to make some of the most prolific and fantastic operators we have,” said Robinson.

For some Air Guard units, that comes as a benefit as missions shift and equipment changes. When the West Virginia Air National Guard’s 167th Airlift Wing transitioned from flying the C-5 Galaxy cargo aircraft to the smaller C-17 Globemaster III, that left many maintainers in limbo.

“C-17s don’t require as many maintainers as C-5s, so there was a net loss of people of force structure,” said Air Force Lt. Col. Jody W. Ogle, the director of communications and cyber programs with the West Virginia National Guard.

Using workforce development grants, many of those maintainers attended civilian education courses to retrain into the Guard’s cyber force.

“It was met with great success,” said Ogle, adding that about 50 maintainers made the switch.

Robinson echoed his sentiments.

“We’ve taken some of our maintainers and turned them into cyber operators and they are just crushing all of these classes and they are among the most sought-after folks by Cyber Command to come sit in on these teams,” she said.

Having another potential avenue to pull from is important, said Robinson, as the Maryland National Guard has a large concentration of cyber capability.

“It’s a very robust mission set in the state,” she said. “We run full spectrum operations for Cyber Command and 24th Air Force as well as on the Army side.”

That capability means filling a variety of roles.

“In the National Guard our core missions are one, fight America’s wars, two, secure the homeland and, three, build partnerships,” Burkett said. “We support the warfight by building fully integrated National Guard cyber units into operational federal missions. [We] protect the homeland by providing highly-trained cyber forces available to support mission-partner requirements.”

Those mission-partner requirements often focus on working with state and local agencies to assess and identify potential security risks in their networks.

“We provide vulnerability assessments, we’ll do some mission assurance, predominantly with the government agencies,” said Robinson, adding that Maryland Guard cyber units assisted the Maryland Board of Elections during recent elections in the state.

“We were called in pretty early with the Maryland Board of Elections just to have a conversation,” she said. “We provided a lot of lead up information, a lot of policy review and should they have needed it we were available going into the elections to do more over-the-shoulder monitoring [for potential cyber threats] for them.”

Robinson stressed, the cyber teams were strictly hands-off when it came to using computer hardware.

“We were very clear from the beginning that we were not going to be hands-on-keyboard,” she said. “The Board of Elections felt they had a strong handle on what was happening on the networks on Election Day.”

The Maryland Guard cyber units were able to easily integrate because of partnerships built between the Guard and those local agencies, stated Robinson.

Those partnerships are important.

“We learn a lot from our partners,” said Burkett. “We don’t necessarily have all the answers.”

For the Maryland Guard cyber units, one of the most beneficial partnerships has been an international one.

Since 1993 the Maryland Guard has been partnered with Estonia as part of the Department of Defense’s State Partnership Program, which pairs National Guard elements with partner nations worldwide. Since 2007, that partnership has included a strong cyber component, said Robinson.

That year saw Estonia suffered a massive hack to its computer infrastructure.

“What Estonia brings to the United States is quite fascinating because of the hack that happened in 2007, what it did to their critical infrastructure and their ability and how Estonia responded following that,” said Robinson.

The result was a total redo of network systems.

“They completely revamped their network system and how they do all online transactions,” said Robinson. “It’s a fascinating study in how you can add additional layers of encryption, additional layers of protection to everything that is online.”

It makes for a unique system, Robinson said.

”We’re learning a lot from them from that perspective,” she said, adding that cyber operations have been integrated into training exercises conducted with Estonian forces, including a large-scale training exercise in 2017 that incorporated both flying and cyber missions.

“We created an exercise where a massive attack, a piece of malware, had found its way on to the Estonian air base,” Robinson said, referring to the cyber portion of the exercise. From there, the exercise simulated the malware getting onto the computers used for maintenance of the A-10 Thunderbolt II aircraft that were used for the flying portion of the exercise.

The cyber operators had to respond quickly, said Robinson, just as if it were a real-world attack. And, it was both Estonian and Maryland Guard cyber elements responding.

“We worked side by side,” she said. “It was a fantastic exercise that we’re looking at expanding in 2020.”

Those exercises, and partnerships, only expand the Guard’s cyber capabilities, said Burkett.

“Learning and building those relationship and partnerships is what the National Guard does naturally,” he said, adding that’s critical as the cyber threat continues to evolve.

“There is nothing that cannot be hacked,” he said. “We are dependent upon our cyber infrastructure for critical systems to support our way of life. As long as we are dependent upon those systems, we are going to have to defend them.”

 

 

Related Articles
The Republic of Zambia's Brig. Gen. Choonga Mutandalike speaks to senior leaders from the North Carolina National Guard, representatives from the Republics of Moldova, Botswana, Malawi, and Zambia at a hurricane response symposium in Raleigh, N.C. April 22, 2025. The symposium was part of a six-day event hosted by the National Guard’s State Partnership program, reviewing and sharing lessons learned from Hurricane Helene.
North Carolina Guard Welcomes SPP Partners to Hurricane Response Exercise
By Lt. Col. Ellis Parks, | April 25, 2025
RALEIGH, N.C. – Senior leaders from the North Carolina National Guard are hosting representatives from Moldova, Botswana, Malawi and Zambia this week for a hurricane response exercise. The six-day event, from April 21-26 in...

A HH-60M Black Hawk, assigned to Wyoming Army Aviation Support Facility, releases water during an interagency bucket drop training at Camp Guernsey, Wyoming, on April 16, 2025. The training brought together Wyoming Aviation crews and partners including Wyoming State Forestry, Camp Guernsey Fire Department, Cheyenne Fire Rescue’s Wildland Team, Glendo Volunteer Fire & Rescue, Albany County Volunteer Fire Department, Yoder Volunteer Fire Department, Guernsey Rural Fire District, and the Platte County Fire Warden. The exercise was designed to sharpen skills like water bucket deployment, aerial coordination, and ground-to-air communications.
Wyoming Guard Aviators Sharpen Wildfire Response Skills in Training
By Staff Sgt. Cesar Rivas, | April 25, 2025
CAMP GUERNSEY, Wyo. – Wyoming Army National Guard aviators, in coordination with local and state firefighting agencies, conducted annual interagency bucket drop training April 16 at Camp Guernsey Joint Training Center,...

Tech. Sgt. Franklin Angel, 105th Airlift Wing production recruiter, poses for a photo with his two Blue Suit Awards at Stewart Air National Guard Base, New York, April 22, 2025. The Blue Suit Award recognizes the 14 top-performing recruiters from around the world, including those in active duty, the Air National Guard, and the Air Force Reserve.
Meet the New York Air National Guard’s Record-Setting Recruiter
By Senior Airman Sarah Post, | April 23, 2025
STEWART AIR NATIONAL GUARD BASE, N.Y. – One recruiter at the New York Air National Guard’s 105th Airlift Wing is standing out from his peers, having recruited more Airmen in 2024 than any other recruiter in the Air Force and...