JOINT BASE ELMENDORF-RICHARDSON, Alaska — An electronic sensor on the more than 800-mile stretch of the Trans-Alaska Pipeline System was just triggered. A potential leak is happening, so you send a team out to respond. When the team shows up, it was a false alarm, but then another alarm goes off, then another, and before you know it every sensor is chiming.
This scenario is very real, and all it takes is one malicious cyber attacker to make it happen.
As part of Arctic Eagle 2018, Alaska National Guardsmen trained on how to identify a potential cyber threat.
“We wanted to test what the operational impacts would be if this happened,” said Scott Moreland, exercise planner, Arctic Eagle 2018. “This will test the Guard’s ability to identify when it has happened and make sure it is being communicated.”
Arctic Eagle 2018 was an optimal time to conduct such a scenario. More than 1,100 Guardsmen from multiple states came to Alaska to participate in the multi-facet exercise.
Multiple cyber-based scenarios were part of the exercise. The first being a satellite crash and practicing cyber hygiene, followed by exercises on cybersecurity and cyber protection.[xyz-ihs snippet=”adsense-body-ad”]“We don’t currently have a real-world cybersecurity mission, so what we presently do is called cyber hygiene, which is focused on training, awareness and outreach,” said Capt. Robert Gordon, Director of Computers and Communications, Alaska National Guard. “If a threat actor, wanted to know what the National Guard is doing, they can track that through their social media,” he said. “That is where cyber hygiene can help stop the attackers.”
Not having an extensive cyber program, and facing real-world scenarios during an exercise, allows the Alaska National Guard to train and grow their program, and they called for assistance from other state National Guards to help.
Lt. Col. Thomas Pries, Director of Space and Integrated Air Defense, Washington Military Department, made the trip from Washington State to discuss the work being done in his home state in the cyber security domain.
“We have done some extensive work supporting public utility districts in Washington state,” said Pries. “The knowledge of our National Guard cyber professionals is invaluable, and has already assisted in strengthening the security of the networks our citizens rely on every day.”
Another part of Arctic Eagle 2018’s cyber exercise was to identify a phishing attack on the city of Valdez, mainly targeting the shipping port. The Port of Valdez handles more than 1.5 million barrels of crude oil, along with other goods annually.
“We chose the port because we wanted to know how much it could possibly disrupt the operations, and what actions would take place, mainly communicating with other organizations about the phishing attack,” said Moreland.
Starting to have those kinds of conversations, according to Moreland, was a priority during the exercise.
“We want to know if the message is getting out, so as one attack happens, then another, then another, were the other organizations warned, communication is critical when it comes to getting in front of mysterious disrupters,” said Moreland. “One of the goals of Arctic Eagle 2018 was to have scenarios that included security and protection of critical infrastructure, we feel like including cyber in the exercise meets the state’s intent.”