Page 14 - The Dispatch September 2018
P. 14

Attendees of the Jack Voltaic 2.0 cybersecurity exercise watch a video by a
          TEXAS MILITARY DEPARTMENT                                                 meteorologist explaining the impending hurricane.
                                                                                             (Photo Courtesy of the City of Houston)





































              JACK VOLTAIC 2.0 Tests





              REAL-WORLD RESPONSE







                                                               allowed  to  explore  and  complete  objectives  within  the
            Commentary By: Sgt. 1st. Class Roland Cisneros     range.
                  Texas Military Department J6
                                                               On the second day, we proceeded to the tabletop exercise,
          HOUSTON, Texas - In late July, I joined a contingent of Tex-  which was built around four turns:
          as Army and Air National Guardsmen at the Jack Voltaic
          2.0 Cyber Research Project, where we acted as observers.   Turn 1: Hurricane Miguel  approaches (Prepare and  Pre-
          We were fortunate the event took place in our own back-  vent) – (H-72 hours)
          yard—Houston, Texas—giving many of the Texas National   Turn  2:  Operations  against  infrastructure  organizations
          Guard’s state and local partner agencies an opportunity to   (Transportation, Water, Energy) – (H-12 hours)
          collaborate. Building on the success of the first Jack Voltaic   Turn 3: Operations against service organizations (Health-
          exercise in 2017, this year’s event was especially relevant   care, Government) – (H-hour)
          for our force, as it focused on the intersection of cyber-  Turn 4: Collective response and escalation – (H+12 hours)
          security and domestic disaster response. The event was
          hosted by Circadence, AECOM, Army Cyber Institute and   Throughout  the  exercise,  there  were  multiple  cyber  at-
          the City of Houston.                                 tacks and injects that corresponded to the escalating hur-
                                                               ricane category. Cyber-attacks included computer worms,
          Upon arrival on day one, we were given a live-fire exercise   data  breaches,  compromised  networks  and  software
          briefing, with a one-hour range overview, which included   hacks—all very real-life scenarios for both the private and
          operation, navigation and ground rules for the exercise.   public sectors.
          The  demonstration  range  included  two  missions  which
          covered analyzing network traffic, stopping malicious ex-  The objectives for the exercise were threefold: to better
          filtration and identifying and removing malware. We were   manage cyber and physical risks to critical infrastructure,

          14   TheDISPATCH  SEPTEMBER 2018
   9   10   11   12   13   14   15   16   17   18   19