3. The Adversary of Cybersecurity: Hackers 47 States government to collect foreign intelligence signals on domestic soil under specific circumstances. The NSA relies heavily on FISA to accomplish its national security mission. FISA and the Electronic Communications Privacy Act (ECPA) are occasionally seen to be in conflict because the ECPA protects the right to privacy for United States citizens (ECPA is explained in more detail in Chapter 10). It is vital that cyber warriors understand these laws so that they can properly protect the rights of all citizens. Title 10: Armed Forces of the United States Code, outlines the role of the United States Armed Forces (the Army, Marine Corps, Navy, Air Force, Space Force, and Coast Guard) and the Unified Combatant Commands (UCCs). The UCCs have broad, continuing missions and coordinate military activity either by geography or by specialty domain area. The United States Cyber Command (USCYBERCOM) was established in 2010 to unify the cyberspace operations of the military and has several components, including Army Cyber Command and Air Forces Cyber. Cyber operators acting under the authority of Title 10 carry out military missions in cyberspace, which have much broader goals than just SIGINT. USCYBERCOM’s seal contains the MD5 hash of their original mission statement (see Figure 3.2 and look closely around the inner ring): 9ec4c12949a4f31474f299058ce2b22a Section 7.2.3 of this text covers hashes and their significance to cybersecurity. Because technology underpins all five domains of warfare and intelligence operations, the DOD is a pioneer of cybersecurity in the United States and remains a foremost influence. Challenge coins are an important part of cybersecurity culture that has arisen out of the influence of the NSA, USCYBEROM, and the military. A challenge coin is a custom coin presented by a leader as a commendation for a job well done. Challenge coins originated in the military as a way of recognizing outstanding effort and accomplishments, and soldiers would carry them around in their pockets as a treasured keepsake. They became known as challenge coins because a group of soldiers could be challenged to present a coin and any that failed to produce one would have to buy drinks for those that did! Different organizations and units within an organization create their own coin designs bearing a seal or motto or other phrases and symbols of special significance, and leaders within those organizations hand them out at their discretion. The challenge coin tradition has been integrated into the cybersecurity industry and cybersecurity education in the academy, and collecting coins is a badge of honor for cyber professionals and students. An NSA challenge coin is shown in Figure 3.3. The motivation of cyber warriors is to improve their nation’s cyber defense and advance their national interests.
RkJQdWJsaXNoZXIy MTM4ODY=