April 20, 2024

Crazz Files

Exposing the Dark Truth of Our World

‘hunter’ cyberweapon will use AI to search for security holes in computer networks

2DAA927500000578-0-image-a-28_1457472917613

US Air Force reveals its latest recruit: ‘hunter’ cyberweapon will use AI to search for security holes in computer networks

  • Cyberspace weapon system has just achieved ‘Full Operational Capability’
  • Tool can be used to perform vulnerability assessments and detect threats
  • This will help keep computers, infrastructure, and all cyberspace secure

By CHEYENNE MACDONALD FOR DAILYMAIL.COM

The US Air Force has unveiled its latest recruit – and it’s a piece of software. 

The Cyberspace Vulnerability Assessment/Hunter Weapon System has been declared capable of full operations, allowing it to scour military networks to look for security holes. 

It can be used to locate, assess, and target threats within the computer systems, helping to maintain the safety of both air and network operations.

THE CYBERSPACE WEAPONSThe US Air Force has added another cyberspace weapon to its ranks. The Cyberspace Vulnerability Assessment/Hunter Weapon System was recently declared capable of full operations, allowing it to serve as a leading component of the defence platform in the Air Force Information Network

The Cyberspace Vulnerability Assessment/Hunter Weapon System was recently declared capable of full operations.

When a threat to the network is detected, the system provides a way to track, target, engage, and assess it, and operate accordingly.

The network extends to computers, infrastructure, applications, data, and cyberspace operations, all of which the CVA/H will be working to protect. 

The declaration came barely a month after the same achievement was granted to the first cyberspace weapon system, the Air Force Intranet Control (AFINC) Weapon System.

‘CVA/H defends the Air Force’s ability to fly, fight and win in air, space, and cyberspace,’ said Brig. Gen.I Stephen Whiting, AFSPC Director of Integrated Air, Space, Cyberspace and ISR Operations. 

The system achieved Full Operational Capability status on February 12.

While it is referred to as a ‘weapons system,’ the Air Force explains this doesn’t necessarily mean the tool is a weapon.

Instead, it is a defence mechanism used by the Cyber Protection Teams to perform vulnerability assessments, adversary threat detection, and compliance evaluations.

The CVA/H weapon system can be used to gather information and perform ‘Hunt’ missions, including discovery and counter-infiltration missions, on the networks and systems of the Air Force and Department of Defence.

When a threat to the network is detected, the system provides a way to track, target, engage, and assess it, and operate accordingly.

There are four main components to the CVA/H weapons system: Mobile Interceptor Platform, the Deployable Interceptor Platform, the Garrison Interceptor Platform, and the Information Operations Platform-Fly Away Kit.

‘This achievement underscores our commitment to the U.S. Cyber Command Cyber Protection Team mission and to the defense of prioritized cyberspace terrain in the Air Force portion of the Department of Defense Information Network,’ said Brig. Gen.I Stephen Whiting, who signed the FOC declaration.

The network extends to computers, infrastructure, applications, data, and cyberspace operations, all of which the CVA/H will be working to protect. While it is referred to as a ‘weapons system,’ the Air Force explains this doesn’t necessarily mean the tool is a weapon. Instead, it is a defence mechanism to locate and assess threat

The network extends to computers, infrastructure, applications, data, and cyberspace operations, all of which the CVA/H will be working to protect.

CVA/H is the second cyberspace weapon to attain Full Operational Capability.

The declaration came barely a month after the same achievement was granted to the first cyberspace weapon system, the Air Force Intranet Control (AFINC) Weapon System, on January 7.

CVA/H has been in the works for three years. It was first designated a weapon system in March 2013 by the Air Force Chief of Staff. Later that year, it achieved Initial Operational Capability in June.

Now, the CVA/H weapon system joins AFINC as a fully operational tool against cyber threats. 

Source

http://www.dailymail.co.uk/sciencetech/article-3482923/US-Air-Force-reveals-latest-recruit-hunter-cyberweapon-use-AI-search-security-holes-computer-networks.html

1 thought on “‘hunter’ cyberweapon will use AI to search for security holes in computer networks

  1. “scan the network to look for security holes”
    what does this mean ?
    “it can be used to locate, assess & target threats within the computer system, helping to maintain the safety of both air & network opperations”
    so there are hickups in their software programs to begin with & this software looks for the glitches in the system & – repairds them – or alerts the establishment that there is a problem & that it needs to be call in the tech boys to fix the problems.
    AND THEY NEEDED TO TELL US THIS — WHY EXACTLY
    I am thrilled to bits by the news – but hey .

Leave a Reply to R Davis Cancel reply

Your email address will not be published. Required fields are marked *

Copyright © Crazz Files | Newsphere by AF themes.