Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • Fluid power
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • Leadership
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings

Cyberspace Critical To Nuclear Treaty Monitoring

By Susan A. Romano, AFTAC Public Affairs | August 30, 2017

Share

The Air Force Technical Applications Center here is charged with ensuring each and every nation across the globe complies with the ban on nuclear weapons testing, 24 hours a day, seven days a week. Members of AFTAC answer that call without fail – monitoring nuclear treaty compliance is their business.

To accomplish this task, the center uses a network of 3,600 worldwide sensors across multiple domains to collect a variety of data critical to revealing magnitude, yield and location of nuclear explosions. Regardless of what corner of the earth the data comes from or how the data is collected, the information must be transmitted back to the U.S. so analysts can transform the information into usable data that our national decision makers can rely on. 

While Airmen performing the data analysis are the best in the business, they could not execute their job without the skill and expertise of members of AFTAC’s Cyber Capabilities Squadron. The primary mission of CYCS is to generate, project and sustain cyberspace capabilities by providing mission assurance for AFTAC’s global enterprise. In other words, AFTAC’s treaty monitoring mission cannot be effectively accomplished without access to cyberspace.

“My squadron supports all information technology services that AFTAC needs to achieve operational success,” said Maj. Nathan Loyd, the CYCS commander. “We support the mission through our oversight and sustainment of our servers, long haul communications systems, databases, and hardware/software. AFTAC is responsible for the largest sensor network in the Air Force, and we take that responsibility very seriously.”

Loyd is a career cyberspace operations officer who took command of CYCS in July. Prior to joining the AFTAC team, he was assigned to various roles in the fields of cyber, electronic warfare, information systems and automations. His leadership philosophy is based on the foundation of trust.

“Trust is the single most important key to effective leadership-followership,” Loyd said. “Our cyber mission is too large for any one person to handle alone, so I believe in trusting and empowering our Airmen down to the lowest possible level. That allows for more flexibility across the board.”

In August 2016, Air Force Chief of Staff Gen. David L. Goldfein outlined his number one focus area – squadron revitalization. He informed personnel Air Force wide that he considers squadrons to be the basic building block of the force and our most essential team, and squadron commanders have the most profound and lasting impact on Airmen and families.

It’s a charge Loyd has taken to heart.

“The Air Force is focusing heavily on reinvigorating the role of squadrons based on feedback received from various climate surveys and strategic planning meetings,” said Loyd. “The chief of staff wants to empower squadrons to have more authority to make decisions at the lowest possible level. As a relatively new member of the AFTAC team, my goal is to take Gen. Goldfein’s vision and incorporate it into every decision I make and every action I take.”

A majority of CYCS’s efforts is tied to the DOD Information Network (DOIN) to ensure data confidentiality, integrity and availability. Loyd’s 150-person squadron is made up of a cross-section of talent – officers, enlisted, civilians and contractors – each filling critical roles as system and network administrators, help desk technicians, project managers and troubleshooters. 

“Like many organizations throughout the Air Force, our people-to-mission ratio is not quite right,” he said. “I’m working with my officers, civilian and senior enlisted leaders within the squadron to define where our limitations are, figure out what we can do to eliminate extraneous workloads, and determine how we can operate more efficiently with scarce resources.”

Today’s cyber landscape is ever-evolving and one that sees increasing threats from those who want to disrupt it, whether that disruption comes from simple non-malicious, attention-seeking hackers or from combative nation-states with the purposeful intent to interfere with military operations and their IT systems. Government entities, to include Air Force organizations, are dependent on computer networks and systems, and rely on those information systems to successfully execute their global missions. 

As with any complex IT operation, however, the systems are vulnerable, and Loyd’s team addresses this concern every day.

“Our biggest obstacle is balancing cybersecurity postures with the needs of a high operations tempo,” he explained. “AFTAC is a high-speed, enormously innovative organization that uses technology in its drive for change and evolution. So to balance that demand, it’s critical we ensure our CYCS Airmen are trained and certified to continually be on the cutting edge of technology.”

He added, “Here in CYCS, we are working towards standardizing our enterprise to increase efficiencies in system maintenance. Additionally, we are posturing the squadron to establish a Mission Defense Team, focusing on cyberspace defensive operations to our mission critical systems. This pathfinder initiative takes aim at protecting the mission’s crown jewels. It is an important shift in posture to ensure AFTAC is able to execute its treaty monitoring mission across air, sea, space and cyberspace.”

Col. Steven M. Gorski, the AFTAC commander, emphasized Loyd’s comment on the need to focus on cyberspace defense.

“In today’s world, cyber threats pose serious challenges to AFTAC,” Gorski said. “Here at AFTAC, access to networks play a powerfully role in our daily responsibilities. Lack of access can significantly impact the effectiveness of our organization, and that’s why having the best people on board – leaders like Maj. Loyd and his incredibly talented Airmen who form his cyber team – is crucial to our worldwide mission. Countering cyber threats is all about risk management, and Maj. Loyd’s squadron fully understands that threat and takes every step possible to keep our systems and networks safe.”

When asked what he sees as the Cyber Capabilities Squadron’s strongest asset, Loyd said, “Our squadron has done tremendous work in providing continuous, secure communications for AFTAC. CYCS’s shining moments are defined each time mission data is available on demand for our customers and delivered securely and without degradation. That’s the bottom line.”


Filed Under: Aerospace + defense, Cybersecurity

 

Related Articles Read More >

Mars helicopter receives Collier Trophy
Flexible rotary shafts to power Delta Airlines’ engines powering their first Airbus A321neo aircraft
Ontic acquires Servotek and Westcon product lines from Marsh Bellofram
Flexible rotary shafts support thrust reverser on 150 LEAP 1-A turbofan engines

DESIGN GUIDE LIBRARY

“motion

Enews Sign Up

Motion Control Classroom

Design World Digital Edition

cover

Browse the most current issue of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Renishaw next-generation FORTiS™ enclosed linear encoders offer enhanced metrology and reliability for machine tools
  • WAGO’s smartDESIGNER Online Provides Seamless Progression for Projects
  • Epoxy Certified for UL 1203 Standard
  • The Importance of Industrial Cable Resistance to Chemicals and Oils
  • Optimize, streamline and increase production capacity with pallet-handling conveyor systems
  • Global supply needs drive increased manufacturing footprint development

Design World Podcasts

June 12, 2022
How to avoid over engineering a part
See More >
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • Advertising
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Engineering White Papers
  • LEAP AWARDS

Copyright © 2022 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • Fluid power
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • Leadership
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings