recommended reading

Sandia Draws From Nuclear Science in Inaugurating New Cyber Lab

A Sandia reseracher inspects a Thunderbird supercomputer component.

A Sandia reseracher inspects a Thunderbird supercomputer component. // Sandia National Laboratories

Sandia National Laboratories on Tuesday will inaugurate a cybersecurity center to perform offensive and defensive warfighting techniques that onsite nuclear weapons scientists have been practicing for decades.

The Cybersecurity Engineering Research Laboratory, which began operating in 2011, draws from nuclear research and development to test hardware vulnerabilities in closed facilities and model cyberweapons on supercomputers, Sandia officials said. Cybersecurity is one of the New Mexico-based lab’s defense systems missions. 

“Sandia’s cyber R&D capabilities are rooted in our [nuclear weapons] mission, and specifically weapons use-control engineering and adversarial threat assessment,” said Ben Cook, a senior manager for Sandia’s research and development science and engineering group.

Officials on Tuesday are expected to showcase several of the new lab’s capabilities in deflecting cyberattacks against citizens, businesses and governments. "Sandia was doing cyber before the term cyberspace existed," states the national laboratory's website.  

One demonstration will have students don electrode-studded caps that record the electrical activity of the brain, normally to spot tumors.  In this situation, the electroencephalograph headwear will track brain activity changes when students are doing math work to document and compare the skill level of cyber defenders.

Separately, a giant computer screen will illustrate how researchers cull huge amounts of email traffic to spot signs of malicious code, before the messages can do harm. “We are recognized leaders in high-performance computing R&D, a capability developed to do physics-based modeling and simulation related to our [nuclear weapons] mission that we’re now applying to do scalable informatics to identify anomalies in network and other data,” Cook said.

Various other federal investments over the years have positioned Sandia as a cyber pioneer, including a self-contained microelectronics design and fabrication facility. A big concern about computer safety is that electronic components are susceptible to tampering by any one of the thousands of humans who deal with a product during the manufacturing process. At Sandia, essentially, “we can build our own computer chips in a controlled environment, mitigating supply chain risks,” Cook said.

Sandia took an early interest in cybersecurity education about 10 years ago, with the creation of a cyber defenders student internship program. Cook explained, “With the advent of modern microelectronics and communication systems several decades ago, Sandia had to develop a very deep understanding of cryptography and other foundational cybersecurity concepts -- ranging from the device physics to the application level -- to rigorously protect weapon systems.”

Dignitaries scheduled to formally initiate the program on Tuesday include the CEO of supercomputer maker Cray and Sen. Tom Udall, D-N.M.

In November, cyber researchers at Sandia published a study that showed it is possible to predict whether online chatter will give rise to politically motivated cyberattacks. During one experiment, analysts examined diffuse mentions of key words on social media networks in 2010, after payment processors stopped handling donations to the anti-secrets website Wikileaks. The online dynamics suggested that WikiLeaks supporters would eventually perpetrate denial of service attacks to disrupt those companies’ websites -- which is ultimately what happened. 

Threatwatch Alert

Network intrusion / Software vulnerability

Hundreds of Thousands of Job Seekers' Information May Have Been Compromised by Hackers

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.