recommended reading

Sandia Draws From Nuclear Science in Inaugurating New Cyber Lab

A Sandia reseracher inspects a Thunderbird supercomputer component.

A Sandia reseracher inspects a Thunderbird supercomputer component. // Sandia National Laboratories

Sandia National Laboratories on Tuesday will inaugurate a cybersecurity center to perform offensive and defensive warfighting techniques that onsite nuclear weapons scientists have been practicing for decades.

The Cybersecurity Engineering Research Laboratory, which began operating in 2011, draws from nuclear research and development to test hardware vulnerabilities in closed facilities and model cyberweapons on supercomputers, Sandia officials said. Cybersecurity is one of the New Mexico-based lab’s defense systems missions. 

“Sandia’s cyber R&D capabilities are rooted in our [nuclear weapons] mission, and specifically weapons use-control engineering and adversarial threat assessment,” said Ben Cook, a senior manager for Sandia’s research and development science and engineering group.

Officials on Tuesday are expected to showcase several of the new lab’s capabilities in deflecting cyberattacks against citizens, businesses and governments. "Sandia was doing cyber before the term cyberspace existed," states the national laboratory's website.  

One demonstration will have students don electrode-studded caps that record the electrical activity of the brain, normally to spot tumors.  In this situation, the electroencephalograph headwear will track brain activity changes when students are doing math work to document and compare the skill level of cyber defenders.

Separately, a giant computer screen will illustrate how researchers cull huge amounts of email traffic to spot signs of malicious code, before the messages can do harm. “We are recognized leaders in high-performance computing R&D, a capability developed to do physics-based modeling and simulation related to our [nuclear weapons] mission that we’re now applying to do scalable informatics to identify anomalies in network and other data,” Cook said.

Various other federal investments over the years have positioned Sandia as a cyber pioneer, including a self-contained microelectronics design and fabrication facility. A big concern about computer safety is that electronic components are susceptible to tampering by any one of the thousands of humans who deal with a product during the manufacturing process. At Sandia, essentially, “we can build our own computer chips in a controlled environment, mitigating supply chain risks,” Cook said.

Sandia took an early interest in cybersecurity education about 10 years ago, with the creation of a cyber defenders student internship program. Cook explained, “With the advent of modern microelectronics and communication systems several decades ago, Sandia had to develop a very deep understanding of cryptography and other foundational cybersecurity concepts -- ranging from the device physics to the application level -- to rigorously protect weapon systems.”

Dignitaries scheduled to formally initiate the program on Tuesday include the CEO of supercomputer maker Cray and Sen. Tom Udall, D-N.M.

In November, cyber researchers at Sandia published a study that showed it is possible to predict whether online chatter will give rise to politically motivated cyberattacks. During one experiment, analysts examined diffuse mentions of key words on social media networks in 2010, after payment processors stopped handling donations to the anti-secrets website Wikileaks. The online dynamics suggested that WikiLeaks supporters would eventually perpetrate denial of service attacks to disrupt those companies’ websites -- which is ultimately what happened. 

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.