An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.


NEWS | Oct. 11, 2017

Cyber games strengthen ties and technical skills

By Tech. Sgt. Jecca Geffre Colorado National Guard

​A cyber-attack is invisible, can be undeterred by boundaries, and extremely dangerous. The possibilities for damage are endless. Attacks can range from small annoyances to catastrophic damage to loss of life and property. 

Cyber security is the protection of computers, networks, programs and data from unintended or unauthorized access, change or destruction. It has been a concern for Colorado National Guard leadership, proactively defending against potential vulnerabilities, since the late 1990s for Y2K.

U.S. Army Lt. Col. Rhodes is the commander of Cyber Protection Team 174 and the Defensive Cyber Operations Element of the Colorado Army National Guard. He is recruiting personnel to fill positions in both units.

One of 10 teams across the U.S., CPT 174 is a 39-person National Guard element, shared with Utah, North Dakota, and South Dakota. Colorado is home to the command headquarters and the inspection team. “Our stated mission is to be the first military responder for major cyber incidents in FEMA [Federal Emergency Management Agency] Region 8,” Rhodes said. “Teams from each area can act as attackers, defenders, inspectors or hunters who seek out the threat.”

The DCOE team defends against local attacks on Department of Defense networks supporting CONG Soldiers and Airmen. The governor can also call upon the 10-person team to assist with defensive cyber operations during an incident affecting the state, when civilian assets are unavailable or exhausted. 

Rhodes emphasized how partnerships are important to cyber programs. 

“We work with groups that are in charge of important organizations and infrastructure,” Rhodes said. “Some organizations only think of cyber protection when they experience a significant problem or breach. We want a secure community that is leading the way.”

For example, the CONG participated in a cyber security exercise with Regis University Feb. 11-12, 2017, at the Regis campus in Greenwood Village, Colorado.

The exercise, which increased interagency coordination efforts, involved a critical infrastructure protection scenario, where one of the state’s 1,738 dams experienced a malicious cyber-attack.

The players divided into two teams; one team acted as the hackers and the other defended against attacks. During the afternoon, the teams switched roles, so that they could experience both perspectives. The teams included instructors and students from Regis University, CONG information technology specialists, employees of private and public companies, and industry experts who provided guidance along the way.

“The realistic exercise made it clear that this is something that could potentially happen,” said U.S. Air Force Tech. Sgt. Shugg, an information technology specialist from the Colorado Air National Guard’s 233rd Space Group. “It gave us the perspective of the attacker, which is very important when trying to defend a system.” 

U.S. Army Lt. Col. Martinez, the CONG director of joint IT and communications, emphasized how important trust is for those within the industry. 

“This was a great opportunity for us to build relationships, because IT is all about trust; you have to trust someone before you are going to allow them to do anything on your network,” he said. “This exercise allows the partner organizations to build that trust.”

Mr. Clark, an IT manager at Northern Water in Berthoud, Colorado, said he participated in the exercise so that he can contribute to the betterment of his organization’s cyber security plan. ”The scenarios were very educational,” he said. 

Rhodes said, “It’s an extremely rewarding experience to work in cyber for the military. If you come to cyber, you will get significant professional certifications and experience, making you extremely marketable, and you get to work in the cutting edge of the industry.”

“We’ve had people come to us from unexpected fields — Special Forces, aviators, etc.,” U.S. Army Chief Warrant Officer 2 Cobert said. Cobert, a DCOE member, was a key CONG cyber planner for the exercise. “They want to be involved with IT. They want to go to a whole new realm of training and experience and be a vital aspect of our security.”

“Every day people connect more things to the internet. Every day we’re creating more vectors, more surfaces, more opportunities for bad guys to do bad things,” Rhodes said. 

“The Guard has always been a force multiplier,” he said. “Our traditional [cyber operations] Soldiers bring a great deal of industry understanding and perspective to the fight. That experience engenders trust with our partner agencies.”

According to, more than a million cyber-related jobs will remain unfilled by the year 2020. 

“We need more people in this field; the Guard is a great place to get a start,” Rhodes said. “Our members become so much more marketable within the civilian sector; that’s just one advantage of being on a National Guard cyber team.”
February 2024 (1)
January 2024 (3)
December 2023 (5)
November 2023 (3)
October 2023 (6)
September 2023 (2)
August 2023 (3)
July 2023 (6)
June 2023 (4)
May 2023 (6)
April 2023 (2)
March 2023 (2)
February 2023 (2)
January 2023 (6)
December 2022 (5)
November 2022 (5)
October 2022 (2)
September 2022 (7)
August 2022 (5)
July 2022 (3)
June 2022 (7)
May 2022 (3)
April 2022 (4)
March 2022 (3)
February 2022 (4)
January 2022 (5)
December 2021 (7)
November 2021 (3)
October 2021 (2)
September 2021 (2)
August 2021 (6)
July 2021 (4)
June 2021 (1)
May 2021 (5)
April 2021 (5)
March 2021 (5)
February 2021 (2)
January 2021 (3)
December 2020 (3)
November 2020 (7)
October 2020 (6)
September 2020 (6)
August 2020 (8)
July 2020 (9)
June 2020 (7)
May 2020 (10)
April 2020 (9)
March 2020 (2)
February 2020 (4)
January 2020 (5)
December 2019 (6)
November 2019 (2)
October 2019 (8)
September 2019 (4)
August 2019 (7)
July 2019 (5)
June 2019 (2)
May 2019 (6)
April 2019 (9)
March 2019 (2)
February 2019 (2)
January 2019 (3)
December 2018 (4)
November 2018 (6)
October 2018 (2)
September 2018 (3)
August 2018 (9)
July 2018 (1)
June 2018 (1)
May 2018 (1)
April 2018 (5)
October 2017 (1)
May 2017 (1)
April 2017 (2)
March 2017 (2)
February 2017 (3)
January 2017 (1)
November 2016 (1)
October 2016 (2)
September 2016 (5)
August 2016 (3)
July 2016 (4)
May 2016 (2)
April 2016 (3)
March 2016 (1)
February 2016 (4)
January 2016 (1)
December 2015 (1)
November 2015 (3)
October 2015 (3)
September 2015 (2)
August 2015 (1)
July 2015 (1)
June 2015 (2)
May 2015 (3)
March 2015 (1)
February 2015 (1)
October 2014 (1)
September 2014 (1)
June 2014 (1)
April 2014 (1)
May 2013 (1)
April 2013 (4)
March 2013 (8)
February 2013 (9)
January 2013 (7)
November 2012 (1)
April 2012 (2)
January 2012 (1)
March 2010 (1)