FAS

Army Red Teams Test Communications Security

12.29.11 | 1 min read | Text by Steven Aftergood

A newly revised Army regulation prescribes the use of “red teams” that are assigned to try and penetrate the security of military communications, as if they were hackers or opposition forces.

“Red Team operations expose vulnerabilities by challenging an organization’s readiness and ability to protect information. Red Team activities focus on identifying an organization’s critical and classified information to show the operational impact of physical, information and operations security shortcomings,” the regulation explains. “To replicate a true adversary, certified Red Teams have the authority to access .mil networks from public domains through the use of remote operations.”

See “Communications Security Monitoring,” Army Regulation 380-53, December 23, 2011.

Among other changes to the previous edition of the regulation, the new revision “removes the requirement to obtain permission from the Assistant Secretary of Defense for Networks and Information Integration to conduct communications security monitoring in the National Capital Region.”

publications
See all publications
Government Capacity
Blog
The National Security Council’s Decision-Making Process: When Consensus Becomes a Constraint

The emphasis on interagency consensus, while well-intentioned, has become a structural impediment to bold or innovative policy options. When every agency effectively holds veto power over proposals, the path of least resistance becomes maintaining existing approaches with minor modifications.

01.22.25 | 4 min read
read more
Environment
Press release
Position on the Re-Introduction of H.R. 471 – The Fix Our Forests Act

The Federation of American Scientists supports H.R. 471, the re-introduction of the Fix Our Forests Act.

01.17.25 | 2 min read
read more
Emerging Technology
day one project
Policy Memo
Fighting Fakes and Liars’ Dividends: We Need To Build a National Digital Content Authentication Technologies Research Ecosystem

As people become less able to distinguish between what is real and what is fake, it has become easier than ever to be misled by synthetic content, whether by accident or with malicious intent. This makes advancing alternative countermeasures, such as technical solutions, more vital than ever before. 

01.17.25 | 12 min read
read more
Government Capacity
Blog
Herding Unicorns: Sharing Resources Speeds Hiring

Throughout this phase of work, there are many actions hiring managers and staffing specialists can take to streamline the process and improve the quality of eligible candidates. Most importantly, hiring managers and staffing specialists can collaborate within and across agencies to expedite and simplify the process.

01.17.25 | 10 min read
read more