SOCIAL MEDIA ENVIRONMENT AND INTERNET REPLICATION

ANTICIPATING CYBER WARFARE THREATS

From replicating real life social media environments that facilitate the enemy’s operations, to delivering nation state intelligence, surveillance, and reconnaissance of mission critical infrastructure, we prepare our nation’s military with multi-domain training and intelligence.

TRADITIONAL CYBER TRAINING IS NO MATCH FOR TODAY'S CHALLENGES

Today’s virtual training environments are segmented and simplistic, failing to adequately prepare warfighters and cyber operators for the complex challenges they will confront on the cyber battlefield. Using outdated and one-dimensional training, our armed forces are unable to outpace the operational tempo of the rapidly-evolving multi-domain battlefield. In this virtual arena, where new threats emerge each day, better tools are needed to anticipate and prepare for the risks of tomorrow.

Huge epic laptop war iStock-155216701 smaller.jpg

Train Smart

A total solution integrating all aspects of the training life cycle

Social Media Environment and Internet Replication™, a product of IDS International, is a digital training solution that provides an immersive, realistic, and scalable operational practice environment. In this environment, warfighters simultaneously train on social media analytics and full-spectrum cyberspace operations, during integrated and multi-dimensional exercises. 

Content is flexible and customizable, covering everything from social media analysis and engagement, to network mapping. Before each training exercise, commanders provide experts with their operational problem sets, then the platform is tailored to provide force-on-force scenarios that address each problem set. Subject matter experts (SMEs) lead each training exercise, providing real-time feedback for every client operator. Once the exercises are complete, SMEs perform after-action reviews, providing additional recommendations to bolster operational readiness.

By replicating realistic internet environments within a closed network, our platform delivers the ability to conduct unrestricted offensive and defensive cyber and information operation training. It is the only solution of its kind to combine information operations and a cyber range into one virtual training platform. 

Our platform is used at the Joint Readiness Training Center, National Training Center, Cybertropolis, and at civilian locations hosting Mission Readiness Exercises. US Army Special Forces, Psychological Operations, and Civil Affairs units from team to battalion levels have all used our platform to meet their training needs.  

CAPABILITIES

We deliver the ability to conduct unrestricted offensive and defensive combat information operations training while replicating realistic internet environments in closed network environments. Content is flexible and customizable, covering everything from social media analysis and engagement, to network mapping.

 

The platform addresses the experience gap operators often face between the time they receive classroom training, to when they must operationalize their training in combat environments. It is comprised of five core capabilities:  

WEBSITE AND SOCIAL MEDIA REPLICATION

EXERCISE DEVELOPMENT & MANAGEMENT

MALICIOUS TRAFFIC GENERATION

SUBJECT MATTER EXPERTS

VIRTUALIZED NETWORKS

Multi-Domain-Battlespace.jpg

IMPLEMENTATION AND DEPLOYMENT

Training is delivered on a unique platform that can be implemented in one of three ways:

  • Client site: platform license is installed on an approved client site server.

  • DISA compliant cloud: Clients are able to remotely log into the platform from any Internet connected device. This allows all replicated Internet content, social media platforms, and networks on the server to be stored and easily accessed via a secured connection.

  • Physical deployment: SMEs deploy to the client site with an air-gapped server. The platform server is physically deployed and operated without a live Internet connection. Using this option, the platform can be accessed locally via WIFI and/or closed physical connections at the customer’s discretion.

Regardless of implementation method, trainers populate content and deliver command-specific training, ensuring a comprehensive, virtual, and live training environment.