Connect with us

Augusta, GA

AvengerCon VIII – Army Cyber’s homegrown hacker con returns

Published

on

AvengerCon VIII – Army Cyber’s homegrown hacker con returns


AUGUSTA, Ga. – AvengerCon VIII is an annual computer security conference hosted by the 780th Military Intelligence Brigade (Cyber) to benefit the hackers of the U.S. Cyber Command and the Department of Defense and took place at the Georgia Cyber Innovation & Training Center, February 28 and 29.

This year’s event was hosted in partnership with the Army Cyber Institute, the Army Cyber Command Technology and Innovation Center (ArCTIC), and the Cyber Infusion Innovation Center.

Advertisement

“AvengerCon is a computer security conference hosted by members of the 780th Military Intelligence Brigade,” said Capt. Jake Heybey, a 17C, cyberspace operations officer with the 780th MI Brigade (Cyber), and one of the lead organizers for AvengerCon VIII. “It has stuff like presentations, three tracks of speakers, we host training workshops, and we also run small village activities for attendees to participate in.”

Heybey said the event is important for three reasons.

“One is outreach. The Georgia Cyber Innovation & Training Center is a perfect example of what we’re looking for in terms of getting elements from the federal government, state governments, academia, and private industry to all be in one space and learn from and influence each another.”

The second reason is building a culture within the DoD. A big part of why we started AvengerCon was trying to get junior service members and Civilians within our units to reach out and experience the broader culture represented by larger conferences, like Black Hat or DefCon,” added Heybey. “We wanted AvengerCon to be kind of a stepping stone. If you wanted to experience or participate in that broader culture, AvengerCon can be your first and that friendly venue to start.”

And third, it’s really important to us that AvengerCon is an all-volunteer event,” said Heybey. “It’s always been a grassroots driven event and that contributes to the unit’s culture and really binds the various units together, and while we have volunteers mostly from the 780th Brigade, we also have volunteers from across Army Cyber Command, and even some from other services.”

Advertisement

Day one of AvengerCon was chock-full of workshops including: an introduction to module writing for the Flipper Zero; a hands-on Python programming workshop presented by Army Maj. Brent Stone, Cyber Solutions Development Detachment, U.S. Army Cyber Command (CSD-ARCYBER); an Introduction to Rootkit Development by Clark Wood, Boston Cybernetics Institute; Threat Hunting with Security Onion by Bryant Treacle, Security Onion Solutions; Introduction to Symbolic Execution by Jeremy Blackthorne, Boston Cybernetics Institute; a hands-on workshop where the participants learned GitLab CI/CD concepts and how to write effective pipelines; and Recorded Future invited attendees to participate in an exclusive Capture-the-Flag (CTF) event tailored specifically for their Department of Defense, U.S. Intelligence Community, and Federal partners.

Day two began with a talk from Col. Stephen Hamilton, Technical Director of the Army Cyber Institute, who discussed the confluence of “Leadership and Technology.”

Hamilton recalled being told by a general officer “you don’t have to be technical to be a good leader. True, that’s true. This is the viewpoint of the Army – leadership’s important; technical abilities, if you have them, kind of cool.”

However, to make his point when talking about the Army cyber branch, Hamilton used a quote from Capt. Benjamin Allison, currently a research scientist at West Point, “An officer cannot assume risk, if they cannot understand the risk.

His argument was to strengthen your leadership and technical abilities.

Advertisement

Following Hamilton’s remarks, the AvengerCon VIII keynote speaker was Army Col. Matthew Vea. Vea has worked at the National Security Agency supporting the nation’s intelligence requirements with cyber in both civilian and military capacities, and talked about the origins of Army Cyber.

Vea talked about the current stark divide between the senior folks, who he calls ‘staffers’ and the junior folks, who are the ‘doers.’ He mentioned that it might be a “strange way” to start a keynote; however, the resources to fix that gap were present at AvengerCon, both the seniors and the juniors.

The senior folks were the one originally called upon by General Ray Odierno to develop and grow the cyber branch, and while they were not necessarily the ones with the right backgrounds and made mistakes, they should be recognized for getting the force where it is today.

“To really maximize the potential of our branch, we basically have to take our heads out of the sand and acknowledge the gorilla in the room,” said Vea. “The message here isn’t that we’re a terrible branch, like I said earlier, we can’t grow and move forward unless we’re honest with ourselves about the mistakes that we made.”

“The advantage right now, though, is at least the O-5, O-6 tier groups (lieutenant colonels, colonels) are a gap point. Whereas before we’re talking about folks who have never done any of this before, the current generation has been at least CMT or NMT leads (Combat Mission Team / National Mission Team); been a mission commander at least, been with you while you conducted missions,” Vea explained they are the bridge to where the branch is going to. “My challenge for you is presence. Get away from your desks, get away from the staff (folks), and spend time with the ‘doers’. You need to understand the stress operators have, working an eight-to-12-hour op (operations), requiring absolute perfection to avoid creating an international incident, day after day after day. While also thinking I was supposed to be home at four to pick up the kids from school and if I’m in a SCIF (sensitive compartmented information facility) I can’t call them to let them know to walk home. Once you can articulate these challenges on your own without asking someone to tell me what to say then you can use your rank to push back on the really bad good idea faeries.”

Advertisement

Vea said the second fix is for the ‘doers’. He said a lieutenant pretty much summarized your fix when she said “We need all the old guys to retire so we can replace them.”

“She wasn’t wrong, but you’ll never have the leaders you want if you don’t stay in the Army,” explained Vea. “Basically, in about ten more years, there won’t be any excuse for any of these leadership, senior positions to be filled by someone else, never been an operator, never been an analyst, or never been an operator. Do the math, a second lieutenant operator in 2015, that first round, by 2033, (Soldier) should be an 0-6. Same with the NCO side. (Soldier) should be a sergeant major, a command sergeant major.”

“My challenge again to the doers. Don’t quit the Army,” reemphasized Vea.

The third fix, Vea explained, is on the Army Reserve support side of Cyber.

“There’s already a lot of operators, analysts, (developers) in the Reserves, but none of us are aligned with missions that actually support those training certifications” said Vea, and he’s made the to stay in the Army Reserves to try and address that.

Advertisement

Following the key note address, the rest of day two provided attendees with options to attend one of three presentation tracks taking place throughout the day, and a panel discussion focused on the recent innovations and mass proliferation of AI-driven tools, including large language models (LLMs) such as OpenAI’s ChatGPT, and other generative AI systems capable of creating or modifying text, audio, image, and video content.

The panel – Kevin Dwyer, VP of Engineering at Black Cape; Maj. Ian Garrett, U.S. Army Reserve and CEO/co-founder of Phalanx; and Dr. Ravi Starzl, Adjunct Professor at Carnegie Mellon University, hosted by 1st Lt. Adrian Naaktegeboren, U.S. Army Cyber Protection Brigade – explored topics including the current state of these tools, their current and potential uses supporting cybersecurity applications and U.S. government cyberspace operations, limitations and security flaws of these systems including prompt injection, and the potential consequences of this technology for the world’s larger information environment.

Army Maj. Skyler Onken, a 17C, is an Individual Mobilization Augmentee (IMA) Soldier with the 780th Military Intelligence Brigade (Cyber). IMAs are part of the Select Reserve and are an integral part of our modern-day force. Onken was one of the original organizers of AvengerCon.

“AvengerCon started as an idea years ago (in 2015 at an overcrowded Johnny Rockets)… The brigade was sending a number of people out to Las Vegas for DefCon and Black Hat. I was really fortunate to go,” said Onken. “One day, I was sitting the with Steve Rogacki, another member of the brigade, we were discussing how it would be super valuable for the entirety of the force to get exposed to this hacker culture, hacker community, and how, obviously, it wasn’t feasible to fly everyone out to Vegas – so what if we did something of our own where we used the opportunity for the public sector to come in and interact with the military, especially within cyber and bring that hacker culture to Soldiers, many of whom join the Army interested in cyber, but haven’t really been exposed to the hacker culture and that’s where we came up with the idea.”

The very first event was very small in scope, just under a hundred people, added Onken, and was named AvengerCon because A Company, 781st MI Battalion (Cyber) was nicknamed the Avengers, and it originally included only Soldiers and Civilians from the Avengers.

Advertisement

“After (the first) AvengerCon, we decided that it would be more beneficial for people if it was more inclusive, so we decided to go away from having a classified environment to just a purely unclassified environment where we could bring in more people and that would encourage more participation as well as bring in those industry people that we kind of always wanted to involve,” said Onken. “So, in year two we did (the event) at McGill Training Center (Fort George G. Meade, Maryland)… we brought in a car hacking village, an IOT hacking village, we got the same people that do the lock-picking village at DefCon (The Open Organisation Of Lockpickers, or TOOOL), the population grew, we made invitations for people outside the unit to make it as joint as possible.”

According to Onken, over the years AvengerCon has continued to evolve. Outgrowing McGill, and was, until recently, held at the MISI DreamPort facility in Columbia, Md. This year marks the first time the event has been held outside the state where the 780th MI Brigade is headquartered, and marks new partnerships and sponsors in Augusta, Ga., the home of U.S. Army Cyber Command, and where two of the brigade’s battalions – the 782d MI Battalion (Cyber), and 11th Cyber Battalion reside – as well as our sister unit, the Cyber Protection Brigade, the Cyber Center of Excellence, and U.S. Army Cyber School.

This year’s event also introduced the first ever electronic badge for AvengerCon called the “8-8-8 badge.” This conference badge doubled as a scavenger hunt to encourage participants to see all the conference has to offer. Participants either could collect codes and light up the LEDs, or hack the badge and bypass the contest altogether.

Returning AvengerCon volunteer, Army Capt. Richard Shmel, Army Cyber Institute, personally developed and made more than 300 electronic badges for this year’s event.

“Recruiting the next generation of volunteers has always been critical for ensuring the longevity of AvengerCon,” said Army Maj. Neil Milchak, one of the lead AvengerCon VIII organizers. “With the move of AvengerCon to Georgia this year, we were especially reliant on finding a cadre of supporters in the Fort Eisenhower area. We were blessed to find a host of talented and motivated Soldiers and Civilians from the 782d MI BN, 11th Cyber BN, and others from the greater ARCYBER community to lead and help. I’m excited to see how these new contributors will drive the future of AvengerCon!”

Advertisement

“Everywhere and Always…In the Fight!”

Date Taken: 02.29.2024
Date Posted: 02.29.2024 20:05
Story ID: 465055
Location: AUGUSTA, GA, US

Web Views: 42
Downloads: 0

PUBLIC DOMAIN  

Advertisement





Source link

Augusta, GA

Investigators interviewing person of interest in acid attack in Savannah’s Forsyth Park, mayor says

Published

on

Investigators interviewing person of interest in acid attack in Savannah’s Forsyth Park, mayor says


Savannah police and the FBI are continuing to follow any possible leads to find whoever is responsible for the acid attack in a local park that left a woman with severe burns.

During a media update on Tuesday, Savannah Mayor Van Johnson said a person of interest police were looking to identify is now being interviewed by investigators.

The person of interest, whom Johnson called “Bugs Bunny guy,” came in voluntarily and has not been identified as a suspect in the case at this time.

“He is not detained at this time. We are just asking questions of him,” Johnson said.

Advertisement

The mayor said that officers have interviewed dozens of individuals since the attack in Forsyth Park on Dec. 10.

In this photo provided by Connor Milam, her friend Ashley Wasielewski sits with bandages in a hospital bed in Augusta, Ga., on Thursday, Dec. 11, 2025, after witnesses she suffered severe burns when an unknown attacker poured a corrosive chemical over her head at a public park in Savannah. (Connor Milam via AP)

Connor Milam / AP


An unusual attack shocks Savannah

On that night, 46-year-old Ashley Wasielewski had gone for a walk after attending a Christmas program at a nearby church. She was walking laps at Forsyth Park when the attack happened. Her son, Westley Wasielewski, said he learned about what happened through a phone call from a bystander who stopped to help his mother. He said he could hear her screaming in pain over the phone.

Advertisement

Wasielewski suffered burns that covered about half of her body, including her scalp, face, and legs. 

From her hospital bed, Wasielewski told family and friends that she was walking along the sidewalk near the edge of the park when she noticed a shadow coming up behind her, said close friend Connor Milam. As she turned around, the person poured a liquid over her head.

“She was instantly like, ‘Why are you pouring water on me?’ And then her skin started to burn,” Milam told the Associated Press. “She looked down, and her pants were starting to burn off her body. She started screaming.”

Investigators later determined that the substance was acid.

ashley-wasielewski.jpg

Ashley Wasielewski was left with severe burns over half her body after what appeared to be a random acid attack while she was walking in a Savannah park.

Advertisement

Courtesy of GoFundMe


Investigation into acid attack continues

Johnson called the attack a “horrific incident” that shocked him and other Savannah residents “to the core.”

“In all of the time that I have been in law enforcement here and engaged in public service – over 30 years – I can not remember anything like this involving acid. And there are just so many questions,” Johnson said.

The Savannah Police Department took to social media to ask for the public’s help identifying a man seen on security footage near the park and the driver of a white SUV/Crossover that was spotted traveling on Whitaker Street. Both have since made contact with investigators.

The department is working with the FBI, which set up $5,000 reward on Monday for any information that leads to the arrest and conviction of the person responsible for the attack.

Advertisement

Police have increased patrols in city parks out of an abundance of caution and urged residents to stay aware of their surroundings and report suspicious activity. Officials do not believe there is any indication of an ongoing threat.

“We’re not going to let people scare us out of our parks,” Johnson said.

The FBI and the Savannah Police Department have established a digital tip line for photos and videos that may aid in the investigation here.

Anyone with information about the attack is urged to contact the Savannah Police Department at (912) 234-2020 or the FBI’s toll-free tip line at 1-800-225-5324.

Burn victim continues slow recovery

A GoFundMe page created by friends of Wasielewski has raised more than $170,000 to help cover her medical bills and long-term recovery costs. According to the page, the money will go toward burn unit care, surgeries, rehabilitation, wound care, skin grafts, and adaptive needs.

Advertisement

A friend provided a medical update saying most of Wasielewski’s burns have been diagnosed as third-degree and cover more than 50% of her body. The friend said it is unlikely hair will grow back on her scalp and that doctors are closely monitoring whether her body will accept cadaver skin following recent surgery before moving forward with skin grafting procedures.

Despite the attack, Johnson said that Wasielewski “has had a remarkable attitude.”

“The city will continue to be supportive to her on that end, and we’ll be very interested in justice and accountability on the other end,” he said. “Because I think what will make her feel best is to make sure that whoever did this is off of our streets.”

The Associated Press contributed to this report.

Advertisement



Source link

Continue Reading

Augusta, GA

Augusta Stars hosts Christmas bowling event with Fort Gordon soldiers

Published

on

Augusta Stars hosts Christmas bowling event with Fort Gordon soldiers


AUGUSTA, Ga. (WRDW/WAGT) – The Augusta Stars Special Olympics team hosted their annual Bowl with Soldiers Christmas party.

The goal was to bring together local athletes and military personnel from Fort Gordon for an evening of bowling at Bowlero.

The Augusta Stars is a Special Olympics team that offers bowling and basketball programs. The team is currently preparing for the Winter Special Olympics, which begin Jan. 30 in Marietta.

“I like the bowls because it’s fun and I like to get to play,” said Victoria Valootton, an Augusta Stars athlete.

Advertisement

The annual event allows soldiers to join the Special Olympics athletes for bowling and community connection.

“Personally, it’s important because Jeff Keating is one of our teammates and we want to support them,” said Sapriya McLendon, U.S. Army. “Secondly, just for the community in general, just coming out here and being part of the team that cares about us and supports us, and we’re here to serve you today.”

The Winter Special Olympics will be held in Marietta, Georgia, starting Jan. 30.



Source link

Advertisement
Continue Reading

Augusta, GA

Through pain, acid victim still smiling as she recovers in Augusta

Published

on

Through pain, acid victim still smiling as she recovers in Augusta


AUGUSTA, Ga. – A Savannah woman faces a long road to recovery after a stranger attacked her with acid that ate through her clothes and covered 50% of her body with burns.

Ashley Wasielewski is trying to recover after receiving a first round of emergency surgery at the Joseph M. Still Burn Center at Doctors Hospital in Augusta.

The attack happened last Wednesday at Savannah’s iconic Forsyth Park when a man stepped out of the shadows and poured acid all over Wasielewski.

The recovery has been extremely difficult, according to her friend Kristen Oddi, of Marietta.

Advertisement

Most of the burns have been diagnosed as third-degree, covering over 50% of her body, Oddi wrote on a GoFundMe page.

She said it’s unlikely one burned area of Wasielewski’s scalp will ever grow hair again.

She added that the most crucial next step is to see if Ashley’s body will accept the cadaver skin from a recent surgery.

If that happens, skin graft surgeries will proceed, Oddi said.

Plastic surgery is ahead for her, but there’s no timetable yet.

Beyond that, Wasielewski faces rehabilitation, occupational therapy, wound management, long-term support and follow-up.

Advertisement

For now, she’s stable, according to Oddi.

Women suffers third-degree burns in Forsyth Park acid attack; Community concerned
Women suffers third-degree burns in Forsyth Park acid attack; Community concerned(WTOC)

And despite the hardship she’s been through and that lies ahead, she’s smiling in a photo from her hospital bed, with little other than her eyes and mouth visible through openings in gauze that covers her face.

“She will come back so much stronger,” Oddi said. “That, I don’t have a single doubt about.”

The investigation continues

Police are looking for the suspect and have spoken with two witnesses.

They’re hoping to speak with a third person whose photo they posted and to find the driver of a vehicle that was spotted nearby.

Meanwhile, the FBI is offering a $5,000 reward for tips.

Advertisement



Source link

Continue Reading

Trending