Kamal Toufic Jabbour (born July 27, 1957) is a retired member of the Scientific and Professional Career Service of the United States of America SES having served for 15 years as the United States Air Force Senior Scientist for Information Assurance.[1] He is also the Founding Director of the Advanced Course in Engineering Cyber Security Boot Camp for ROTC cadets,[2] developer of the Bachelor of Science in Cyber Engineering,[3] and designer of the trademarked Cyber Blue Book[4][5] for cyber vulnerability assessment of Air Force missions and weapons.[6]
From 1997 to 2003, he wrote a weekly article on running for The Post-Standard. In 1997, Jabbour and his wife Marla helped to establish The Stabler Running Collection at Syracuse University by donating over 500 books that tell the stories of runners and races.[12]
Jabbour is an ordained elder in Presbyterian Church (USA) and covers the pulpit in pastors' absences. He has preached on light,[13] the prophet Elijah,[14] happiness and joy,[15] gratitude not guilt,[16] good and evil,[17] his testimony,[18] the star of Bethlehem,[19] a republic if you can keep it,[20] and singing a new song.[21]
Academic career
Jabbour joined the electrical and computer engineering faculty at Syracuse University as an assistant professor in 1982, and earned tenure and promotion in 1989. He served as chairman of the department of electrical and computer engineering at Syracuse University from 1990 to 1993.[22] In 1999, he created TrackMeets.com[23] to broadcast track meets through the Internet in TV quality video.[24] In 2001, Jabbour co-founded Syracuse University's Center for Systems Assurance which received National Security Agency designation as a Center of Excellence in Information Assurance.[25]
Jabbour studied the adverse effects of group delay distortion on the performance of computer networks during his post-graduate research, and carried this interest into his post-doctoral work.[26][27][28][29]
Jabbour researched using Artificial Intelligence (AI) to study the impact of weather on electric power systems with funding from Niagara Mohawk Power Corporation.[54][55][56][57] He developed an Automated Load Forecasting Assistant (ALFA)[58] and a Gas Automated Load Forecaster (GAuLF),[59] explored load flow analysis on parallel computers,[60] and invented a patented approach for alarms processing.[61]
Following his appointment as United States Air Force Senior Scientist for Information Assurance in 2007, Jabbour published a booklet to educate airmen on the cyberspace domain,[75] followed by a journal paper on the science and technology of cyber operations.[76][77]
He served on three studies of the United States Air Force Scientific Advisory Board: Implications of Cyber Warfare,[78] Defending and Operating in a Contested Cyber Environment,[79] and Cyber Vulnerabilities of Embedded Systems on Air and Space Systems.[80] Jabbour acted as lead for the Air component of Cyber Vision 2025 United States Air Force Cyberspace Science and Technology Vision 2012-2025,[81] exploring the role of cyberspace in the air mission of the United States Air Force.[82]
In 2010, Jabbour created a curriculum outline for a bachelor of science degree in cyber engineering, and called on universities to implement it,[83] likening the time to that of the creation of astronautics engineering at the dawn of the space age half a century earlier.[84][85]Louisiana Tech University answered the call and implemented the first cyber engineering curriculum.[86] In 2015, Jabbour gave the commencement address at Louisiana Tech,[87][88] awarding the diploma to the nation's first cyber engineering graduate.[3]
In 2011, the commandant of the U.S. Air Force Test Pilot School asked Jabbour to create a cyber course to educate test pilots on the dependence of modern aircraft on cyber and the resulting mission risks of cyber vulnerabilities. Jabbour taught the resulting Cyber Systems Test Course from 2012 to 2019.[89][90][91] Jabbour examined the risks of cyber fratricide, or friendly cyber fire, and its unforeseen consequences,[92] and the role of deterrence in cyber warfare.[93]
In a seminal paper on the science of mission assurance in the Journal of Strategic Security, Jabbour introduced the information lifecycle as the foundation for mission assurance against cyber risk, and presented 12 rules that govern cyber vulnerability assessment of systems and missions.[94][95] Jabbour codified the information lifecycle approach to cyber vulnerability assessment in the Cyber Blue Book[4][96] methodology that enabled the Air Force Operational Test and Evaluation Center to assess over 100 weapon systems.[97] Jabbour educated United States Air Force engineers on conducting systematic cyber vulnerability assessments that informed the testers in designing repeatable operational tests on these systems. This approach, and the teams that implemented it, increased the readiness of weapons and earned Air Force-level honors and awards.[98][99]
Jabbour looked beyond the current global information grid, and outlined a vision for next-generation military networks.[100] He sought to move the posture of critical missions from resilience to robustness, and proposed anti-fragility as a desired objective.[101]
Jabbour advocated mission assurance through correct design by mathematical specification of requirements and formal verification of implementations. He received a US patent for a method for manufacturing and executing single-use systems with proven security properties over the life of a mission.[102]
Astronomy
In 2024, Jabbour received appointment as visiting scholar at the Physics and Astronomy Department at the State University of New York at Oswego, where he operates the observatory at the Rice Creek Field Station[103] and assists in astronomy research, instruction and public outreach activities. Jabbour contributes data to the Hunting Outbursting Young Stars (HOYS) citizen science project[104] at the University of Kent in the UK, and serves as a DWARFLAB[105] Ambassador, assisting in beta testing of astronomy hardware and software.
^Jacobs, David (2017). "Where Is The Air Force Brand?"(PDF). The Reporter - Education and Outreach for the Judge Advocate General's Corps. 44 (2): 66–68 – via AFJAG.
^Cerqueiro, Manuel; Makhoul, George; Ju, Ru-Lin; Jabbour, Kamal (1989). "Modeling and performance evaluation of FDDI ring". Proceedings of the 32nd Midwest Symposium on Circuits and Systems. 2: 955–959 – via IEEE Xplore.
^Parashar, M; Hariri, S; Jabbour, K (1992). "An expert system for performance management". [1992] Proceedings of the 35th Midwest Symposium on Circuits and Systems. pp. 1052–1055. doi:10.1109/MWSCAS.1992.271113. ISBN0-7803-0510-8. S2CID14462184.
^Parashar, Manish; Hariri, Salim; Jabbour, Kamal (1995). "An Expert System for Performance Management". Proceedings of the 35th Midwest Symposium on Circuits and Systems – via Siteseerx.
^US4977390A, Saylor, Charles H. M. & Jabbour, Kamal, "Real time method for processing alaarms generated within a predetermined system", issued 1990-12-11
^Yannakogeorgos, Panayotis A.; Geis, John P.; Hagel, Stephen; Dacus, Chad; Conway, John L.; Lowther, Adam B.; Drinnon, Steven (2016). Introduction: Project Context and Methodology (Report). Air University Press. p. 11.
^Saunders, Thomas (2007). Implications of Cyber Warfare. United States Air Force Scientific Advisory Board.
^Sztipanovits, Janos (2008). Defending and Operating in a Contested Cyber Domain. United States Air Force Scientific Advisory Board.
^Chow, James (2015). Cyber Vulnerabilities of Embedded Systems on Air and Space Systems. United States Air Force Scientific Advisory Board.
^Maybury, Mark (15 July 2012). Cyber Vision 2025: United States Air Force Cyberspace Science and Technology Vision 2012-2025. United States Air Force Chief Scientist AF/ST.
^Lowther, Adam (December 2013). Thinking about Deterrence (1st ed.). Maxwell AFB, AL, USA: Air University Press. pp. 37–47. ISBN978-1-58566-227-2.{{cite book}}: CS1 maint: date and year (link)
^Schlichting, Alexander (January 2018). Assessment of Operational Energy System Cybersecurity Vulnerabilities (MITRE TECHNICAL REPORT MTR 180048 ed.). The MITRE Corporation. pp. 7-25 to 7-28, 9–53.{{cite book}}: CS1 maint: date and year (link)