CYBERCOM Elevated To Full Combatant Command Status

US Defense Secretary Ash Carter is considering turning US Cyber Command into a full combatant command, an acknowledgment that cyber warriors are today not just defending military networks but joining in combined-arms attacks on the enemy.

Pentagon leaders long have said that cyber has joined land, sea, air, and space as a new warfare domain. Especially in cyberspace, Carter said at the Center for Strategic and International Studies in Washington, “our reliance on technology has given us great strengths and great opportunities, but also led to vulnerabilities that adversaries are eager to exploit,”  

It is time, Carter said, to “consider changes to Cyber’s role in DOD’s Unified Command Plan.”

The military is currently organized into nine COCOMs: six geographic commands (Pacific, Europe, Africa, Middle East, etc.) and three that field specialized capabilities: special operations, nuclear (strategic) forces, and transportation. US Cyber Command, or CYBERCOM, is currently a sub-unified command under U.S. Strategic Command.

“I have given Cyber Command in the ISIL fight its first wartime assignment,” Carter said recently, referring to the historic role that network experts are playing in the Mosul offensive, described primarily as disrupting the group’s communications, command, and control capabilities.

“Increasingly, I’ve brought Strategic Command and Cyber Command into these operations as well to leverage their unique capabilities in space and cyber to contribute to the defeat of ISIL. Beyond terrorism,” Carter said. “A couple of years ago, that would never have occurred to a secretary of defense.”

The calculation has changed largely as a result of ISIS’s own behavior and what the Defense Department perceives as the need to fight ISIS on the group’s own turf, inside online communications networks. He described the thinking as: “Hey, these guys are using this tool. We need to take it away.”

Adm. Michael Rogers, commander of Cyber Command, told the Senate his unit was ready for the upgrade. Appearing before the Senate Armed Services Committee, he discussed the future of the fledgling Cyber Mission Force and defending networks and as part of the so-called Third Offset, the Defense Department’s bid to develop technologies to secure technological advantage. “USCYBERCOM stands ready to help develop and deploy the new cyber capabilities entailed in the Third Offset, particularly hardened command and control networks and autonomous countermeasures to cyber attack,” he said.

Becoming a Combatant Command “would allow us to be faster, which would generate better mission outcomes,” he said.

DefenseOne

« Convoy Of Self Driving Trucks Completes European Cross-Border Trip
#PanamaPapers: The Biggest Leak In History »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

Certes

Certes

Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM).

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

Lancera

Lancera

Lancera provides growth accelerating Software Development, Web Presence and Cybersecurity Solutions with a focus on customer happiness.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.

Synersoft BLACKbox

Synersoft BLACKbox

Synersoft, the maker of path-breaking and disruptive technology for SMEs, now branded as BLACKbox, is an incubated and invested portfolio company of CIIE - IIM-Ahmedabad.

InfoSight

InfoSight

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud.

HazeGrayCyber

HazeGrayCyber

HazeGrayCyber offers comprehensive technical services to bring your company to the next level.