CYBERCOM Elevated To Full Combatant Command Status

US Defense Secretary Ash Carter is considering turning US Cyber Command into a full combatant command, an acknowledgment that cyber warriors are today not just defending military networks but joining in combined-arms attacks on the enemy.

Pentagon leaders long have said that cyber has joined land, sea, air, and space as a new warfare domain. Especially in cyberspace, Carter said at the Center for Strategic and International Studies in Washington, “our reliance on technology has given us great strengths and great opportunities, but also led to vulnerabilities that adversaries are eager to exploit,”  

It is time, Carter said, to “consider changes to Cyber’s role in DOD’s Unified Command Plan.”

The military is currently organized into nine COCOMs: six geographic commands (Pacific, Europe, Africa, Middle East, etc.) and three that field specialized capabilities: special operations, nuclear (strategic) forces, and transportation. US Cyber Command, or CYBERCOM, is currently a sub-unified command under U.S. Strategic Command.

“I have given Cyber Command in the ISIL fight its first wartime assignment,” Carter said recently, referring to the historic role that network experts are playing in the Mosul offensive, described primarily as disrupting the group’s communications, command, and control capabilities.

“Increasingly, I’ve brought Strategic Command and Cyber Command into these operations as well to leverage their unique capabilities in space and cyber to contribute to the defeat of ISIL. Beyond terrorism,” Carter said. “A couple of years ago, that would never have occurred to a secretary of defense.”

The calculation has changed largely as a result of ISIS’s own behavior and what the Defense Department perceives as the need to fight ISIS on the group’s own turf, inside online communications networks. He described the thinking as: “Hey, these guys are using this tool. We need to take it away.”

Adm. Michael Rogers, commander of Cyber Command, told the Senate his unit was ready for the upgrade. Appearing before the Senate Armed Services Committee, he discussed the future of the fledgling Cyber Mission Force and defending networks and as part of the so-called Third Offset, the Defense Department’s bid to develop technologies to secure technological advantage. “USCYBERCOM stands ready to help develop and deploy the new cyber capabilities entailed in the Third Offset, particularly hardened command and control networks and autonomous countermeasures to cyber attack,” he said.

Becoming a Combatant Command “would allow us to be faster, which would generate better mission outcomes,” he said.

DefenseOne

« Convoy Of Self Driving Trucks Completes European Cross-Border Trip
#PanamaPapers: The Biggest Leak In History »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

Sentia

Sentia

Sentia is an IT and infrastructure firm, with focus on Outsourcing, IT operation and management, Hosting, Co-location, Network, and IT security.

Blancco Technology Group

Blancco Technology Group

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

LinkUp

LinkUp

LinkUp is a leading data-driven job search company. Every day we index millions of job openings directly from employer websites.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

Infosys

Infosys

Infosys is a global leader in consulting, technology and outsourcing solutions.. Services include IT strategy, technical architecture and operations including cybersecurity.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

Innerworks

Innerworks

Innerworks intelligent bot detection. Innerworks is building the future of behavioural data on web3.