The Pentagon Has A Clear View Of Cyberwar

US Cyber Command’s first dedicated facility is providing government leaders a more holistic view of the global cyber environment and helping them make more informed decisions. The Integrated Cyber Center and Joint Operations Center, or ICC/JOC, is Cyber Command’s first dedicated facility and doubles as the US government’s first truly integrated cyber center.

Staffers there work with domestic and international partners to provide more rapid sharing of threat information while de-conflicting global cyber operations.

As part of the military’s operation to defend the US midterm elections in 2018, an operation known internally in the Department of Defense as “Synthetic Theology,” Cyber Command deployed cyber-warriors to Ukraine, North Macedonia, and Montenegro to help defend those countries’ networks, and to collect intelligence on adversaries.

US Cyber Command is still working overseas with allies to try preventing election interference, Brig. Gen. Timothy Haugh, the commander of Cyber Command’s cyber national mission force said during a roundtable at the Integrated Cyber Center and Joint Operations Center in Fort Meade, Maryland.

The facility’s operations floor, which operates 24/7, is organised by warfighting functions to include protection, intelligence, fires, sustainment and a leadership cell, officials told reporters May 7 during a first of its kind media briefing at the facility at Fort Meade.

The leadership cell houses Cyber Command’s joint operations center’s top officials and sits the battle captain right next to the NSA’s Cybersecurity Threat Operations Center director. This arrangement didn’t previously exist, Col. Joy Kaczor, director of current operations at Cyber Command, told reporters. Under the previous arrangement, information sharing was much slower.

“Now they’re sitting right next to each other and they both have different perspective on things but now they can also provide Gen. Paul Nakasone head of Cyber Command and director of the National Security Agency… a common understanding across both organisations, that shared picture of what is happening in this space,” she said.

This arrangement is critical especially as it relates to the network protection cell, she said. NSA analysts are looking at their sensors and sharing that information with Cyber Command so officials there can work with their NSA counterparts to take necessary steps to defend themselves across government sectors.

Similarly, in the intelligence cell, NSA analysts can pass addition information back and forth to get a clearer picture from an offensive and defensive perspective.

The sustainment cell is responsible for ensuring all the tools, equipment and sensors are up and running. The only cell on the operations floor that exclusively has Cyber Command personnel is the fires cell. Fires in military parlance refers to specific actions taken such as shooting a missile or using a cyber effect.

The military, and by extension Cyber Command, is the only US entity authorised to take such offensive actions, which is why they are the only personnel in the fires cell. 

While the ICC/JOC does not conduct operations, the fires cell merely works to coordinate and help de-conflict offensive cyber operations that might be occurring globally between different cyber entities.

FedAgent:      CyberScoop

You Might Also Read:

US Cyber Command Can Cut Russian Troll Access:

US Cyber Soldiers Go To The Battlefield:               

 


 

« Google Plan To Use Drone Delivery In Australia
US Campaigners Get Trained About Cyber Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

Gatefy

Gatefy

Getfy is a cybersecurity company specialized in artificial intelligence and machine learning. We work to solve challenging issues, especially those involving email security.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

Black Girls In Cyber (BGiC)

Black Girls In Cyber (BGiC)

Black Girls In Cyber's mission is to increase industry awareness and diversity in cybersecurity, privacy, and STEM for women of color.

Computacenter

Computacenter

Computacenter is a leading independent technology partner, trusted by large corporate and public sector organisations. We help our customers to source, transform and manage their IT infrastructure.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.