US Army To Focus On Information Warfare

The US Commander Lieutenant General Stephen Fogarty says he wants to change the name of his command to Army Information Warfare Command, which he says would embody their new US military mission. 

“The intent is to provide a proposal that will change us from Army Cyber Command to Army Information Warfare Command, because we believe that is a more accurate descriptor of what I am being asked to do on a daily basis,” Fogarty said at the AFCEA TechNet Conference on August 20th. 

“We’re building cyber electro-magnetic activity cells in every brigade, division and corps in the Army in every Army service component command,” Fogarty explained. “That’s going to give a full time crew to that commander at that level. They won’t drop in and then pull out.”

The General hopes to place a full-time crew of cybersecurity professionals, from electronic warfare experts to information warfare practitioners, with each commander in the Army. This digital expertise, he says, would help leaders make decisions faster.

Not Easily Done
Similar efforts to distribute cyber personnel throughout the Army have not been successful so far, according a Government Accountability Office report issued earlier in August. The Army has been creating cyber units without addressing the new teams’ training and equipment needs, GAO found. For instance, the Army had tried in December to stand up a cyber battalion, known as a cyber warfare support battalion, intended to have 45-person expeditionary cyber teams. By March 2019 the unit still was understaffed by more than 80%, the GAO found.

“Army leadership believed the threats justify developing these units at an accelerated pace,” the report stated. “Consequently, the Army did not assess the staffing, equipping, and training risk before activating one unit.”

Fogarty alluded to these issues in his remarks Tuesday, saying that although the battalion is small now, its mission and structure will change. When it comes to reorganising the Army, he said, “if we wait until we get it perfect, we will be late to the game” compared to other countries.

Also part of the goal moving forward is to add elements of other information warfare techniques, such as psychological operations and military deception, throughout the Army, the spokesman said.

This shift comes as US Army Cyber Command also is undergoing a geographic change. It’s working with the National Security Agency and US Cyber Command to relocate to Fort Gordon, Georgia, where the new headquarters will include an information operations center.

CyberScoop

You Might Also Read: 

Shockwave - A Global Transformation In Warfare:

The Cyber Effect On Modern Warfare:

 

« Cyber Strategy & Cyber Security
Fact-Checking Comes To Instagram »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

Australian Cyber Security Centre (ACSC)

Australian Cyber Security Centre (ACSC)

The Australian Cyber Security Centre (ACSC) brings cyber security capabilities from across the Australian Government together into a single location.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

Appgate

Appgate

Appgate is the secure access company. We empower how people work and connect by providing solutions purpose-built on Zero Trust security principles.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

Red Sky Alliance

Red Sky Alliance

Red Sky Alliance (Wapack Labs Corp) is a cyber threat intelligence firm that delivers proprietary intelligence data, analysis and in-depth strategic reporting.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Trackd

Trackd

At trackd, we’re re-imaging vulnerability remediation for the benefit of the entire cyber security community. Automating Vulnerability Remediation without the Fear of Disruption.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.