US Army To Focus On Information Warfare

The US Commander Lieutenant General Stephen Fogarty says he wants to change the name of his command to Army Information Warfare Command, which he says would embody their new US military mission. 

“The intent is to provide a proposal that will change us from Army Cyber Command to Army Information Warfare Command, because we believe that is a more accurate descriptor of what I am being asked to do on a daily basis,” Fogarty said at the AFCEA TechNet Conference on August 20th. 

“We’re building cyber electro-magnetic activity cells in every brigade, division and corps in the Army in every Army service component command,” Fogarty explained. “That’s going to give a full time crew to that commander at that level. They won’t drop in and then pull out.”

The General hopes to place a full-time crew of cybersecurity professionals, from electronic warfare experts to information warfare practitioners, with each commander in the Army. This digital expertise, he says, would help leaders make decisions faster.

Not Easily Done
Similar efforts to distribute cyber personnel throughout the Army have not been successful so far, according a Government Accountability Office report issued earlier in August. The Army has been creating cyber units without addressing the new teams’ training and equipment needs, GAO found. For instance, the Army had tried in December to stand up a cyber battalion, known as a cyber warfare support battalion, intended to have 45-person expeditionary cyber teams. By March 2019 the unit still was understaffed by more than 80%, the GAO found.

“Army leadership believed the threats justify developing these units at an accelerated pace,” the report stated. “Consequently, the Army did not assess the staffing, equipping, and training risk before activating one unit.”

Fogarty alluded to these issues in his remarks Tuesday, saying that although the battalion is small now, its mission and structure will change. When it comes to reorganising the Army, he said, “if we wait until we get it perfect, we will be late to the game” compared to other countries.

Also part of the goal moving forward is to add elements of other information warfare techniques, such as psychological operations and military deception, throughout the Army, the spokesman said.

This shift comes as US Army Cyber Command also is undergoing a geographic change. It’s working with the National Security Agency and US Cyber Command to relocate to Fort Gordon, Georgia, where the new headquarters will include an information operations center.

CyberScoop

You Might Also Read: 

Shockwave - A Global Transformation In Warfare:

The Cyber Effect On Modern Warfare:

 

« Cyber Strategy & Cyber Security
Fact-Checking Comes To Instagram »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

C2B2 Consulting

C2B2 Consulting

C2B2 are experts in middleware support and consultancy. We specialise in ensuring scalability, performance and security of large scale systems.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

Sintef Digital

Sintef Digital

Sintef Digital carries out research in Information and Communication Technology for industry and the public sector.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

Rimini Street

Rimini Street

Rimini Street is a global provider of enterprise software support products and services, and the leading third-party support provider for Oracle and SAP software products.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.