US Army To Focus On Information Warfare

The US Commander Lieutenant General Stephen Fogarty says he wants to change the name of his command to Army Information Warfare Command, which he says would embody their new US military mission. 

“The intent is to provide a proposal that will change us from Army Cyber Command to Army Information Warfare Command, because we believe that is a more accurate descriptor of what I am being asked to do on a daily basis,” Fogarty said at the AFCEA TechNet Conference on August 20th. 

“We’re building cyber electro-magnetic activity cells in every brigade, division and corps in the Army in every Army service component command,” Fogarty explained. “That’s going to give a full time crew to that commander at that level. They won’t drop in and then pull out.”

The General hopes to place a full-time crew of cybersecurity professionals, from electronic warfare experts to information warfare practitioners, with each commander in the Army. This digital expertise, he says, would help leaders make decisions faster.

Not Easily Done
Similar efforts to distribute cyber personnel throughout the Army have not been successful so far, according a Government Accountability Office report issued earlier in August. The Army has been creating cyber units without addressing the new teams’ training and equipment needs, GAO found. For instance, the Army had tried in December to stand up a cyber battalion, known as a cyber warfare support battalion, intended to have 45-person expeditionary cyber teams. By March 2019 the unit still was understaffed by more than 80%, the GAO found.

“Army leadership believed the threats justify developing these units at an accelerated pace,” the report stated. “Consequently, the Army did not assess the staffing, equipping, and training risk before activating one unit.”

Fogarty alluded to these issues in his remarks Tuesday, saying that although the battalion is small now, its mission and structure will change. When it comes to reorganising the Army, he said, “if we wait until we get it perfect, we will be late to the game” compared to other countries.

Also part of the goal moving forward is to add elements of other information warfare techniques, such as psychological operations and military deception, throughout the Army, the spokesman said.

This shift comes as US Army Cyber Command also is undergoing a geographic change. It’s working with the National Security Agency and US Cyber Command to relocate to Fort Gordon, Georgia, where the new headquarters will include an information operations center.

CyberScoop

You Might Also Read: 

Shockwave - A Global Transformation In Warfare:

The Cyber Effect On Modern Warfare:

 

« Cyber Strategy & Cyber Security
Fact-Checking Comes To Instagram »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Delphix

Delphix

Delphix is the industry leader for DevOps test data management.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

Riskified

Riskified

Riskified is a leading eCommerce fraud-prevention company, trusted by hundreds of global brands – from luxury fashion houses and retail chains, to gift card and ticket marketplaces.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

CyberUSA

CyberUSA

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience.

Intigriti

Intigriti

Intigriti helps companies protect themselves from cybercrime. Our community of ethical hackers provides continuous, realistic security testing to protect our customer’s assets and brand.

mxHERO

mxHERO

mxHERO reduces the risks inherent with ransom and cyber-security threats specific to email.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

HTL Support

HTL Support

HTL Support, your trusted partner for comprehensive IT support in London. We specialize in delivering top-tier IT solutions tailored to both large enterprises and small businesses.

Rebellion Defense

Rebellion Defense

Rebellion Defense is a technology company developing advanced software to ensure mission-critical organizations stay ahead of emerging threats.