US Army To Focus On Information Warfare

The US Commander Lieutenant General Stephen Fogarty says he wants to change the name of his command to Army Information Warfare Command, which he says would embody their new US military mission. 

“The intent is to provide a proposal that will change us from Army Cyber Command to Army Information Warfare Command, because we believe that is a more accurate descriptor of what I am being asked to do on a daily basis,” Fogarty said at the AFCEA TechNet Conference on August 20th. 

“We’re building cyber electro-magnetic activity cells in every brigade, division and corps in the Army in every Army service component command,” Fogarty explained. “That’s going to give a full time crew to that commander at that level. They won’t drop in and then pull out.”

The General hopes to place a full-time crew of cybersecurity professionals, from electronic warfare experts to information warfare practitioners, with each commander in the Army. This digital expertise, he says, would help leaders make decisions faster.

Not Easily Done
Similar efforts to distribute cyber personnel throughout the Army have not been successful so far, according a Government Accountability Office report issued earlier in August. The Army has been creating cyber units without addressing the new teams’ training and equipment needs, GAO found. For instance, the Army had tried in December to stand up a cyber battalion, known as a cyber warfare support battalion, intended to have 45-person expeditionary cyber teams. By March 2019 the unit still was understaffed by more than 80%, the GAO found.

“Army leadership believed the threats justify developing these units at an accelerated pace,” the report stated. “Consequently, the Army did not assess the staffing, equipping, and training risk before activating one unit.”

Fogarty alluded to these issues in his remarks Tuesday, saying that although the battalion is small now, its mission and structure will change. When it comes to reorganising the Army, he said, “if we wait until we get it perfect, we will be late to the game” compared to other countries.

Also part of the goal moving forward is to add elements of other information warfare techniques, such as psychological operations and military deception, throughout the Army, the spokesman said.

This shift comes as US Army Cyber Command also is undergoing a geographic change. It’s working with the National Security Agency and US Cyber Command to relocate to Fort Gordon, Georgia, where the new headquarters will include an information operations center.

CyberScoop

You Might Also Read: 

Shockwave - A Global Transformation In Warfare:

The Cyber Effect On Modern Warfare:

 

« Cyber Strategy & Cyber Security
Fact-Checking Comes To Instagram »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Park Place Technologies

Park Place Technologies

Park Place Technologies' mission is to drive uptime, performance and value for critical IT infrastructure.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.