US Army To Focus On Information Warfare

The US Commander Lieutenant General Stephen Fogarty says he wants to change the name of his command to Army Information Warfare Command, which he says would embody their new US military mission. 

“The intent is to provide a proposal that will change us from Army Cyber Command to Army Information Warfare Command, because we believe that is a more accurate descriptor of what I am being asked to do on a daily basis,” Fogarty said at the AFCEA TechNet Conference on August 20th. 

“We’re building cyber electro-magnetic activity cells in every brigade, division and corps in the Army in every Army service component command,” Fogarty explained. “That’s going to give a full time crew to that commander at that level. They won’t drop in and then pull out.”

The General hopes to place a full-time crew of cybersecurity professionals, from electronic warfare experts to information warfare practitioners, with each commander in the Army. This digital expertise, he says, would help leaders make decisions faster.

Not Easily Done
Similar efforts to distribute cyber personnel throughout the Army have not been successful so far, according a Government Accountability Office report issued earlier in August. The Army has been creating cyber units without addressing the new teams’ training and equipment needs, GAO found. For instance, the Army had tried in December to stand up a cyber battalion, known as a cyber warfare support battalion, intended to have 45-person expeditionary cyber teams. By March 2019 the unit still was understaffed by more than 80%, the GAO found.

“Army leadership believed the threats justify developing these units at an accelerated pace,” the report stated. “Consequently, the Army did not assess the staffing, equipping, and training risk before activating one unit.”

Fogarty alluded to these issues in his remarks Tuesday, saying that although the battalion is small now, its mission and structure will change. When it comes to reorganising the Army, he said, “if we wait until we get it perfect, we will be late to the game” compared to other countries.

Also part of the goal moving forward is to add elements of other information warfare techniques, such as psychological operations and military deception, throughout the Army, the spokesman said.

This shift comes as US Army Cyber Command also is undergoing a geographic change. It’s working with the National Security Agency and US Cyber Command to relocate to Fort Gordon, Georgia, where the new headquarters will include an information operations center.

CyberScoop

You Might Also Read: 

Shockwave - A Global Transformation In Warfare:

The Cyber Effect On Modern Warfare:

 

« Cyber Strategy & Cyber Security
Fact-Checking Comes To Instagram »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security create a secure digital environment for countries, governments, and organisations and implement cybersecurity resilience enhancement projects around the world.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Blackbird.AI

Blackbird.AI

Blackbird.AI provides an intelligence and early-warning system to help users detect disinformation and take action against threats.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

Orchid Security

Orchid Security

Orchid Security provides unprecedented insight and action to your identity security with the help of advanced technologies like Large Language Models (LLM).

Bluecyber Insurance

Bluecyber Insurance

At Bluecyber, we are revolutionizing the cyber insurance market, democratizing access to digital protection for small and medium-sized businesses.