US Steps Up Its Cyberwar Capability

The Trump administration is finalising plans to revamp the military chain of command for defensive and offensive cyber operations in the hope of boosting the US’s ability to wage cyber war against Islamic State and other foes.

Under the plans, US Cyber Command eventually would be split off from the intelligence-¬focused National Security Agency, according to US officials.

Details are still being worked out, but officials say they expect a decision and announcement in the coming weeks.

They said the goal was to give US Cyber Command more autonomy, freeing it from constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, Internet and other intelligence data from around the world, a responsibility that can sometimes clash with military operations against enemy forces.

Making Cyber an independent military command will put the fight in digital space on the same footing as more traditional realms of battle on land, in the air, at sea and in space.

The move reflects the escalating threat of cyber-attacks and intrusions from other countries, terrorist groups and hackers, and comes as the US faces increasing fears about Russian hacking following Moscow’s efforts to meddle in last year’s US presidential election.

The US has long operated quietly in cyberspace, using it to collect information, disrupt enemy networks and aid conventional military missions.

However, as other nations and foes expand their use of cyber-spying and attacks, the US is determined to improve its ¬ability to incorporate cyber operations into its war operations. Experts said the command would need time to find its footing.

“Right now I think it’s inevitable, but it’s on a very slow glide path,” said Jim Lewis, a cybersecurity expert with the Centre for Strategic and International Studies.

However, he said: “A new entity is not going to be able to duplicate NSA’s capabilities.”

For example, the NSA has 300 of the country’s leading mathematicians “and a gigantic super computer”, Mr Lewis said. “Things like this are hard to duplicate.”

Over time, the US had increasingly used cyber operations as a tactical weapon, bolstering the argument for separating it from the NSA, he said. The two highly secretive organisations, based at Fort Meade, Maryland, have been under the same four-star commander since Cyber Command’s creation in 2009. However, the Defence Department has been agitating for a separation, perceiving the NSA and intelligence community as resistant to more aggressive cyber-warfare.

Although the military wanted to attack Islamic State’s networks, intelligence objectives prioritised gathering information from them, according to US officials familiar with the ¬debate.

“NSA is truly an intelligence-collection organisation,” said Lauren Fish, a research associate with the Centre for a New American Security.

“It should be collecting information, writing reports on it. Cyber Command is meant to be an organisation that uses tools to have military operational effect.”

The Australian

You Might Also Read:

Cyber Warfare Takes A New Turn:

Cyberwar: A New Front For US Military:

 

« Australia Wants Technology Businesses To Act On Extremism
Key Concepts For Understanding Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

Netsafe

Netsafe

Netsafe is an independent, non-profit New Zealand organisation focused on online safety. We help people stay safe online by providing online safety education, advice and support.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

Acuant

Acuant

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

QuoLab

QuoLab

QuoLab empowers security professionals to analyze, investigate and respond to threats within an integrated ecosystem.

Reliance Cyber

Reliance Cyber

Reliance Cyber (formerly Reliance ACSN) help to monitor and manage your organisation’s security infrastructure 24/7, so you can make sure all threats and issues are dealt with.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

Sollensys

Sollensys

Sollensys is a leader in commercial blockchain applications. Our flagship product, The Blockchain Archive Server™ is the best defense against the devastating financial loss that ransomware causes.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.

Continent 8 Technologies

Continent 8 Technologies

Continent 8 Technologies is the leading provider of managed hosting, connectivity, cloud and cybersecurity solutions to the global online gambling industry.