US Steps Up Its Cyberwar Capability

The Trump administration is finalising plans to revamp the military chain of command for defensive and offensive cyber operations in the hope of boosting the US’s ability to wage cyber war against Islamic State and other foes.

Under the plans, US Cyber Command eventually would be split off from the intelligence-¬focused National Security Agency, according to US officials.

Details are still being worked out, but officials say they expect a decision and announcement in the coming weeks.

They said the goal was to give US Cyber Command more autonomy, freeing it from constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, Internet and other intelligence data from around the world, a responsibility that can sometimes clash with military operations against enemy forces.

Making Cyber an independent military command will put the fight in digital space on the same footing as more traditional realms of battle on land, in the air, at sea and in space.

The move reflects the escalating threat of cyber-attacks and intrusions from other countries, terrorist groups and hackers, and comes as the US faces increasing fears about Russian hacking following Moscow’s efforts to meddle in last year’s US presidential election.

The US has long operated quietly in cyberspace, using it to collect information, disrupt enemy networks and aid conventional military missions.

However, as other nations and foes expand their use of cyber-spying and attacks, the US is determined to improve its ¬ability to incorporate cyber operations into its war operations. Experts said the command would need time to find its footing.

“Right now I think it’s inevitable, but it’s on a very slow glide path,” said Jim Lewis, a cybersecurity expert with the Centre for Strategic and International Studies.

However, he said: “A new entity is not going to be able to duplicate NSA’s capabilities.”

For example, the NSA has 300 of the country’s leading mathematicians “and a gigantic super computer”, Mr Lewis said. “Things like this are hard to duplicate.”

Over time, the US had increasingly used cyber operations as a tactical weapon, bolstering the argument for separating it from the NSA, he said. The two highly secretive organisations, based at Fort Meade, Maryland, have been under the same four-star commander since Cyber Command’s creation in 2009. However, the Defence Department has been agitating for a separation, perceiving the NSA and intelligence community as resistant to more aggressive cyber-warfare.

Although the military wanted to attack Islamic State’s networks, intelligence objectives prioritised gathering information from them, according to US officials familiar with the ¬debate.

“NSA is truly an intelligence-collection organisation,” said Lauren Fish, a research associate with the Centre for a New American Security.

“It should be collecting information, writing reports on it. Cyber Command is meant to be an organisation that uses tools to have military operational effect.”

The Australian

You Might Also Read:

Cyber Warfare Takes A New Turn:

Cyberwar: A New Front For US Military:

 

« Australia Wants Technology Businesses To Act On Extremism
Key Concepts For Understanding Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Mastercard

Mastercard

MasterCard is a leading global payments solutions company that serves consumers and businesses in over 210 countries and territories worldwide.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

HumanFirewall

HumanFirewall

HumanFirewall makes it possible for every individual to take part in securing their organisation. With HumanFirewall, achieving security has never been easier.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Quantum Xchange

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Safe Data Storage

Safe Data Storage

Safe Data Storage offer a fully managed, professional, secure UK-based online backup service to businesses, education and charities.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.