US Steps Up Its Cyberwar Capability

The Trump administration is finalising plans to revamp the military chain of command for defensive and offensive cyber operations in the hope of boosting the US’s ability to wage cyber war against Islamic State and other foes.

Under the plans, US Cyber Command eventually would be split off from the intelligence-¬focused National Security Agency, according to US officials.

Details are still being worked out, but officials say they expect a decision and announcement in the coming weeks.

They said the goal was to give US Cyber Command more autonomy, freeing it from constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, Internet and other intelligence data from around the world, a responsibility that can sometimes clash with military operations against enemy forces.

Making Cyber an independent military command will put the fight in digital space on the same footing as more traditional realms of battle on land, in the air, at sea and in space.

The move reflects the escalating threat of cyber-attacks and intrusions from other countries, terrorist groups and hackers, and comes as the US faces increasing fears about Russian hacking following Moscow’s efforts to meddle in last year’s US presidential election.

The US has long operated quietly in cyberspace, using it to collect information, disrupt enemy networks and aid conventional military missions.

However, as other nations and foes expand their use of cyber-spying and attacks, the US is determined to improve its ¬ability to incorporate cyber operations into its war operations. Experts said the command would need time to find its footing.

“Right now I think it’s inevitable, but it’s on a very slow glide path,” said Jim Lewis, a cybersecurity expert with the Centre for Strategic and International Studies.

However, he said: “A new entity is not going to be able to duplicate NSA’s capabilities.”

For example, the NSA has 300 of the country’s leading mathematicians “and a gigantic super computer”, Mr Lewis said. “Things like this are hard to duplicate.”

Over time, the US had increasingly used cyber operations as a tactical weapon, bolstering the argument for separating it from the NSA, he said. The two highly secretive organisations, based at Fort Meade, Maryland, have been under the same four-star commander since Cyber Command’s creation in 2009. However, the Defence Department has been agitating for a separation, perceiving the NSA and intelligence community as resistant to more aggressive cyber-warfare.

Although the military wanted to attack Islamic State’s networks, intelligence objectives prioritised gathering information from them, according to US officials familiar with the ¬debate.

“NSA is truly an intelligence-collection organisation,” said Lauren Fish, a research associate with the Centre for a New American Security.

“It should be collecting information, writing reports on it. Cyber Command is meant to be an organisation that uses tools to have military operational effect.”

The Australian

You Might Also Read:

Cyber Warfare Takes A New Turn:

Cyberwar: A New Front For US Military:

 

« Australia Wants Technology Businesses To Act On Extremism
Key Concepts For Understanding Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Digital Forensics Inc (DFI)

Digital Forensics Inc (DFI)

Digital Forensics Inc. is a nationally recognized High Technology Forensic Investigations and Information System Security firm

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Virsec Systems

Virsec Systems

Virsec detects and remediates previously “indefensible” advanced memory-based attacks on critical applications and server endpoints.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

Wiser Market

Wiser Market

Wiser Market is a leading company in global online brand protection services, intellectual property protection, anti-Counterfeit & trademark infringements.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

HackNotice

HackNotice

HackNotice Teams is an all-in-one encompassing tool that monitors threats within your organization, different vendors, and third parties whose services you use.

BIRD Cyber

BIRD Cyber

BIRD Cyber is a program to promote collaboration on cybersecurity and emerging technologies aimed at enhancing the cyber resilience of critical infrastructure.

The Cyber Scheme

The Cyber Scheme

The Cyber Scheme provides NCSC certified and assured assessments, training and career support for security testers & technical cyber professionals.