US Steps Up Its Cyberwar Capability

The Trump administration is finalising plans to revamp the military chain of command for defensive and offensive cyber operations in the hope of boosting the US’s ability to wage cyber war against Islamic State and other foes.

Under the plans, US Cyber Command eventually would be split off from the intelligence-¬focused National Security Agency, according to US officials.

Details are still being worked out, but officials say they expect a decision and announcement in the coming weeks.

They said the goal was to give US Cyber Command more autonomy, freeing it from constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, Internet and other intelligence data from around the world, a responsibility that can sometimes clash with military operations against enemy forces.

Making Cyber an independent military command will put the fight in digital space on the same footing as more traditional realms of battle on land, in the air, at sea and in space.

The move reflects the escalating threat of cyber-attacks and intrusions from other countries, terrorist groups and hackers, and comes as the US faces increasing fears about Russian hacking following Moscow’s efforts to meddle in last year’s US presidential election.

The US has long operated quietly in cyberspace, using it to collect information, disrupt enemy networks and aid conventional military missions.

However, as other nations and foes expand their use of cyber-spying and attacks, the US is determined to improve its ¬ability to incorporate cyber operations into its war operations. Experts said the command would need time to find its footing.

“Right now I think it’s inevitable, but it’s on a very slow glide path,” said Jim Lewis, a cybersecurity expert with the Centre for Strategic and International Studies.

However, he said: “A new entity is not going to be able to duplicate NSA’s capabilities.”

For example, the NSA has 300 of the country’s leading mathematicians “and a gigantic super computer”, Mr Lewis said. “Things like this are hard to duplicate.”

Over time, the US had increasingly used cyber operations as a tactical weapon, bolstering the argument for separating it from the NSA, he said. The two highly secretive organisations, based at Fort Meade, Maryland, have been under the same four-star commander since Cyber Command’s creation in 2009. However, the Defence Department has been agitating for a separation, perceiving the NSA and intelligence community as resistant to more aggressive cyber-warfare.

Although the military wanted to attack Islamic State’s networks, intelligence objectives prioritised gathering information from them, according to US officials familiar with the ¬debate.

“NSA is truly an intelligence-collection organisation,” said Lauren Fish, a research associate with the Centre for a New American Security.

“It should be collecting information, writing reports on it. Cyber Command is meant to be an organisation that uses tools to have military operational effect.”

The Australian

You Might Also Read:

Cyber Warfare Takes A New Turn:

Cyberwar: A New Front For US Military:

 

« Australia Wants Technology Businesses To Act On Extremism
Key Concepts For Understanding Artificial Intelligence »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

FoxGuard

FoxGuard

FoxGuard develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

InPhySec

InPhySec

InPhySec is a leading New Zealand information, physical and cyber security company.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

SwiftSafe

SwiftSafe

SwiftSafe is a cybersecurity consulting company providing auditing, pentesting, compliance and managed security services.

National Health Care Anti-Fraud Association (NHCAA) - USA

National Health Care Anti-Fraud Association (NHCAA) - USA

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

SNC-Lavalin

SNC-Lavalin

SNC-Lavalin is a fully integrated professional services and project management company with offices around the world.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.