US Steps Up Its Cyberwar Capability

The Trump administration is finalising plans to revamp the military chain of command for defensive and offensive cyber operations in the hope of boosting the US’s ability to wage cyber war against Islamic State and other foes.

Under the plans, US Cyber Command eventually would be split off from the intelligence-¬focused National Security Agency, according to US officials.

Details are still being worked out, but officials say they expect a decision and announcement in the coming weeks.

They said the goal was to give US Cyber Command more autonomy, freeing it from constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, Internet and other intelligence data from around the world, a responsibility that can sometimes clash with military operations against enemy forces.

Making Cyber an independent military command will put the fight in digital space on the same footing as more traditional realms of battle on land, in the air, at sea and in space.

The move reflects the escalating threat of cyber-attacks and intrusions from other countries, terrorist groups and hackers, and comes as the US faces increasing fears about Russian hacking following Moscow’s efforts to meddle in last year’s US presidential election.

The US has long operated quietly in cyberspace, using it to collect information, disrupt enemy networks and aid conventional military missions.

However, as other nations and foes expand their use of cyber-spying and attacks, the US is determined to improve its ¬ability to incorporate cyber operations into its war operations. Experts said the command would need time to find its footing.

“Right now I think it’s inevitable, but it’s on a very slow glide path,” said Jim Lewis, a cybersecurity expert with the Centre for Strategic and International Studies.

However, he said: “A new entity is not going to be able to duplicate NSA’s capabilities.”

For example, the NSA has 300 of the country’s leading mathematicians “and a gigantic super computer”, Mr Lewis said. “Things like this are hard to duplicate.”

Over time, the US had increasingly used cyber operations as a tactical weapon, bolstering the argument for separating it from the NSA, he said. The two highly secretive organisations, based at Fort Meade, Maryland, have been under the same four-star commander since Cyber Command’s creation in 2009. However, the Defence Department has been agitating for a separation, perceiving the NSA and intelligence community as resistant to more aggressive cyber-warfare.

Although the military wanted to attack Islamic State’s networks, intelligence objectives prioritised gathering information from them, according to US officials familiar with the ¬debate.

“NSA is truly an intelligence-collection organisation,” said Lauren Fish, a research associate with the Centre for a New American Security.

“It should be collecting information, writing reports on it. Cyber Command is meant to be an organisation that uses tools to have military operational effect.”

The Australian

You Might Also Read:

Cyber Warfare Takes A New Turn:

Cyberwar: A New Front For US Military:

 

« Australia Wants Technology Businesses To Act On Extremism
Key Concepts For Understanding Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

Recruit.net

Recruit.net

Recruit.net allows job seekers to instantly find millions of jobs from thousands of web sites with a single search.

Cyber Security Academy (CSA)

Cyber Security Academy (CSA)

The CSA aims to educate professionals who wish to contribute to strengthening the digital defensibility of states, organisations and individual citizens.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance is a nonprofit, nonpartisan collaboration of individuals, businesses, government entities, and professionals advocating for more effective cyber security solutions.

Axellio

Axellio

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network.

ConnectSecure

ConnectSecure

ConnectSecure (formerly CyberCNS) is a global cybersecurity company that delivers tools to identify and address vulnerabilities and manage compliance requirements.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Surf Security

Surf Security

SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.