After several delays, U.S. Cyber Command was established in May atFt. Meade, Md., under the umbrella of the U.S. Strategic Command.
Atthe helm is Air Force Gen. Keith B. Alexander, who is also director ofthe National Security Agency and head of the Central Security Service.Congress made him responsible for “directing the operations and defenseof the Defense Department’s information networks, the systemic andadaptive planning, integration and synchronization of cyber-activitiesand . . . for conducting full-spectrum military cyberspace operationsto ensure U.S. and allied freedom of action in cyberspace.”
Buthow will the command fulfill this mission? Part of the answer lies inhow the command prepares for a mission that requires the integration ofIT offices from all five services, all combatant commands, the nation’sintelligence services and by necessity the private sector, includingpublic utilities and industry, and local law enforcement. Factor in aswell foreign governments and non-state actors who are involved incyber-espionage or suspected of attacking the Defense Department’snetworks. All of this must be taken into account as Cyber Commandidentifies, connects and strengthens the latticework of 15,000different Pentagon networks, 4,000 military installations and more thanseven million Defense Department computer and telecommunication tools.The scope of the problem, considering the amount of hardware andsoftware that needs to be cataloged, ordered and protected, isstaggering.
Since the command has been set up totackle a new and emerging kind of warfare—one which hasn’t been fullydefined—it is critical that Cyber Command breaks out of the rigidhistorical and structural box that conventional U.S. combatant commandsoperate in, say several industry experts interviewed by DTI.
MichaelTanji, a security consultant who previously worked with the DefenseIntelligence Agency, National Security Agency and NationalReconnaissance Office, says the command should strive to “operate in amatrix fashion” and bring in the right staffers regardless of wherethey sit on the civilian/military divide, or even which service oroffice they report to, for any given problem. “A pyramid-shapedorganization chart, made up of smaller pyramid-shaped organizationcharts, is not going to work,” he says. “Cyber Command has to deal withoffense and defense, and the best way to do that is to have [everyone]work together to understand the adversary mindset and techniques.You’re a much better defender if you know how bad guys exploitsoftware; you’re a much better attacker if you know what defenders cando to stop you from succeeding.”
The notion thatthis command needs to find a new way of operating is shared by anotheranalyst, Richard Stiennon, who says “it’s not like setting up the AirForce or bringing in John Paul Jones to set up the Navy, where you takesome people at the beginning of an industry and have them do it. We’re10-15 years behind the times and playing catch-up.” Stiennon, chiefresearch analyst at IT-Harvest and an IT security adviser who hasworked for the Pentagon and private industry, adds, “Imagine if theNavy decided to get into aircraft carriers today, from scratch,”without having the benefit of decades of developing aircraft andcarrier technologies, tactics and procedures in tandem. That, he says,captures the scope of the task ahead. Stiennon says the first priorityof the command should be simple: start with the basics. “On Day 1, if[General] Alexander were to pound the table with his fist, it should beto discover and know every network connection and make sure it’sprotected. That’s a huge task. It would be expensive, but it’s got tobe done.”
An event in Washington in July,sponsored by the Armed Forces Communications and ElectronicsAssociation, brought together the major players from industry,cyber-office heads from the individual services and Cyber Commandleaders to figure out how some of these problems might be addressed.Bruce Held, director of intelligence and counterintelligence for theEnergy Department, warned that “a static cyber-defense can never winagainst an agile cyber-offense. No matter how many attacks the U.S.repels in the coming years, there will always be more on the way. “Youbeat me 99 times, I will come after you 100 times. Beat me 999 times, Iwill come after you 1,000 times,” and eventually, “I will beat you.”
ArmyBrig. Gen. John Davis, director of current operations at U.S. CyberCommand, said it is imperative that the offensive capabilities of themilitary are linked with other government agencies and the civilianworld, so the government can build “the frameworks to plan across thespectrum of conflict.”
Another panelist, EdMueller, chairman of the President’s National SecurityTelecommunications Advisory Committee, added that “we’ve made a bigpush over the last several years to become more tactical” when it comesto thwarting cyber-attacks. To continue innovating, “a bridge betweenprivate [industry] and public [government] is absolutely essential.”
Giventhe pervasive nature of the threat from hackers and even disgruntledservice members leaking information that each service has toconfront—the recent leak of 90,000 pages of tactical reports fromAfghanistan to the activist website WikiLeaks shows how pervasive thethreat is—one wonders how all of these different cyber commands aregoing to coalesce into one effective organization under U.S. CyberCommand. The new command’s director of plans and policy, USAF Maj. Gen.Suzanne Vautrinot, moderated a panel of cyber commanders from theservices, saying that “nobody here has one job,” since those taskedwith leading their services’ cyber-operations are “dual-hatted” toCyber Command.
USAF Brig. Gen. GregoryBrundidge added that the services have to “harmonize” their efforts,and quickly. He mentioned that when he was deployed to Iraq, theservices “were fighting to get information because everyone wasreporting through their own services. If there is one lesson we’velearned over the years, it’s that anything that brings our effortscloser together and harmonizes things is going to get us much fartheralong in our journey . . . what we’re all grappling with today is how .. . we bring all these things together that we have created in our owncocoons.”
In comments this summer to a group atthe Center for Strategic and International Studies, Alexander outlinedsome of the difficulties that Cyber Command faces under differentscenarios. For example: When the U.S. is at war with another state; astate uses an intermediary to “bounce” an attack (i.e., conceal itsinvolvement) against U.S. networks; or the U.S. is under attack bystateless entities. “Each one of those is going to have differentstanding rules of engagement,” Alexander said. “What we don’t have nowis precision in those standing rules of engagement, [which] we need.And we’re working through those with U.S. defense policy and up throughthe deputies’ committees for the administration.”
Whilethe command might not yet have methods to work through these problems,Stiennon says, the danger lies in the fact that “you can’t do thisslowly, the adversaries already know about the networks—they might knowmore about the network than the owners of the network. You’ve got toslam the door in their face, and you’ve got to do it now.”
Tanjisees the success of Cyber Command resting on the issue of whether theleadership can think, organize and behave as an information-ageenterprise. “If their model is that of every other military command,then they will fail,” he says. “They will spend their time fightinginternal and external battles. The only way they will succeed in amilitary command structure is if their authorities trump other commandand service level [structures]. To overcome that you need to bethinking about how to offer solutions or capabilities that multiply thepower of operational commands within that construct
Search
Followers
Tag Cloud
- ABM (7)
- Abu Dhabi (1)
- Aero-India-2011 (15)
- Afghanistan (5)
- Air defence System (4)
- Arjun Tank (6)
- Armoured Vehicles (10)
- Artillery (11)
- ASIA (1)
- Austrailia (3)
- AWACS (8)
- Ballistic Missile (1)
- Bangladesh (4)
- C-130 (2)
- china (173)
- CHINA-PAKISTAN-NUCLEAR-DEAL (1)
- CIA (1)
- Cobra heli (1)
- Cruise Missile (3)
- Cruise Missiles (2)
- Dubai Air Show (2)
- EF-2000 TYPHOON (8)
- European Union (4)
- F-16 (16)
- F-18 (6)
- F-22 (8)
- F-35 (18)
- FC-20 (6)
- Fighter Jet (151)
- France (15)
- Frigate (4)
- Germany (1)
- HAL-Dhruv (1)
- Helicopter (23)
- IDEAS DEFENCES SHOW (2)
- IDEF-2009 (1)
- IDEX (1)
- IL-78 (1)
- INDIA (196)
- Indonesia (3)
- Irag (2)
- Iran (27)
- Israel (14)
- J-10 (12)
- J-11 (1)
- J-16 (1)
- J-20 J-XX Chinese Stealth Fighter (16)
- J-20 J-XX fChinese Stealth Fighter (3)
- J-xx (7)
- Japan (5)
- JAS-39-Gripen (12)
- JF-17 (17)
- K-8 (2)
- L-15 (2)
- Laser_Weaponry (1)
- LCA (8)
- LCH (1)
- Malayasia (1)
- Martime Patrol Aircraft (2)
- MCA (2)
- Middle East (4)
- Mig-29 (1)
- Mig-35 (3)
- Missiles (51)
- Missiles Boat (1)
- MRCA (4)
- MRLS (1)
- NATO (1)
- NAVAL (61)
- North Korea (4)
- Nuclear (9)
- Nuclear Submarine (1)
- P-8i (2)
- PAC-3 (1)
- PAF (1)
- Pak-FA (15)
- Pakistan (87)
- Radar (30)
- Rafale (7)
- Rokestan (1)
- Russia (82)
- S-400 (1)
- Saudi Arabia (2)
- Sayria (5)
- Singapore (2)
- South korea (7)
- Space (3)
- Special-Reports (20)
- Sri Lanka (4)
- Stealth-Fighter (1)
- Su-27-30-35 (19)
- Submarine (21)
- Taiwan (11)
- Tank-MBT (18)
- Tanker Aircraft (2)
- Training Aircraft (3)
- Transport Aircraft (6)
- Turkey (25)
- UAE (3)
- UAV (32)
- UCAV (1)
- USA (73)
- Z-10 (3)
Popular Posts
-
The Indian Ministry of Defence has issued a tender for the import of 66,000 5.56 mm assault rifle for an estimated $250 million (Rs 13...
-
A German team is due in few days probably on August 5th according tosources to look into possibility of signing the accord for provision ofU...
-
China agree to give J-20/FC-20 5th Generation Stealth Fighter to Pakistan" Defence Minister Ahmad Mukhtar said. The J-20 is a singl...
-
U.S. plans for a missile defense system in Europe will pose a genuine threat to Russia's nuclear deterrence capability if they are ca...
-
On the 63rd Independence day Master Abdul Basit a 15 year old boy madea history to become soldier of Pakistan Army for a day. The young,patr...
-
India's state-owned Defence Research and Development Organization (DRDO) claims that it has completed upgrades on the Arjun tank, replac...
-
St. Petersburg's Severnaya Verf shipyard on Thursday started construction of a new corvette for The Russian Navy. The project 20385 c...
-
The cost of building the F-35 fighter jet, set to replace a large part of the US warplane fleet, is "unaffordable" in its curre...
Feedjit
Pakistan Military Watch Archieves
-
▼
2010
(512)
-
▼
September
(95)
- China’s Naval Build-up
- Pakistan Ready To Russian Arms
- Pakistan to use force to stop violations of its te...
- Iranian Navy Get The New Bavar-2 Flying Boats
- BEML Offers 155mm, Artillery Gun To Army
- SAAB Optimistic About MMRCA
- Osprey-Class Minehunter Coastal ships For India.
- Indian Navy Submarine strategy
- Boeing To Modernize B-52 Fighter Bombers
- India is expanding its defense ties with Japan
- Cross-Border Strikes By NATO Helicopters In Pakistan
- Iran says US Stuxnet Worm Is The begining of Elect...
- Iran nuclear plant staff computers targeted by St...
- MBDA Settles FREMM Frigate Missile Specifications
- Russia could make Aerial Drones without Israeli he...
- No Proof Iran Building Nuclear Weapons - Russian F...
- Israel to Cancel UAV deal with Russia over Syria...
- Russia Delivers Three Mi-35M helicopters to Indonesia
- Russia To Create DARPA Like Agency For Innovative ...
- Russia Bans Sale of S-300 Missiles And Other Weapo...
- Sukhoi Su-27SKM Passes Flight Tests At Indonesia
- Iranian Revolutionary Guards Receives New SAMs
- Russia developing laser weapons - military chief
- Flying Coffine MIG-27 Of IAF Crashes In West Bengal
- An eight-year-old Kashmiri went out to play. He ca...
- New Chinese SSK Fuels Asia's Submarine Race
- Denel Develops New Version Casspir APC
- India’s artillery News
- US-INDIA $3.5 billion defence deal
- IAF To Develop Nyoma Into A full-fledged airfield
- Indian Navy To Get Fast AttackCraft Kalpeni
- Prithvi 2 Missile Test on Sept 24
- Air Force says DRDO stalling Tejas fighter engine
- India Inspects Russian Shipyard Repairing Diesel E...
- Russia's Weapons Top Customer India
- LCA Undergoing Sea Trials
- Agni-5 To be Tested In 2011
- Gorshkov Cost $2.33 Billion: Navy
- Indian Navy Participates In IBSAMAR 2010 Excercise
- New Opportunities Mature for Alenia Aermacchi M-34...
- Sweden Funds METEOR missile Integration with the G...
- Hawks vs. Doves: Beijing Debates “Core Interests” ...
- EU Remains Divided On Lifting China Arms Embargo
- “Where’s the Nearest (U.S.) Carrier?” SPECIAL-REPORT
- Northrop Grumman G/ATOR Radar Is Candidate To Rep...
- Indo-Russian Fifth Genration Fighter Aircraft Pact
- Suicide Bombing Hit Military Base In Dagestan RUSSIA
- Poland To Get Bids for New Jet Trainer
- China Launch The Latest Submarine
- Indian Air Force To Launch Digital Information Grid
- Turkey looking partner the KF-X Program
- Indian Army To Face Raping Case
- Indian Army To Spend Billions on T-72 Tanks
- HAL-UAC Joint Venture To Build Military Transpo...
- India's Defence Spending 2nd Highest in Asia-Pacif...
- Sri Lanka & China Enhance Cooperation
- India Poland To Boost Defence Ties
- US Iran Attack Plans Revealed
- Hackers Trying To Steal Defence Secrets From India
- Indian close look-up of PAK FA fighter
- Strike Weapon of Today UAVs: Special-Report
- New Chinese SinoSat-6 Communication Satellite La...
- Space Satellite navigation deal Signed Between Rus...
- Arjun Mk-2
- Sarath An Infantry Combat Vehicle Tested in Medak:...
- New QBZ-95G Rifle New Variants Revealed: China
- India To Test Fire BrahMos Missile Off Coast Of Ea...
- U.S Bypasses Turkey For Withdrawal Of Heavy Weapo...
- Lockheed Martin And DOD Talks On Next JSF Batch T...
- French, U.S. Procurement Chiefs Discussed Predator
- UK, France Refuted Reports Of Joint Use Of Carriers
- China Is Ready To Lay Down Own Aircraft Carrier
- Pentagon Bomber Evolution Underway
- US Cyber Command Established
- New RFP Expected For Indian Wheeled Guns
- More Pics Of US Solders
- I Support My Troops But I Do Not Support The Unne...
- Operation Iraqi Freedom: The Real Terrorist Was M...
- Chinese Satellite Intentionally Nudged Another Spa...
- India To Build Un-Manned High Altitude Airship
- Ukraine Develops Modernised Seeker For R-27ET AAM
- Indian Army to Boost Electronic Warfare Capability
- India-US Seeking Greater Ties In Cyber Security
- India, South Korea Sign Five Year Defense Co-opera...
- PAF and Saudi Air force Refueling Exercise
- Laser Based Missile Defense System For Helicopters
- BAE Bofors 155mm Artiliery Gun Back in Indian Art...
- India To Spend 6.5$ Billion For Building Four Stea...
- China Refutes Reports Of Sending Troops To Pakista...
- China to be Biggest Exhibitor at Defence Expo 2010...
- Indian "RAW" is behind Pakistani Cricket Scandal
- Indians look into Russia’s fifth-generation jet fi...
- Saab Turns Towards Asia, Eastern Europe to Save G...
- India Will Get Harpoon Block II Missiles From US
- J-10 vs F-16 Technical Comparison
-
▼
September
(95)