Army Cyber Command

June 29, 2017
By Sandra Jontz
U.S. Army Chief of Staff Gen. Mark A. Milley, USA, visits soldiers serving with the cyber electromagnetic activities (CEMA) support to corps and below (CSCB) team, 780th Military Intelligence Brigade, in May at the National Training Center in Fort Irwin, California. Photo by Sgt. 1st Class Chuck Burden, USA

The U.S. Army is serious about the narrative that it is serious about cyber. The service has put its organizational architecture on the line by prioritizing the newest warfighting domain while converging it with long-extant but re-emerging combat disciplines, a senior leader says.

October 14, 2016
By Sandra Jontz

Lt. Gen. Paul M. Nakasone, USA, assumed leadership of U.S. Army Cyber Command and 2nd Army during a ceremony Friday at Fort Belvoir, Virginia. He took over responsibilities from outgoing commander Lt. Gen. Edward C. Cardon, USA, who led Army Cyber for more than three years.

October 5, 2016
By Sandra Jontz
In this U.S. Army file photo, Lt. Gen. Edward Cardon, USA, commanding general of Army Cyber Command, testifies before the U.S. Senate in 2015.

The U.S. Army is fighting fire with cyber fire, applying an “incredible focus” on attacking a primary terrorist threat by creating a task force to concentrate on a single targeted mission, says Lt. Gen. Edward Cardon, USA, commanding general of Army Cyber Command.

Responding to a rebuke by Defense Department Secretary Ash Carter that the cyber war against the Islamic State of Iraq and the Levant (ISIL) was progressing too slowly, the U.S. Cyber Command launched a unit with the sole task of going after the militant group’s online activity and put Gen. Cardon in charge of that effort.

December 23, 2011
By Beverly Schaeffer

...When website spoofers do deceive-especially when the legitimate sites belong to the U.S. military. Untold damage could result should hackers glean crucial data, whether it involves service personnel, missions or daily operations. Earlier in the year, the U.S. Air Force faced this very scenario when its portal was spoofed. The best defense, in addition to the 24/7 protection provided by military cyberspace operators worldwide, is vigilance by every service member from the top echelons all the way down.