Army Cyber Command

July 1, 2020
By George I. Seffers
The NETCOM Network Enterprise Center provided extended information technology support to many of the units deploying in support of Joint Task Force-Civil Support during the COVID-19 pandemic. U.S. Army Cyber Command has now delegated to NETCOM some its authorities for protecting Army portions of the Department of Defense Information Network. U.S. Army photo by Spc. Chafelmer Kroll

The U.S. Army Cyber Command is transferring some of its cyber defense responsibilities for the service’s networks to the Army Network Enterprise Technology Command, commonly known as NETCOM. The change, which officially took effect on June 1, transfers authority for the Army’s worldwide regional cyber centers to NETCOM, allows Cyber Command to increase its focus on electronic warfare and information operations and provides one primary point of contact for warfighters in need of network support.

February 1, 2020
By Col. Stephen Hamilton, USA, and Chief Warrant Officer 4 Judy Esquibel, USA
Staff Sgt. David Nelson, USA, a signal support systems specialist assigned to 218th Maneuver Enhancement Brigade in support of Resolute Castle 2018, explains near vertical incidence skywave antenna theory to members of Company B, 151st Expeditionary Signal Battalion during a high frequency radio class. Credit: Sgt. 1st Class Kimberly D. Calkins, ANG

As cyber threats continue to grow, so does the reality that digital satellite communications can be degraded and denied either through digital or electromagnetic means. If these capabilities are compromised, however, high frequency radio provides a means to continue communicating even beyond the line of sight by leveraging the ionosphere to refract radio signals back to earth.

The International Communication Union Telecommunication Standardization Sector designates the high frequency (HF) range as between 3 megahertz and 30 megahertz. While this method of communication was utilized extensively up through the 1990s, it began to lose traction in the military when the availability of satellite communications (SATCOM) increased.

January 15, 2020
By Julianne Simpson
Photo Credit: Gorodenkoff/Shutterstock

Lt. Gen. Stephen G. Fogarty, USA, commanding general, U.S. Army Cyber Command, is preparing for the command's move from Fort Belvoir, Virginia, to Fort Gordon in Georgia later this year. Top of mind for the general though is not the physical move, it’s the people.

“It’s all about the people,” stressed Gen. Fogarty during his keynote at the third annual Cyber Education, Research and Training Symposium (CERTS) in Augusta, Georgia. “We cannot have a failure to imagine” what the future cyber workforce looks like.

August 6, 2018
By Kimberly Underwood
After 10 rotations with brigades, the Army’s Cyber-Electromagnetic Activities (CEMA) teams are hitting their stride, Army experts explain at an Association of the U.S. Army event August 2. Photo credit: Anna Neubauer

The U.S. Army’s efforts to bring electronic warfare, information warfare and cyber capabilities into expeditionary forces is succeeding, Army leaders report. To better support tactical commanders, the service developed a pilot program in 2015 to add such capabilities to brigade combat teams (BCTs). In addition to providing equipment, abilities and authorities to BCTs, the service deployed cyber electromagnetic activities (CEMA) teams to support the initiative known as CEMA Support to Corps and Below (CSCB). The CEMA teams, under the guidance of the U.S. Army Cyber Command, provide training to brigade combat teams (BCTs) through National Training Center (NTC) rotations at exercises and home-base training.

April 1, 2018
By Howard Miller and RADM Bill Leigher, USN, (Ret.)
One possible element of the Persistent Cyber Training Environment (PCTE) as envisioned would include a collaborative cyber training virtual environment where cyber warriors could train in real-life scenarios and learn new skills to be ready for the next cyber attack.

When combatant commanders plan an attack on an enemy stronghold, they know exactly what to do, including which intelligence reports to consider, where to send the ground troops, when to call in an air strike and when to jam the enemy’s radar. But ask those same commanders to attack the enemy in cyberspace and the response will be far less defined.

June 29, 2017
By Sandra Jontz
U.S. Army Chief of Staff Gen. Mark A. Milley, USA, visits soldiers serving with the cyber electromagnetic activities (CEMA) support to corps and below (CSCB) team, 780th Military Intelligence Brigade, in May at the National Training Center in Fort Irwin, California. Photo by Sgt. 1st Class Chuck Burden, USA

The U.S. Army is serious about the narrative that it is serious about cyber. The service has put its organizational architecture on the line by prioritizing the newest warfighting domain while converging it with long-extant but re-emerging combat disciplines, a senior leader says.

October 14, 2016
By Sandra Jontz

Lt. Gen. Paul M. Nakasone, USA, assumed leadership of U.S. Army Cyber Command and 2nd Army during a ceremony Friday at Fort Belvoir, Virginia. He took over responsibilities from outgoing commander Lt. Gen. Edward C. Cardon, USA, who led Army Cyber for more than three years.

October 5, 2016
By Sandra Jontz
In this U.S. Army file photo, Lt. Gen. Edward Cardon, USA, commanding general of Army Cyber Command, testifies before the U.S. Senate in 2015.

The U.S. Army is fighting fire with cyber fire, applying an “incredible focus” on attacking a primary terrorist threat by creating a task force to concentrate on a single targeted mission, says Lt. Gen. Edward Cardon, USA, commanding general of Army Cyber Command.

Responding to a rebuke by Defense Department Secretary Ash Carter that the cyber war against the Islamic State of Iraq and the Levant (ISIL) was progressing too slowly, the U.S. Cyber Command launched a unit with the sole task of going after the militant group’s online activity and put Gen. Cardon in charge of that effort.

December 23, 2011
By Beverly Schaeffer

...When website spoofers do deceive-especially when the legitimate sites belong to the U.S. military. Untold damage could result should hackers glean crucial data, whether it involves service personnel, missions or daily operations. Earlier in the year, the U.S. Air Force faced this very scenario when its portal was spoofed. The best defense, in addition to the 24/7 protection provided by military cyberspace operators worldwide, is vigilance by every service member from the top echelons all the way down.