The U.S. Army Cyber Command is transferring some of its cyber defense responsibilities for the service’s networks to the Army Network Enterprise Technology Command, commonly known as NETCOM. The change, which officially took effect on June 1, transfers authority for the Army’s worldwide regional cyber centers to NETCOM, allows Cyber Command to increase its focus on electronic warfare and information operations and provides one primary point of contact for warfighters in need of network support.
Army Cyber Command
As cyber threats continue to grow, so does the reality that digital satellite communications can be degraded and denied either through digital or electromagnetic means. If these capabilities are compromised, however, high frequency radio provides a means to continue communicating even beyond the line of sight by leveraging the ionosphere to refract radio signals back to earth.
The International Communication Union Telecommunication Standardization Sector designates the high frequency (HF) range as between 3 megahertz and 30 megahertz. While this method of communication was utilized extensively up through the 1990s, it began to lose traction in the military when the availability of satellite communications (SATCOM) increased.
Lt. Gen. Stephen G. Fogarty, USA, commanding general, U.S. Army Cyber Command, is preparing for the command's move from Fort Belvoir, Virginia, to Fort Gordon in Georgia later this year. Top of mind for the general though is not the physical move, it’s the people.
“It’s all about the people,” stressed Gen. Fogarty during his keynote at the third annual Cyber Education, Research and Training Symposium (CERTS) in Augusta, Georgia. “We cannot have a failure to imagine” what the future cyber workforce looks like.
The U.S. Army’s efforts to bring electronic warfare, information warfare and cyber capabilities into expeditionary forces is succeeding, Army leaders report. To better support tactical commanders, the service developed a pilot program in 2015 to add such capabilities to brigade combat teams (BCTs). In addition to providing equipment, abilities and authorities to BCTs, the service deployed cyber electromagnetic activities (CEMA) teams to support the initiative known as CEMA Support to Corps and Below (CSCB). The CEMA teams, under the guidance of the U.S. Army Cyber Command, provide training to brigade combat teams (BCTs) through National Training Center (NTC) rotations at exercises and home-base training.
When combatant commanders plan an attack on an enemy stronghold, they know exactly what to do, including which intelligence reports to consider, where to send the ground troops, when to call in an air strike and when to jam the enemy’s radar. But ask those same commanders to attack the enemy in cyberspace and the response will be far less defined.
The U.S. Army is serious about the narrative that it is serious about cyber. The service has put its organizational architecture on the line by prioritizing the newest warfighting domain while converging it with long-extant but re-emerging combat disciplines, a senior leader says.
Lt. Gen. Paul M. Nakasone, USA, assumed leadership of U.S. Army Cyber Command and 2nd Army during a ceremony Friday at Fort Belvoir, Virginia. He took over responsibilities from outgoing commander Lt. Gen. Edward C. Cardon, USA, who led Army Cyber for more than three years.
The U.S. Army is fighting fire with cyber fire, applying an “incredible focus” on attacking a primary terrorist threat by creating a task force to concentrate on a single targeted mission, says Lt. Gen. Edward Cardon, USA, commanding general of Army Cyber Command.
Responding to a rebuke by Defense Department Secretary Ash Carter that the cyber war against the Islamic State of Iraq and the Levant (ISIL) was progressing too slowly, the U.S. Cyber Command launched a unit with the sole task of going after the militant group’s online activity and put Gen. Cardon in charge of that effort.
...When website spoofers do deceive-especially when the legitimate sites belong to the U.S. military. Untold damage could result should hackers glean crucial data, whether it involves service personnel, missions or daily operations. Earlier in the year, the U.S. Air Force faced this very scenario when its portal was spoofed. The best defense, in addition to the 24/7 protection provided by military cyberspace operators worldwide, is vigilance by every service member from the top echelons all the way down.