The U.S. Army’s efforts to bring electronic warfare, information warfare and cyber capabilities into expeditionary forces is succeeding, Army leaders report. To better support tactical commanders, the service developed a pilot program in 2015 to add such capabilities to brigade combat teams (BCTs). In addition to providing equipment, abilities and authorities to BCTs, the service deployed cyber electromagnetic activities (CEMA) teams to support the initiative known as CEMA Support to Corps and Below (CSCB). The CEMA teams, under the guidance of the U.S. Army Cyber Command, provide training to brigade combat teams (BCTs) through National Training Center (NTC) rotations at exercises and home-base training.
Army Cyber Command
When combatant commanders plan an attack on an enemy stronghold, they know exactly what to do, including which intelligence reports to consider, where to send the ground troops, when to call in an air strike and when to jam the enemy’s radar. But ask those same commanders to attack the enemy in cyberspace and the response will be far less defined.
The U.S. Army is serious about the narrative that it is serious about cyber. The service has put its organizational architecture on the line by prioritizing the newest warfighting domain while converging it with long-extant but re-emerging combat disciplines, a senior leader says.
Lt. Gen. Paul M. Nakasone, USA, assumed leadership of U.S. Army Cyber Command and 2nd Army during a ceremony Friday at Fort Belvoir, Virginia. He took over responsibilities from outgoing commander Lt. Gen. Edward C. Cardon, USA, who led Army Cyber for more than three years.
The U.S. Army is fighting fire with cyber fire, applying an “incredible focus” on attacking a primary terrorist threat by creating a task force to concentrate on a single targeted mission, says Lt. Gen. Edward Cardon, USA, commanding general of Army Cyber Command.
Responding to a rebuke by Defense Department Secretary Ash Carter that the cyber war against the Islamic State of Iraq and the Levant (ISIL) was progressing too slowly, the U.S. Cyber Command launched a unit with the sole task of going after the militant group’s online activity and put Gen. Cardon in charge of that effort.
...When website spoofers do deceive-especially when the legitimate sites belong to the U.S. military. Untold damage could result should hackers glean crucial data, whether it involves service personnel, missions or daily operations. Earlier in the year, the U.S. Air Force faced this very scenario when its portal was spoofed. The best defense, in addition to the 24/7 protection provided by military cyberspace operators worldwide, is vigilance by every service member from the top echelons all the way down.