From the virtual realm to zero gravity, China is posing a serious threat to U.S. national security that goes far beyond the Earth. With a strategic thrust designed to buttress and expand the reach of the Chinese Communist Party, the country is engaged in a long march for control that currently includes operations inside the United States as well as in orbit and beyond.
The U.S. arsenal boasts diverse weapons that share a common cybersecurity challenge: They depend on power generated by U.S. Defense Department or civilian-owned infrastructures that are increasingly vulnerable to cyber attack. Disrupting the availability of these power systems could impact not only the United States’ ability to project U.S. military power globally but also to respond to a domestic attack.
The U.S. Cyber Command has released a list of 39 challenge problems fitting under 12 categories: vulnerabilities, malware, analytics, implant, situational awareness, capability development, persona, hunt, mission management, attack, security and blockchain.
The U.S. Coast Guard is pursuing digital solutions to support its unique set of military, law enforcement, humanitarian, regulatory and diplomatic responsibilities. It is no small feat to provide information technology to its workforce of 87,570, as well as to its cutters, boats, and aircraft that move along the coastline and inland waterways protecting the United States.
Two years’ experience at the U.S. Cyber Command has shaped U.S. Coast Guard Rear Adm. Dermanelian’s perspective as he implements, as commander, the Coast Guard Cyber Command’s three main missions: (1) defending the Coast Guard’s portion of the Department of Defense Information Network, or DODIN; (2) protecting the maritime transportation sector; and (3) enabling cyber operations. The admiral is dual hatted as the assistant commandant for command, control, communications, computers and information technology/CG-6 as well as being the commander of the Coast Guard Cyber Command.
The U.S. Defense Department is leaning forward by investing in capabilities that equip U.S. cyber forces with a warfighting platform to achieve, maintain and defend cyberspace superiority. The Unified Platform will be critical to realizing U.S. Cyber Command’s vision to maneuver globally and seamlessly between defense and offense across the cyberspace domain and defend far forward into an adversary’s cyber space.
The U.S. Cyber Command’s Cyber Mission Force must keep pace with a threat landscape that is evolving at an unprecedented tempo. Cyberthreats are constantly growing in volume, velocity and sophistication, and the force needs a warfighting platform that will allow it to get ahead of attackers. That platform should enable continuous improvement through iterative development at the speed and scale of military operations.
Cyberspace is an operational domain, and cybersecurity is essential to the operational readiness of military units to achieve the mission, defeat the adversary and win wars. Our increasing reliance on cyberspace for command and control and operations in all domains, the explosion of networked digital technologies within combat and support systems, and the growing capabilities of adversaries to threaten the United States and its allies in cyberspace mean greater risks to our mission and to national security.
U.S. Cyber Command hopes for a bigger slice of the federal budget pie to cover operating costs in an increasingly volatile and dangerous cyber domain, said Adm. Michael Rogers, USN, head of U.S. Cyber Command and the National Security Agency (NSA).
He made his budget pitch before House lawmakers on Tuesday, seeking $647 million in fiscal year 2018—a 16 percent increase from fiscal year 2017—to address mounting cyber needs.
Cybersecurity can no longer be viewed as a technology-only problem and segmented into stovepipes where the U.S. Defense Department carries out one set of tasks; the civilian government another; and industry does its own thing, said Adm. Michael Rogers, USN, director of the National Security Agency (NSA) and commander of U.S. Cyber Command.
“It must be viewed more broadly and must be tackled from a national security perspective,” Adm. Rogers said during a morning West 2017 conference presentation Thursday with Adm. James Stavridis, USN (Ret.), former NATO commander and dean of Tufts University’s Fletcher School of Law and Diplomacy.
The U.S. Army is fighting fire with cyber fire, applying an “incredible focus” on attacking a primary terrorist threat by creating a task force to concentrate on a single targeted mission, says Lt. Gen. Edward Cardon, USA, commanding general of Army Cyber Command.
Responding to a rebuke by Defense Department Secretary Ash Carter that the cyber war against the Islamic State of Iraq and the Levant (ISIL) was progressing too slowly, the U.S. Cyber Command launched a unit with the sole task of going after the militant group’s online activity and put Gen. Cardon in charge of that effort.
Defensive Cyber Operations Symposium 2015
The SIGNAL Magazine Online Show Daily
Quote of the Day: “JIE is a good thing, because it allows us to bring a more centralized capability to bear and that is a lot of security capability.”
--John Hickey, DISA cybersecurity risk management authorizing official executive.
While it has always been important to strive for interoperability among and across systems within the U.S. military branches and other Defense Department (DOD) agencies, the need now is more critical than ever for the oldest and largest government agency in the United States.
Why now? One primary driving force for a refocus on interoperability is the creation of the U.S. Cyber Command (CYBERCOM). Formally established in May 2010, CYBERCOM’s focus, among other things, is to “lead day-to-day defense and protection of DOD information networks,” according to the agency’s mission statement.
The Defense Information Systems Agency (DISA) is seeking information from small businesses as potential sources to provide cyber-related support services; to conduct activities; and to create products to improve the U.S. Defense Department's cyber systems. Specifically, the agency's omnibus indefinite delivery/indefinite quantity contract will support the U.S. Cyber Command's ability to operate resilient, reliable information and communication networks; counter cyberspace threats; and assure access to cyberspace.
Creating a deterrence strategy in cyberspace similar to the Cold War approach to nuclear weapons is a difficult proposition, according to Gen. Keith Alexander, USA, who commands U.S. Cyber Space Command and is director of the National Security Agency.
"There is no deterrence model out there analogous to what we had during the Cold War for nuclear détente. If you think about it, there are no rules of the road yet. There are no norms. We don't have all that figured out, so there is no deterrence strategy. In fact, I would posit that it is much more difficult to have a deterrent strategy in cyber space because all countries, nation states and non-nation states, can have these capabilities in cyberspace," says Alexander.
Integral Systems Incorporated recently announced that it has been awarded a contract by the U.S. Strategic Command to provide worldwide interference geolocation services. Under the terms of the contract, the company will provide U.S. Cyber Command, a sub-unified command, with commercial satellite geolocation services. The geolocation services contract provides Cyber Command's Global Satellite Communications Support Center at Peterson Air Force Base, Colorado, access to actionable information via Integral's global network of advanced digital signal processing monitoring sensors, geolocation systems and tri-band (C-, X- and Ku-band) antennas.
The U.S. Defense Department must secure the cyber domain to protect and defend its own information and U.S. citizens, Gen. Keith B. Alexander, USA, commander of U.S. Cyber Command said today during the opening address of LandWarNet 2010. Gen. Alexander also serves as the director of the National Security Agency. "Every link and system has vulnerabilities that we have to defend," he stated. Gen. Alexander organized his speech by comparing warfare in the past with the movie WarGames and cyberwarfare to the movie The Matrix. In the former movie, as in nuclear warfare, there is no good engagement option because of assured mutual destruction.