United States Cyber Command
Encyclopedia
United States Cyber Command (USCYBERCOM) is an armed forces
United States armed forces
The United States Armed Forces are the military forces of the United States. They consist of the Army, Navy, Marine Corps, Air Force, and Coast Guard.The United States has a strong tradition of civilian control of the military...

 sub-unified command
Unified Combatant Command
A Unified Combatant Command is a United States Department of Defense command that is composed of forces from at least two Military Departments and has a broad and continuing mission. These commands are established to provide effective command and control of U.S. military forces, regardless of...

 subordinate to United States Strategic Command
United States Strategic Command
United States Strategic Command is one of nine Unified Combatant Commands of the United States Department of Defense . The Command, including components, employs more than 2,700 people, representing all four services, including DoD civilians and contractors, who oversee the command's operationally...

. The command is located in Fort Meade, Maryland
Maryland
Maryland is a U.S. state located in the Mid Atlantic region of the United States, bordering Virginia, West Virginia, and the District of Columbia to its south and west; Pennsylvania to its north; and Delaware to its east...

 and led by General
General (United States)
In the United States Army, United States Air Force, and United States Marine Corps, general is a four-star general officer rank, with the pay grade of O-10. General ranks above lieutenant general and below General of the Army or General of the Air Force; the Marine Corps does not have an...

 Keith B. Alexander
Keith B. Alexander
General Keith B. Alexander, USA is the current Director, National Security Agency , Chief, Central Security Service and Commander, United States Cyber Command. He previously served as Deputy Chief of Staff, G-2, U.S. Army from 2003 to 2005...

. USCYBERCOM centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks.

Mission

"USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."

The text "9ec4c12949a4f31474f299058ce2b22a", which is located in the command's emblem, is the MD5 hash
MD5
The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit hash value. Specified in RFC 1321, MD5 has been employed in a wide variety of security applications, and is also commonly used to check data integrity...

 of their mission statement.

The command is charged with pulling together existing cyberspace resources, creating synergy and synchronizing war-fighting effects to defend the information security environment. USCYBERCOM is tasked with centralizing command of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD’s cyber expertise.

Organization

USCYBERCOM is an armed forces
United States armed forces
The United States Armed Forces are the military forces of the United States. They consist of the Army, Navy, Marine Corps, Air Force, and Coast Guard.The United States has a strong tradition of civilian control of the military...

 sub-unified command
Unified Combatant Command
A Unified Combatant Command is a United States Department of Defense command that is composed of forces from at least two Military Departments and has a broad and continuing mission. These commands are established to provide effective command and control of U.S. military forces, regardless of...

 subordinate to United States Strategic Command
United States Strategic Command
United States Strategic Command is one of nine Unified Combatant Commands of the United States Department of Defense . The Command, including components, employs more than 2,700 people, representing all four services, including DoD civilians and contractors, who oversee the command's operationally...

.

Service components

U.S. Cyber Command is composed of several service components, units from military services who will provide Joint services to Cyber Command.
  • Army Cyber Command/Second Army (Army
    United States Army
    The United States Army is the main branch of the United States Armed Forces responsible for land-based military operations. It is the largest and oldest established branch of the U.S. military, and is one of seven U.S. uniformed services...

    )
    • Army Network Enterprise Technology Command / 9th Army Signal Command
      Army Network Enterprise Technology Command (NETCOM)/9th Army Signal Command
      Army Network Enterprise Technology Command is a subordinate command under the Army Cyber Command. Its mission is operating and defending United States Army computer networks. The numerical command for NETCOM is 9th Army Signal Command. Its heritage can be traced back to the creation of the 9th...

    • Portions of 1st Information Operations Command (Land)
      1st Information Operations Command (Land)
      The 1st Information Operations Command , formerly the Land Information Warfare Activity Information Dominance Center , is an information operations command of the U.S. Army Cyber Command ....

    • United States Army Intelligence and Security Command
      United States Army Intelligence and Security Command
      The United States Army Intelligence and Security Command is a direct reporting unit that conducts intelligence, security, and information operations for U.S. Army commanders and national decision makers. INSCOM is both an organization within the United States Army and the National Security Agency,...

       will be under the operational control of ARFORCYBER for cyber-related actions.
  • Fleet Cyber Command/Tenth Fleet
    United States Tenth Fleet
    The Tenth Fleet is a functional formation of the United States Navy responsible for the Navy's cyber warfare programs. It was first created as an anti submarine warfare coordinating organization during the Battle of the Atlantic in the Second World War...

      (Navy
    United States Navy
    The United States Navy is the naval warfare service branch of the United States Armed Forces and one of the seven uniformed services of the United States. The U.S. Navy is the largest in the world; its battle fleet tonnage is greater than that of the next 13 largest navies combined. The U.S...

    )
    • Naval Network Warfare Command
      Naval Network Warfare Command
      Naval Network Warfare Command is the US Navy's information operations, intelligence, networks and space unit. NETWARCOM is charged with operating a secure naval network that enables information operations...

    • Navy Cyber Defense Operations Command
    • Naval Information Operation Commands
    • Combined Task Forces
  • Air Force Space Command/Twenty-Fourth Air Force (Air Force
    United States Air Force
    The United States Air Force is the aerial warfare service branch of the United States Armed Forces and one of the American uniformed services. Initially part of the United States Army, the USAF was formed as a separate branch of the military on September 18, 1947 under the National Security Act of...

    )
    • 67th Network Warfare Wing
      67th Network Warfare Wing
      The 67th Network Warfare Wing , Lackland Air Force Base, Texas, was reactivated October 1, 1993 as the 67th Intelligence Wing. The wing was re-designated the 67th Information Operations Wing on February 1, 2001...

    • 688th Information Operations Wing
      688th Information Operations Wing
      The United States Air Force's 688th Information Operations Wing is an Information Operations unit located at Lackland AFB, Texas.It was a redesignation of the Air Force Information Operations Center on August 18, 2009 as planned by the initial Air Force Cyber Command plan in 2007-2008,The 688 IOW...

    • 689th Combat Communications Wing
      689th Combat Communications Wing
      The 689th Combat Communications Wing is a wing of the United States Air Force stationed at Robins Air Force Base, Georgia. The wing was activated on 9 October 2009...

  • United States Marine Corps Forces Cyberspace Command
    United States Marine Corps Forces Cyberspace Command
    The United States Marine Corps Forces Cyberspace Command is a functional formation of the United States Marine Corps to protect critical infrastructure from cyberwarfare...

     (Marine Corps
    United States Marine Corps
    The United States Marine Corps is a branch of the United States Armed Forces responsible for providing power projection from the sea, using the mobility of the United States Navy to deliver combined-arms task forces rapidly. It is one of seven uniformed services of the United States...

    )

Background

On 23 June 2009, the Secretary of Defense directed the Commander of U.S. Strategic Command (USSTRATCOM) to establish USCYBERCOM. In May 2010, General Keith Alexander
Keith B. Alexander
General Keith B. Alexander, USA is the current Director, National Security Agency , Chief, Central Security Service and Commander, United States Cyber Command. He previously served as Deputy Chief of Staff, G-2, U.S. Army from 2003 to 2005...

 outlined his views in a report for the United States House Committee on Armed Services
United States House Committee on Armed Services
thumb|United States House Committee on Armed Services emblemThe U.S. House Committee on Armed Services, commonly known as the House Armed Services Committee, is a standing committee of the United States House of Representatives...

 subcommittee:
Initial operational capability was attained on 21 May 2010. General Alexander was promoted to General and took charge of U.S. Cyber Command in a ceremony at Fort Meade that was attended by Commander of U.S. Central Command GEN David Petraeus, and Secretary of Defense Robert M. Gates.
USCYBERCOM reached full operational capability on 31 October 2010.

The command assumed responsibility for several existing organizations. The Joint Task Force for Global Network Operations (JTF-GNO) and the Joint Functional Component Command for Network Warfare (JFCC-NW) were absorbed by the command. The Defense Information Systems Agency
Defense Information Systems Agency
The Defense Information Systems Agency is a United States Department of Defense agency that provides information technology and communications support to the President, Vice President, Secretary of Defense, the military Services, and the Combatant Commands.As part of the Base Realignment and...

, where JTF-GNO operated, provides technical assistance for network and information assurance to USCYBERCOM, and is moving its headquarters to Ft. Meade.

Concerns

There are concerns that the Pentagon
The Pentagon
The Pentagon is the headquarters of the United States Department of Defense, located in Arlington County, Virginia. As a symbol of the U.S. military, "the Pentagon" is often used metonymically to refer to the Department of Defense rather than the building itself.Designed by the American architect...

 and NSA will overshadow any civilian cyber defense efforts. There are also concerns on whether the command will assist in civilian cyber defense efforts. According to Deputy Secretary of Defense William J. Lynn, the command "will lead day-to-day defense and protection of all DOD networks. It will be responsible for DOD's networks – the dot-mil
.mil
The domain name mil is the sponsored top-level domain in the Domain Name System of the Internet for the United States Department of Defense and its subsidiary or affiliated organizations. The name is derived from military. It was one of the first top-level domains, created in January 1985.The...

 world. Responsibility for federal civilian networks – dot-gov
.gov
The domain name gov is a sponsored top-level domain in the Domain Name System of the Internet. The name is derived from government, indicating its restricted use by government entities in the United States. The gov domain is administered by the General Services Administration , an independent...

 – stays with the Department of Homeland Security, and that's exactly how it should be." Alexander notes, however, that if faced with cyber hostilities an executive order could expand Cyber Command's spectrum of operations to include, for instance, assisting the Department of Homeland Security defend their networks.

Some military leaders claim that the existing cultures of the Army, Navy and Air Force are fundamentally incompatible with that of cyber warfare, and have suggested a fourth branch of the military, a cyber-warfare branch. LTC Gregory Conti and COL John "Buck" Surdu (chief of staff of the United States Army Research, Development and Engineering Command
United States Army Research, Development and Engineering Command
The U.S. Army Research, Development and Engineering Command is a major subordinate command of the Army Materiel Command, and is charged with "creating, integrating and delivering technology-enabled solutions to our Soldiers." With its headquarters at Aberdeen Proving Ground, Maryland, RDECOM...

) stated that the three major services are "properly positioned to fight kinetic wars, and they value skills such as marksmanship, physical strength, the ability to leap out of airplanes and lead combat units under enemy fire. "Unfortunately," the two officers write, "these skills are irrelevant in cyber warfare. Technical expertise isn't highly valued in the three services. Just look at military uniforms: no decorations or badges honoring technical expertise", the officers point out. These officers suggest that "Ultimately, the role of fighting and winning in cyberspace is a military mission, which demands a military organization – one that can recruit, train and retain highly qualified cyber-warfare combatants."

Conti and Surdu reason: "Adding an efficient and effective cyber branch alongside the Army, Navy and Air Force would provide our nation with the capability to defend our technological infrastructure and conduct offensive operations. Perhaps more important, the existence of this capability would serve as a strong deterrent for our nation's enemies."

In response to concerns about the military's right to respond to cyber attacks, GEN Alexander stated "The U.S. must fire back against cyber attacks swiftly and strongly and should act to counter or disable a threat even when the identity of the attacker is unknown" prior to his confirmation hearings before the United States Congress
United States Congress
The United States Congress is the bicameral legislature of the federal government of the United States, consisting of the Senate and the House of Representatives. The Congress meets in the United States Capitol in Washington, D.C....

. This came in response to incidents such as a 2008 operation to take down a government run extremist honeypot
Honeypot (computing)
In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems...

 in Saudi Arabia
Saudi Arabia
The Kingdom of Saudi Arabia , commonly known in British English as Saudi Arabia and in Arabic as as-Sa‘ūdiyyah , is the largest state in Western Asia by land area, constituting the bulk of the Arabian Peninsula, and the second-largest in the Arab World...

. "Elite U.S. military computer specialists, over the objections of the CIA, mounted a cyberattack that dismantled the online forum".

"The new U.S. Cyber Command needs to strike a balance between protecting military assets and personal privacy." stated Alexander, in a Defense Department release. If confirmed, Alexander said, his main focus will be on building capacity and capability to secure the networks and educating the public on the command's intent.

"This command is not about an effort to militarize cyber space," he said. "Rather, it's about safeguarding our military assets."

In July 2011 Deputy Defense Secretary William Lynn announced in a conference that “We have, within Cyber Command, a full spectrum of capabilities, but the thrust of the strategy is defensive.” “The strategy rests on five pillars, he said: treat cyber as a domain; employ more active defenses; support the Department of Homeland Security in protecting critical infrastructure networks; practice collective defense with allies and international partners; and reduce the advantages attackers have on the Internet.”

International effects and reactions

The creation of U.S. Cyber Command appears to have motivated other countries in this arena. In December 2009, South Korea
South Korea
The Republic of Korea , , is a sovereign state in East Asia, located on the southern portion of the Korean Peninsula. It is neighbored by the People's Republic of China to the west, Japan to the east, North Korea to the north, and the East China Sea and Republic of China to the south...

 announced the creation of a Cyber Warfare command. Reportedly this is in response to North Korea
North Korea
The Democratic People’s Republic of Korea , , is a country in East Asia, occupying the northern half of the Korean Peninsula. Its capital and largest city is Pyongyang. The Korean Demilitarized Zone serves as the buffer zone between North Korea and South Korea...

's creation of a cyber warfare unit. In addition, the British GCHQ has begun preparing a cyber force. In addition, Recent shift in military interest in Cyber warfare has motivated the creation of the first U.S. Cyber Warfare Intelligence Center. In 2010, China introduced its first department dedicated to defensive cyber war and information security, in response to the creation of USCYBERCOM.

See also

  • United States Strategic Command
    United States Strategic Command
    United States Strategic Command is one of nine Unified Combatant Commands of the United States Department of Defense . The Command, including components, employs more than 2,700 people, representing all four services, including DoD civilians and contractors, who oversee the command's operationally...

  • Joint Task Force-Global Network Operations
    Joint Task Force-Global Network Operations
    Joint Task Force-Global Network Operations was a subordinate command of United States Strategic Command whose mission is to: direct the operation and defense of the Global Information Grid across strategic, operational, and tactical boundaries in support of the US Department of Defense's full...

  • 2008 cyberattack on United States
    2008 cyberattack on United States
    The 2008 cyberattack on the United States was the "worst breach of U.S. military computers in history". The defense against the attack was named "Operation Buckshot Yankee"...

  • United States Department of Homeland Security
    United States Department of Homeland Security
    The United States Department of Homeland Security is a cabinet department of the United States federal government, created in response to the September 11 attacks, and with the primary responsibilities of protecting the territory of the United States and protectorates from and responding to...

  • United States
    United States
    The United States of America is a federal constitutional republic comprising fifty states and a federal district...

     National Security Agency
    National Security Agency
    The National Security Agency/Central Security Service is a cryptologic intelligence agency of the United States Department of Defense responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting U.S...

  • Information Assurance Vulnerability Alert
    Information Assurance Vulnerability Alert
    An information assurance vulnerability alert is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories identified by DoD-CERT, a division of the United States Cyber Command...

  • Cooperative Cyber Defence Centre of Excellence
    CCDCOE
    CCDCOE, officially the Cooperative Cyber Defence Centre of Excellence is one of NATO Centres of Excellence, located in Tallinn, Estonia.The CCDCOE was established in the wake of the 2007 cyberattacks on Estonia and the Bronze Night events.-History:...

  • National Cyberdefence Centre
    National Cyberdefence Centre
    The National Cyberdefence Centre is a German government agency established to respond to attacks on government computers in Germany.The interior ministry's spokesman announced in December 2010 that the agency would be established; the German government reports that in the first 9 months of 2010,...

  • Cyberwarfare
  • Cyberwarfare in the United States
    Cyberwarfare in the United States
    Cyberwarfare in the United States is the United States Cyber Commands military strategy of proactive cyber defence and the use of cyberwarfare as a platform for attack. The United States Department of Defense sees the use of computers and the Internet to conduct warfare in cyberspace as a threat...

  • Defense Information Systems Agency
    Defense Information Systems Agency
    The Defense Information Systems Agency is a United States Department of Defense agency that provides information technology and communications support to the President, Vice President, Secretary of Defense, the military Services, and the Combatant Commands.As part of the Base Realignment and...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK