Cyber Command (Estonia)
   HOME

TheInfoList



OR:

United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of
cyberspace Cyberspace is a concept describing a widespread interconnected digital technology. "The expression dates back from the first decade of the diffusion of the internet. It refers to the online world as a world 'apart', as distinct from everyday rea ...
operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise. USCYBERCOM was created in mid-2009 at the National Security Agency (NSA) headquarters in Fort George G. Meade, Maryland. It cooperates with NSA networks and has been concurrently headed by the director of the National Security Agency since its inception. While originally created with a defensive mission in mind, it has increasingly been viewed as an offensive force. On 18 August 2017, it was announced that USCYBERCOM would be elevated to the status of a full and independent unified combatant command.


Mission statement

According to the US Department of Defense (DoD): The text "9ec4c12949a4f31474f299058ce2b22a", located in the command's emblem, is the MD5 hash of their mission statement. The command is charged with pulling together existing cyberspace resources, creating synergies and synchronizing war-fighting effects to defend the information security environment. USCYBERCOM is tasked with centralizing command of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD's cyber expertise.U.S. Department of Defense, Cyber Command Fact Sheet, 21 May 2010


Organizational structure


Cyber teams

Since 2015, the U.S. Cyber Command added 133 new cyber teams. The breakdown was: * Thirteen National Mission Teams to defend against broad cyberattacks * Sixty-eight Cyber Protection Teams to defend priority DoD networks and systems against priority threats * Twenty-seven Combat Mission Teams to provide integrated cyberspace attacks in support of operational plans and contingency operations * Twenty-five Cyber Support Teams to provide analytic and planning support to the national mission and combat mission teams.


Component Commands


Standing joint task force


Background

An intention by the U.S. Air Force to create a 'cyber command' was announced in October 2006. An
Air Force Cyber Command Air Force Cyber Command (Provisional) (AFCYBER (P)) was a proposed United States Air Force Major Command that existed only in provisional status. On 6 October 2008, the Air Force announced that the command would not be brought into permanent activ ...
was created in a provisional status in November 2006. However, in October 2008, it was announced the command would not be brought into permanent activation. On 23 June 2009, the Secretary of Defense directed the Commander of U.S. Strategic Command (USSTRATCOM) to establish USCYBERCOM. In May 2010, General Keith Alexander outlined his views in a report for the United States House Committee on Armed Services subcommittee: Initial operational capability was attained on 21 May 2010. General Alexander was promoted to four-star rank, becoming one of United States's 38 four-star officers, and took charge of U.S. Cyber Command in a ceremony at Fort Meade that was attended by Commander of U.S. Central Command GEN David Petraeus, and Secretary of Defense Robert M. Gates. USCYBERCOM reached full operational capability on 31 October 2010. The command assumed responsibility for several existing organizations. The Joint Task Force for Global Network Operations ( JTF-GNO) and the Joint Functional Component Command for Network Warfare ( JFCC-NW) were absorbed by the command. The Defense Information Systems Agency, where JTF-GNO operated, provides technical assistance for network and information assurance to USCYBERCOM, and is moving its headquarters to Fort Meade. President Obama signed into law, on 23 December 2016, the National Defense Authorization Act (NDAA) for fiscal year (FY) 2017, which elevated USCYBERCOM to a unified combatant command. The FY 2017 NDAA also specified that the dual-hatted arrangement of the commander of USCYBERCOM will not be terminated until the Secretary of Defense and Chairman of the Joint Chiefs of Staff jointly certify that ending this arrangement will not pose risks to the military effectiveness of CYBERCOM that are unacceptable to the national security interests of the United States.


Concerns

There are concerns that the
Pentagon In geometry, a pentagon (from the Greek πέντε ''pente'' meaning ''five'' and γωνία ''gonia'' meaning ''angle'') is any five-sided polygon or 5-gon. The sum of the internal angles in a simple pentagon is 540°. A pentagon may be simpl ...
and NSA will overshadow any civilian cyber defense efforts. There are also concerns on whether the command will assist in civilian cyber defense efforts. According to Deputy Secretary of Defense
William J. Lynn William James Lynn III (born January 1, 1954) is a former United States Deputy Secretary of Defense. Before that he was Under Secretary of Defense (Comptroller) and a lobbyist for Raytheon. Life and career Lynn was born in Key West, Florida and ...
, the command "will lead day-to-day defense and protection of all DoD networks. It will be responsible for DoD's networks – the dot-mil world. Responsibility for federal civilian networks – dot-gov – stays with the Department of Homeland Security, and that's exactly how it should be." Alexander notes, however, that if faced with cyber hostilities an executive order could expand Cyber Command's spectrum of operations to include, for instance, assisting the Department of Homeland Security in defense of their networks. Some military leaders claim that the existing cultures of the Army, Navy, and Air Force are fundamentally incompatible with that of cyber warfare. Major Robert Costa (USAF) even suggested a sixth branch of the military, an Information (Cyber) Service with
Title 10 Title 10 of the United States Code outlines the role of armed forces in the United States Code. It provides the legal basis for the roles, missions and organization of each of the services as well as the United States Department of Defense. ...
responsibilities analogous to its sister services in 2002 noting: Others have also discussed the creation of a cyber-warfare branch. Lieutenant Colonel Gregory Conti and Colonel John "Buck" Surdu (chief of staff of the United States Army Research, Development and Engineering Command) stated that the three major services are ''properly positioned to fight kinetic wars, and they value skills such as marksmanship, physical strength, the ability to leap out of airplanes and lead combat units under enemy fire.'' Conti and Surdu reasoned, "Adding an efficient and effective cyber branch alongside the Army, Navy and Air Force would provide our nation with the capability to defend our technological infrastructure and conduct offensive operations. Perhaps more important, the existence of this capability would serve as a strong deterrent for our nation's enemies." In response to concerns about the military's right to respond to cyber attacks, General Alexander stated "The U.S. must fire back against cyber attacks swiftly and strongly and should act to counter or disable a threat even when the identity of the attacker is unknown" prior to his confirmation hearings before the United States Congress. This came in response to incidents such as a 2008 operation to take down a government-run extremist honeypot in Saudi Arabia. "Elite U.S. military computer specialists, over the objections of the CIA, mounted a cyberattack that dismantled the online forum". "The new U.S. Cyber Command needs to strike a balance between protecting military assets and personal privacy." stated Alexander, in a Defense Department release. If confirmed, Alexander said, his main focus will be on building capacity and capability to secure the networks and educating the public on the command's intent. "This command is not about an effort to militarize cyber space," he said. "Rather, it's about safeguarding our military assets." In July 2011, Deputy Defense Secretary William Lynn announced in a conference that "We have, within Cyber Command, a full spectrum of capabilities, but the thrust of the strategy is defensive." "The strategy rests on five pillars, he said: treat cyber as a domain; employ more active defenses; support the Department of Homeland Security in protecting critical infrastructure networks; practice collective defense with allies and international partners; and reduce the advantages attackers have on the Internet." In 2013, USCYBERCOM held a classified exercise in which reserve officers (with extensive experience in their civilian cyber-security work) easily defeated active duty cyber warriors. In 2015 Eric Rosenbach, the principal cyber adviser to Defense Secretary
Ash Carter Ashton Baldwin Carter (September 24, 1954 – October 24, 2022) was an American government official and academic who served as the 25th United States Secretary of Defense from February 2015 to January 2017. He later served as director of the Be ...
, said DoD was looking at alternatives to staffing with just active-duty military. Beginning that year, USCYBERCOM added 133 teams (staffing out at 6,000 people), with the intent that at least 15% of the personnel would be reserve cyber operations airmen. These new teams had achieved "initial operating capability" (IOC) as of 21 October 2016. Officials noted that IOC is not the same as combat readiness, but is the first step in that direction. President Barack Obama's
Commission on Enhancing National Cybersecurity The President's Commission on Enhancing National Cybersecurity is a Presidential Commission formed on April 13, 2016, to develop a plan for protecting cyberspace, and America's economic reliance on it. The commission released its final report in De ...
was formed to develop a plan for protecting cyberspace. The commission released a report in December 2016. The report made 16 major recommendations regarding the intertwining roles of the military, government administration and the private sector in providing cyber security. President Trump indicated that he wanted a full review of Cyber Command during his bid for presidency. During his presidency, the Trump administration made Cyber Command a unified combatant command, and took other measures attempting to deter cyber attacks. However, the FBI reported that they logged a record number of complaints and economic losses in 2019, as cybercrime continued to grow.


International effects and reactions

The creation of U.S. Cyber Command appears to have motivated other countries in this arena. In December 2009, South Korea announced the creation of a cyber warfare command. Reportedly, this was in response to North Korea's creation of a cyber warfare unit. In addition, the British GCHQ has begun preparing a cyber force. Furthermore, a shift in military interest in cyber warfare has motivated the creation of the first U.S. Cyber Warfare Intelligence Center. In 2010, China introduced a department dedicated to defensive cyber war and information security in response to the creation of USCYBERCOM.


Operations

In June 2019, Russia has conceded that it is "possible" its
electrical grid An electrical grid is an interconnected network for electricity delivery from producers to consumers. Electrical grids vary in size and can cover whole countries or continents. It consists of:Kaplan, S. M. (2009). Smart Grid. Electrical Power ...
was under cyberattack by the United States. The '' New York Times'' reported that hackers from the U.S. Cyber Command planted malware potentially capable of disrupting the Russian electrical grid. Cyber command is using its 2021 exercise Cyber Flag 21-2 to improve its teams' tactics. Mark Pomerleau (23 Jun 2021) US Cyber Command exercise will help shape new tactics for changing threats
/ref>Mark Pomerleau (25 May 2021) US Army emphasizes ‘information advantage’
"five pillars of information advantage: enable decision-making, protect friendly information, inform and educate domestic audiences, inform and influence international audiences, and conduct information warfare"


List of commanders

The commander of U.S. Cyber Command is a statutory office (), and is held by a four-star general, or if the commander is a Navy officer, a four-star
admiral Admiral is one of the highest ranks in some navies. In the Commonwealth nations and the United States, a "full" admiral is equivalent to a "full" general in the army or the air force, and is above vice admiral and below admiral of the fleet, ...
.


See also

* List of cyber warfare forces * United States Strategic Command *
Joint Task Force-Global Network Operations A joint or articulation (or articular surface) is the connection made between bones, ossicles, or other hard structures in the body which link an animal's skeletal system into a functional whole.Saladin, Ken. Anatomy & Physiology. 7th ed. McGraw ...
* United States National Security Agency (NSA) * United States Department of Homeland Security *
U.S. Department of Defense Strategy for Operating in Cyberspace The 2011 U.S. Department of Defense Strategy for Operating in Cyberspace is a formal assessment of the challenges and opportunities inherent in increasing reliance on cyberspace for military, intelligence, and business operations. Although the c ...
*
Information assurance vulnerability alert {{Unreferenced, date=August 2010 An information assurance vulnerability alert (IAVA) is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories iden ...
* Cooperative Cyber Defence Centre of Excellence (NATO) * National Cyberdefence Centre (Germany) *
Cyberwarfare Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic war ...
*
Cyberwarfare in the United States Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States i ...
* Defense Information Systems Agency *
2008 cyberattack on United States In 2008, the United States Department of Defense was infected with malware. Described at the time as the "worst breach of U.S. military computers in history", the defense against the attack was named "Operation Buckshot Yankee". It led to the crea ...
*
2020 United States federal government data breach In 2020, a major cyberattack suspected to have been committed by a group backed by the Russian government penetrated thousands of organizations globally including multiple parts of the United States federal government, leading to a series of ...


Further reading

* Smeets, Max (4 July 2022). " A US history of not conducting cyber attacks". ''Bulletin of the Atomic Scientists'' 78 (4): 208–213.


References


External links


U.S. Cyber Command website
* *
US Cyber Command Fact Sheet

US Cyber Command Fact Sheet PowerPoint

FACT SHEET: Imposing Costs for Harmful Foreign Activities by the Russian Government
{{DOD agencies navbox
Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
Cyberinfrastructure Cyberwarfare in the United States National cyber security centres Net-centric
Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
Military units and formations established in 2009 2009 establishments in the United States Military installations in Maryland