Pentagon Creates New 5,000 Strong Cyber Force

Formation of the Pentagon's new  Cyber Mission Force is a key step in improving the US’s ability to respond to hacks by overseas adversaries.

A 5,000-person Pentagon force created to bolster military computer networks and initiate Cyber-attacks against terror groups should shortly be ready to carry out its mission, a key step in improving the US’s ability to respond to hacks by overseas adversaries.

The Cyber Mission Force reached "initial operational capability” recently, said Colonel Daniel J.W. King, a Cyber Command spokesman, in an e-mail. The group’s 133 teams have met basic criteria on personnel, training, resources and equipment, but all of them aren’t necessarily ready to launch attacks, he said.

The force, which falls under the US Cyber Command created in 2009, likely will focus on the highest priorities, such as risks from Russia, China, Iran and terrorist groups including Islamic State, according to Bob Stasio, a fellow at the Truman National Security Project and former chief of operations at the National Security Agency’s Cyber Operations Center.

Until the force becomes fully operational, which is planned in 2018, the question officials directing it will ask first will be, “What’s the minimum operation I need against the biggest threats that I have today, the closest alligators to the boat," Stasio said.

Previously, Cyber operations were scattered in silos across Cyber Command, the NSA and other military branches, according to Stasio. The new centralised force will help cut through the bureaucracy, he added. Officials plan to expand the force by another 1,200 people as part of the process of becoming fully combat ready.

"We continue to generate the mission force," Admiral Michael Rogers, who heads Cyber Command and the NSA, said in a Sept. 13 speech in Washington. "At the same time, we got to tell ourselves we are not where we need to be in this mission."

The operational capability designation means the Pentagon has better streamlined Cyber activities across its bureaucracy, but analysts say it doesn’t necessarily reflect greater security chops as defense officials try to keep up with fast-evolving technology and threats.

"What it means is we have the people, the tools, we’ve practiced and we’re ready," said Mark Young, chief security officer and senior vice president at IronNet Cybersecurity Inc. and a former senior executive at Cyber Command.

Digital Labyrinth

As hacking attacks traced to countries such as Russia and China continue to make US headlines, people "can feel more comfortable, not completely comfortable, but they can feel more comfortable, that we now have a military force that could respond if directed to these activities," Young said.

The mission force is tasked with defending the Defense Department’s data and its labyrinth of thousands of digital networks across the world. It also has to defend the US "against Cyber-Attacks of significant consequence" as well as the nation’s critical infrastructure, King said. Cyber war plans are also in place for the military’s various regional commands.

Setting up the force is also a sign that cyber is more "baked into" the military’s overall strategy, while providing defense officials a grasp of how much it needs to spend on cybersecurity, said Dave Aitel, chief executive officer of Immunity Inc. and a former NSA computer scientist. In its 2017 information technology budget, the Defense Department requested $6.8 billion for cyber operations.

Money Buckets

"You have to kind of look at it as if you’re building a whole new Navy, that’s a very expensive operation," Aitel said. "It gives them better buckets to throw money into and know where that money is going."

There’s work ahead as the military builds out all of its Cyber teams to full capability in the next two years. Even when they reach that stage, officials will still have to keep pace with emerging tech tools and cyber-attack tactics, according to Ben FitzGerald, a senior fellow at the Center for a New American Security, who previously worked as an executive for technology companies with defense contracts.

"Cyber Comm. is still going through a process of establishing the command and control arrangements between their teams, and the support they provide to rest of the Department of Defense, and that’s going to take time to figure out," FitzGerald said. "The key challenge is will they be able to adapt and keep making changes as rapidly as they need to?"

Information-Management

 

 

« Dealing With Insider Data Theft
Ecuador Cut WikiLeaks Assange's Internet Connection »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BakerHostetler

BakerHostetler

BakerHostetler is one of the largest law firms in the USA We have five core practice groups including a specialty practice team in Privacy and Data Protection.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

Industrial Cyber Security

Industrial Cyber Security

Industrial Cyber Security provides specialist consulting services in enterprise and SCADA system security.

NetGuardians

NetGuardians

NetGuardians is a leading Fintech company recognized for its unique approach to fraud and risk assurance solutions.

Regulus Cyber

Regulus Cyber

Regulus enables drones, robots and autonomous vehicles to operate safely, without malicious or accidental interference to the operation of their mission.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

CyberPion

CyberPion

Cyberpion’s groundbreaking platform enables security teams to identify and neutralize threats stemming from vulnerabilities within online assets throughout an enterprise’s ecosystem.

Cyber Defense Networking Solutions (CDNS)

Cyber Defense Networking Solutions (CDNS)

CDNS is a global network infrastructure provider whose platforms are engineered for security, optimized for speed and designed for resiliency.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

Information Technology Solutions (ITS)

Information Technology Solutions (ITS)

Information Technology Solutions is a single source provider for managing and securing mission-critical IT services.

Prelude

Prelude

Prelude offer the first autonomous platform built to attack, defend and train critical assets through continuous red-teaming.

eCloudvalley Digital Technology

eCloudvalley Digital Technology

eCloudvalley Digital Technology is a born-in-the-cloud partner focused entirely on AWS services across APAC region.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

CDS

CDS

CDS is a strategic change agency enabling organisations and businesses to create and build better services to meet the evolving needs of customers, employees and citizens.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.