The Pentagon Has A Clear View Of Cyberwar

US Cyber Command’s first dedicated facility is providing government leaders a more holistic view of the global cyber environment and helping them make more informed decisions. The Integrated Cyber Center and Joint Operations Center, or ICC/JOC, is Cyber Command’s first dedicated facility and doubles as the US government’s first truly integrated cyber center.

Staffers there work with domestic and international partners to provide more rapid sharing of threat information while de-conflicting global cyber operations.

As part of the military’s operation to defend the US midterm elections in 2018, an operation known internally in the Department of Defense as “Synthetic Theology,” Cyber Command deployed cyber-warriors to Ukraine, North Macedonia, and Montenegro to help defend those countries’ networks, and to collect intelligence on adversaries.

US Cyber Command is still working overseas with allies to try preventing election interference, Brig. Gen. Timothy Haugh, the commander of Cyber Command’s cyber national mission force said during a roundtable at the Integrated Cyber Center and Joint Operations Center in Fort Meade, Maryland.

The facility’s operations floor, which operates 24/7, is organised by warfighting functions to include protection, intelligence, fires, sustainment and a leadership cell, officials told reporters May 7 during a first of its kind media briefing at the facility at Fort Meade.

The leadership cell houses Cyber Command’s joint operations center’s top officials and sits the battle captain right next to the NSA’s Cybersecurity Threat Operations Center director. This arrangement didn’t previously exist, Col. Joy Kaczor, director of current operations at Cyber Command, told reporters. Under the previous arrangement, information sharing was much slower.

“Now they’re sitting right next to each other and they both have different perspective on things but now they can also provide Gen. Paul Nakasone head of Cyber Command and director of the National Security Agency… a common understanding across both organisations, that shared picture of what is happening in this space,” she said.

This arrangement is critical especially as it relates to the network protection cell, she said. NSA analysts are looking at their sensors and sharing that information with Cyber Command so officials there can work with their NSA counterparts to take necessary steps to defend themselves across government sectors.

Similarly, in the intelligence cell, NSA analysts can pass addition information back and forth to get a clearer picture from an offensive and defensive perspective.

The sustainment cell is responsible for ensuring all the tools, equipment and sensors are up and running. The only cell on the operations floor that exclusively has Cyber Command personnel is the fires cell. Fires in military parlance refers to specific actions taken such as shooting a missile or using a cyber effect.

The military, and by extension Cyber Command, is the only US entity authorised to take such offensive actions, which is why they are the only personnel in the fires cell. 

While the ICC/JOC does not conduct operations, the fires cell merely works to coordinate and help de-conflict offensive cyber operations that might be occurring globally between different cyber entities.

FedAgent:      CyberScoop

You Might Also Read:

US Cyber Command Can Cut Russian Troll Access:

US Cyber Soldiers Go To The Battlefield:               

 


 

« Google Plan To Use Drone Delivery In Australia
US Campaigners Get Trained About Cyber Threats »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

Allurity

Allurity

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world.

C2 Risk

C2 Risk

C2 Risk are focussed on risk analytics for information assurance, privacy and ESG (Environmental, Social, and Governance).

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

HEAL Security

HEAL Security

HEAL Security is the global authority for cybersecurity data, research and insights across the healthcare sector.

Applied Insight

Applied Insight

Applied Insight work closely with government agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest cloud, data and cyber capabilities.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.

Umbrella Cyber

Umbrella Cyber

Umbrella Cyber specialises in Cyber Essentials and Cyber Essentials Plus Certification and penetration testing.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.

Novera

Novera

Novera offer security assessment and advisory services to help businesses manage risks from AI, cyber and privacy.