The Pentagon Has A Clear View Of Cyberwar

US Cyber Command’s first dedicated facility is providing government leaders a more holistic view of the global cyber environment and helping them make more informed decisions. The Integrated Cyber Center and Joint Operations Center, or ICC/JOC, is Cyber Command’s first dedicated facility and doubles as the US government’s first truly integrated cyber center.

Staffers there work with domestic and international partners to provide more rapid sharing of threat information while de-conflicting global cyber operations.

As part of the military’s operation to defend the US midterm elections in 2018, an operation known internally in the Department of Defense as “Synthetic Theology,” Cyber Command deployed cyber-warriors to Ukraine, North Macedonia, and Montenegro to help defend those countries’ networks, and to collect intelligence on adversaries.

US Cyber Command is still working overseas with allies to try preventing election interference, Brig. Gen. Timothy Haugh, the commander of Cyber Command’s cyber national mission force said during a roundtable at the Integrated Cyber Center and Joint Operations Center in Fort Meade, Maryland.

The facility’s operations floor, which operates 24/7, is organised by warfighting functions to include protection, intelligence, fires, sustainment and a leadership cell, officials told reporters May 7 during a first of its kind media briefing at the facility at Fort Meade.

The leadership cell houses Cyber Command’s joint operations center’s top officials and sits the battle captain right next to the NSA’s Cybersecurity Threat Operations Center director. This arrangement didn’t previously exist, Col. Joy Kaczor, director of current operations at Cyber Command, told reporters. Under the previous arrangement, information sharing was much slower.

“Now they’re sitting right next to each other and they both have different perspective on things but now they can also provide Gen. Paul Nakasone head of Cyber Command and director of the National Security Agency… a common understanding across both organisations, that shared picture of what is happening in this space,” she said.

This arrangement is critical especially as it relates to the network protection cell, she said. NSA analysts are looking at their sensors and sharing that information with Cyber Command so officials there can work with their NSA counterparts to take necessary steps to defend themselves across government sectors.

Similarly, in the intelligence cell, NSA analysts can pass addition information back and forth to get a clearer picture from an offensive and defensive perspective.

The sustainment cell is responsible for ensuring all the tools, equipment and sensors are up and running. The only cell on the operations floor that exclusively has Cyber Command personnel is the fires cell. Fires in military parlance refers to specific actions taken such as shooting a missile or using a cyber effect.

The military, and by extension Cyber Command, is the only US entity authorised to take such offensive actions, which is why they are the only personnel in the fires cell. 

While the ICC/JOC does not conduct operations, the fires cell merely works to coordinate and help de-conflict offensive cyber operations that might be occurring globally between different cyber entities.

FedAgent:      CyberScoop

You Might Also Read:

US Cyber Command Can Cut Russian Troll Access:

US Cyber Soldiers Go To The Battlefield:               

 


 

« Google Plan To Use Drone Delivery In Australia
US Campaigners Get Trained About Cyber Threats »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

CS Group

CS Group

CS Group offers a complete range of security solutions from consultancy to security maintenance and from secure infrastructure design to security governance.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

Desec Security

Desec Security

Desec's training platform allows professionals around of the world to acquire knowledge and practical experience in Information Security.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

ValueMentor

ValueMentor

ValueMentor is a leading cyber security service provider in the Middle East. We enable clients to reduce risk by taking a strategic approach to cybersecurity.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

Theta432

Theta432

THETA432 is a cybersecurity firm that provides 24/7/365 managed prevention, detection, response, Hybrid SOC, cyber defense monitoring services with dynamically defined defense (3D™).

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.

Grey Market Labs

Grey Market Labs

Grey Market Labs is a special place. It is a data privacy and security skunkworks.

TENEX

TENEX

TENEX is a cybersecurity company leveraging advanced artificial intelligence and human expertise to transform enterprise security.