The Pentagon Has A Clear View Of Cyberwar

US Cyber Command’s first dedicated facility is providing government leaders a more holistic view of the global cyber environment and helping them make more informed decisions. The Integrated Cyber Center and Joint Operations Center, or ICC/JOC, is Cyber Command’s first dedicated facility and doubles as the US government’s first truly integrated cyber center.

Staffers there work with domestic and international partners to provide more rapid sharing of threat information while de-conflicting global cyber operations.

As part of the military’s operation to defend the US midterm elections in 2018, an operation known internally in the Department of Defense as “Synthetic Theology,” Cyber Command deployed cyber-warriors to Ukraine, North Macedonia, and Montenegro to help defend those countries’ networks, and to collect intelligence on adversaries.

US Cyber Command is still working overseas with allies to try preventing election interference, Brig. Gen. Timothy Haugh, the commander of Cyber Command’s cyber national mission force said during a roundtable at the Integrated Cyber Center and Joint Operations Center in Fort Meade, Maryland.

The facility’s operations floor, which operates 24/7, is organised by warfighting functions to include protection, intelligence, fires, sustainment and a leadership cell, officials told reporters May 7 during a first of its kind media briefing at the facility at Fort Meade.

The leadership cell houses Cyber Command’s joint operations center’s top officials and sits the battle captain right next to the NSA’s Cybersecurity Threat Operations Center director. This arrangement didn’t previously exist, Col. Joy Kaczor, director of current operations at Cyber Command, told reporters. Under the previous arrangement, information sharing was much slower.

“Now they’re sitting right next to each other and they both have different perspective on things but now they can also provide Gen. Paul Nakasone head of Cyber Command and director of the National Security Agency… a common understanding across both organisations, that shared picture of what is happening in this space,” she said.

This arrangement is critical especially as it relates to the network protection cell, she said. NSA analysts are looking at their sensors and sharing that information with Cyber Command so officials there can work with their NSA counterparts to take necessary steps to defend themselves across government sectors.

Similarly, in the intelligence cell, NSA analysts can pass addition information back and forth to get a clearer picture from an offensive and defensive perspective.

The sustainment cell is responsible for ensuring all the tools, equipment and sensors are up and running. The only cell on the operations floor that exclusively has Cyber Command personnel is the fires cell. Fires in military parlance refers to specific actions taken such as shooting a missile or using a cyber effect.

The military, and by extension Cyber Command, is the only US entity authorised to take such offensive actions, which is why they are the only personnel in the fires cell. 

While the ICC/JOC does not conduct operations, the fires cell merely works to coordinate and help de-conflict offensive cyber operations that might be occurring globally between different cyber entities.

FedAgent:      CyberScoop

You Might Also Read:

US Cyber Command Can Cut Russian Troll Access:

US Cyber Soldiers Go To The Battlefield:               

 


 

« Google Plan To Use Drone Delivery In Australia
US Campaigners Get Trained About Cyber Threats »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

Materna Radar Cyber Security

Materna Radar Cyber Security

Radar Cyber Security is the only European supplier of Managed Detection & Response who provides its services based on inhouse developed technology.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Infosec Cloud

Infosec Cloud

Infosec Cloud is a specialist Cyber Security company offering fully managed Training & Testing Services in addition to market leading Cyber Security technology and accredited professional services.

F1 Security

F1 Security

F1 Security provides a family of web security solutions including web application firewalls, web shell detection solutions, and web shell scanners.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

Argenta Talent Acquisition

Argenta Talent Acquisition

Argenta Talent Acquisition is a recruitment partner specializing in Space and Defense, Intelligence Community, all things Technical, Cyber, and Logistics.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.

Digital Technologies Group (DTG)

Digital Technologies Group (DTG)

DTG are a digital transformation company helping process organisations embrace smarter manufacturing through the adoption of industry 4.0 technologies and solutions.