The Pentagon Has A Clear View Of Cyberwar

US Cyber Command’s first dedicated facility is providing government leaders a more holistic view of the global cyber environment and helping them make more informed decisions. The Integrated Cyber Center and Joint Operations Center, or ICC/JOC, is Cyber Command’s first dedicated facility and doubles as the US government’s first truly integrated cyber center.

Staffers there work with domestic and international partners to provide more rapid sharing of threat information while de-conflicting global cyber operations.

As part of the military’s operation to defend the US midterm elections in 2018, an operation known internally in the Department of Defense as “Synthetic Theology,” Cyber Command deployed cyber-warriors to Ukraine, North Macedonia, and Montenegro to help defend those countries’ networks, and to collect intelligence on adversaries.

US Cyber Command is still working overseas with allies to try preventing election interference, Brig. Gen. Timothy Haugh, the commander of Cyber Command’s cyber national mission force said during a roundtable at the Integrated Cyber Center and Joint Operations Center in Fort Meade, Maryland.

The facility’s operations floor, which operates 24/7, is organised by warfighting functions to include protection, intelligence, fires, sustainment and a leadership cell, officials told reporters May 7 during a first of its kind media briefing at the facility at Fort Meade.

The leadership cell houses Cyber Command’s joint operations center’s top officials and sits the battle captain right next to the NSA’s Cybersecurity Threat Operations Center director. This arrangement didn’t previously exist, Col. Joy Kaczor, director of current operations at Cyber Command, told reporters. Under the previous arrangement, information sharing was much slower.

“Now they’re sitting right next to each other and they both have different perspective on things but now they can also provide Gen. Paul Nakasone head of Cyber Command and director of the National Security Agency… a common understanding across both organisations, that shared picture of what is happening in this space,” she said.

This arrangement is critical especially as it relates to the network protection cell, she said. NSA analysts are looking at their sensors and sharing that information with Cyber Command so officials there can work with their NSA counterparts to take necessary steps to defend themselves across government sectors.

Similarly, in the intelligence cell, NSA analysts can pass addition information back and forth to get a clearer picture from an offensive and defensive perspective.

The sustainment cell is responsible for ensuring all the tools, equipment and sensors are up and running. The only cell on the operations floor that exclusively has Cyber Command personnel is the fires cell. Fires in military parlance refers to specific actions taken such as shooting a missile or using a cyber effect.

The military, and by extension Cyber Command, is the only US entity authorised to take such offensive actions, which is why they are the only personnel in the fires cell. 

While the ICC/JOC does not conduct operations, the fires cell merely works to coordinate and help de-conflict offensive cyber operations that might be occurring globally between different cyber entities.

FedAgent:      CyberScoop

You Might Also Read:

US Cyber Command Can Cut Russian Troll Access:

US Cyber Soldiers Go To The Battlefield:               

 


 

« Google Plan To Use Drone Delivery In Australia
US Campaigners Get Trained About Cyber Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

tunCERT

tunCERT

TunCERT is the National Computer Emergency Response Team of Tunisia.

Bastille

Bastille

Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, IoT) in your organization.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

DataTribe

DataTribe

DataTribe is a cyber startup foundry, leveraging deep experience and expertise to build and launch successful product companies.

WisePlant

WisePlant

WisePlant's portfolio of solutions and services includes process measurement, secure automation, industrial cybersecurity, functional safety and more.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

Simplilearn

Simplilearn

Simplilearn is the world's #1 online bootcamp for digital skills training in disciplines such as Cyber Security, Cloud Computing, Project Management, Digital Marketing, and Data Science.

Sunartek Labs

Sunartek Labs

Sunartek are equipped with expert resources and advanced technology to identify cyber threats and prevent any breach, bypassing the security network of your organization.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

DataSolutions

DataSolutions

DataSolutions is a leading value-added distributor of transformational IT solutions in the UK and Ireland.

GTT Communications

GTT Communications

GTT are a global network provider that serves thousands of multinational and national enterprise, government and carrier customers with a portfolio of advanced connectivity and security services.

Secjur

Secjur

Secjur is a provider of AI-based compliance tools that aim to put compliance, data protection, information security and whistleblowing on autopilot.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.