Pentagon to Boost Cyber-Security Unit Five-Fold, Eyes Effective Offense
January 28, 2013 3:34 PM
Force will rise from 900 troops to around 4,900 over the next several years
The U.S. is finally getting more serious about cybersecurity in the wake of stinging attacks from
economic rivals such as China
military adversaries like Iran
. Currently the
U.S. Department of Defense
(USCYBERCOM) unit is stressed to the brink, with a small crew of around 900 soldiers. That count is reportedly dwarfed by the
large cyberwarfare teams
in Iran, China, and other cyberpowers.
I. Better Defense, More Offense
The DOD announced this week ambitious plans to catch up, growing the unit five-fold to around 4,900 troops. The plan was first formulated by senior Pentagon officials late last year and is in the final stages of confirmation.
Under the plan, Cyber Command will be split into three distinct subunits, each with a distinct purpose. "National mission forces" will protect critical infrastructure like
power and water grids
or attacks; "combat mission forces" will communicate with overseas officers and coordinate cyberattacks (
); and "cyber protection forces" will be tasked with entrenching the Pentagon's networks against both foreign and
Sources indicate that the "national mission" teams will only take action on U.S. networks if a sister agency, such as the
Federal Bureau of Investigation
(FBI), requests it. While that may not lay to rest citizen fears of domestic spying or policing, it does suggest -- at least officially -- a limited domestic role for the expanding unit.
An unnamed official
, "There’s no intent to have the military crawl inside industry or private networks and provide that type of security. [Action would only be taken in cases where the adversary could] really hurt. We’re not talking about doing something to make sure that Mrs. Smith’s bank account didn’t get hijacked by somebody."
The U.S. wants better cyberoffensive capabilities to use against hostile regimes like Iran.
[Image Source: ISNA]
The plan to dramatically expand the
three-year old unit
-- at a time when the military as a whole is undergoing sweeping budget cuts -- is a sign of cyberwarfare's growing role in modern warfare.
William J. Lynn III, a former deputy defense secretary, tells
The Washington Post
that the plan is long overdue, commenting, "Given the malicious actors that are out there and the development of the technology, in my mind, there’s little doubt that some adversary is going to attempt a significant cyberattack on the United States at some point. The only question is whether we’re going to take the necessary steps like this one to deflect the impact of the attack in advance or . . . read about the steps we should have taken in some post-attack commission report."
II. Big Challenges Ahead
Currently, the DOD relies heavily on the
National Security Agency
(NSA) for its cyberwarfare needs. Indeed, Cyber Command's main physical presence is located directly beside the main NSA building in Fort Meade, Maryland. But the NSA's official role is limited to foreign intelligence gather; outside of electronic intelligence it's ill suited to provide necessary cyberoffensive or defensive capabilities.
The question, going ahead, though is how to merge the NSA's existing support role with the expanding role of the Cyber Command unit.
Some argue that when Cyber Command is expanded "you sever that" relationship with the NSA. But others say the NSA will continue to complement the bigger, more independent unit without issue. Comments one source, "That’s been the plan all along. Take the talent resident in NSA, turn it into [cyber] attack talent."
Another key unanswered question is where the Pentagon will be able to get enough qualified hackers to join its ranks. Funding will obviously play a key role, but one problem is simply availability; skilled security experts are a relatively rarity and many have misgivings about working for "the man" (aka the U.S. Military).
Comments one Navy source, "You get the resource guys sucking a lot of air through their teeth because they know their service chiefs have backed it. So they have to find the resources to pay for the people."
Many hackers frown on working for the Pentagon, but given sufficient money they might change their tune. [Image Source: Reuters]
Figuring out those challenges will be a big part of
Keith B. Alexander
's job. Director Alexander, who jointly serves as director of the NSA and chief of the Cyber Command.
Director Alexander is expected to retire or move to another agency in summer 2014, but until then he will be pushing strong to gain the ability for Cyber Command to have its own independent budget, something other major military branches have. Such authority would have to be granted by Congress.
In the meantime his agencies will continue to ponder how to recruit talent, how to differentiate their respective roles, and how to counterattack foreign cyberagressors with their small, but growing staff of government hackers.
The Washington Post
"This is about the Internet. Everything on the Internet is encrypted. This is not a BlackBerry-only issue. If they can't deal with the Internet, they should shut it off." -- RIM co-CEO Michael Lazaridis
Anonymous Declares War on the U.S. Government Following Aaron Swartz' Suicide
January 26, 2013, 1:43 PM
Two U.S. Power Plants Infected With USB Malware Last Year
January 17, 2013, 3:01 PM
Iran Accuses U.S. and Israel of Spreading Holiday Stuxnet "Cheer"
December 26, 2012, 3:57 PM
Move Over China, Iran May Have Been Source of Latest Cyberattacks on the U.S.
October 16, 2012, 4:25 AM
NSA: China is Destroying U.S. Economy Via Security Hacks
March 28, 2012, 7:06 PM
PIQ ROBOTTM reveals its new artificial intelligence software
November 29, 2016, 12:59 AM
One more time - Happy Thanksgiving to Everyone Around the World
November 24, 2016, 4:00 AM
Google’s Smart Contact Lens Project gets halted for 2016
November 20, 2016, 7:00 AM
Cell Research Study shows African Americans have greater immune response to infection
November 10, 2016, 1:00 AM
UTHealth Clinical Trial Shows Progress Using Stem Cells to Treat Traumatic Brain Injury
November 8, 2016, 1:00 AM
Uber Partners with Circulation to Pilot Program Connecting Transportation and Digital Health Care
November 6, 2016, 5:00 AM
Most Popular Articles
OnePlus 3T – 5.5” Optic AMOLED and Dash Charging Technology
March 23, 2017, 8:45 AM
Gigabyte GA-Z170X-Gaming G1 – Intel Thunderbolt 3 Certified Motherboard
March 9, 2017, 6:25 AM
Huawei P8 Lite 2017 – Android 7 Nougat Smartphone with Octa-Core Processor
March 8, 2017, 7:03 AM
Lenovo ThinkPad T460 - Ultra-Thin and Feather-light
March 3, 2017, 6:00 AM
Nokia has ditched this camera technology in its new smartphones
March 7, 2017, 8:45 AM
Latest Blog Posts
Android Creator and New Bezel-less Smartphone
Mar 29, 2017, 10:28 AM
More Apps From Google
Mar 28, 2017, 7:15 AM
Are you thinking of performance and speed? Intel claims:
Mar 25, 2017, 7:45 AM
Apple buys an automation app called Workflow. The deal was completed today and brings the app along with its developers.
Mar 23, 2017, 7:35 AM
Apple Announces new color for iPhones and iPads
Mar 22, 2017, 7:45 AM
Instagram: You Can Now Save Live Videos For Later
Mar 21, 2017, 7:49 AM
Samsung Galaxy S8 to Get New Color Scheme
Mar 20, 2017, 7:45 AM
What else to worry about?
Mar 17, 2017, 6:45 AM
Icon of the Day: Intel/ NVIDIA or Mobileye
Mar 16, 2017, 6:15 AM
JUST IN - Twitter Hijacked : High-Profile Account Accesses
Mar 15, 2017, 7:07 AM
Mar 14, 2017, 7:30 AM
News and Tips
Mar 13, 2017, 6:30 AM
iPhone 8 – May Not Get Curved Screen
Mar 11, 2017, 8:00 AM
California paves way to self-driving car tests without humans
Mar 11, 2017, 7:18 AM
Smart Machines V hackers
Mar 10, 2017, 7:00 AM
Uber Can Resume Autonomous Car Testing in California
Mar 9, 2017, 6:50 AM
Mar 8, 2017, 7:09 AM
Mar 7, 2017, 8:45 AM
World news 3-6
Mar 6, 2017, 5:40 AM
Mar 4, 2017, 7:40 AM
Mixed News of the Day
Mar 4, 2017, 6:32 AM
Jaguar Land Rover invests in ride-sharing
Mar 3, 2017, 7:00 AM
More Blog Posts
Copyright 2017 DailyTech LLC. -
Terms, Conditions & Privacy Information