Cyber Command: We Don’t Wanna Defend the Internet (We Just Might Have To)




OMAHA, Nebraska – Members of the military’s new Cyber Command insist that they’ve got no interest in taking over civilian Internet security – or even in becoming the Pentagon’s primary information protectors. But
the push to intertwine military and civilian network defenses is gaining
momentum, nevertheless. At a gathering this week of top cybersecurity
officials and defense contractors, the Pentagon’s number two floated the
idea that the Defense Department might start a protective program for
civilian networks, based on a deeply controversial effort to keep
hackers out of the government’s pipes.

U.S. Cyber Command (“CYBERCOM“) officially became operational this week, after years of preparation. But observers inside the military and out still
aren’t quite sure what the command is supposed to do: protect the
Pentagon’s networks, strike enemies with logic bombs, seal up civilian
vulnerabilities, or some combination of all three.

To one senior CYBERCOM official, the answer is pretty simple: nothing new. Smaller military units within U.S. Strategic Command coordinated and set policies for the armed forces’ far-flung teams of network
operators and defenders. Those coordinators and policy-makers have now
been subsumed into CYBERCOM. They’ll still do the same thing as before,
only more efficiently. “Doesn’t expand any authorities. It doesn’t have
any new missions,” the official told Danger Room. “It really doesn’t add
any significant funding… And really, it’s not a significant increase in
personnel; we just reorganized the personnel have we had in a smarter
and more effective way.”

That may soon change, however. A 356-page classified plan outlining CYBERCOM’s rise is being put into action. A team of about 560 troops, headquartered at Ft. Meade, Maryland, will eventually grow to 1093. Each
of the four armed services are assembling their own cyber units out of
former communications specialists, system administrators, network
defenders, and military hackers. Those units – Marine Forces Cyber
Command, the 24th Air Force, the 10th Fleet, and Army Forces Cyber
Command – are then supposed to supply some of their troops to CYBERCOM
as needed. It’s similar to how the Army and Marines provide Central
Command with combat forces to fight the wars in Afghanistan and Iraq.
Inside the military, there’s a sense that CYBERCOM may take on a
momentum of its own, its missions growing more and more diverse.

Most importantly, perhaps, procedures are now being worked out for CYBERCOM to help the Department of Homeland Security defend government and civilian networks, much like the military contributed to disaster
recovery efforts after Hurricane Katrina and the Gulf of Mexico oil
spill.

In those incidents, it took days, even weeks for the military to fully swing into action. In the event of an information attack, those timelines could be drastically collapsed. “There’s probably gonna be a
very temporal element to it. It’s gonna need to be pretty quick,” the
CYBERCOM official said.

Exactly what kind of event might trigger CYBERCOM’s involvement isn’t clear. “From our perspective the threshold is really easy: it’s when we get a request from DHS,” the official noted. “What’s their threshold? I
couldn’t tell you what their threshold is.”

The Pentagon might not even wait for an information disaster to move in. The National Security Agency is developing threat-monitoring systems for government networks dubbed Einstein 2 and Einstein 3. Deputy
Secretary of Defense William Lynn believes those
programs ought to extended to cover key private networks, as ...
.

We are already using our technical capabilities… to protect governm...,” Lynn announced at the Strategic Command Cyber Symposium here. “We need
to think imaginatively about how this technology can also help secure a
space on the Internet for critical government and commercial
applications.”

Einstein 2 is supposed to inspect data for threat signatures as it enters federal networks. Einstein 3 goes even further — alerting
DHS and the NSA before the attacks hit
. “You’re starting to
anticipate intrusions, anticipate threat signatures, and try and
preventing things from getting to the firewalls rather than just
stopping at the firewalls,” Lynn told Danger Room after his Cyber
Symposium speech. (Full disclosure: I ran a panel at the event,
and the military paid my travel costs.)

Given the NSA’s history of domestic surveillance, civil liberties groups fear that the Einstein programs could
become a new way to snoop on average Americans’ communications
.
Lynn said not to worry: “Individual users who do not want to enroll
could stay in the ‘wild, wild west’ of the unprotected internet.”

“I think it’s gonna have to be voluntary,” he added. “People could opt into protection – or choose to stay out. Individual users may well choose to stay out. But in terms of protecting the nation’s security,
it’s not the individual users [that matter most]. I mean, they have to
worry about their individual [data], their credit rating, and all that.
But it’s the vulnerability of certain critical infrastructure – power,
transportation, finance. This starts to give you an angle at doing
that.”

Privacy rights organizations and military insiders also wonder whether CYBERCOM is just another way to extend the NSA’s reach. After all, both organizations are headquartered at Ft. Meade. And both
are headed by Gen. Keith Alexander
.

The CYBERCOM official swears that won’t happen. “It’s not NSA taking over military cyber,” he said. “And it’s not military cyber taking over NSA.”

[Photo: USAF]

See Also:


Source: Wired.com

Views: 58

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega commented on Doc Vega's blog post Was a Planned Civil War Averted?
"cheeki kea, you are spot on. The old guard is about to collapse! "
13 hours ago
Doc Vega commented on Doc Vega's blog post Alligator Creek and a Japanese Massacre
"cheeki kea, the Japanese thought they could expand their empire and exact enough damage on the US…"
13 hours ago
Michelle Reichert favorited Burbia's video
yesterday
cheeki kea posted a video

NEW DOCUMENTARY - Dissent Into Madness

TRANSCRIPT AND SOURCES: https://www.corbettreport.com/dissent-into-madness/What if the delusions of the dissidents are in fact real? What if their paranoid f...
yesterday
cheeki kea commented on Doc Vega's blog post Alligator Creek and a Japanese Massacre
"Japan served themselves up no favours by inching out into the South Pacific as they soon found out.…"
yesterday
cheeki kea commented on Doc Vega's blog post Was a Planned Civil War Averted?
"Their plans did not work out because we are the news now, and the old news is the enemy. "
yesterday
Doc Vega posted a blog post

Alligator Creek and a Japanese Massacre

The year is 1942 just a few months after the Pearl Harbor disaster. Despite losses suffered by the…See More
Tuesday
Doc Vega commented on Burbia's video
Thumbnail

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

"With all due respect this guy comes off as a drunken asshole and he didn't even  know who…"
Monday
Doc Vega posted a blog post

Was a Planned Civil War Averted?

We are living in sadly historic times where good and evil are in battle all the time. Not that this…See More
Sunday
Sandy posted a photo
Sunday
Less Prone posted a video

President Trump addresses U.N. General Assembly - FULL SPEECH

President Donald Trump speaks at the United Nations General Assembly in New York City.Full video here: https://www.c-span.org/event/white-house-event/preside...
Sunday
Burbia posted a video

2 MIN AGO: Western Provinces MAJOR New WEXIT Announcement - Canada EXPLODES!

In a stunning turn of events, Western provinces just made a major new WEXIT announcement — and it’s shaking the foundations of Canadian unity. Is Western sep...
Saturday
Doc Vega posted a blog post

How You Provoke a Civil War

In the world of counter intelligence which is simply one aspect of many pertaining to asymmetrical…See More
Sep 26
Burbia commented on Burbia's video
Thumbnail

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

"I don't follow as much with Josh Reeves than I use to. He seems to be a documentary producing…"
Sep 25
Burbia posted a video

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

DONATE-paypal-dayglow76@yahoo.comCashapp-reevesradioVenmo-Josh-Reeves-61FILMS AND AUDIOBOOKS DOWNLOAD STORE-https://store.payloadz.com/results/242828-josh-re...
Sep 25
Doc Vega posted blog posts
Sep 25
tjdavis posted a video

CHARLIE KIRK VIDEO THAT KEEPS GETTING REMOVED OFF OF SEVERAL PLATFORMS

I had not planned to share this publicly, but I believe Advar, who spoke with Charlie Kirk while I was very ill, would have wanted me to. After my interview ...
Sep 25
pohonemas33 team commented on Chris of the family Masters's photo
Thumbnail

Gold-Coast-Message

"untuk bermain slot, kamu cukup kunjungi situs kacang99 pasti langsung gacor"
Sep 24
Doc Vega posted blog posts
Sep 24
Burbia posted a blog post

Former President Trump?

When was this article written? It is attributed to Victor Davis Hanson. He is a Fellow at Hoover…See More
Sep 22

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted