Is the US cyber command ready for Information Warfare?

A Government spokesman confirmed the US Government is supporting the growth for its cyber command but it is not yet ready to repel any cyber attacks.

The US are among the most advanced countries in Information Warfare, Obama administration considers strategic the dominance of the country in the cyber space.

The US Government established in 20o9 its military cyber command in order to defend the country from cyber attacks. Since the creation of the cyber army cyber threats have evolved in significant way and practically every government is investing its cyber capabilities.

Information warfare is strategic for almost every government, North Korea, Russia, China, Danmark are among the countries that are more investing to improve their cyber capabilities, and of course, the governments belonging to the Five Eyes alliance.

The US Department of Defense announced that it plans to hire 3,000 cyber experts that will support the US Cyber Command, the new units will be added by the end of 2015, doubling its resources by 2016.

Despite the huge effort of the US Government we cannot consider the infrastructure of the country totally secure and the risk of a major cyber attack is concrete.

The military cyber command, created in 2009, lacks the means to lead an offensive campaign in a fast-moving digital conflict, said Eric Rosenbach, the Pentagon’s principal adviser on cyber security.

Asked by Senator Bill Nelson if the US cyber command lacks the computer network infrastructure to carry out a cyber offensive “effectively,” the Pentagon’s principal adviser on cyber security Eric Rosenbach explained:

“Yes, they currently do not have a robust capability.”

I believe that the sentence should be analyzed with caution, the approach of the member of the US government is precautionary due to the difficulty to put in place all the necessary countermeasures against dynamic and complex cyber threats.

According to Rosenbach the US Government has the necessary resources and funds for its cyber army, but the US still has technical and manpower problems to solve.

The US Cyber command, according the Snowden‘s revelations, is continually improving its offensive capabilities that could target infrastructures of a foreign enemy, “but in a very precise and confined way” and respecting the legal framework in warfare matter.

Pentagon chief Ashton Carter is reviewing a new cyber strategy for the military that is coming soon, he also declared that the Obama administration is ready to support more investment in cyber security for its Cyber Command as needed,

The cyber security is a primary goal for the US Government, despite budget cuts in the military expense, Washington it continuing to invest in cyber security.

Pierluigi Paganini

(Security Affairs –  US Cyber Command, Information Warfare)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

1 hour ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

8 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

8 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

13 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

1 day ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

1 day ago

This website uses cookies.