Informasi Sains    
   
Daftar Isi
(Sebelumnya) United States Army Cyber CommandUnited States dollar (Berikutnya)

United States Cyber Command

United States Cyber Command
2010-05-14-USCYBERCOM Logo.jpg
U.S. Cyber Command emblem
Active2009–current
CountryUnited States of America
Typesub-unified command
RoleAdministration
Part ofU.S. Strategic Command
Garrison/HQFort Meade, Maryland
NicknameUSCYBERCOM or CYBERCOM
Commanders
Current
commander
General Keith B. Alexander, USA

United States Cyber Command (USCYBERCOM) is an armed forces sub-unified command subordinate to United States Strategic Command. The command is located in Fort Meade, Maryland and led by General Keith B. Alexander.[1] USCYBERCOM centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks.

Contents

Mission

"USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."[2]

The text "9ec4c12949a4f31474f299058ce2b22a", which is located in the command's emblem, is the MD5 hash of their mission statement.[3]

The command is charged with pulling together existing cyberspace resources, creating synergy and synchronizing war-fighting effects to defend the information security environment. USCYBERCOM is tasked with centralizing command of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD’s cyber expertise.[4][5]

Organization

USCYBERCOM is an armed forces sub-unified command subordinate to United States Strategic Command.

Service components

U.S. Cyber Command is composed of several service components, units from military services who will provide Joint services to Cyber Command.

Background

On 23 June 2009, the Secretary of Defense directed the Commander of U.S. Strategic Command (USSTRATCOM) to establish USCYBERCOM. In May 2010, General Keith Alexander outlined his views in a report for the United States House Committee on Armed Services subcommittee:[14][15][16][17][18]

"My own view is that the only way to counteract both criminal and espionage activity online is to be proactive. If the U.S. is taking a formal approach to this, then that has to be a good thing. The Chinese are viewed as the source of a great many attacks on western infrastructure and just recently, the U.S. electrical grid. If that is determined to be an organized attack, I would want to go and take down the source of those attacks. The only problem is that the Internet, by its very nature, has no borders and if the U.S. takes on the mantle of the world's police; that might not go down so well."

Initial operational capability was attained on 21 May 2010. General Alexander was promoted to four-star rank, becoming one of 38 General_(United States), and took charge of U.S. Cyber Command in a ceremony at Fort Meade that was attended by Commander of U.S. Central Command GEN David Petraeus, and Secretary of Defense Robert M. Gates.[19][20][21][22] USCYBERCOM reached full operational capability on 31 October 2010.[23]

The command assumed responsibility for several existing organizations. The Joint Task Force for Global Network Operations (JTF-GNO) and the Joint Functional Component Command for Network Warfare (JFCC-NW) were absorbed by the command. The Defense Information Systems Agency, where JTF-GNO operated, provides technical assistance for network and information assurance to USCYBERCOM, and is moving its headquarters to Ft. Meade.[24]

Concerns

There are concerns that the Pentagon and NSA will overshadow any civilian cyber defense efforts.[25] There are also concerns on whether the command will assist in civilian cyber defense efforts.[26] According to Deputy Secretary of Defense William J. Lynn, the command "will lead day-to-day defense and protection of all DOD networks. It will be responsible for DOD's networks – the dot-mil world. Responsibility for federal civilian networks – dot-gov – stays with the Department of Homeland Security, and that's exactly how it should be."[27] Alexander notes, however, that if faced with cyber hostilities an executive order could expand Cyber Command's spectrum of operations to include, for instance, assisting the Department of Homeland Security defend their networks.[28]

Some military leaders claim that the existing cultures of the Army, Navy and Air Force are fundamentally incompatible with that of cyber warfare.[29] Col Robert Costa, USAF even suggested a fourth branch of the military, an Information (Cyber) Service with Title 10 responsibilities analogous to its sister services in 2002 noting "While no one [Instrument of National Power] operates in a vacuum..., Information increasingly underpins the other three [Diplomatic, Economic and Military], yet has proven to be the most vulnerable, even as US society becomes more dependent on it in peace, conflict, and war. To attack these centers of gravity, an adversary will use the weakest decisive point, ...the Information IOP. In addition, the other IOPs benefit from Unity of Effort--Constitutional balances of power ensure the Diplomatic and Military IOPs exercised by the President in concert with Congress are focused, while the Economic IOP achieves Unity of Action through international market controls and an international body of law. [In 2002], [t]he Information IOP however, [was] rudderless, lacking both Unity of Action and Unity of Command."[30] Others have discussed the creation of a cyber-warfare branch.[31][32] LTC Gregory Conti and COL John "Buck" Surdu (chief of staff of the United States Army Research, Development and Engineering Command) stated that the three major services are "properly positioned to fight kinetic wars, and they value skills such as marksmanship, physical strength, the ability to leap out of airplanes and lead combat units under enemy fire. "Unfortunately," the two officers write, "these skills are irrelevant in cyber warfare. Technical expertise isn't highly valued in the three services. Just look at military uniforms: no decorations or badges honoring technical expertise", the officers point out. These officers suggest that "Ultimately, the role of fighting and winning in cyberspace is a military mission, which demands a military organization – one that can recruit, train and retain highly qualified cyber-warfare combatants."

Conti and Surdu reason: "Adding an efficient and effective cyber branch alongside the Army, Navy and Air Force would provide our nation with the capability to defend our technological infrastructure and conduct offensive operations. Perhaps more important, the existence of this capability would serve as a strong deterrent for our nation's enemies."[33]

In response to concerns about the military's right to respond to cyber attacks, GEN Alexander stated "The U.S. must fire back against cyber attacks swiftly and strongly and should act to counter or disable a threat even when the identity of the attacker is unknown" prior to his confirmation hearings before the United States Congress. This came in response to incidents such as a 2008 operation to take down a government run extremist honeypot in Saudi Arabia. "Elite U.S. military computer specialists, over the objections of the CIA, mounted a cyberattack that dismantled the online forum".[34]

"The new U.S. Cyber Command needs to strike a balance between protecting military assets and personal privacy." stated Alexander, in a Defense Department release. If confirmed, Alexander said, his main focus will be on building capacity and capability to secure the networks and educating the public on the command's intent.

"This command is not about an effort to militarize cyber space," he said. "Rather, it's about safeguarding our military assets."[35]

In July 2011 Deputy Defense Secretary William Lynn announced in a conference that “We have, within Cyber Command, a full spectrum of capabilities, but the thrust of the strategy is defensive.” “The strategy rests on five pillars, he said: treat cyber as a domain; employ more active defenses; support the Department of Homeland Security in protecting critical infrastructure networks; practice collective defense with allies and international partners; and reduce the advantages attackers have on the Internet.” [36]

International effects and reactions

The creation of U.S. Cyber Command appears to have motivated other countries in this arena. In December 2009, South Korea announced the creation of a Cyber Warfare command. Reportedly this is in response to North Korea's creation of a cyber warfare unit.[37] In addition, the British GCHQ has begun preparing a cyber force.[38] In addition, recent shift in military interest in Cyber warfare has motivated the creation of the first U.S. Cyber Warfare Intelligence Center.[39] In 2010, China introduced its first department dedicated to defensive cyber war and information security, in response to the creation of USCYBERCOM.[40]

See also

References

  1. ^ Hsu, Jeremy (5 Oct 2009). "U.S. Cyber Command Now Fully Online, and Seeking a Few Good Geeks". Popular Science. http://www.popsci.com/military-aviati on-amp-space/article/2009-10/us-cyber -command-now-online-and-seeking-few-g ood-geeks. Retrieved 18 April 2010.
  2. ^ U.S. Department of Defense, Cyber Command Fact Sheet, 21 May 2010 http://www.stratcom.mil/factsheets/Cy ber_Command/
  3. ^ Jelinek, Pauline (8 July 2010). "A code you can hack: On CYBERCOM’s logo". Marine Corps Times. Associated Press. Retrieved 8 July 2010. 
  4. ^ U.S. Department of Defense, Cyber Command Fact Sheet, 21 May 2010
  5. ^ http://www.nytimes.com/2013/03/13/us/ intelligence-official-warns-congress- that-cyberattacks-pose-threat-to-us.h tml
  6. ^ 20091203 IO Newsletter v10 no 03
  7. ^ Patrick Jackson (2010-03-15). "Meet USCybercom: Why the US is fielding a cyber army". BBC News. Retrieved 2010-07-10. 
  8. ^ "News Release: Army Forces Cyber Command Headquarters Standup Plan Announced". Defense.gov. http://www.defense.gov//releases/rele ase.aspx?releaseid=13549. Retrieved 2010-07-10.
  9. ^ Chief of Naval Operations, 'Fleet Cyber Command/Commander Tenth Fleet Implementation Plan,' Memorandum, United States Navy, 2009
  10. ^ Communication, Mass (2010-01-29). "Cryptologists in Monterey Preview Navy's Newest Numbered Fleet". Navy.mil. http://www.navy.mil/search/display.as p?story_id=50098. Retrieved 2010-07-10.
  11. ^ http://www.24af.af.mil/
  12. ^ http://www.af.mil/news/story.asp?id=1 23233993
  13. ^ "Fort Mead News: USMC Cyber Command". Ftmeade.army.mil. 2010-01-28. http://www.ftmeade.army.mil/pages/new s/stories/2010/jan/cyber.html. Retrieved 2010-07-10.
  14. ^ BBC News: US needs 'digital warfare force'
  15. ^ "Homeland Security Today - preparedness and security news - DC Summit Convenes Military 'Cyber Warriors'". Hstoday.us. 2009-11-18. http://www.hstoday.us/content/view/11 125/152/. Retrieved 2010-07-10.
  16. ^ "News Release: Flag and General Officer Announcements". Defense.gov. 2009-03-12. http://www.defense.gov/releases/relea se.aspx?releaseid=13051. Retrieved 2010-07-10.
  17. ^ Previous post Next post (15 April 2010). "Cyberwar Commander Survives Senate Hearing , Threat Level". Wired.com. Retrieved 2010-07-10. 
  18. ^ "U.S. Senate: Legislation & Records Home > Nominations Confirmed (Non-Civilian)". Senate.gov. http://www.senate.gov/pagelayout/legi slative/one_item_and_teasers/noms_con fn.htm. Retrieved 2010-07-10.
  19. ^ "Photos : News Photo". Defense.gov. 2010-05-21. http://www.defense.gov/photos/newspho to.aspx?newsphotoid=12630. Retrieved 2010-07-10.
  20. ^ DoD Cyber Command is officially online, 21 May 2010, Army Times
  21. ^ "Military Mulls Joint Cyber Defense". Govinfosecurity.com. http://www.govinfosecurity.com/articl es.php?art_id=1450&search_keyword =Keith+Alexander&search_method=ex act. Retrieved 2010-07-10.
  22. ^ "Fort Meade cyber security center sought (www.HometownGlenBurnie.com - The Maryland Gazette)". www.HometownGlenBurnie.com. http://www.hometownglenburnie.com/new s/Business/2009/12/09-17/Fort+Meade+c yber+security+center+sought%0A.html. Retrieved 2010-07-10.
  23. ^ Cyber Command Achieves Full Operational Capability
  24. ^ Jackson, William (2009-06-24). "DOD creates Cyber Command as U.S. Strategic Command subunit - Federal Computer Week". Fcw.com. http://www.fcw.com/Articles/2009/06/2 4/DOD-launches-cyber-command.aspx. Retrieved 2010-07-10.
  25. ^ Monroe, John S. (2009-07-02). "Cyber Command: So much still to know". Federal Computer Week. 1105 Media, Inc.. http://www.fcw.com/Articles/2009/07/0 6/buzz-cyber-command.aspx. Retrieved 2009-07-11.
  26. ^ "U.S Cyber Command Goes Online". democracyarsenal.org. 2009-10-01. http://www.democracyarsenal.org/2009/ 10/us-cyber-command-goes-online-.html. Retrieved 2010-07-10.
  27. ^ "Speech:". Defense.gov. http://www.defense.gov/speeches/speec h.aspx?speechid=1399. Retrieved 2010-07-10.
  28. ^ Shachtman, Noah. "Military's Cyber Commander Swears: "No Role" in Civilian Networks", The Brookings Institution, 23 September 2010.
  29. ^ G. Conti and J. Easterly; "Recruiting, Development, and Retention of Cyber Warriors Despite an Inhospitable Culture;" Small Wars Journal, July 2010
  30. ^ Costa, Robert (April 2002). "SUPPORTING THE INFORMATION-CENTRIC 2001 QUADRENNIAL DEFENSE REVIEW:THE CASE FOR AN INFORMATION SERVICE". AU: 261. http://www.dtic.mil/cgi-bin/GetTRDoc? AD=ADA420669.
  31. ^ "Report: Cybersecurity Military Command Coming". Govinfosecurity.com. http://www.govinfosecurity.com/articl es.php?art_id=1401&search_keyword =Keith+Alexander&search_method=ex act. Retrieved 2010-07-10.
  32. ^ G. Conti and B. Surdu; "Army, Navy, Air Force, Cyber: Is it Time for a Cyberwarfare Branch of the Military;" Information Assurance Newsletter, Vol. 12, No. 1, Spring 2009, pp. 14–18.
  33. ^ "New Cyber Warfare Branch Proposed". Blogs.govinfosecurity.com. 2009-03-25. http://blogs.govinfosecurity.com/post s.php?postID=160. Retrieved 2010-07-10.
  34. ^ Nakashima, Ellen (2010-03-19). "Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies". The Washington Post. Retrieved 2010-07-10. 
  35. ^ "News Article: Nominee Urges Government, Private Sector Cooperation". Defense.gov. http://www.defense.gov/News/NewsArtic le.aspx?ID=58772. Retrieved 2010-07-10.
  36. ^ "News Article: Lynn: Cyber Strategy’s Thrust is Defensive". Defense.gov. http://www.defense.gov/news/newsartic le.aspx?id=64682. Retrieved 2010-07-14.
  37. ^ "Cyber Warfare Command to Be Launched in January". Koreatimes.co.kr. http://www.koreatimes.co.kr/www/news/ nation/2009/12/205_56502.html. Retrieved 2010-07-10.
  38. ^ Clark, Colin (2009-06-29). "StratCom Plows Ahead on Cyber". DoD Buzz. http://www.dodbuzz.com/2009/06/29/str atcom-plows-ahead-on-cyber/. Retrieved 2010-07-10.
  39. ^ "Construction begins on first cyber warfare intelligence center". Af.mil. http://www.af.mil/news/story.asp?id=1 23204543. Retrieved 2010-07-10.
  40. ^ Branigan, Tania (2010-07-22). "Chinese army to target cyber war threat". The Guardian (London). Retrieved 25 July 2010. 

External links

(Sebelumnya) United States Army Cyber CommandUnited States dollar (Berikutnya)