Defense Secretary Gates approves creation of U.S. Cyber Command
U.S. Cybercom's mission: To oversee protection of DoD networks
Computerworld - Defense Secretary Robert Gates today approved the creation of a unified U.S. Cyber Command to oversee the protection of military networks against cyber threats.
In a memorandum issued to the Joint Chiefs of Staff, Gates said he intends to recommend to the president that the new command be led by the director of the National Security Agency (NSA) Lt. Gen. Keith Alexander.
Gates directed the commander of the U.S. Strategic Command, Gen. Kevin Chilton, to develop implementation plans for Cybercom, as the new unified command will be called.
The plans are due by Sept. 1 and need to include the new command's mission, roles and responsibilities, reporting structures and accountability measures, Gates said.
The new command will most likely be headquartered in Fort Meade, Md., and will reach initial operating capabilities by October, and full operating capability by October 2010, Gates said in his memo.
The "subordinate unified" cyber command will operate under U.S. Strategic Command for military cyberspace operations.
Gates also ordered the undersecretary of defense for policy to develop policies and strategies for a comprehensive approach to the Defense Department's cyberspace operations.
The proposal to create the new command has been expected for some time and is part of an effort to address growing threats to Defense Department and Pentagon networks from foreign and domestic threats. As part of its mission, Cybercom is also expected to develop a range of offensive cyber warfare capabilities.
The proposal for Cybercom is part of a broader effort by the Obama administration to bolster federal and military cybersecurity capabilities. It comes a few weeks after President Obama announced the creation of a White House cyber security coordinator role and plans to develop a comprehensive national strategy for protecting U.S. interests in cyberspace.
That effort is largely targeted at protecting U.S. civilian government and critical infrastructure targets in cyberspace, while the new command's mission is to do the same for DoD networks.
Alan Paller, director of research at SANS Institute, a security training and certification body, said the move to create a unified cybercommand across the Defense Department is a "spectacular idea."
Melding both defensive and offensive missions under the same command will allow for better threat preparedness, he said. A unified command also increases the "potential for interoperability and both process sharing and real time information sharing among the services," Paller said.
He said the only downside is the possibility that the cybercommand will "so militarize the Information Assurance Division of NSA" that it could harm the public-private partnerships that are important for security.
Obama and tech
- Analysis: Obama's push to open government elevates risk of data leaks
- White House set to unleash 100,000 federal data sources via data.gov
- Growing White House ties to Google draw protest
- Experts: Obama cybersecurity plan short on details
- U.S. cyberwarfare command: Better late than never
- Obama outlines cybersecurity plans, cites grave threat to cyberspace
- Obama's new cybersecurity direction wins praise
- Internet warfare: Are we focusing on the wrong things?
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- SBIC: Transforming Information Security This report combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.
- Is Your Credit Card Data Safe from Hacks? News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What...
- Protecting Your Mid-Size Business from Today's Security Threats Think you're too small to get hacked? Think again.
- CSO QuickPulse IT Security: Midsize Businesses Face Enterprise This survey finds that midsize firms lack understanding of vulnerabilities, and need comprehensive security tools.
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed in recent years, and it continues to escalate. All Cybercrime and Hacking White Papers | Webcasts
Computerworld has launched its annual search for outstanding IT leaders who align technology with business goals. Nominate a top IT executive for the 2015 Premier 100 IT Leaders awards now through July 18.