Éditoriaux Défense Sécurité Terrorisme Zones de conflits Logistique Livres de référence Liens
Terre Air Mer Gendarmerie Renseignement Infoguerre Cyber Recherche


U.S. Military’s Cyber Capabilities Provide Strength, Challenges, Official Says

By Jim Garamone, DoD News, Defense Media Activity.
Washington D.C. — (DoD News)  — June 22, 2016 — There is hardly a military mission that doesn’t incorporate cyber capabilities, and that is both a great strength of the U.S. military and a possible weakness, Air Force Brig. Gen. Charles L. Moore Jr. told the House Armed Services Committee today.

Participants at Cyber Guard 2016 work through a June 16, 2016, training scenario during the nine-day exercise in Suffolk, Va. Air Force Brig. Gen. Charles Moore, the Joint Staff’s deputy director of global operations, told Congress June 22 that Cyber Guard and exercises like it test the abilities of Cyber Mission Force teams to defend Defense Department networks.

Moore, the Joint Staff’s deputy director of global operations, said the inherent global nature of cyberspace operations and threats creates numerous challenges for the Defense Department.

American warfighting capabilities “are increasingly reliant on the cyber domain, and it is integral to the advantages we enjoy in everything from our high-tech weaponry and communications systems, to our ability to rapidly deploy forces around the globe,” the general said.

And Moore’s Law -- no relation to the general -- predicts the increasing pace of change in the field will continue, and that, too, causes challenges for DoD, the general said.

“Trying to keep up with the rate at which technology is advancing in this rapidly changing environment is extremely challenging,” he said. “It is important to note that while our adversaries and potential adversaries continue to increase their capabilities, they also share these challenges.”

However, DoD is making progress, including in building the Cyber Mission Force, challenging an adversary’s ability to operate freely in cyberspace and continuing to more effectively defend networks, information and weapon systems from malicious actors, Moore said.

Cyber Mission Force teams support combatant command requirements to defend the nation against cyberattack and to protect Defense Department information networks, the general said.

“While significant progress in all these areas has been made in the last year, significant challenges do remain, to include equipping the force, establishing a persistent training environment that is responsive to the many layers of required training, recruiting and retaining a professional force and finalizing the command-and-control structure for the Cyber Mission Force,” he told the committee.

Fighting ISIL in Cyberspace

Moore discussed U.S. Cyber Command’s continuing effort against the Islamic State of Iraq and the Levant. “In this area, Cybercom has not only challenged ISIL, as the president and the secretary of defense have publicly stated, but they have also built on our lessons-learned to date, establishing a solid foundation on which to expand the scale and effectiveness of our operations,” he said.

The cyber domain is attractive to potential adversaries because the cost of entry is low, Moore said. Many believe the United States cannot identify where an attack originates from. They see the domain as their asymmetric advantage,” the general said.

“Because of these threats from both state and non-state actors, we work vigorously to harden our networks and weapon systems while educating the Total Force to create a climate of constant vigilance,” he said.

There cannot be a weak link in the national defense, the general said. DoD engages and works with private-sector companies, other federal agencies, state and local governments and with foreign partners to strengthen network defense, said Moore, noting there is tremendous interest in expanding those cyber relationships.

Cyber warriors are also needed tactically, he said. “As our capabilities continue to grow, we continually engage all of the combatant commands to ensure cyber-enabled effects are being considered for incorporation in their planning processes and to benefit all current and future operations,” the general said.

While Cybercom battles ISIL, Moore said, “We also recognize that there are other threats in cyberspace that must be planned for and addressed. The Joint Staff, he said, is working closely with Cybercom to … “continue to bring cyber related options to the table for consideration to support all of our global operations.”
(Follow Jim Garamone on Twitter: @GaramoneDoDNews)

Related Biographies :
Air Force Brig. Gen. Charles L. Moore Jr.

Derniers articles

Verdun 2016 : La légende de la « tranchée des baïonnettes »
Eyes in the Dark: Navy Dive Helmet Display Emerges as Game-Changer
OIR Official: Captured Info Describes ISIL Operations in Manbij
Cyber, Space, Middle East Join Nuclear Triad Topics at Deterrence Meeting
Carter Opens Second DoD Innovation Hub in Boston
Triomphe de St-Cyr : le Vietnam sur les rangs
Dwight D. Eisenhower Conducts First OIR Missions from Arabian Gulf
L’amiral Prazuck prend la manœuvre de la Marine
Airmen Practice Rescuing Downed Pilots in Pacific Thunder 16-2
On ne lutte pas contre les moustiques avec une Kalachnikov...
Enemy Mine: Underwater Drones Hunt Buried Targets, Save Lives
Daesh Publications Are Translated Into Eleven Languages
Opération Chammal : 10 000 heures de vol en opération pour les Mirage 2000 basés en Jordanie
Le Drian : Daech : une réponse à plusieurs niveaux
Carter: Defense Ministers Agree on Next Steps in Counter-ISIL Fight
Carter Convenes Counter-ISIL Coalition Meeting at Andrews
Carter Welcomes France’s Increased Counter-ISIL Support
100-Plus Aircraft Fly in for Exercise Red Flag 16-3
Growlers Soar With B-1s Around Ellsworth AFB
A-10s Deploy to Slovakia for Cross-Border Training
We Don’t Fight Against Mosquitoes With a Kalashnikov
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge
Chiefs of US and Chinese Navies Agree on Need for Cooperation
DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks
Vice Adm. Tighe Takes Charge of Information Warfare, Naval Intelligence
Truman Strike Group Completes Eight-Month Deployment
KC-46 Completes Milestone by Refueling Fighter Jet, Cargo Plane
Air Dominance and the Critical Role of Fifth Generation Fighters
Une nation est une âme
The Challenges of Ungoverned Spaces
Carter Salutes Iraqi Forces, Announces 560 U.S. Troops to Deploy to Iraq
Obama: U.S. Commitment to European Security is Unwavering in Pivotal Time for NATO
International Court to Decide Sovereignty Issue in South China Sea
La SPA 75 est centenaire !
U.S. to Deploy THAAD Missile Battery to South Korea
Maintien en condition des matériels : reprendre l’initiative
La veste « léopard », premier uniforme militaire de camouflage
Océan Indien 2016 : Opérations & Coopération
Truman Transits Strait of Gibraltar
Navy Unveils National Museum of the American Sailor
New Navy, Old Tar
Marcel Dassault parrain de la nouvelle promotion d’officiers de l’École de l’Air
RIMPAC 2016 : Ravitaillement à la mer pour le Prairial avant l’arrivée à Hawaii
Bataille de la Somme, l’oubliée
U.S., Iceland Sign Security Cooperation Agreement
Cléopatra : la frégate Jean Bart entre dans l’histoire du BPC Gamal Abdel Nasser
Surveiller l’espace maritime français aussi par satellite
America's Navy-Marine Corps Team Fuse for RIMPAC 2016
Stratégie France : Plaidoyer pour une véritable coopération franco-allemande
La lumière du Droit rayonne au bout du chemin

Directeur de la publication : Joël-François Dumont
Comité de rédaction : Jacques de Lestapis, Hugues Dumont, François de Vries (Bruxelles), Hans-Ulrich Helfer (Suisse), Michael Hellerforth (Allemagne).
Comité militaire : VAE Guy Labouérie (†), GAA François Mermet (2S), CF Patrice Théry (Asie).