Lt. Col. Tim Sands (from left), Capt. Jon Smith and Lt. Col. John Arnold monitor a simulated test April 16 in the Central Control Facility at Eglin Air Force Base, Fla. They use the Central Control Facility to oversee electronic warfare mission data flight testing. Portions of their missions may expand under the new Air Force Cyber Command. Colonel Sands is the 53th Electronic Warfare Group AFCYBER Transition Team Chief, Captain Smith is the 36th Electronic Warfare Squadron Suppression of Enemy Air Defensestest director, and Colonel Arnold is the 36th Electronic Warfare Squadron commander. (U.S. Air Force photo/Capt. Carrie Kessler)
From The Danger Room:
Earlier this week, Defense Secretary Robert Gates ordered the military to start setting up a new “U.S. Cyber Command.” It’s a move that’s been discussed in defense circles for more than a year. But despite the announcement — and despite the lengthy debate – no one in the military-industrial complex seems all that sure what this new fighting force is supposed to do, exactly.
Officially, the Pentagon still has a few months to figure things out. Gates told his troops in a Tuesday memo that they have until September 1st to come up with an “implementation plan” for the new command. But there’s a ton to figure out in the next ten weeks. As Gates notes, that plan will have to “delineate USCYBERCOM’s mission, roles and responsibilities,” detail the command’s “minimum requirements” to get up and running, and sort out its “relationships” with the rest of the military – and the rest of the government.
In other words, just about everything.
Read more ...
My Comment: The Danger Room asks the same questions that I asked when I reported on this story last week .... both of our observations are the same .... it appears that everything is up in the air right now on what will be the mission statement and objectives of this new command.
If I was to have any input, I would (in a nutshell) give it a defensive and an offensive mandate. Defensive by keeping and maintaining America's line of communications and networks free from malicious infiltration. Offensive .... to me this involves the disabling and corrupting the lines of communications and networks of our adversaries.
No comments:
Post a Comment