TITLE

U.S. Army Cyber Command: Cyberspace for America's Force Of Decisive Action

AUTHOR(S)
Hernandez, Rhett A.
PUB. DATE
October 2012
SOURCE
Army Magazine;Oct2012, Vol. 62 Issue 10, p205
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses how the U.S. Army Cyber Command is using cyberspace for the nation's force of decisive action. According to the author, since its inception in 2010, the Army Cyber Command has been leading the struggle to secure and defend Army networks from hacktivists, cyber criminals, nation states, and terrorists who aim to take advantage of the Army's reliance on networked information systems.
ACCESSION #
82115370

 

Related Articles

  • Cyberwarfare and Anonymity. Perr, Christopher // Proceedings of the International Conference on Information Warfa;2011, p207 

    Public policy and strategy do not keep up to date with technology. There is generally a lag time between the release and application of a technology till a shortcoming is observed. Once a shortcoming is revealed it is a race to address that potential weakness with improved policy, updated...

  • International Legal Issues and Approaches Regarding Information Warfare. Nitu, Alexandru // Proceedings of the International Conference on Information Warfa;2011, p200 

    In present times, societies and economies increasingly rely on electronic communications, becoming more vulnerable to threats from cyberspace. At the same time, states' military and intelligence organizations are increasingly developing the capability to attack and defend computer systems. The...

  • Catch me if you can: Cyber Anonymity. Rohret, David; Kraft, Michael // Proceedings of the International Conference on Information Warfa;2011, p213 

    Advances in network security and litigation have empowered and enabled corporations to conduct Internet and desktop surveillance on their employees to increase productivity and their customers to gain valuable marketing data. Governments have spent billions to monitor cyberspace and have entered...

  • Neutrality in the Context of Cyberwar. Ryan, Julie; Ryan, Daniel // Proceedings of the International Conference on Information Warfa;2011, p221 

    This paper will examine the legal antecedents of the concepts of neutrality and current enforceability of declarations of neutrality in the context of information operations amongst belligerents. This is a non-trivial point of understanding, given the potential for belligerents to use and abuse...

  • Content management serves as a vital cyberspace operations enabler.  // Army Communicator;Summer2011, Vol. 36 Issue 2, p22 

    The article discusses how the official definition of cyberspace created a paradigm shift in its operations and became an area of operations where the information transitioned to a tool that can produce non-kinetic effects in and through cyberspace. It explains why content management (CM)...

  • HACKING CYBER STOVEPIPES. Maier, Matthew; Cook, Jerry // Army AL&T Magazine;Jan-Mar2015, p10 

    The article discusses the holistic approach adopted by the U.S. Army acquisition, logistics and technology (ALT) to meet the demand for cyber expertise. Topics discussed include the military vision for Army Cyberspace operations, creation of a career management field focused on developing cyber...

  • Navy Establishes Cyber Forces In Norfolk.  // Defense Daily;1/27/2010, Vol. 245 Issue 16, p7 

    The article reports that the U.S. Navy has established the Navy Cyber Forces (CYBERFOR) at Joint Expeditionary Base, Little Creek-Fort Story in Norfolk, Virginia. According to the Navy, vice admiral Denby Starling will command both the new CYBERFOR and the Naval Network Warfare Command...

  • Information warfare: OPFOR doctrine--an integrated approach. Gallogly-Staver, Erin J.; Hilliard, Raymond S. // Military Intelligence Professional Bulletin;Jul-Sep97, Vol. 23 Issue 3, p53 

    Focuses on the opposing force (OPFOR) information warfare (IW) doctrinal concept of the US Army. General framework for OPFOR IW strategies, campaigns and operations; OPFOR IW elements; Protection and security measures; EM spectrum operations; Perception management; Destruction; Computer warfare.

  • Force XXI.  // Military Review;Apr1994, Vol. 74 Issue 4, following p104 

    Focuses on the United States Army's transformation into an information age fighting force. Redesigned force for the 21st century; Characteristics of the new units.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics