US military to send cyber soldiers to the battlefield

US Secretary of Defense Ash Carter addressing US Cyber Command troops and NSA employees in Maryland on March 13, 2015.


:: The US Army will soon send teams of cyber warriors to the battlefield, officials said Wednesday, as the military increasingly looks to take the offensive against enemy computer networks.

While the Army’s mission is generally to “attack and destroy,” the cyber troops have a slightly different goal, said Colonel Robert Ryan, who commands a Hawaii-based combat team.

“Not everything is destroy. How can I influence by non-kinetic means? How can I reach up and create confusion and gain control?” he told reporters.

The cyber soldiers have been integrated for six months in infantry units, and will tailor operations according to commanders’ needs, said Colonel William Hartman of the Army’s Cyber Command. The Army has for the past three years conducted training for such operations at a huge center in southern California.

Cyber troops

Hartman didn’t give details on what the cyber troops can achieve, except to say that they would be scooping up information or intercepting planned attacks.

According to the New York Times, CYBERCOM has previously placed “implants” in ISIS group networks that let experts monitor the group’s behavior and ultimately imitate or alter commanders’ messages so they unwittingly direct fighters to areas likely to be hit by drone or plane strikes.

Another technique likely being employed is a common type of cyber attack known as a denial of service.

Cyber Command had previously been a subordinate part of the US Strategic Command, but President Donald Trump in August ordered the Pentagon to elevate it to its own command, in a sign of its growing importance.













Pakistani top court rejects bid to bar opposition leader Imran Khan
US envoy Nikki Haley to present ‘irrefutable evidence’ on Iran
%d bloggers like this:
Powered by : © 2014 Systron Micronix :: Leaders in Web Hosting. All rights reserved

| About Us | Privacy Policy | Terms of Use | Disclaimer | Contact Us |