The Cyberwar Thread

"Big Brother, on your lap. Many casual home computer buyers give no thought to the fact that they are bringing a powerful surveillance tool into their homes, one that can eavesdrop on conversations, watch them walk about the room (and worse), and follow every move they make online."

The good news - I found another use for duct tape!
View attachment 334945:goodjob:

This and DARPA together seems like a bad combo...just waiting to have our privacy abused..
 
This and DARPA together seems like a bad combo...just waiting to have our privacy abused..

Respectfully disagree. Your privacy is already abused - by foriegn and domestic hackers, NGOs and various Internet companies like Google and SONY that track your data and preferences against your will - or without your knowledge - and then allowing your information to be hacked do to poor security.

By criticizing public and private security organizations attempting to make the Web more secure, we are foolishly mistaking "Internet Freedom" with the Wild Wild West. That is, criticising the sherrifs instead of the badmen.
 
From CNN's Security Blogs:

Threats from Iran;

Iran is believed to be behind a slew of massive attacks in September that took down a string of U.S. banks' websites. The country is also thought to have launched a devastating cyber time bomb on Saudi Oil company Aramco in August and to have coordinated a similar attack on Qatar's RasGas and Exxon Mobil.

"It certainly is the case that Iran is improving its capabilities in the cyber field. We're paying attention. We are concerned about their increasing ability to operate in this realm," a U.S. intelligence official said.
 
Computer Virus Timeline

1949
Theories for self-replicating programs are first developed.

1981
Apple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found on the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.

1983
Fred Cohen, while working on his dissertation, formally defines a computer virus as “a computer program that can affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself.”

1986
Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had “© Brain” for a volume label.

1987
The Lehigh virus, one of the first file viruses, infects command.com files.

1988
One of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virus affects both .exe and .com files and deletes any programs run on that day.
MacMag and the Scores virus cause the first major Macintosh outbreaks.

1990
Symantec launches Norton AntiVirus, one of the first antivirus programs developed by a large company.

1991
Tequila is the first widespread polymorphic virus found in the wild. Polymorphic viruses make detection difficult for virus scanners by changing their appearance with each new infection.

1992
1300 viruses are in existence, an increase of 420% from December of 1990.

The Dark Avenger Mutation Engine (DAME) is created. It is a toolkit that turns ordinary viruses into polymorphic viruses. The Virus Creation Laboratory (VCL) is also made available. It is the first actual virus creation kit.

1994
Good Times email hoax tears through the computer community. The hoax warns of a malicious virus that will erase an entire hard drive just by opening an email with the subject line “Good Times.” Though disproved, the hoax resurfaces every six to twelve months.

1995
Word Concept becomes one of the most prevalent viruses in the mid-1990s. It is spread through Microsoft Word documents.

1996
Baza, Laroux (a macro virus), and Staog viruses are the first to infect Windows95 files, Excel, and Linux respectively.

1998
Currently harmless and yet to be found in the wild, StrangeBrew is the first virus to infect Java files. The virus modifies CLASS files to contain a copy of itself within the middle of the file's code and to begin execution from the virus section.

The Chernobyl virus spreads quickly via .exe files. As the notoriety attached to its name would suggest, the virus is quite destructive, attacking not only files but also a certain chip within infected computers.

Two California teenagers infiltrate and take control of more than 500 military, government, and private sector computer systems.

1999
The Melissa virus, W97M/Melissa, executes a macro in a document attached to an email, which forwards the document to 50 people in the user's Outlook address book. The virus also infects other Word documents and subsequently mails them out as attachments. Melissa spread faster than any previous virus, infecting an estimated 1 million PCs.

Bubble Boy is the first worm that does not depend on the recipient opening an attachment in order for infection to occur. As soon as the user opens the email, Bubble Boy sets to work.

Tristate is the first multi-program macro virus; it infects Word, Excel, and PowerPoint files.

2000
The Love Bug, also known as the ILOVEYOU virus, sends itself out via Outlook, much like Melissa. The virus comes as a VBS attachment and deletes files, including MP3, MP2, and .JPG. It also sends usernames and passwords to the virus's author.

W97M.Resume.A, a new variation of the Melissa virus, is determined to be in the wild. The “resume” virus acts much like Melissa, using a Word macro to infect Outlook and spread itself.

The “Stages” virus, disguised as a joke email about the stages of life, spreads across the Internet. Unlike most previous viruses, Stages is hidden in an attachment with a false “.txt” extension, making it easier to lure recipients into opening it. Until now, it has generally been safe to assume that text files are safe.

“Distributed denial-of-service” attacks by hackers knock Yahoo, eBay, Amazon, and other high profile web sites offline for several hours.

2001
Shortly after the September 11th attacks, the Nimda virus infects hundreds of thousands of computers in the world. The virus is one of the most sophisticated to date with as many as five different methods of replicating and infecting systems.

The “Anna Kournikova” virus, which mails itself to persons listed in the victim's Microsoft Outlook address book, worries analysts who believe the relatively harmless virus was written with a “tool kit” that would allow even the most inexperienced programmers to create viruses.

Worms increase in prevalence with Sircam, CodeRed, and BadTrans creating the most problems. Sircam spreads personal documents over the Internet through email.

CodeRed attacks vulnerable webpages, and was expected to eventually reroute its attack to the White House homepage. It infected approximately 359,000 hosts in the first twelve hours. BadTrans is designed to capture passwords and credit card information.

2002
Author of the Melissa virus, David L. Smith, is sentenced to 20 months in federal prison. The LFM-926 virus appears in early January, displaying the message “Loading.Flash.Movie” as it infects Shockwave Flash (.swf) files.

Celebrity named viruses continue with the “Shakira,” “Britney Spears,” and “Jennifer Lopez” viruses emerging.

The Klez worm, an example of the increasing trend of worms that spread through email, overwrites files (its payload fills files with zeroes), creates hidden copies of the originals, and attempts to disable common anti-virus products. The Bugbear worm also makes it first appearance in September. It is a complex worm with many methods of infecting systems.

2003
In January the relatively benign “Slammer” (Sapphire) worm becomes the fastest spreading worm to date, infecting 75,000 computers in approximately ten minutes, doubling its numbers every 8.5 seconds in its first minute of infection.

The Sobig worm becomes one of the first to join the spam community. Infected computer systems have the potential to become spam relay points and spamming techniques are used to mass-mail copies of the worm to potential victims.
2004

In January a computer worm, called MyDoom or Novarg, spreads through emails and file-sharing software faster than any previous virus or worm. MyDoom entices email recipients to open an attachment that allows hackers to access the hard drive of the infected computer. The intended goal is a “denial of service attack” on the SCO Group, a company that is suing various groups for using an open-source version of its Unix programming language. SCO offers a $250,000 reward to anyone giving information that leads to the arrest and conviction of the people who wrote the worm.

An estimated one million computers running Windows are affected by the fast-spreading Sasser computer worm in May. Victims include businesses, such as British Airways, banks, and government offices, including Britain's Coast Guard. The worm does not cause irreparable harm to computers or data, but it does slow computers and cause some to quit or reboot without explanation. The Sasser worm is different than other viruses in that users do not have to open a file attachment to be affected by it. Instead, the worm seeks out computers with a security flaw and then sabotages them. An 18-year-old German high school student confessed to creating the worm. He's suspected of releasing another version of the virus.

2005
March saw the world's first cell phone virus: Commwarrior-A. The virus probably originated in Russia, and it spread via text message. In the final analysis, Commwarrior-A only infected 60 phones, but it raised the specter of many more—and more effective—cell phone viruses.

2008
First discovered in November, the Conficker virus is thought to be the largest computer worm since Slammer of 2003. It's estimated that the worm infected somewhere between nine and 15 million server systems worldwide, including servers in the French Navy, the UK Ministry of Defense, the Norwegian Police, and other large government organizations. Since its discovery, at least five variants of the virus have been released. Authorities think that the authors of Conficker may be releasing these variants to keep up with efforts to kill the virus.

2010
Discovered in June, Stuxnet is a computer worm targeting Siemens industrial software through Microsoft Windows. It is the first worm that corrupts industrial equipment. Stuxnet is also the first worm to include a PCL (programmable logic controller), software designed to hide its existence and progress. In August, security software company Symantec states that 60% of the computers infected with Stuxnet are in Iran. In November, Siemens announces that the worm has not caused any damage to customers. However, the Iran nuclear program is damaged by Stuxnet. Iran uses embargoed Siemens equipment for its nuclear program. A Russian computer company, Kaspersky Lab concludes that Stuxnet is the kind of sophisticated attack that could only be conducted with the full support of a nation.

2012
Flame, a malware that attacks computers using Microsoft Windows, is discovered. A report, released on May 28 by Budapest University's CrySyS Lab, states that "arguably, it is the most complex malware ever found." Flame is capable of recording Skype conversations, audio, keyboard activity, network traffic and screenshots. It is spread over a local network or USB stick. Flame also has a kill command, wiping out all traces of it from the computer.

On June 1, an article in The New York Times states that Stuxnet is part an intelligence operation by the U.S. and Israel called "Operation Olympic Games." Started during George W. Bush's presidency, the operation has expanded under President Obama.



From infoplease
 
Onion News Network
Washington Watcher: Pentagon Warns Of Viral Video Cyber Attack
By Jane Carmichael, Washington Watch Reporter

According to a Pentagon statement, a raid on the the home of al Qaeda operative Khalid al Shehri revealed a cache of tools which could have been used to conduct a second cyber attack: hundreds of kittens, many with little red bows tied around their necks, as well as several crates of teeny tiny Yoda costumes. The Pentagon stated they do not know at this time whether al Shehri's intent was to place the Star Wars costumes on babies or small dogs, but that either could have been devastatingly cute. Even more frightening, the raid also produced a detailed plan for kidnapping Justin Bieber. As a safety precaution, Pentagon officials immediately buried Bieber in a concrete casket six miles below the earth's surface.

:mischief:
 
Cybersecurity Involves Federal, Industry Partners, Allies;

Spoiler :
By Cheryl Pellerin
American Forces Press Service

WASHINGTON, Nov. 8, 2012 - The $110 billion-a-year cyber economy has never been more vulnerable to crime and other threats, and securing the Internet against attacks demands the expertise of government agencies, industry and allies, the commander of U.S. Cyber Command said here yesterday.

Army Gen. Keith B. Alexander, Cybercom chief and director of the National Security Agency, spoke before a large audience at the Symantec 2012 Government Symposium.

The symposium examines a fundamental question: How to protect sensitive information while enabling collaboration across jurisdictions, nations, citizens and the private sector?

"Government ... operations depend on the network. If we lose that network we can't communicate, [and] ... what happens when [adversaries] disrupt our network or the power grid or our banking institutions?" Alexander said, adding that the U.S. must work with its partners in industry and its allies to solve the problem.

"Many will ask about the roles of [the National Security Agency and Cybercom] in this, and how can we ensure civil liberties and privacy [as well as] the security of cyberspace? We can do both," he said.

One of the first things industry and government must decide is how to make sure all companies involved in U.S. critical infrastructure -- including financial and information services and the defense industrial base -- institute the highest possible levels of computer security.

"How many companies in the United States and among our allies are at this level?" Alexander asked.

"We actually do inspections," he added. "We inspect our government networks to see how many are at 100 percent. And the answer is, very few."

Companies in some sectors, like banking and the high end of the defense industrial base, are "right there at the top" of computer security, the general said.

"Then you go out to some companies that are being [attacked by adversaries in cyberspace] and they don't know what the threat looks like nor what they should do, and some of them are in critical infrastructure," he added.

Nobody wants to make such an effort hard, costly or bureaucratic, Alexander said.

"The question is how do we help them?" he said. "What's the right forum for government and industry to work together to help those companies get to the right level of security?"

Another imperative for government-industry collaboration involves gaps in computer security exploited by what are called "zero-day" attacks -- those that exploit vulnerabilities in computer applications.

Eventually, patches are created to plug the security holes, but not before adversaries have entered and damaged the network or stolen intellectual property.

Alexander used an analogy to explain how Cybercom or the NSA could help industry identify what the general called "bad packets," or those that carry destructive payloads out on the Internet.

"Internet service providers see packets out there. We want them to be able to see bad packets and do something about them. We'll have [an examination process] for every packet. And we'll say, 'Did you see a bad packet in the network? Tell us where it's coming from and going to, and stop it because [it's carrying] a destructive payload,'" the general explained.

"When they see that bad packet, we don't need to know what was in the communications," he added. "All we need to know is a dangerous packet went from point A to point B right now, and that we may need to act."

The federal government "is not looking at the traffic," Alexander said.

"Industry is looking at the traffic and they have to do that to own and operate these networks. We're going to help them with signatures and other things, and they need to tell us when they need our help. But it's got to be done in time for us to help, and that's part of the key issue."

At Cybercom, the general said, experts are training the cyber workforce of the future, determining roles and responsibilities of the federal agencies involved in cybersecurity and exploring a defensible architecture for the Defense Department.

"The DOD architecture, in my opinion, is not defensible per se. We're doing our best to defend it, but we've made this really hard," Alexander said. The department has 15,000 enclaves, each run by separate system administrators and each with its own firewalls, he added.

"What that means is we need to come up with a defensible architecture," the general said, adding that "a ... virtual cloud is key to our success for a couple of areas for the Defense Department," including for a growing number of mobile users.

Cybercom and other agencies are also working on issues related to their authority to respond to a problem, Alexander said.

The key question, he added, is what can the Department of Homeland Security, the FBI, Cybercom and the NSA do to defend the country against a cyberattack, and when can they do it?

Alexander said that he, DHS Secretary Janet Napolitano, and FBI Director Robert S. Mueller III "have laid out lanes in the road for the government entities."

The FBI is responsible for investigation, attribution and domestic problems. DHS is responsible, along with partners like NSA, the National Institute for Standards and Technology and the SANS Institute, for cybersecurity standards.

NSA and Cybercom have a couple of roles and responsibilities, Alexander said, including foreign intelligence.

"NSA has the best folks in the world," the general said. "They have special skills and we want to leverage those skills to help secure cyberspace for our country and for our allies."

Cybercom's role "is not only to operate and defend DOD networks but to defend the country," he said, noting Cybercom would step in if America came under cyberattack.

In the meantime, the general said, he's concerned that attacks like the destructive August attack on computers at Saudi Arabia's government-owned oil company Aramco are happening and "we're spending a lot of time talking about what we should do and when we should do it."

While there is still time, he said, "while you're all in the room together with us ... we ought to argue it out just like we did in the election [on Tuesday], come to a solution and then get going."
 
Some tittles;

China's Techno-Warriors: National Security and Strategic Competition from the Nuclear to the Information Age by Evan A. Feigenbaum (Hardcover - Mar 18, 2003)

Cyber-threats, Information Warfare, and Critical Infrastructure Protection, Cordesman, Anthony H., Cordesman, Justin G. Greenwood Publ. (2002):goodjob:

Cyberwar: Security, Strategy and Conflict in the Information Age, Campen, Dearth[13] and Gooden, Armed Forces Communications and Electronics Association

Cyberdeterence And Cyberwar, Martin C. Libicki (Paperback - Nov 25, 2009)

Cyber War: The Next Threat to National Security and What to Do About It by Richard A. Clarke, and Robert Knake (Hardcover - Apr 20, 2010)

Cyberthreats: The Emerging Fault Lines of the Nation State by Susan W. Brenner (Hardcover - Jan 16, 2009)

Surviving Cyberwar by Richard Stiennon (Paperback - Jul 16, 2010)
 
10/10
#5 was excessively easy because I was at that symposium

Well, speaking of which;

List of General Computer Security Conferences

ACM-CCS (Conferences on Computer and Communications Security), security conference held since 1993.
ACSAC, Annual Computer Security Applications Conference - oldest information security conference held annually
ASIA or the Annual Symposium on Information Assurance that serves as the academic track for the New York State Cyber Security Conference, an annual information security conference held in Albany, NY usually for two days during June targeted at academic, government, and industry participants.
Black Hat, a series of conferences held annually in different cities around the world. Black Hat USA, held in Las Vegas immediately before DEF CON, is the largest 'official' computer security event in the world.
BlueHat Conference, a twice a year, invitation-only Microsoft security conference aimed at bringing Microsoft security professionals and external security researchers together.
CarolinaCon, in North Carolina, is a regional technology and network security conference usually held during Spring.
Department of Defense Cyber Crime Conference, an annual conference that focuses on the computer security needs of the United States federal government, military, and defense contractors.
GreHack.org an annual conference held in Grenoble, french Alps, France. Speakers from academia, industry. Both offensive and defensive security.
Hack.lu, an annual conference held in Luxembourg
FSec - Croatian annual security conference held at the Faculty of organization and informatics in Varaždin, Croatia.
Hacker Halted, Presented by EC-Council, the objective of the global series of Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security.
Hackito Ergo Sum, Security conference pertaining to research topics, with attendees and speakers from both the industry, the offensive side and the academic circles, held in Paris every April.
IEEE Symposium on Security and Privacy, top-tier privacy & security conference.
NSPW (New Security Paradigms Workshop), a unique, highly-interactive workshop with new ideas in security.
RSA Security Conference, Cryptography and information security-related conference held annually in the San Francisco Bay Area.
S4:SCADA Security Scientific Symposium, Security conference pertaining to SCADA held annually by Digital Bond, usually in Miami, FL.
SANSFIRE, A yearly conference dedicated to the training of GIAC certified professionals, and networking with members of the SANS Internet Storm Center.
SecureWorld Expo, A series of regional IT Security conferences offering education, CPE training opportunities, and networking of security leaders, experts, senior executives, and policy makers who shape the face of security.
SOURCE Conference, SOURCE is a computer security conference in Boston, Seattle, and Barcelona that offers education in both the business and technical aspects of the security industry.
TROOPERS IT Security Conference, Annual international IT Security event with workshops held in Heidelberg, Germany.
USENIX Security, annual security conference associated with USENIX.
CanSecWest, in Vancouver, Canada is held at the end of March and hosts the Pwn2Own hacking contest.
SecurIT 2012, International Conference on Security of Internet of Things held in mid of August at Amrita Vishwa Vidyapeetham.

List of hacker conferences

AthCon, the largest hacker conference in South Eastern Europe taking place annually in Athens, Greece.
B Sides, community conference that initially started in the US is now global.
Chaos Communication Congress, the oldest and Europe's largest hacker conference, held by Chaos Computer Club.
DEF CON, in Las Vegas, is the biggest hacker convention in the United States held during summer (June–August).
DerbyCon, an annual hacker conference.
Ekoparty, a hacker convention in Argentina and one of the most important in South America, held annually around September in Buenos Aires.
GrrCon, an annual hacker conference hosted each September in Grand Rapids, Michigan.
Hackfest.ca, a Quebec, Canada, bilingual conferences and hacking games.
Hacktivity, in Budapest, Hungary, run every September, the largest hacker conference in the Central and Eastern Europe.
Hack in the Box, an annual hacker conference.
Hackers on Planet Earth (H.O.P.E.), in New York is held by 2600: The Hacker Quarterly in mid-summer (July/August) every other year.
Kiwicon, is a Wellington, New Zealand hacker convention.
LayerOne, held every spring in Los Angeles, California.
Malcon, the world's first International Malware Conference, hosted in India.
Notacon, in Cleveland, Ohio, is an art and technology conference held frequently in mid-April.
Nuit Du Hack, in Paris, France, is the oldest and largest hacker conference held frequently in late-June.
PhreakNIC, in Nashville, Tennessee, is held by Nashville 2600. around October.
Quahogcon, In Providence, Rhode Island is held at the end of April.
ROOTCON , Premier Annual Hacker Conference in the Philippines held annually during summer (September - October).
ShmooCon, a Washington DC convention started in 2005 by The Shmoo Group, and held annually in late winter (usually February).
Summercon, one of the oldest hacker conventions, held during Summer (frequently in June). It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON.
T2 infosec conference, focuses on newly emerging information security research with a balance of topics on auditing and pen-testing, and security and defensive strategies. In general, presentations will address different aspects of information security—all presentations will include demos and be technically oriented and practical.
THOTCON, a Chicago based hacker conference held in the Spring each year.
ToorCon, San Diego hacker convention that emerged from the 2600 user group frequently in late September.
 
And speaking of Kiwicon,

"It may be coincidental, but a hacking conference called Kiwicon is due to kick off tomorrow in Wellington. Kiwicon's blog mentioned the New Zealand Herald's hack this morning, along with two other security-related incidents: a wi-fi outage on an airport bus and payment system problems in Wellington. It's not unheard of for hackers to show off their skills during conferences by attacking infrastructure or even the computers of other conference attendees."
 
I had fun with my first SCADA at the ripe age of 18

Feel free to expand on this.

My personal anecdote...

Long ago as a young man, I was an avionics technician in the Marines. My MOS (job) was "avionics intermediate maintenance" - using diagnostic computers to troubleshoot and repair black boxes out of Marine Phantoms, Skyhawks, Intruders and Prowlers. We had these primitive computer consoles, the size of Volkswagens, that ran on one-inch-wide reel-to-reel metalic punch tape - similar to civilian data punchcards used in Fortran and Cobal in those days. It was like something out of an old "Lost in Space" episode - big dials, blinking lights, clanking noises; state-of-the-art 1960s technology.

Once, over a few beers at the NCO club, a few of us drunkenly schemed at how we could cause these computers to damage themselves; like the Ship's-Self-Destruct-Sequence on the old Star Trek show. Soon after, during some free time, I went to our pub library and checked-out the schematics and learned that - sure enough - DC power could be re-routed by controllable relays to short out a bank of diodes and transistors (chip precursers). Now sober, I naturally didn't have the moxie to take action, but I did point out the anomaly to one of our civilian techreps, and he took action. He notified engineers at his company. Eventually (I later learned) the next generation of these diagnostic computers would incorporate a redesign to prevent any "accidents" and he got a bonus and his picture in the company magazine.

So yes, I invented Stuxnet :lol:.
 
Feel free to expand on this.

My personal anecdote...

Long ago as a young man, I was an avionics technician in the Marines. My MOS (job) was "avionics intermediate maintenance" - using diagnostic computers to troubleshoot and repair black boxes out of Marine Phantoms, Skyhawks, Intruders and Prowlers. We had these primitive computer consoles, the size of Volkswagens, that ran on one-inch-wide reel-to-reel metalic punch tape - similar to civilian data punchcards used in Fortran and Cobal in those days. It was like something out of an old "Lost in Space" episode - big dials, blinking lights, clanking noises; state-of-the-art 1960s technology.

Once, over a few beers at the NCO club, a few of us drunkenly schemed at how we could cause these computers to damage themselves; like the Ship's-Self-Destruct-Sequence on the old Star Trek show. Soon after, during some free time, I went to our pub library and checked-out the schematics and learned that - sure enough - DC power could be re-routed by controllable relays to short out a bank of diodes and transistors (chip precursers). Now sober, I naturally didn't have the moxie to take action, but I did point out the anomaly to one of our civilian techreps, and he took action. He notified engineers at his company. Eventually (I later learned) the next generation of these diagnostic computers would incorporate a redesign to prevent any "accidents" and he got a bonus and his picture in the company magazine.

So yes, I invented Stuxnet :lol:.

After I went to the digital Pearl Harbor Symposium I went to investigate some power plants through the internet, I realised just how dangerous an idea it is to connect power plants to the internet and have it so you could do remote diagnostics. I found that you could turn on some generators on the power plant internal grid (remotely) and then connect them to the power grid when they were running too slow...
 
After I went to the digital Pearl Harbor Symposium I went to investigate some power plants through the internet, I realised just how dangerous an idea it is to connect power plants to the internet and have it so you could do remote diagnostics. I found that you could turn on some generators on the power plant internal grid (remotely) and then connect them to the power grid when they were running too slow...

So not only can the SCADAs be cybermanipulated to cause damage or failure, but a simultaneous DOS attack could prevent or delay power authorities from analysis/remedy.
 
So not only can the SCADAs be cybermanipulated to cause damage or failure, but a simultaneous DOS attack could prevent or delay power authorities from analysis/remedy.

No, they can control it from the inside of the plant too, but the destruction of generators is a catastrophic thing if done on a wide scale.
 
Army Cyber Command/2nd Army plans, coordinates, integrates, synchronizes, directs, and conducts network operations and defense of all Army networks; when directed, conducts cyberspace operations in support of full spectrum operations to ensure U.S./Allied freedom of action in cyberspace, and to deny the same to our adversaries. The total command strength will exceed 21,000 Soldiers and civilians and will be funded from within existing fiscal resources.

US_Army_Cyber_Command_logo.png


U.S. Army Cyber Command (Army Cyber) is the Army service component command supporting U.S. Cyber Command. It was established on Oct. 1, 2010. Its commander is Lt. Gen. Rhett A. Hernandez. The numerical command for Army Cyber is Second Army. The command is intended to be the Army's single point of contact for external organizations regarding cyberspace and Information Operations.
 
Back
Top Bottom