Cyber Mission Force

Cyber Mission Force (Part Two of Military Cybersecurity Threats)

The USA is still a world power and it remains the strongest. But this could change, and our enemies would revel in our downfall. The good news is that we have a resolve to preserve our way of life, and compassion to protect our allies. American has a cyber mission force and this article explores what this entails. Also we have the money, the technological resources, and the brilliant people to secure the future. This is part two of our look at military cybersecurity threats. Read part one of our military cybersecurity threats here.

Cyber Mission Force

Military Cybersecurity Threats and America’s Cyber Mission Force

We ought to be grateful to live in an advanced and civilized country. However, we will win the cybersecurity war. Here is an over-view of America’s position as it currently stands. The US Defense website has a sophisticated strategy to protect the country with:

A Cyber Defense Posture

The purpose of this strategy is to guide the development of DoD’s cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD’s three primary cyber missions.

  1. Defend DoD Networks
  2. Defend the U.S. Homeland and U.S. National Interests
  3. Provide Cyber Support to Military Operations and Contingency Plans

Three Primary Cyber Missions

State and non-state actors threaten disruptive and destructive attacks against the United States and conduct cyber-enabled theft of intellectual property to undercut the United States’ technological and military advantage. DoD must develop its cyber forces and strengthen its cyber defense and cyber deterrence posture.

  • National Mission Teams — 13 Teams
  • Cyber Protection Teams — 68 Teams
  • Combat Mission Teams — 27 Teams
  • Support Teams — 25 Teams

It’s amazing to do a study on today’s U.S. military. It’s flabbergasting! Our cyber mission force is strong, almost as strong as our traditional military. We have ships, planes, guns, missiles, and tanks that surpass the imagination in what they can do. Just a few of these weapons could have won WW II all by themselves! However, this is the 21st century and things have changed. What good is a plane or a tank without fuel? What good is any weapon without ammunition? Cyber attacks can neutralize conventional weapons systems by taking out internet, supply operations, and military communications.

Back to the Washington Post, Trump reveals his concerns about hostile cyber attacks:

The Federal Government has a responsibility to defend America from cyberattacks that could threaten U.S. national interests or cause significant damage to American’s personal or economic security. That responsibility extends to protecting both privately and publicly operated critical networks and infrastructure.

In conclusion, we are not fighting Attila the Hun. The cyber mission force is our defense. Furthermore, our battle is fought first and foremost in the technology arena. If we lose there, our advanced weapons systems cannot save us. However, we are winning there, so let’s be optimistic.

Read part one of our military cybersecurity threats here.

The Military Cybersecurity Threats we Face Today

The Military Cybersecurity Threats we Face Today

It wasn’t that many years ago the word, “Cybersecurity,” did not exist, except perhaps in a science fiction script. Now in 2017, the word is as common as “apple pie.” Actually, I’m not sure the last time I heard apple pie mentioned. This article will help you appreciate the military cybersecurity threats in the world, while at the same time give you comfort in our Nation’s capabilities.

The Military Cybersecurity Threats we Face Today

Executive Orders by President Trump

Two sections of President Trump’s Executive Order is found on the Lawfare website address both domestic and foreign affairs concerns:

Section3.  Cybersecurity for the Nation.

(a)  Policy.  It is the policy of the United States to promote an open, interoperable, reliable, and secure Internet that fosters efficiency, innovation, communication, and economic prosperity, and respects privacy, while guarding against disruption, fraud, and theft.


(f)  Department of Defense Warfighting Capabilities and Industrial Base.  The Secretary of Defense . . . shall provide a report to the President, . . . on cybersecurity risks facing the defense industrial base, including its supply chain, and United States military platforms, systems, networks, and capabilities, and recommendations for mitigating these risks, within 90 days of the date of this order.

Another section, as reported by the Washington Post addresses the security issue:

It is the policy of the United States to defend and enhance the security of the Nation’s cyber infrastructure and capabilities. Free and secure use of cyberspace is essential to advancing US. national interests.

Military Cybersecurity Threats

Are the enemies of the U.S. genuine threats, or are they just saber-rattling? We know of at least four significant threats in recent days: North Korea, Russia, China, and Iran. It would be a mistake to underestimate any of them based on the size of the country. The smallest on the list, first mentioned, is ruled by a dictator with questionable sanity.

North Korea – the Ultimate “Saber-Rattlers”

Many in North Korea are on the brink of starvation, but their leader seems determined to make the USA a pile of ash:

The Korean People’s Army will reduce the bases of aggression and provocation to ashes with its invincible Hwasong rockets tipped with nuclear warheads and reliably defend the security of the country and its people’s happiness in case the US and the South Korean puppet forces fire even a single bullet at the territory of the DPRK. – Kim Jong-un

Some Americans brush him aside as dysfunctional or crazy, but our current military leaders say there is a real threat. That threat is real to our South Korean allies in Seoul, with a population of over 25 million souls, and only a short distance from the border of North Korea.

Russia – Hackers of the U.S. Election and An Ally of Middle East Terror Groups

It should not matter how any of us feel about the politics. What matters is that there is unwelcome intrusion into our way of life. Now, to be fair, we know that all countries spy on each other – even allies. However, hacking can be more destructive than bombs. It can ruin companies, reputations, and even economies. Thankfully, our country has many of the brightest minds and the tools to put forth a strong wall of defense. It is encouraging to hear that our leaders are continually upgrading the country’s infrastructure to meet the onslaught.

China – Building Military Bases on the Spratly Islands in the South China Sea

Against International outrage, China has leveraged its considerable industrial genius to build man-made islands. It appears these islands are not for the purpose of attracting world-wide tourists to enjoy the view. They are for military bases; potentially rich for military cybersecurity threats. This is the most populous nation on Earth with 1.371 billion people (as of 2015). Most of Apple’s iPhones are made there, as are many other high-tech devices and appliances. Would it be a surprise to anyone that they have a large cyber attack force? That, combined with the fact that the U.S. owes them over one trillion dollars, our second biggest obligation. We owe more only to Japan!

Iran – World’s Major Supporter of Terrorism

Their nuclear ambitions are equalled by their cyber-terrorism goals. They do not wish us well. Imagine what a military cybersecurity threats they are to our country. Two of these most hostile regimes against America have developed cyber attack groups. Furthermore, North Korea has a group called “Lazarus,” and Iran has one called “Oil Rig.” These cyber terrorists are modeling their attacks to replicate Russian hackers and organized crime activity. I suppose they do this to confuse us all. Apparently, they are good at it.

Join IDRGroup’s Newsletter

Part two is coming soon. If you are in current need of a cybersecurity assessment please contact us immediately. Also, join our newsletter and keep current of military cybersecurity threats:

GSISS survey 2017

Cybersecurity Privacy GSISS Report 2017

How organizations are adopting innovative safeguards to manage threats and achieve competitive advantages in a digital era. This report examines the approach that could be taken. The report GSISS is thorough and can aid any organization.

Think broadly about cybersecurity privacy

Most businesses today are fundamentally digital, and software is becoming the backbone of operations, products and services. Organizations are exploring new opportunities to create value and competitive advantages. This is done by integrating cybersecurity and privacy with digital business strategies. Consider the automotive industry. In the past, buying an automobile focused on performance, design, capabilities and price of the vehicle. Today, these factors are being eclipsed by connectivity, in-car digital content and services, and autonomous driving features. A growing range of automobile manufacturers, telecommunications operators, software vendors and consumer electronics firms provide a robust aftermarket in digital services.

Move Away from Fear, Uncertainty and Doubt (FUD)

This represents a distinct shift: Many organizations no longer view cybersecurity as a barrier to change or as an IT cost. They understand that cybersecurity solutions can also facilitate business growth, create market advantages and build brand trust.

Cybersecurity Privacy GSISS Report 2017

In large part, this shift in thinking is an outgrowth of the digitization of business. Today, organizations
not only create products but they also deliver complementary (and sometimes complimentary) software-based services for products that extend opportunities for customer engagement and growth.

Cloud-based platforms as an opportunity for cybersecurity privacy

The need to proactively address cybersecurity and privacy risks continues to increase. It’s not the only driver, however: Data privacy and trust have also become critical business requirements as exponentially more consumer and business information is generated and shared.

As a result, forward-thinking organizations are pivoting toward a new model of cybersecurity, one that is agile, capable of acting on analytic inputs and adaptive to evolving risks and threats. At the core of this new approach are solutions like data analytics and real-time monitoring, managed security services, advanced authentication and open-source software.
Cloud-based solutions are not new. What is new is how these solutions are being distributed and focused. Some, such as adoption of open-source software, represent a radical shift in how organizations develop and run on-premises systems.

Technologies used to address threats and add value

Source: PwC, CIO and CSO, The Global State of Information Security® Survey 2017, October 5, 2016

If there is one unifying thread, it’s the cloud. The power and interoperability of cloud-based platforms enables organizations to synthesize a range of synergistic technologies. Businesses can leverage the inherent simplification of cloud architectures to confidently build secure new products and services on the cloud. These architectural advantages represent a breakout opportunity for the integration and improvement of cybersecurity and privacy tools.

Remember if you need help with your cybersecurity needs contact us.

Learn more by downloading the report2016-PWC-gsiss-report-cybersecurity-privacy-safeguards.pdf