Feeds

US military cyber warriors looking for a home

Operation Pork Snatch is go

Combat fraud and increase customer satisfaction

Cyberwarfare means different thing to different people. To cyberpunk buffs it means Operation Screaming Fist; to the Estonians it means Russian DDoS. In America, as with many other military activities, it means pork.

Specifically in this case, the most important question exercising many Americans regarding cyber war is where the US Air Force Cyber Command will be based. The Colorado Springs Gazette reports that the two front runners are Barksdale airforce base in Louisiana - the Cyber Command's "interim" home - and Beale AFB in California, handy for Silicon Valley. Offutt AFB in Nebraska, home to US Strategic Command, is also hotly tipped.

But Colorado wants to be home to the American cyberwar force, too. The Cyber Command is forecast to be mainly made up of "legions of highly paid computer contractors" who will operate loads of mighty computers.

The US air force is keen to achieve dominance over its enemies in what it calls the "cyber domain" of warfare. (The idea is that we have air, land and sea warfare - perhaps space and special-ops too - and now cyber warfare.) The air force's enemies in this are not so much terrorists or sinister foreign powers as the other US armed services. The air force's traditional business of operating expensive manned aircraft has been somewhat undercut of late by the proliferation of much cheaper flying robots, often operated by the army, navy or marines.

Worse, the current Wars On Stuff seldom offer enemies with enough heavy weaponry for the air force to get much of a look-in.

A belated USAF push to seize overall control of all the hated flying robots has seemingly been rebuffed, and so the service is looking for something new where it can be relevant. Hence the new cyber force, to include subunits such as the 67th Network Warfare Wing, which "organizes, trains, and equips cyberspace forces to conduct network defense, attack, and exploitation. Executes full spectrum AF network operations."

Lots of well-paid contractors + lots of computers = lots of money, and it now seems that Colorado is joining the race to be the cyberforce's home base. Contender bases could include the now-disused Cheyenne Mountain complex, "an inside-the-mountain fortress that could protect sensitive computers from attack".

Colorado defence-IT biz kingpin Wes Clark told the Gazette that Lousiana would be an awful location for the cyber force, because of the threat of hurricanes.

However, the pork-hungry contractor clearly had a firm understanding of just what kind of computer war is being fought by the USAF. He had a plan B in mind should Colorado be sidelined.

"If we don’t get Air Force Cyber Command, then we need to start looking at Army Cyber Command," Clark reportedly said. ®

Top three mobile application threats

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.