Feeds

New USAF Cyber-war formation downgraded

Cyber Command becomes Space Command Cyber Force

Choosing a cloud hosting partner with confidence

The US Air Force will proceed with plans to create a large, dedicated cyber warfare force, it was confirmed yesterday. However, rather than being an independent "Command" in its own right, the net battle formation has been downgraded in status and will now be subordinate to USAF Space Command.

The original plans to form a full-blown Cyber Command were put on hold in August, following the sacking of the uniformed and civilian heads of the air force. General Buzz Moseley and Secretary Michael Wynne were asked to resign following extreme difficulties in ramping up unmanned robot aircraft operations, along with several embarrassing mishaps involving nuclear weaponry.

Apart from the nuke and drone bungles, Moseley and Wynne's Cyber Command plans had also come under fire from the other US armed services, who viewed the scheme as an attempt by the air force to take over all network combat operations for itself. The new plan to make the USAF cyber force merely a part of space command should lessen such criticism, allowing the other services to have netwar branches of their own.

“The conduct of cyberoperations is a complex issue... other interagency partners have substantial equity in the cyberarena,” the new air force secretary Michael Donley told the Air Force Times. The USAF leadership reportedly consider that space and cyber warfare go together naturally.

Space Command will gain the new cyber force, but will lose control of America's landbased intercontinental missiles; these will now be reassigned to a new, unified nuclear-weapons command. The setting up of the nuke command is intended to improve the ethos and efficiency of USAF atomic-weapons management, avoiding humiliating blunders like those of recent times.

Further details on the Space Command cyber force will emerge in coming months. However it has been reported that it will be numbered the 24th Air Force. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.