Feeds

US military cyber force activated

Operation Screaming Fist is go

Secure remote control for conventional and virtual desktops

The US air force held an activation ceremony in Texas yesterday for its new cyberspace combat unit, the 24th Air Force, which will "provide combat-ready forces trained and equipped to conduct sustained cyber operations".

The 24th will be commanded by former Minuteman missile and satellite-jamming specialist Major-General Richard Webber. Under his command are two cyber "wings", the 688th Information Operations Wing and the 67th Network Warfare Wing, plus combat communications units.

According to Air Force Space Command, under which the new cyber force comes, the 688th will be "exploring, developing, applying and transitioning counter information technology, strategy, tactics and data to control the information battle space". The unit was formerly known as the Air Force Information Operations Center, and will continue to function as an "information operations centre of excellence".

The 67th, by contrast, seems to be a more offensive unit. It will "execute computer network exploitation and attack" as required, and when not doing that will conduct "electronic systems security assessments" for US military units and facilities.

When fully manned up, the combined wings plus supporting units and the 24th AF headquarters are expected to number several thousand personnel, many of whom will be from new specialist career paths in cyber warfare. Space command public affairs describes the 24th as "a battle-ready, responsive and forward-thinking team of America's best".

The new netwar force will be headquartered at Lackland airbase in Texas, with some personnel dispersed to bases in Oklahoma and Georgia. The US Army and Navy are also in the process of setting up cyberwar units, and there is to be a tri-service cyber command too - co-located with the NSA (another Defense Department tentacle) at Fort Meade. ®

Intelligent flash storage arrays

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.