(Reuters) - The Defense Department unveiled a new strategy for protecting military computer networks from hackers on Thursday, designating cyberspace as an "operational domain" U.S. forces will be trained to defend.
Army Cyber's Creed is a bit Scary
Cyber is not just a network. We operate in a contested environment which therefore makes it critical to improve our defense systems. These key defensive positions are manned by our Soldiers, civilians and contractors who need support to maintain the immediate tactical edge and expand strategic boundaries.
Network dominance is an integral part of the cyber fight – today and tomorrow. Cyber threats demand new approaches to managing information, securing information, and ensuring our ability to operate. Cyberspace is on par with the other war-fighting domains of land, sea, air and space. It is in cyberspace that we must use our strategic vision to dominate the information environment throughout interdependencies and independent systems.
The U.S. Army Cyber Command/2nd Army's breadth of responsibility spans the entire Army and the entire world - from the tactical edge to the strategic enterprise-level or national levels. Traditional boundaries no longer exist and anonymous attacks can occur literally at near light speed over fiber optic networks. Our enemies will deny the freedom of movement on our networks and use whatever they can from wherever in the world they are to gain advantage.
Army Cyber Command/2nd Army plans, coordinates, integrates, synchronizes, directs, and conducts network operations and defense of all Army networks; when directed, conducts cyberspace operations in support of full spectrum operations to ensure U.S./Allied freedom of action in cyberspace, and to deny the same to our adversaries. The total command strength will exceed 21,000 Soldiers and civilians and will be funded from within existing fiscal resources.
Cyber Command is composed of a professional team of elite warriors defending Army networks and providing full spectrum cyber, enabling mission command and providing global advantage! The cyber war fighting requires impact, integration, risk, and knowing ourselves, the enemy, and the cyber terrain.
We are the Army leader in operating, maintaining, and defending the network.