Who's Inside the New U.S. Cyber Command?

Who's Inside the New U.S. Cyber Command?
Who's Inside the New U.S. Cyber Command?

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

Content-Transfer-Encoding: QUOTED-PRINTABLE

By David Kushner  
IEEE Spectrum
November 08, 2010

Last Wednesday, the Department of Defense finally announced that the 
"U.S. Cyber Command has achieved full operational capability."  The 
Cyber Command will be "responsible for directing activities to operate 
and defend DoD networks," the release stated.

While we've heard a lot about the threat of cyber warfare, and the need 
for greater security, we haven't heard much about the people on the 
front line.  Who are the cyberwarriors, and what will they do?  I had an 
early glimpse into this world when I visited the provisional Cyber 
Command at Barksdale Air Force Base in Shreveport, Louisiana.

One morning, I drove in with three cyberwarriors to accompany them on 
the job.   Just before six thirty they filed into the Cyber Command, 
past the guard dog sign, slipped on their headsets, and stared into the 
wall of flashing screens. They would stay here for eight hours.  Their 
hours rotated including a recurring graveyard shift.

When trouble happened, the guys snapped into action with expert 
precision, rapidly assimilating the attack and simultaneously 
dispatching orders to the other cyber warriors.  Lackland Air Force Base 
near San Antonia, Texas housed a large supporting team of cyber 
warriors.  Often the guys=E2=80=99 order was the same:  shut down the computer 
system being attacked, and find someway to reroute it.   Mouse-skills 
were essential.  =E2=80=9CIf you hesitate for a second,=E2=80=9D one cyber warrior told 
me, =E2=80=9Cthat could be the difference in a base going down.=E2=80=9D


Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Tegatai Managed Colocation: Four Provider Blended
Tier-1 Bandwidth, Fortinet Universal Threat Management,
Natural Disaster Avoidance, Always-On Power Delivery 
Network, Cisco Switches, SAS 70 Type II Datacenter. 
Find peace of mind, Defend your Critical Infrastructure. 

Site design & layout copyright © 1986-2014 CodeGods