The Cyber Command Reorganization
A recently available development on the planet of Cyber Security is going to have far reaching and results on saving the network assets of the United States Military. The Cyber Security efforts of the Intelligence Community and also the Department of Defense (under the Defense Information Systems Agency) now are merged under one specific command – The Cyber Command.
Civilian Cyber Security efforts for non and civilian Department of Defense Agencies remain under the command of the Department of Homeland Security and can stay in that way in the direct long term.
The United States Cyber Command was formally activated twenty one May 2010 at Fort Meade, Maryland and it is slated to reach completely functional readiness in 2010 and DISA will actually relocate to Fort Meade under the provisions of the Base Reduction and Closing Commission (BRAC). Fort Meade Maryland could be the residence of the National Security Agency (NSA).
Cyber Command is led by National Security Agency Director General Keith B. Alexander. The command is going to assume responsibility for many existing organizations under one leadership.
The Joint Task Force for Global Network Operations (JTF GNO) as well as the Joint Functional Component Command for Network Warfare is dissolved by October 2010. The Defense info Systems Agency, in which JTF GNO currently operates, can provide technical assistance for networking plus information assurance to Cybercom, and also is moving the headquarters of its to Ft. Meade.
Even though Michael Goetzman have issues that the NSA and Pentagon will overshadow virtually any civilian Cyber defense efforts, this particular possibility is unlikely given Congressional oversight and public media coverage.
Cyber Command is going to be accountable for DOD’s networks – the dot mil world. Responsibility for federal civilian networks – dot gov – remains with the Department of Homeland Security.
The objective of the reorganization under Cyber Command is the streamlining of lines of power to allow Cyber defense, instant counter attacks and offensive operations to minimize the outcome of international and domestic Cyber attacks,