Sunday, 24 March 2013

Digital Warriors: Improving Military Capabilities for Cyber Operations





Second United States Army was originally formed 15 October 1918 during World War I. It functioned as a training and administrative headquarters until being inactivated 15 April 1919. It operated 1933 to 1966, training and organizing troops for overseas deployment during World War II. It later operated under U.S. Army Forces Command as a regional command to control Army Reserve forces 1983 to 1995. Second Army was reactivated on 1 October 2010 as U.S. Army Cyber Command/Second Army, it is based at Fort Belvoir, Virginia.[1]
http://samuelezerzer.blogspot.ca/






Second United States Army
US Second Army.svg
Second United States Army shoulder sleeve insignia
Active15 October 1918 – 15 April 1919;
20 October 1933 – 1 January 1966;
1 October 2010 – present
Allegiance United States of America
Branch United States Army
TypeRegular Army
RoleField Army
Motto"Second To None"
EngagementsWorld War I
Commanders
Notable
commanders
William Simpson
Insignia
Distinctive Unit Insignia2nd Army DUI.jpg


Current



On 1 October 2010, Second Army was again re-activated as United States Army Cyber Command (ARCYBER)/Second Army. The new command is based out of Fort Belvoir, Virginia and a part of the larger, U.S. Cyber Command (CYBERCOM). Lieutenant General Rhett A. Hernandez became the first commander of the newly reactivated Army.


"The most significant organizational milestone occurred on December 1, 2011 when the Army activated its first dedicated cyber brigade at Fort Meade, Maryland. The 780th Military 
Intelligence Brigade (780th MI BDE) (Cyber) is organized to support USCC and combatant command cyberspace operations. Army Cyber Command has operational control of the brigade.
This brigade conducts signals intelligence and computer network operations, and enables Dynamic Computer Network Defense of Army and Department of Defense networks. When fully staffed, the 780th MI BDE will have more than 1,200 assigned Soldiers and civilian employees."
General Rhett A. Hernandez




Past Commanders

Date BeganDate EndedCommanding General
15 October 191815 April 1919Robert Lee Bullard
20 October 193925 April 1943Ben Lear
25 April 19437 May 1945Lloyd Fredendall
1945 October1946 NovemberWilliam Simpson
1948 January1950 JulyLeonard T. Gerow
10 August 195011 April 1951James Alward Van Fleet
11 April 19511953 AprilEdward H. Brooks
19531956Floyd L. Parks
19571960George Windle Read, Jr.
19601962Ridgely Gaither
2010CurrentRhett A. Hernandez




STATEMENT BY
LIEUTENANT GENERAL RHETT HERNANDEZ
COMMANDING GENERAL
U.S. ARMY CYBER COMMAND/2ND ARMY
BEFORE THE
HOUSE ARMED SERVICES COMMITTEE
SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES
CONCERNING DIGITAL WARRIOR: IMPROVING 
MILITARY CAPABILITIES IN THE CYBER DOMAIN
SECOND SESSION, 112TH CONGRESS
July 25, 2012

Cyber Threat

""We all recognize that cyber threats are becoming more dangerous and are on the  Intelligence Community’s list of biggest challenges to our Nation. These threats are real,  growing, sophisticated, and evolving. There is a wide range of actors ranging from lone  individuals to organized hacker groups, criminal syndicates, violent extremist organizations, and sophisticated nation-states. All pose a danger of increasing their ability to disrupt the networks or critical infrastructure we count on to operate and conduct missions, and advancing their techniques to exploit our people and information. Others are seeking more disruptive or potentially destructive capabilities to impact our freedom to operate and our national security.

Collectively, these threats create a dynamic and dangerous cyberspace environment.Daily there are thousands of attempts to penetrate Army networks. Each Army computer 
faces multiple unauthorized attempts a day to penetrate Army networks. End users remain our most vulnerable link. Every time Army Soldiers and Civilians enter the network, regardless of 
where they are, they must recognize they’re in a contested environment. Everyone must be aware of the cyberspace threats and remain vigilant against them. """

No comments:

Post a Comment