Second United States Army was originally formed 15 October 1918 during World War I. It functioned as a training and administrative headquarters until being inactivated 15 April 1919. It operated 1933 to 1966, training and organizing troops for overseas deployment during World War II. It later operated under U.S. Army Forces Command as a regional command to control Army Reserve forces 1983 to 1995. Second Army was reactivated on 1 October 2010 as U.S. Army Cyber Command/Second Army, it is based at Fort Belvoir, Virginia.[1]
http://samuelezerzer.blogspot.ca/
| Second United States Army | |
|---|---|
Second United States Army shoulder sleeve insignia | |
| Active | 15 October 1918 – 15 April 1919; 20 October 1933 – 1 January 1966; 1 October 2010 – present |
| Allegiance | |
| Branch | |
| Type | Regular Army |
| Role | Field Army |
| Motto | "Second To None" |
| Engagements | World War I |
| Commanders | |
| Notable commanders | William Simpson |
| Insignia | |
| Distinctive Unit Insignia | |
Current
On 1 October 2010, Second Army was again re-activated as United States Army Cyber Command (ARCYBER)/Second Army. The new command is based out of Fort Belvoir, Virginia and a part of the larger, U.S. Cyber Command (CYBERCOM). Lieutenant General Rhett A. Hernandez became the first commander of the newly reactivated Army.
"The most significant organizational milestone occurred on December 1, 2011 when the Army activated its first dedicated cyber brigade at Fort Meade, Maryland. The 780th Military
Intelligence Brigade (780th MI BDE) (Cyber) is organized to support USCC and combatant command cyberspace operations. Army Cyber Command has operational control of the brigade.
This brigade conducts signals intelligence and computer network operations, and enables Dynamic Computer Network Defense of Army and Department of Defense networks. When fully staffed, the 780th MI BDE will have more than 1,200 assigned Soldiers and civilian employees."
General Rhett A. Hernandez
Past Commanders
| Date Began | Date Ended | Commanding General |
|---|---|---|
| 15 October 1918 | 15 April 1919 | Robert Lee Bullard |
| 20 October 1939 | 25 April 1943 | Ben Lear |
| 25 April 1943 | 7 May 1945 | Lloyd Fredendall |
| 1945 October | 1946 November | William Simpson |
| 1948 January | 1950 July | Leonard T. Gerow |
| 10 August 1950 | 11 April 1951 | James Alward Van Fleet |
| 11 April 1951 | 1953 April | Edward H. Brooks |
| 1953 | 1956 | Floyd L. Parks |
| 1957 | 1960 | George Windle Read, Jr. |
| 1960 | 1962 | Ridgely Gaither |
| 2010 | Current | Rhett A. Hernandez |
STATEMENT BY
LIEUTENANT GENERAL RHETT HERNANDEZ
COMMANDING GENERAL
U.S. ARMY CYBER COMMAND/2ND ARMY
BEFORE THE
HOUSE ARMED SERVICES COMMITTEE
SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES
CONCERNING DIGITAL WARRIOR: IMPROVING
MILITARY CAPABILITIES IN THE CYBER DOMAIN
SECOND SESSION, 112TH CONGRESS
July 25, 2012
Cyber Threat
""We all recognize that cyber threats are becoming more dangerous and are on the Intelligence Community’s list of biggest challenges to our Nation. These threats are real, growing, sophisticated, and evolving. There is a wide range of actors ranging from lone individuals to organized hacker groups, criminal syndicates, violent extremist organizations, and sophisticated nation-states. All pose a danger of increasing their ability to disrupt the networks or critical infrastructure we count on to operate and conduct missions, and advancing their techniques to exploit our people and information. Others are seeking more disruptive or potentially destructive capabilities to impact our freedom to operate and our national security.
Collectively, these threats create a dynamic and dangerous cyberspace environment.Daily there are thousands of attempts to penetrate Army networks. Each Army computer
faces multiple unauthorized attempts a day to penetrate Army networks. End users remain our most vulnerable link. Every time Army Soldiers and Civilians enter the network, regardless of
where they are, they must recognize they’re in a contested environment. Everyone must be aware of the cyberspace threats and remain vigilant against them. """
No comments:
Post a Comment