Cybersecurity

Pentagon staffing up to address cyber concerns

US Cyber Command logo

Amid growing recognition of serious cyber threats, the Pentagon is quintupling the staff for its three-year-old U.S. Cyber Command.

The Defense Department will boost cybersecurity support nearly fivefold in coming years, according to a report from the Washington Post. Current defensive operations as well as increased offensive measures will be key parts of the strategy to CyberCom from its current 900 employees to nearly 5,000 military and civilian personnel.

In a Jan. 24 interview on NBC’s "Rock Center with Brian Williams," Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, underscored his cyber concerns and the topic's priority in national security as threats and warfare evolve.

"What I worry about is that [a cyberattack] could be used to implant a destructive device that could cause significant harm to the industrial base, whether it’s critical infrastructure or the financial network," Dempsey said. "You’re not going to see these broad, sweeping movements across the desert of eastern Iraq …you’re going to see smaller groups of military formations confronting these distributed enemies across a much wider scope."

To that end, DOD leaders plan to create three types of forces at CyberCom. National mission forces will protect critical infrastructure; combat mission forces will bolster troops deployed in offensive operations; and cyber protection forces will target DOD networks.

News of the expansion plans come nearly a week after the Air Force announced it would increase its cyber forces by 15 percent in 2014. Gen. William Shelton, commander of Air Force Space Command, pointed to CyberCom orders for more cyber personnel, and the new plan indicates the other services will be following suit.

"Cyber Command is in the midst of determining how they are going to operate across all the geographic combatant commands as well as internal to the United States," Shelton said. "It looks like we will be tapped for well over 1,000 additional people into the cyber business, so you can see [cyber] is starting to take root."

Lawmakers on Capitol Hill also are pushing to act on cybersecurity. On Jan. 23 Senate leaders signed a resolution to resume work on comprehensive cybersecurity legislation, which last year failed.

"Throughout my five years of work on cyber, our military and national security officials and our country’s top business executives have made it abundantly clear that the serious threats to our country grow every day," Sen. Jay Rockefeller (D-W.V.), one of the resolution’s co-sponsors, said in a released statement. "It is a priority this year to act on comprehensive cybersecurity legislation."

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

Featured

  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Tue, Jan 29, 2013 Wally

People with a technical understanding of netorking and communications will be needed. All too often DoD hires fast talking "smoke and mirrors" contractors who have nothing more than a superficial understanding of technical issues. As long as the attitude that "Contractors are here to help" prevails, we are doomed.

Tue, Jan 29, 2013 Beltway Billy

One HUGE area Cybercom is and will be missing is an R&D element. Rather than build one, they should place validated requirements against the services labs. They are the proper place to bring new things into the network. .... just like they've been the place to bring tanks into combat, planes into the air, and subs into the seas.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above