Defense

Cyber Command builds critical infrastructure defense skills

Major General James K.

Lt. Gen. James McLaughlin said Cyber Command is poised to help respond to a significant attack on the country's critical infrastructure.

As U.S. Cyber Command reaches operational capability in its mission to protect Defense Department networks and support combat commanders, it is also firming up its plans to help the Department of Homeland Security defend critical infrastructure networks, according to one of the command's top leaders.

"We're still fleshing out [how to protect critical infrastructure providers from] attacks of significant consequence," said Lt. Gen. James McLaughlin, Cyber Command's deputy commander, at the Air Force Association's Air, Space and Cyber Conference on Sept. 20.

The command has been concentrating on developing its cyber mission workforce since 2013 and now has more than 6,000 people in 133 cyber mission forces, he added.

That total jibes with the goal McLaughlin set earlier this year in announcing the force. He unveiled the cyber mission forces in testimony in June before the House Armed Services Committee and told lawmakers that as of June 10, Cyber Command's mission forces consisted of 4,684 people, with an eventual target of 6,187 people.

How Cyber Command will use those people in the event of an attack on critical infrastructure networks -- such as those used by banks, electricity and water utilities, and other industries -- is not well defined, he said. But that is intentional, given the fluid nature of cyberattacks, which can range from data theft to physical destruction.

"DHS is the lead for defending .gov" and critical infrastructure networks, McLaughlin told FCW after his speech at the Air Force conference. "We share information and intelligence" with DHS and the National Security Agency.

Although the decision to have Cyber Command step in after an attack is left to higher-level authorities, McLaughlin said the command can augment DHS' expertise.

"Our core skill set for DOD translates to other environments," he said.

DHS and the FBI are on the front lines of finding relatively low-level cyberattackers on the civilian side, McLaughlin added. However, he said a significant attack on critical infrastructure, possibly involving a nation-state actor, could require a broader response from the U.S.

"We're poised to respond" to such a threat, he added.

McLaughlin said Cyber Command has been working closely with NSA to develop the command's initial cyber workforce and capabilities. Although it still shares information with the agency, it is moving away from NSA's closer orbit as it develops its own set of skills and expertise.

Cyber Command and NSA are led by Navy Adm. Michael Rogers.

McLaughlin did not elaborate on what the command would bring to the table with DHS in response to a big attack on critical infrastructure but said that given the pace of cyberthreats, an attack of significant consequence is likely in the coming years.

"You will see us do this in the future," he added.

He said Cyber Command has already been working with critical infrastructure providers through cyberattack exercises. This summer's Cyber Guard 16 simulation involved a broad electronic assault on government, academia, industry and allies. Cyber Command, DHS and the FBI led the exercise, which was hosted by the Joint Staff in a state-of-the-art facility in Suffolk, Va.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.