{"id":3612,"date":"2011-07-15T13:54:12","date_gmt":"2011-07-15T17:54:12","guid":{"rendered":"http:\/\/thesocietypages.org\/cyborgology\/?p=3612"},"modified":"2011-07-15T18:52:24","modified_gmt":"2011-07-15T22:52:24","slug":"us-cyber-command","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2011\/07\/15\/us-cyber-command\/","title":{"rendered":"US Cyber Command &amp; Augmented Warfare"},"content":{"rendered":"<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/USCYBERCOM_Logo-437x439.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3621 alignright\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/USCYBERCOM_Logo-437x439.jpg\" alt=\"\" width=\"245\" height=\"246\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/USCYBERCOM_Logo-437x439.jpg 437w, https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/USCYBERCOM_Logo-437x439-150x150.jpg 150w, https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/07\/USCYBERCOM_Logo-437x439-298x300.jpg 298w\" sizes=\"auto, (max-width: 245px) 100vw, 245px\" \/><\/a>Nope.\u00a0 It&#8217;s not a reference to some long-forgotten 80s movie.\u00a0 On June 23, 2009, former Secretary of Defense Robert Gates signed a memorandum creating US Cyber Command, a separate sub-command unit of U.S. Strategic Command (<a href=\"http:\/\/www.stratcom.mil\/\">STRATCOM<\/a>) headed by a four-star general, (currently, Gen. Keith B. Alexander). And, despite all its digital dualist rhetoric (exemplified by the rampant use of terms like &#8220;cyberspace&#8221; and &#8220;cyber-attackers&#8221;), <strong>Cyber Command should viewed as a major step toward the augmentation of warfare<\/strong>.\u00a0 With the launch of Cyber Command, the US has quietly moved toward developing new first strike capacities that may, ultimately, prove more strategically important than even the nation&#8217;s nuclear arsenal.<\/p>\n<p>While most media coverage has tended to focus on Cyber Command&#8217;s defensive postures (e.g., protecting classified data, securing the power grid, etc.), Cyber Command is also developing offensive capabilities to target and cripple other nations&#8217; communication, transportation, and utility grids.\u00a0 This demonstrates that,<strong> in the augmented warfare of the future, an effective assault on atoms will also require a simultaneous assault on bits<\/strong>.<\/p>\n<p>Cyber Command&#8217;s capacities, however, are far from fully developed.\u00a0 A recent <a href=\"http:\/\/www.gao.gov\/products\/GAO-11-421\" target=\"_blank\">report<\/a> by the Government Accountability Office concluded that the Cyber Command \u201chas not fully defined long-term mission requirements and desired capabilities to guide the services\u2019 efforts to recruit, train and provide forces with appropriate skill sets.\u201d<\/p>\n<figure id=\"attachment_3330\" aria-describedby=\"caption-attachment-3330\" style=\"width: 425px\" class=\"wp-caption aligncenter\"><figcaption id=\"caption-attachment-3330\" class=\"wp-caption-text\">Watch CBS sensationalize cyber-warfare and make the digital dualist fallacy of comparing cyberspace to land and sea.<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Nope.\u00a0 It&#8217;s not a reference to some long-forgotten 80s movie.\u00a0 On June 23, 2009, former Secretary of Defense Robert Gates signed a memorandum creating US Cyber Command, a separate sub-command unit of U.S. Strategic Command (STRATCOM) headed by a four-star general, (currently, Gen. Keith B. Alexander). And, despite all its digital dualist rhetoric (exemplified by [&hellip;]<\/p>\n","protected":false},"author":563,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9967,425],"tags":[2324,12071,12078,12076,12082,12077,12073,10447,12079,12081,880,103,12080,12070,12074],"class_list":["post-3612","post","type-post","status-publish","format-standard","hentry","category-commentary","category-links","tag-augmented-reality","tag-cyber-command","tag-cyber-attack","tag-cyber-warfare","tag-cyberspace","tag-cyberwarfare","tag-defensive","tag-digital-dualism","tag-gao","tag-gen-keith-b-alexander","tag-hacking","tag-military","tag-robert-gates","tag-us-cyber-command","tag-warefare"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/3612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/563"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=3612"}],"version-history":[{"count":26,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/3612\/revisions"}],"predecessor-version":[{"id":3639,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/3612\/revisions\/3639"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=3612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=3612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=3612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}