By Gary Sheftick, Army News ServiceSeptember 17, 2019
FORT MEADE, Md. -- During the midterm elections last year, U.S. Cyber Command had three teams deployed forward in Europe working with partner nations to "hunt and track" adversaries attempting to disrupt U.S. democratic processes, its commander said Monday.
Gen. Paul M. Nakasone spoke at the Association of the U.S. Army's "Hot Topics" forum on Army cyber and networks. He said the big difference with defensive cyberspace operations today over a few years ago is the ability to deploy teams forward and project power.
"This was done exquisitely in the midterm elections," he said, "with three different elements being able to move forward into Europe."
He said the command was able to tell partner nations "we know that adversaries are within your network and let's identify them."
The small deployed elements were able to fall back on larger capabilities here in the states, he said. "Among the key players: an Army team that was able to get on the net and provide effects in support of the defense of our midterm elections," he added.
Stopping attempts to interfere with democratic processes is one of the ways CYBERCOM supports national security objectives, Nakasone said. Another is stopping adversaries from stealing intellectual property and even personally identifiable information, known as PII.
Recent ransomware attacks in Louisiana and Texas had governors call out their National Guard cyber teams, he said.
Ransomware attacks last month that affected 23 local governments in Texas had that state's governor call out Army and Air Guard cyber personnel to conduct an assessment and help with recovery efforts.
In July, three different school districts in Louisiana came under cyberattacks and the governor declared an emergency, asking National Guard cyber personnel to help so that thousands of students could get back into their classrooms.
"This is a new venue; this is a new capability," Nakasone said.
The National Guard and Army Reserve are adding 21 cyber teams to the 20 defensive cyber protective teams already in the active component, he said.
The nation invests just under $2 billion annually in its cyber force and it gets much more in return, he said, "in terms of its capabilities, its options and its response times."
In the last 10 years, the Army has stood up a Cyber branch and a Cyber School at Fort Gordon, Georgia, he noted.
Since 2015, more than 330 cyber officers have been trained at Fort Gordon and the school's capacity is growing. Soon about 200 officers a year should be trained there, he said.
About 250 Soldiers have been trained so far as 17C cyber operations specialists, he said, and that number will also grow dramatically.
The Army will stand up a "persistent cyber training environment" within the next six to 12 months, he said, where cyber teams will be able to train virtually on realistic adversary networks, similar to how brigade combat teams face a realistic enemy at the National Training Center on Fort Irwin, California.
"How do you actually take a look at the network that you're going to have to access, to move through, and get to some type of effect at an end state?" Nakasone said, explaining that's what the persistent training environment will soon provide. It will make a huge difference in collective training for cyber teams and improve their readiness, he said.
Some cyber teams have already deployed with brigade combat teams to NTC and the Joint Readiness Training Center, he said, and those lessons learned are becoming doctrine.
An integrated network of cyber, electronic warfare and information operations is already bringing capabilities to commanders around the globe, he said, adding that capability will continue to grow exponentially.
"Every single day as we take a look at operations in Afghanistan and Iraq and other places within Central Command, [they are] leveraging the capabilities of Army Cyber," he said.