An internal watchdog has suggested that resource constraints are dogging the race to position cadres of hacker warriors across the armed forces.
The Defense Department Office of Inspector General over the past six months has published classified audits on the Cyber Mission Force Teams. U.S. Cyber Command has set a goal of operating 133 such teams at initial capacity departmentwide by 2016. Some of them will attack adversary data systems, many will protect military networks and others will deflect catastrophic hacks targeting the states.
Recently, the inspector general’s website posted a title of one of the audits dated Nov. 24 — “Cyber Mission Force Teams Need Resources to Perform Missions.” Prior to that, the office published a title dated April 30, “U.S. Cyber Command and Military Services Need to Reassess Processes for fielding Cyber Mission Force Teams.”
Nextgov has filed requests for each document under the Freedom of Information Act.
Currently, 7 million digital devices touch the military’s network, each with the potential to compromise military data or weapons, or to become compromised themselves.
The Pentagon FOIA office on Thursday sent an interim response to the more recent inquiry, saying the office is currently working through a backlog of 800 open cases.
Later that day, an inspector general spokeswoman told Nextgov she didn’t have any information on the reason the contents of the audits are restricted. Nextgov has requested comment from Cyber Command.
Within CYBERCOM, some 27 “Combat Mission” teams, 68 “Cyber Protection” teams, and 13 “National Mission” teams are expected to be fully operational by 2018. There also will be 25…