JUMPSEAT
AEROSPACE NEWS

US Cyber Command Plays Key Role in Operation Epic Fury

Cyber Operations Support Military Campaign Against Iran

US Cyber Command is playing a key role in Operation Epic Fury, the US military operation against Iran, with cyber operations supporting the campaign through non-kinetic effects. According to Chairman of the Joint Chiefs of Staff Gen. Dan Caine, CYBERCOM’s efforts are focused on disrupting and degrading Iran’s ability to see, communicate, and respond. The operation’s cyber component may evolve over time, with a focus on intelligence gathering and support for kinetic operations. The Pentagon has not commented on the specifics of CYBERCOM’s role, citing operational security concerns. This development was first reported by Breaking Defense.

Source

Key Takeaways
    Sign in to view key takeaways Get full access to in-depth analysis and key takeaways.
    Sign In
    Silver membership required Upgrade to Silver to access Key Takeaways.
    Upgrade
    Strategic Implications

    Sign in to view strategic implications Get full access to strategic analysis and expert insights.
    Sign In
    Silver membership required Upgrade to Silver to access Strategic Implications.
    Upgrade
    Advertisement 728 × 90
    JUMPSEAT
    AEROSPACE NEWS
    JUMPSEAT
    AEROSPACE NEWS

    US Cyber Command Plays Key Role in Operation Epic Fury

    Sponsored by: Jumpseat Solutions

    Cyber Operations Support Military Campaign Against Iran

    US Cyber Command is playing a key role in Operation Epic Fury, the US military operation against Iran, with cyber operations supporting the campaign through non-kinetic effects. According to Chairman of the Joint Chiefs of Staff Gen. Dan Caine, CYBERCOM’s efforts are focused on disrupting and degrading Iran’s ability to see, communicate, and respond. The operation’s cyber component may evolve over time, with a focus on intelligence gathering and support for kinetic operations. The Pentagon has not commented on the specifics of CYBERCOM’s role, citing operational security concerns. This development was first reported by Breaking Defense.

    Source

    Key Takeaways
      Sign in to view key takeaways Get full access to in-depth analysis and key takeaways.
      Sign In
      Silver membership required Upgrade to Silver to access Key Takeaways.
      Upgrade
      Strategic Implications

      Sign in to view strategic implications Get full access to strategic analysis and expert insights.
      Sign In
      Silver membership required Upgrade to Silver to access Strategic Implications.
      Upgrade
      Advertisement 300 × 250 Google AdSense