Monday, March 14, 2011

Enterprise Information Warfare Community Celebrates 76th Birthday

Enterprise Information Warfare Community Celebrates 76th Birthday: "USS Enterprise (CVN 65) information warfare and cryptology (IWC) personnel celebrated the Naval Information Warfare Community's 76th birthday aboard 'Big E' with community members reflecting on its storied past, March 11.

Information warfare (IW) officers and enlisted cryptologic technicians (CT) deploy globally to support Navy and joint military requirements, delivering vital information to decision makers by exploiting, defending and attacking networks to capitalize on vulnerabilities in the information environment.

"Being a part of the cryptologic community is a rewarding experience," said Cryptologic Technician 2nd Class (SW) David Ireland, USS Enterprise Operations Department's Operations Specialists (OS) division. "Most people you talk to don't even know what a CT is, but we're proud to be silent professionals supporting the continuing efforts of fellow military members downrange."

Naval cryptology first began during the Civil War, when specially trained personnel intercepted and deciphered enemy signals, while formulating ways to protect their own communications. Sailors and Marines assumed cryptologic duties after the first radio transmission was sent from a U.S. Navy ship in 1889.

In October 1928, the Navy and Marine Corps' first training class of radio intercept operators convened. The school's original location was in a blockhouse on the roof of the old Navy Department building, and graduates of the school were nicknamed the "On-the-Roof Gang."

During World War II, nearly 10,000 naval cryptologic personnel were deployed worldwide and supported every major campaign in the war. Since that time, cryptologists have played a direct role in every U.S. conflict and have evolved to meet the dynamic challenges of modern cyber warfare. Today's IW/CT community consists of more than 11,000 members.

"From the groundbreaking work of the 'On-the-Roof Gang', and Capt. Joseph Rochefort's cracking of the Japanese navy code to the Global War on Terrorism, the Navy's information warfare/cryptology community has been in the fight," said Rear Adm. Edward H. Deets, III, commander, Naval Network Warfare Command. "This year we celebrate our 76th anniversary, honoring our past and embracing our future."

The IW/CT community ushered in its new era with the following events:

Sept. 15, 2005 – The Navy renamed cryptologic officers "information warfare officers" to reflect the expanded competencies of information operations and cyber warfare.

Sept. 30, 2005 – The Naval Security Group was disestablished, and all missions were assumed by Naval Network Warfare Command.

Oct. 1, 2009 – The Information Dominance Corps was established, which consists of four separate communities: IW/CT; Intelligence/Intelligence Specialists; Information Professionals and Technicians; and Oceanographers/Aerographers.

Jan. 29, 2010 – U.S. 10th Fleet was re-commissioned, and Fleet Cyber Command was established, which assumed the Navy's cryptologic, information operations, cyber, electronic warfare and space missions.


"The Navy's Cryptologic community has a rich history of supporting our forces at war and our national decision makers," said Information Warfare Officer Lt. Christina Bounds, USS Enterprise OS division officer. "As our world becomes increasingly interconnected, our community's ability to provide relevant and time-sensitive support is paramount for the missions we face today."

Today's IW/CT force performs both national missions with the National Security Agency and fleet missions. Thirty-six percent of the force is forward deployed aboard ships, submarines, aircraft and in other tactical applications globally. Navy cryptologic technicians are trained in a total of 114 languages and dialects."
*************************

Cyber Defense




The US military is preparing for 21st Century electronic warfare and cyber terrorism. A joint US Cyber Command and four service cyber commands have been set up.

Their mission is to defend American military networks and civilian American infrastructure from cyber terrorism and from foreign government hackers.

The officers leading these cyber commands explain how they are organized, how they operate, and how they will protect the United States from foreign military hackers, intelligence agencies, and cyber terrorists.