4.7 β’ 798 Ratings
ποΈ 6 September 2019
β±οΈ 38 minutes
ποΈ Recording | iTunes | RSS
π§ΎοΈ Download transcript
Click on a timestamp to play from that location
0:00.0 | On the night of 8 November 2016, as we assembled in the jock, you could up at Fort Meade, |
0:13.9 | you could actually look at the big screens, and most of the coverage was actually on the election. |
0:21.6 | What we were focused like a laser on though was an operation that we were getting ready to kick off. |
0:29.6 | And it would actually be the largest offensive cyberspace operation that the United States had conducted to date. |
0:40.3 | The adversary is operating with cyberspace capabilities, |
0:46.3 | they're operating with electronic warfare capabilities, |
0:49.3 | they're operating in the greater information environment. |
0:55.8 | And it's frankly, they are very, very persistent and they have been very, very effective as they've |
1:04.8 | done that. |
1:06.0 | So we really have no other option but to do the same thing. |
1:15.0 | Hey, welcome to another episode of the Modern War Institute podcast. I'm John Ambo, |
1:19.7 | editorial director at MWI, and for this episode, MWI's major Jake Moraldi had the chance |
1:24.7 | to speak to Lieutenant General Stephen Fogarty. He is currently the commander of U.S. Army Cyber Command. |
1:30.5 | Now, in a lot of ways, it is remarkably difficult to conceptualize the cyber domain |
1:35.2 | and to understand fully what operations in that domain will look like. |
1:40.4 | But although it's difficult, we can't, of course, just wait for those things to be figured out. |
1:44.5 | We can't afford not to be operating in the cyber domain right now. |
1:48.6 | And Army Cyber is. General Forwardty talks about what they're doing, and he offers a really |
1:53.3 | useful big-picture understanding of cyber that includes everything from offensive and |
1:58.1 | defensive cyber operations to electronic warfare and information warfare. |
2:03.3 | The discussion even explores some of the very unique challenges to recruitment and retention |
2:08.4 | in a part of the force that is a little different that's optimized for the cyber domain. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from John Amble, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of John Amble and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright Β© Tapesearch 2025.