4 • 645 Ratings
🗓️ 24 October 2019
⏱️ 50 minutes
🧾️ Download transcript
The U.S. military prides itself on being one of the most powerful militaries on the face of the earth. The best trained, the best equipped with the latest wartech, the most mobile, with a power projection around the world. It’s why, sadly, as the Bureau of Investigative Journalism—which tracks U.S. drone strikes in Pakistan, Yemen, Afghanistan, and Somalia—maintains that the American military has killed as many as over 12,000 people in targeted strikes since 2004. Of those numbers, close to 1,800 are civilians and up to nearly 400 of that number, are kids.
There’s even been consideration on whether or not the U.S. military could have at on point taken on the entire world in the kinetic reality of ground, air, and sea war.
But in 2019, the American war machine doesn’t simply need soldiers,helicopters, or F-22s. It needs hackers to infiltrate secure networks, to spy, or disrupt critical infrastructure of an enemy during any given military operation.
In order to professionalize and certify its importance within the military, the Department of Defense officially elevated “Cyber Command” as its cyberspace force in 2018 to do just that, giving it the distinction of being one of its eleven “unified combatant commands.”
In other words, USCYBERCOM (as its known for short) joins other permanent forces that are designated across DoD with a broad mandate during times of peace and war. For example, the special forces has its own Special Forces Command, while AFRICOM looks after African centric military operations.
According to its mission statement, USCYBERCOM first defends DoD assets, then it’s responsible for “providing support to combatant commanders for execution of their missions around the world, and strengthening our nation's ability to withstand and respond to cyber attack.”
Already there are media reports showing USCYBERCOM coordinating hacking operations against ISIS with the help of the NSA and carrying out a top secret “strike” on Iranian government propaganda wings in response to Tehran’s attacks on a Saudi oil field.
On this week’s CYBER we’ve got Dave Weinstein, a former member of USCYBERCOM and the now CSO of cybersecurity firm Claroty, to give us the inside tract on how this new American cyber army functions.
Hosted on Acast. See acast.com/privacy for more information.
Click on a timestamp to play from that location
0:00.0 | Tann, it's got the code it's going to launch. |
0:11.0 | It's a unit system. |
0:13.0 | I know this. |
0:15.0 | It's all the files of the whole park. |
0:17.0 | It tells her everything. |
0:19.0 | Sir, he's uploading the virus. |
0:21.8 | Eagle won. |
0:22.6 | The package is being delivered. |
0:26.5 | The U.S. military has always prided itself on being the most powerful military on the face of the earth, with GIs better than anyone else's. |
0:37.1 | America. fighting. |
0:40.3 | Fighting for their country while half a world away from it. |
0:43.3 | Fighting for their country, |
0:45.3 | and for more than their country. |
0:47.3 | But in 2019, the American War Machine doesn't just need Rambo's |
0:51.3 | to jump out of helicopters. |
0:53.3 | It needs hackers. And hackers aren't exactly always in the same type of talent pool. |
0:58.0 | And in 2018, born out of the offices of the NSA, |
1:02.0 | the US military officially inaugurated, Cyber Command, |
1:05.0 | as its official internet warrior force. |
1:08.0 | Yes, hacker soldiers. |
1:10.0 | On this week's cyber, we've got Dave Weinstein, a former member of the |
1:13.9 | U.S. Cyber Command, and the now CSO of cybersecurity firm Clarity to give us an inside scoop on how this |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from VICE, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of VICE and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.