The Pentagon Is Busy Integrating Cyber Into Its Battle Plans

The US Department of Defense is continuing to ingrate cyber planning and effects into traditional military operations as Cyber Command nears elevation to a unified combatant command.

One critical step in this process has been the creation of cyber planning cells locally at the combatant command headquarters. DoD leaders now say they hope to have these teams fully staffed in 5 years.

These cells, known as cyber operations-integrated planning elements, will include small staffs to help better coordinate offensive and defensive cyber effects. They are necessary because combatant commands don’t necessarily have cyber skill sets or planners at the staff level to help with campaign planning.

As envisioned, the planning elements will work with combatant commands as a liaison of sorts forward from the remote cyber operators to integrate cyber into operations and contingency plans providing information on the types of capabilities cyber forces can provide.

These planning cells will be staffed by personnel from the service cyber components under a construct known as Joint Force Headquarters-Cyber.

JFHQ-Cyber is one of three headquarters elements of Cyber Command and provides planning, targeting, intelligence and cyber support to combatant commands they support.

Each of the heads of the various service cyber components are dual-hatted as commander of the various JFHQ-Cybers.

This provides a connective tissue of sorts between Cyber Command and the combatant commands.

During written congressional testimony March 13, Vice Adm. Michael Gilday, commander of 10th Fleet/Fleet Cyber Command, said his organization is in the process of standing up three planning elements.

While the JFHQ-C Fleet Cyber supports Pacific Command and Southern Command, Gilday said they are also standing up a planning element for US Forces Korea, a sub-unified command of Pacific Command designed to deter aggression and defend South Korea.

“These Elements will also fully integrate cyberspace into battle plans, ensuring timing and tempo are set by the commanders for use of cyberspace effects in the field based on their operational scheme of maneuver,” Gilday wrote. He added that they will be “working with our combatant commanders to project power in, from and through cyberspace.”

Maj. Gen. Loretta Reynolds, commander of Marine Corps Forces Cyberspace Command, during the same congressional hearing, said as part of its planning element in support of US Special Operations Command, they have hired civilians across the Special Operations Command enterprise who are providing cyber intelligence and planning support for joint cyber fires.

In addition to the five Marines at SOCOM headquarters, Reynolds wrote in prepared testimony, they began to build the planning elements across SOCOM organisations worldwide and look to complete the civilian hiring for a total 26 civilians by October.

Moreover, she wrote they are working within the Marine Corps to increase uniformed planning element staff with an increase of 13 Marines required to meet staffing goal by the end of FY20.

Gilday noted at Joint Service Academy Cybersecurity Summit March 20 at the Naval Academy that there’s much greater overall integration of cyber forces with traditional forces such as deploying carrier strike groups, amphibious readiness groups, our deploying Army brigades and Marine Expeditionary Units.

FifthDomain

You Might Also Read:

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks:

The Pentagon Puts Google’s AI To Use:

« Cyber Criminals Have Ingenious Money Laundering Methods
Australia’s Cybersecurity Adviser Calls For Privacy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CyTech Services

CyTech Services

CyTech provides Forensics Incident Response, Cyber Security and Training services.

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

National Security Agency (NSA)

National Security Agency (NSA)

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

RiskCentric

RiskCentric

RiskCentric is a consultancy specializing in risk management and compliance.

Rippleshot

Rippleshot

Rippleshot is a fraud analytics firm that detects mass card compromises faster, allowing issuers to execute more proactive fraud detection strategies.

Cyber@StationF

Cyber@StationF

Cyber@StationF is an up to 6 months international startup acceleration programme, whose members provide solutions for the Cybersecurity industry.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

Suridata

Suridata

Suridata’s SaaS Security platform enables organizations to secure the use of SaaS applications.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

ClosingLock

ClosingLock

ClosingLock is the leading provider of wire fraud prevention software for the real estate industry.

GoPlus Security

GoPlus Security

GoPlus is working as the "security infrastructure" for web3, by providing open, permissionless, user-driven Security Services.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.