The Pentagon Is Busy Integrating Cyber Into Its Battle Plans

The US Department of Defense is continuing to ingrate cyber planning and effects into traditional military operations as Cyber Command nears elevation to a unified combatant command.

One critical step in this process has been the creation of cyber planning cells locally at the combatant command headquarters. DoD leaders now say they hope to have these teams fully staffed in 5 years.

These cells, known as cyber operations-integrated planning elements, will include small staffs to help better coordinate offensive and defensive cyber effects. They are necessary because combatant commands don’t necessarily have cyber skill sets or planners at the staff level to help with campaign planning.

As envisioned, the planning elements will work with combatant commands as a liaison of sorts forward from the remote cyber operators to integrate cyber into operations and contingency plans providing information on the types of capabilities cyber forces can provide.

These planning cells will be staffed by personnel from the service cyber components under a construct known as Joint Force Headquarters-Cyber.

JFHQ-Cyber is one of three headquarters elements of Cyber Command and provides planning, targeting, intelligence and cyber support to combatant commands they support.

Each of the heads of the various service cyber components are dual-hatted as commander of the various JFHQ-Cybers.

This provides a connective tissue of sorts between Cyber Command and the combatant commands.

During written congressional testimony March 13, Vice Adm. Michael Gilday, commander of 10th Fleet/Fleet Cyber Command, said his organization is in the process of standing up three planning elements.

While the JFHQ-C Fleet Cyber supports Pacific Command and Southern Command, Gilday said they are also standing up a planning element for US Forces Korea, a sub-unified command of Pacific Command designed to deter aggression and defend South Korea.

“These Elements will also fully integrate cyberspace into battle plans, ensuring timing and tempo are set by the commanders for use of cyberspace effects in the field based on their operational scheme of maneuver,” Gilday wrote. He added that they will be “working with our combatant commanders to project power in, from and through cyberspace.”

Maj. Gen. Loretta Reynolds, commander of Marine Corps Forces Cyberspace Command, during the same congressional hearing, said as part of its planning element in support of US Special Operations Command, they have hired civilians across the Special Operations Command enterprise who are providing cyber intelligence and planning support for joint cyber fires.

In addition to the five Marines at SOCOM headquarters, Reynolds wrote in prepared testimony, they began to build the planning elements across SOCOM organisations worldwide and look to complete the civilian hiring for a total 26 civilians by October.

Moreover, she wrote they are working within the Marine Corps to increase uniformed planning element staff with an increase of 13 Marines required to meet staffing goal by the end of FY20.

Gilday noted at Joint Service Academy Cybersecurity Summit March 20 at the Naval Academy that there’s much greater overall integration of cyber forces with traditional forces such as deploying carrier strike groups, amphibious readiness groups, our deploying Army brigades and Marine Expeditionary Units.

FifthDomain

You Might Also Read:

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks:

The Pentagon Puts Google’s AI To Use:

« Cyber Criminals Have Ingenious Money Laundering Methods
Australia’s Cybersecurity Adviser Calls For Privacy »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

Geobridge

Geobridge

Geobridge is a leading information security and compliance provider for retail, financial services, healthcare, manufacturing and government markets

MerlinCryption

MerlinCryption

MerlinCryption develops infrastructure security software, delivering advanced encryption, authentication, and random data generators, for Cloud, VoIP, eCommerce, M2M, and USB hardware.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

360° Online Brand Protection

360° Online Brand Protection

360° Online Brand Protection have developed a response to monitor counterfeiting and piracy activity at the online point of sale.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.