The Pentagon Is Busy Integrating Cyber Into Its Battle Plans

The US Department of Defense is continuing to ingrate cyber planning and effects into traditional military operations as Cyber Command nears elevation to a unified combatant command.

One critical step in this process has been the creation of cyber planning cells locally at the combatant command headquarters. DoD leaders now say they hope to have these teams fully staffed in 5 years.

These cells, known as cyber operations-integrated planning elements, will include small staffs to help better coordinate offensive and defensive cyber effects. They are necessary because combatant commands don’t necessarily have cyber skill sets or planners at the staff level to help with campaign planning.

As envisioned, the planning elements will work with combatant commands as a liaison of sorts forward from the remote cyber operators to integrate cyber into operations and contingency plans providing information on the types of capabilities cyber forces can provide.

These planning cells will be staffed by personnel from the service cyber components under a construct known as Joint Force Headquarters-Cyber.

JFHQ-Cyber is one of three headquarters elements of Cyber Command and provides planning, targeting, intelligence and cyber support to combatant commands they support.

Each of the heads of the various service cyber components are dual-hatted as commander of the various JFHQ-Cybers.

This provides a connective tissue of sorts between Cyber Command and the combatant commands.

During written congressional testimony March 13, Vice Adm. Michael Gilday, commander of 10th Fleet/Fleet Cyber Command, said his organization is in the process of standing up three planning elements.

While the JFHQ-C Fleet Cyber supports Pacific Command and Southern Command, Gilday said they are also standing up a planning element for US Forces Korea, a sub-unified command of Pacific Command designed to deter aggression and defend South Korea.

“These Elements will also fully integrate cyberspace into battle plans, ensuring timing and tempo are set by the commanders for use of cyberspace effects in the field based on their operational scheme of maneuver,” Gilday wrote. He added that they will be “working with our combatant commanders to project power in, from and through cyberspace.”

Maj. Gen. Loretta Reynolds, commander of Marine Corps Forces Cyberspace Command, during the same congressional hearing, said as part of its planning element in support of US Special Operations Command, they have hired civilians across the Special Operations Command enterprise who are providing cyber intelligence and planning support for joint cyber fires.

In addition to the five Marines at SOCOM headquarters, Reynolds wrote in prepared testimony, they began to build the planning elements across SOCOM organisations worldwide and look to complete the civilian hiring for a total 26 civilians by October.

Moreover, she wrote they are working within the Marine Corps to increase uniformed planning element staff with an increase of 13 Marines required to meet staffing goal by the end of FY20.

Gilday noted at Joint Service Academy Cybersecurity Summit March 20 at the Naval Academy that there’s much greater overall integration of cyber forces with traditional forces such as deploying carrier strike groups, amphibious readiness groups, our deploying Army brigades and Marine Expeditionary Units.

FifthDomain

You Might Also Read:

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks:

The Pentagon Puts Google’s AI To Use:

« Cyber Criminals Have Ingenious Money Laundering Methods
Australia’s Cybersecurity Adviser Calls For Privacy »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Spire Solutions

Spire Solutions

Spire Solutions is the Middle East & Africa region’s leading cybersecurity solution provider and value-added distributor (VAD).

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

Phosphorus Cybersecurity

Phosphorus Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

Pacific Certifications

Pacific Certifications

Pacific Certifications provide accredited certification, training and support services to help you improve processes, performance and products and services.