US Marines Embrace Cyber Warfare

In the new age of 21st-century warfare, law enforcement US Marines will scour battlefields for the enemy's cellphones and forensic intelligence, drones will help infantry Marines land ashore out of sight of the adversary, and radio operators will use frequencies to disrupt the enemy's hacking abilities.

These innovations are part of a new command known as the 1st Marine Expeditionary Force's Information Group that on Thursday, July 6, made history at Camp Pendleton by becoming the first of its kind among the Corps' Marine expeditionary forces. 

The group's mission now is to win the war on the information battlefield and to decimate enemy capabilities in the electro-magnetic spectrum, said Col. Bobbi Shea, who has overseen the shift and commanded the group for the last two years.
Shea, recently, handed over command of the newly designated 1st MEF Information Group in a change of command ceremony aboard the base to Col. Dawn Alonso, who most recently served at Central Command and before that as commander for the 1st Intelligence Battalion.

At the ceremony, Shea, 51, was awarded the Legion of Merit for her leadership at 1st Marine Headquarters Group. Later, she was promoted to Brigadier General, making her one of only two active-duty female generals in the Marine Corps. She will go to work at the Pentagon in the office of Secretary of Defense James Mattis, who commanded the 1st Marine Expeditionary Force at Camp Pendleton in 2006.
"In the past, the group's primary mission has been moving and supporting Marines as they go forward to command forces in theater," Shea said. "Now, we're going to divest ourselves of the logistics mission and give it to a support battalion. Our headquarters will transform to a headquarters dedicated to enabling our commanders to fight and win in the information environment."

That will be accomplished, she said, by putting Marines trained in intelligence gathering and electronic warfare in closer contact with commanders and troops on the ground.
"This means degrading the enemy's ability to exploit the information environment, capitalising on social media and defending our abilities against cyber hacks we've become vulnerable to," Shea said. 
"We want to make sure our commanders and units in the battlefield can take advantage of those networks and tools we provide them. We want to synchronise and integrate all those capabilities across the battle space."
Shea pointed to such examples as the use of drones, law enforcement Marines picking up fingerprints or exploiting found cellphones on the battlefield, and imagery analysts gathering information from satellites.

Among the changes that are part of the transition are new Marine personnel, increased intelligence and cyber    space training, and a move to new facilities on the base.

While military officials called the re-designation a first at the Marine Expeditionary Force level, an increased focus on new technology and cyber warfare threats are among the Corps' broader changes, mandated by the Marine Corps Commandant to "modernize the force."

In April, Camp Pendleton held the Advanced Technology Exercise 2017, a collaborative technology expo conducted by the Department of the Navy. The inaugural event showcased dozens of emerging technologies to give Marines and sailors the upper hand in fighting the next generation of wars.

Marine Corps officials cited an urgency of the Marine Corps and Navy to move quickly in acquiring these technologies and to take advantage of tech-savvy Marines joining the Corps. The key, they said, will be to combine the technologies into an effective arsenal and then switch them up enough to keep adversaries on their heels.
"Warfare is human first and foremost, what has changed is technology," Lt. Col. Dan Schmitt, of the Marine Corps Warfighting Lab, said in April. 
"The difference is the human ability to combine the technology to create a dilemma for our adversary." 

Military.com:

You Might Also Read:

Electronic Warfare Development Rate:

Drones, Satellites And Cyber Warfare:

Cyber War Calls For A New Look US Soldier:

« WikiLeaks Reveal CIA Credentials Malware
Cyber Caliphate's Scorecard »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

Checkmarx

Checkmarx

Checkmarx provides state-of-the-art application security solutions with static code analysis software.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

Grupo CFI

Grupo CFI

Grupo CFI is the largest Spanish network of data protection and cybersecurity professionals.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

VIPRE Security Group

VIPRE Security Group

VIPRE Security Group is an award-winning global cybersecurity, privacy and data protection company.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Hacken

Hacken

Hacken provide a range of cybersecurity services including security assessments, blockchain security audits, and secure software development.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.