The Pentagon Is Busy Integrating Cyber Into Its Battle Plans

The US Department of Defense is continuing to ingrate cyber planning and effects into traditional military operations as Cyber Command nears elevation to a unified combatant command.

One critical step in this process has been the creation of cyber planning cells locally at the combatant command headquarters. DoD leaders now say they hope to have these teams fully staffed in 5 years.

These cells, known as cyber operations-integrated planning elements, will include small staffs to help better coordinate offensive and defensive cyber effects. They are necessary because combatant commands don’t necessarily have cyber skill sets or planners at the staff level to help with campaign planning.

As envisioned, the planning elements will work with combatant commands as a liaison of sorts forward from the remote cyber operators to integrate cyber into operations and contingency plans providing information on the types of capabilities cyber forces can provide.

These planning cells will be staffed by personnel from the service cyber components under a construct known as Joint Force Headquarters-Cyber.

JFHQ-Cyber is one of three headquarters elements of Cyber Command and provides planning, targeting, intelligence and cyber support to combatant commands they support.

Each of the heads of the various service cyber components are dual-hatted as commander of the various JFHQ-Cybers.

This provides a connective tissue of sorts between Cyber Command and the combatant commands.

During written congressional testimony March 13, Vice Adm. Michael Gilday, commander of 10th Fleet/Fleet Cyber Command, said his organization is in the process of standing up three planning elements.

While the JFHQ-C Fleet Cyber supports Pacific Command and Southern Command, Gilday said they are also standing up a planning element for US Forces Korea, a sub-unified command of Pacific Command designed to deter aggression and defend South Korea.

“These Elements will also fully integrate cyberspace into battle plans, ensuring timing and tempo are set by the commanders for use of cyberspace effects in the field based on their operational scheme of maneuver,” Gilday wrote. He added that they will be “working with our combatant commanders to project power in, from and through cyberspace.”

Maj. Gen. Loretta Reynolds, commander of Marine Corps Forces Cyberspace Command, during the same congressional hearing, said as part of its planning element in support of US Special Operations Command, they have hired civilians across the Special Operations Command enterprise who are providing cyber intelligence and planning support for joint cyber fires.

In addition to the five Marines at SOCOM headquarters, Reynolds wrote in prepared testimony, they began to build the planning elements across SOCOM organisations worldwide and look to complete the civilian hiring for a total 26 civilians by October.

Moreover, she wrote they are working within the Marine Corps to increase uniformed planning element staff with an increase of 13 Marines required to meet staffing goal by the end of FY20.

Gilday noted at Joint Service Academy Cybersecurity Summit March 20 at the Naval Academy that there’s much greater overall integration of cyber forces with traditional forces such as deploying carrier strike groups, amphibious readiness groups, our deploying Army brigades and Marine Expeditionary Units.

FifthDomain

You Might Also Read:

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks:

The Pentagon Puts Google’s AI To Use:

« Cyber Criminals Have Ingenious Money Laundering Methods
Australia’s Cybersecurity Adviser Calls For Privacy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

Yokogawa Electric

Yokogawa Electric

Yokogawa is an electrical engineering company providing measurement, control, and information technologies including industrial cyber security.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

Neudomains

Neudomains

Neudomains is a Corporate Domain Name Management and Brand Protection Online Specialist. One of the world's top providers of online brand protection and enforcement.

Australian Cyber Collaboration Centre (Aus3C)

Australian Cyber Collaboration Centre (Aus3C)

The Australian Cyber Collaboration Centre (Aus3C) is committed to building cyber capacity and securing Australia's digital landscape.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

CyberForceHQ

CyberForceHQ

CyberForce helps cyber security professionals take real-world tests, get ranked and get paid better. It's that simple.