The Pentagon Is Busy Integrating Cyber Into Its Battle Plans

The US Department of Defense is continuing to ingrate cyber planning and effects into traditional military operations as Cyber Command nears elevation to a unified combatant command.

One critical step in this process has been the creation of cyber planning cells locally at the combatant command headquarters. DoD leaders now say they hope to have these teams fully staffed in 5 years.

These cells, known as cyber operations-integrated planning elements, will include small staffs to help better coordinate offensive and defensive cyber effects. They are necessary because combatant commands don’t necessarily have cyber skill sets or planners at the staff level to help with campaign planning.

As envisioned, the planning elements will work with combatant commands as a liaison of sorts forward from the remote cyber operators to integrate cyber into operations and contingency plans providing information on the types of capabilities cyber forces can provide.

These planning cells will be staffed by personnel from the service cyber components under a construct known as Joint Force Headquarters-Cyber.

JFHQ-Cyber is one of three headquarters elements of Cyber Command and provides planning, targeting, intelligence and cyber support to combatant commands they support.

Each of the heads of the various service cyber components are dual-hatted as commander of the various JFHQ-Cybers.

This provides a connective tissue of sorts between Cyber Command and the combatant commands.

During written congressional testimony March 13, Vice Adm. Michael Gilday, commander of 10th Fleet/Fleet Cyber Command, said his organization is in the process of standing up three planning elements.

While the JFHQ-C Fleet Cyber supports Pacific Command and Southern Command, Gilday said they are also standing up a planning element for US Forces Korea, a sub-unified command of Pacific Command designed to deter aggression and defend South Korea.

“These Elements will also fully integrate cyberspace into battle plans, ensuring timing and tempo are set by the commanders for use of cyberspace effects in the field based on their operational scheme of maneuver,” Gilday wrote. He added that they will be “working with our combatant commanders to project power in, from and through cyberspace.”

Maj. Gen. Loretta Reynolds, commander of Marine Corps Forces Cyberspace Command, during the same congressional hearing, said as part of its planning element in support of US Special Operations Command, they have hired civilians across the Special Operations Command enterprise who are providing cyber intelligence and planning support for joint cyber fires.

In addition to the five Marines at SOCOM headquarters, Reynolds wrote in prepared testimony, they began to build the planning elements across SOCOM organisations worldwide and look to complete the civilian hiring for a total 26 civilians by October.

Moreover, she wrote they are working within the Marine Corps to increase uniformed planning element staff with an increase of 13 Marines required to meet staffing goal by the end of FY20.

Gilday noted at Joint Service Academy Cybersecurity Summit March 20 at the Naval Academy that there’s much greater overall integration of cyber forces with traditional forces such as deploying carrier strike groups, amphibious readiness groups, our deploying Army brigades and Marine Expeditionary Units.

FifthDomain

You Might Also Read:

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks:

The Pentagon Puts Google’s AI To Use:

« Cyber Criminals Have Ingenious Money Laundering Methods
Australia’s Cybersecurity Adviser Calls For Privacy »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

PartnerRe

PartnerRe

PartnerRe provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

Torsion Information Security

Torsion Information Security

Torsion is an innovative information security and compliance engine, which runs either in the cloud or your data centre.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

CSIOS Corp.

CSIOS Corp.

At CSIOS we help our customers achieve and sustain information and cyberspace superiority through a full range of defensive and offensive cyberspace operations and cybersecurity consulting services.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

Cycurion

Cycurion

Cycurion is a global leading provider of Network Communications and Information Technology Security Solutions.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

Eleviant Tech (CTG Group)

Eleviant Tech (CTG Group)

Eleviant Tech (CTG Group) is a USA based digital transformation company with expertise in Mobile, Cloud, Web, IoT, AR, RPA, Cyberseurity and AI Technologies.

Layer 8 Security

Layer 8 Security

Layer 8 Security is a cybersecurity advisory, consulting, and technical services firm that arms businesses with practical compliance, risk management, and security program strategies.