US Marines Embrace Cyber Warfare

In the new age of 21st-century warfare, law enforcement US Marines will scour battlefields for the enemy's cellphones and forensic intelligence, drones will help infantry Marines land ashore out of sight of the adversary, and radio operators will use frequencies to disrupt the enemy's hacking abilities.

These innovations are part of a new command known as the 1st Marine Expeditionary Force's Information Group that on Thursday, July 6, made history at Camp Pendleton by becoming the first of its kind among the Corps' Marine expeditionary forces. 

The group's mission now is to win the war on the information battlefield and to decimate enemy capabilities in the electro-magnetic spectrum, said Col. Bobbi Shea, who has overseen the shift and commanded the group for the last two years.
Shea, recently, handed over command of the newly designated 1st MEF Information Group in a change of command ceremony aboard the base to Col. Dawn Alonso, who most recently served at Central Command and before that as commander for the 1st Intelligence Battalion.

At the ceremony, Shea, 51, was awarded the Legion of Merit for her leadership at 1st Marine Headquarters Group. Later, she was promoted to Brigadier General, making her one of only two active-duty female generals in the Marine Corps. She will go to work at the Pentagon in the office of Secretary of Defense James Mattis, who commanded the 1st Marine Expeditionary Force at Camp Pendleton in 2006.
"In the past, the group's primary mission has been moving and supporting Marines as they go forward to command forces in theater," Shea said. "Now, we're going to divest ourselves of the logistics mission and give it to a support battalion. Our headquarters will transform to a headquarters dedicated to enabling our commanders to fight and win in the information environment."

That will be accomplished, she said, by putting Marines trained in intelligence gathering and electronic warfare in closer contact with commanders and troops on the ground.
"This means degrading the enemy's ability to exploit the information environment, capitalising on social media and defending our abilities against cyber hacks we've become vulnerable to," Shea said. 
"We want to make sure our commanders and units in the battlefield can take advantage of those networks and tools we provide them. We want to synchronise and integrate all those capabilities across the battle space."
Shea pointed to such examples as the use of drones, law enforcement Marines picking up fingerprints or exploiting found cellphones on the battlefield, and imagery analysts gathering information from satellites.

Among the changes that are part of the transition are new Marine personnel, increased intelligence and cyber    space training, and a move to new facilities on the base.

While military officials called the re-designation a first at the Marine Expeditionary Force level, an increased focus on new technology and cyber warfare threats are among the Corps' broader changes, mandated by the Marine Corps Commandant to "modernize the force."

In April, Camp Pendleton held the Advanced Technology Exercise 2017, a collaborative technology expo conducted by the Department of the Navy. The inaugural event showcased dozens of emerging technologies to give Marines and sailors the upper hand in fighting the next generation of wars.

Marine Corps officials cited an urgency of the Marine Corps and Navy to move quickly in acquiring these technologies and to take advantage of tech-savvy Marines joining the Corps. The key, they said, will be to combine the technologies into an effective arsenal and then switch them up enough to keep adversaries on their heels.
"Warfare is human first and foremost, what has changed is technology," Lt. Col. Dan Schmitt, of the Marine Corps Warfighting Lab, said in April. 
"The difference is the human ability to combine the technology to create a dilemma for our adversary." 

Military.com:

You Might Also Read:

Electronic Warfare Development Rate:

Drones, Satellites And Cyber Warfare:

Cyber War Calls For A New Look US Soldier:

« WikiLeaks Reveal CIA Credentials Malware
Cyber Caliphate's Scorecard »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

Cybonet

Cybonet

Cybonet provides easy to deploy, flexible and scalable security solutions that empower organizations of all sizes to actively safeguard their networks in the face of today’s evolving threats.

Pindrop Security

Pindrop Security

Pindrop solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

ClosingLock

ClosingLock

ClosingLock is the leading provider of wire fraud prevention software for the real estate industry.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

SIEM Xpert

SIEM Xpert

SIEM Xpert is a leader in Cyber Security Trainings and services since 2015.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.

Vorlon

Vorlon

Vorlon's agentless patent-pending solution facilitates risk profiling of apps, and provides AI-driven behavioral analytics with response recommendations.

Couno

Couno

Couno is a trusted provider of IT support services throughout the UK and Europe.