US Marines Embrace Cyber Warfare

In the new age of 21st-century warfare, law enforcement US Marines will scour battlefields for the enemy's cellphones and forensic intelligence, drones will help infantry Marines land ashore out of sight of the adversary, and radio operators will use frequencies to disrupt the enemy's hacking abilities.

These innovations are part of a new command known as the 1st Marine Expeditionary Force's Information Group that on Thursday, July 6, made history at Camp Pendleton by becoming the first of its kind among the Corps' Marine expeditionary forces. 

The group's mission now is to win the war on the information battlefield and to decimate enemy capabilities in the electro-magnetic spectrum, said Col. Bobbi Shea, who has overseen the shift and commanded the group for the last two years.
Shea, recently, handed over command of the newly designated 1st MEF Information Group in a change of command ceremony aboard the base to Col. Dawn Alonso, who most recently served at Central Command and before that as commander for the 1st Intelligence Battalion.

At the ceremony, Shea, 51, was awarded the Legion of Merit for her leadership at 1st Marine Headquarters Group. Later, she was promoted to Brigadier General, making her one of only two active-duty female generals in the Marine Corps. She will go to work at the Pentagon in the office of Secretary of Defense James Mattis, who commanded the 1st Marine Expeditionary Force at Camp Pendleton in 2006.
"In the past, the group's primary mission has been moving and supporting Marines as they go forward to command forces in theater," Shea said. "Now, we're going to divest ourselves of the logistics mission and give it to a support battalion. Our headquarters will transform to a headquarters dedicated to enabling our commanders to fight and win in the information environment."

That will be accomplished, she said, by putting Marines trained in intelligence gathering and electronic warfare in closer contact with commanders and troops on the ground.
"This means degrading the enemy's ability to exploit the information environment, capitalising on social media and defending our abilities against cyber hacks we've become vulnerable to," Shea said. 
"We want to make sure our commanders and units in the battlefield can take advantage of those networks and tools we provide them. We want to synchronise and integrate all those capabilities across the battle space."
Shea pointed to such examples as the use of drones, law enforcement Marines picking up fingerprints or exploiting found cellphones on the battlefield, and imagery analysts gathering information from satellites.

Among the changes that are part of the transition are new Marine personnel, increased intelligence and cyber    space training, and a move to new facilities on the base.

While military officials called the re-designation a first at the Marine Expeditionary Force level, an increased focus on new technology and cyber warfare threats are among the Corps' broader changes, mandated by the Marine Corps Commandant to "modernize the force."

In April, Camp Pendleton held the Advanced Technology Exercise 2017, a collaborative technology expo conducted by the Department of the Navy. The inaugural event showcased dozens of emerging technologies to give Marines and sailors the upper hand in fighting the next generation of wars.

Marine Corps officials cited an urgency of the Marine Corps and Navy to move quickly in acquiring these technologies and to take advantage of tech-savvy Marines joining the Corps. The key, they said, will be to combine the technologies into an effective arsenal and then switch them up enough to keep adversaries on their heels.
"Warfare is human first and foremost, what has changed is technology," Lt. Col. Dan Schmitt, of the Marine Corps Warfighting Lab, said in April. 
"The difference is the human ability to combine the technology to create a dilemma for our adversary." 

Military.com:

You Might Also Read:

Electronic Warfare Development Rate:

Drones, Satellites And Cyber Warfare:

Cyber War Calls For A New Look US Soldier:

« WikiLeaks Reveal CIA Credentials Malware
Cyber Caliphate's Scorecard »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Caliber Security Partners

Caliber Security Partners

Caliber Security Partners is a full-service information security company, with a wide range of security services for clients with varying levels of security maturity.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

Cyber Guards

Cyber Guards

Cyber Guards provide comprehensive, turn-key cyber security programs for small and mid-size business for about the cost of one full-time cybersecurity hire.