United States Cyber Command

Last updated

United States Cyber Command
Seal of the United States Cyber Command.svg
Founded21 May 2010 (2010-05-21)
(13 years, 9 months ago)
Country United States
Type Unified combatant command and cyber force
Role Cyberwarfare
Part of U.S. Department of Defense
Garrison/HQ Fort George G. Meade, Maryland, U.S.
Nickname(s)"USCYBERCOM", "CYBERCOM"
Website www.cybercom.mil
Commanders
Commander Gen Timothy D. Haugh, USAF [1]
Deputy Commander LTG William J. Hartman, USA [2]
Executive Director Holly Baroody [3]
Senior Enlisted Leader CSM Sheryl D. Lyon, USA [4]

United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise which focus on securing cyberspace. [5]

Contents

USCYBERCOM was established as a Sub-Unified command under U.S. Strategic Command at the direction of Secretary of Defense Robert Gates on June 23, 2009 [6] at the National Security Agency (NSA) headquarters in Fort George G. Meade, Maryland. It cooperates with NSA networks and has been concurrently headed by the director of the National Security Agency since its inception. [7] While originally created with a defensive mission in mind, it has increasingly been viewed as an offensive force. [7] On 18 August 2017, it was announced that USCYBERCOM would be elevated to the status of a full and independent unified combatant command. [8] On 23 May 2023, it was announced that President Biden nominated Lt. Gen. Timothy Haugh to the Senate to be the next USCYBERCOM Commander. [9]

Mission statement

According to the US Department of Defense (DoD):

USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. [10] [11]

The text "9ec4c12949a4f31474f299058ce2b22a", located in the command's emblem, is the MD5 hash of their mission statement. [11]

The command is charged with pulling together existing cyberspace resources, creating synergies and synchronizing war-fighting effects to defend the information security environment. USCYBERCOM is tasked with centralizing command of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD's cyber expertise. [12] [13]

Organizational structure

Cyber teams

Since 2015, the U.S. Cyber Command added 133 new cyber teams. [14] The breakdown was:

Component Commands

EmblemCommandAcronymCommanderEstablishedHeadquartersSubordinate Commands
US Army Cyber Command SSI.png JFHQ-ARCYBER Emblem.png
United States Army Cyber Command
Joint Force Headquarters–Cyber [15]
ARCYBER / JFHQ–C Lt General Maria B. Barrett 1 October 2010 Fort Eisenhower, Georgia

*These Subordinates fall under United States Army Intelligence and Security Command, however Operational Control (OPCON) is given to ARCYBER for cyber-related effects.

Vector MARFORCYBER LOGO2.svg
Marine Corps Forces Cyberspace Command
Joint Force Headquarters–Cyber [16]
MARFORCYBER / JFHQ-C Major General Ryan P. Heritage 21 January 2010 Fort Meade, Maryland
Seal of the United States Fleet Cyber Command.png United States Tenth Fleet.png Joint Force Headquarters Cyber Fleet Cyber Command.png
U.S. Fleet Cyber Command/United States Tenth Fleet
Joint Force Headquarters–Cyber [17]
FLTCYBER / 10F / JFHQ–C Vice Admiral Craig A. Clapperton 29 January 2010 Fort Meade, Maryland
16th Air Force.png Air Forces Cyber.png Joint-forces-headquarters-cyber air force.png
Sixteenth Air Force / Air Forces Cyber
Joint Force Headquarters–Cyber [18]
16 AF (AFCYBER) / JFHQ–CLt General Kevin B. Kennedy Jr. 11 October 2019 JBSA-Lackland, Texas

Cyber National Mission Force

The Cyber National Mission Force (CNMF) was activated on January 27, 2014, as an element of Cyber Command. [19] [20] At inception the CNMF consisted of 21 teams, broken down into 13 National Mission Teams (NMT) and 8 National Support Teams (NST). [20] Today, the CNMF has expanded to 39 joint cyber teams consisting of over 2,000 service members and civilian members across the U.S. Armed Forces [20] On October 25, 2022, Defense Secretary Lloyd Austin authorized that the Cyber National Mission Force become a subordinate unified command underneath the United States Cyber Command. [21] Following this, on December 19, 2022, General Paul Nakasone presided over a ceremony to establish the CNMF with the new "sub-unified" command status. [21]

Major General William J. Hartman, United States Army has served as CNMF commander since August 2019.

The CNMF is one of three Cyber Command forces that would react to a cyber attack on the United States. The other two forces are the Cyber Combat Mission Force assigned to the operational control of individual U.S. combatant commanders, and the Cyber Protection Force that helps operate and defend the DODIN. [22]

CNMF is composed of cyber mission force teams across services that support the CNMF mission through their specific respective assignments: [23] [24]

The Cyber National Mission Force operates in both defensive and offensive cyber operations to carry out its missions of: U.S. election defense, counter-ransomware operations, global hunt operations, combating foreign malicious cyber actors, and providing support to national security operations. [25]

Global hunt operations began in 2018 as part of the "persistent engagement" strategy with the goal of looking for malicious cyber activity and vulnerabilities on significant networks. [26] Since its inception, the hunt operations have been requested and conducted in 18 countries and over 50 foreign networks. [26]

Standing joint task force

EmblemCommandAcronymCommanderEstablishedHeadquarters
JFHQ-DoDIN Emblem.jpg Joint Force Headquarters Department of Defense Information Network JFHQ-DoDIN Lt General Robert J. Skinner, USAF 2015 Fort Meade, Maryland
Joint Task Force Ares JTF-Ares2016

Background

An intention by the U.S. Air Force to create a 'cyber command' was announced in October 2006. [27] An Air Force Cyber Command was created in a provisional status in November 2006. However, in October 2008, it was announced the command would not be brought into permanent activation.

On 23 June 2009, the Secretary of Defense directed the Commander of U.S. Strategic Command (USSTRATCOM) to establish USCYBERCOM. In May 2010, General Keith Alexander outlined his views in a report for the United States House Committee on Armed Services subcommittee: [28] [29] [30] [31] [32]

My own view is that the only way to counteract both criminal and espionage activity online is to be proactive. If the U.S. is taking a formal approach to this, then that has to be a good thing. The Chinese are viewed as the source of a great many attacks on western infrastructure and just recently, the U.S. electrical grid. If that is determined to be an organized attack, I would want to go and take down the source of those attacks. The only problem is that the Internet, by its very nature, has no borders and if the U.S. takes on the mantle of the world's police; that might not go down so well.

Initial operational capability was attained on 21 May 2010. General Alexander was promoted to four-star rank, becoming one of United States's 38 four-star officers, and took charge of U.S. Cyber Command in a ceremony at Fort Meade that was attended by Commander of U.S. Central Command GEN David Petraeus, and Secretary of Defense Robert M. Gates. [33] [34] [35] [36] USCYBERCOM reached full operational capability on 31 October 2010. [37]

The command assumed responsibility for several existing organizations. The Joint Task Force for Global Network Operations (JTF-GNO) and the Joint Functional Component Command for Network Warfare (JFCC-NW) were absorbed by the command. The Defense Information Systems Agency, where JTF-GNO operated, provides technical assistance for network and information assurance to USCYBERCOM, and is moving its headquarters to Fort Meade. [38]

President Obama signed into law, on 23 December 2016, the National Defense Authorization Act (NDAA) for fiscal year (FY) 2017, which elevated USCYBERCOM to a unified combatant command. The FY 2017 NDAA also specified that the dual-hatted arrangement of the commander of USCYBERCOM will not be terminated until the Secretary of Defense and Chairman of the Joint Chiefs of Staff jointly certify that ending this arrangement will not pose risks to the military effectiveness of CYBERCOM that are unacceptable to the national security interests of the United States. [39]

Concerns

There are concerns that the Pentagon and NSA will overshadow any civilian cyber defense efforts. [40] There are also concerns on whether the command will assist in civilian cyber defense efforts. [41] According to Deputy Secretary of Defense William J. Lynn, the command "will lead day-to-day defense and protection of all DoD networks. It will be responsible for DoD's networks – the dot-mil world. Responsibility for federal civilian networks – dot-gov – stays with the Department of Homeland Security, and that's exactly how it should be." [42] Alexander notes, however, that if faced with cyber hostilities an executive order could expand Cyber Command's spectrum of operations to include, for instance, assisting the Department of Homeland Security in defense of their networks. [43]

Some military leaders claim that the existing cultures of the Army, Navy, and Air Force are fundamentally incompatible with that of cyber warfare. [44] Major Robert Costa (USAF) even suggested a sixth branch of the military, an Information (Cyber) Service with Title 10 responsibilities analogous to its sister services in 2002 noting:

While no one [IOP, Instrument of National Power] operates in a vacuum... Information increasingly underpins the other three [Diplomatic, Economic and Military], yet has proven to be the most vulnerable, even as US society becomes more dependent on it in peace, conflict, and war. To attack these centers of gravity, an adversary will use the weakest decisive point, ... the Information IOP. In addition, the other IOPs benefit from Unity of Effort--Constitutional balances of power ensure the Diplomatic and Military IOPs exercised by the President in concert with Congress are focused, while the Economic IOP achieves Unity of Action through international market controls and an international body of law. [In 2002], [t]he Information IOP however, [was] rudderless, lacking both Unity of Action and Unity of Command. [45]

Others have also discussed the creation of a cyber-warfare branch. [46] [47] Lieutenant Colonel Gregory Conti [48] and Colonel John "Buck" Surdu (chief of staff of the United States Army Research, Development and Engineering Command) stated that the three major services are properly positioned to fight kinetic wars, and they value skills such as marksmanship, physical strength, the ability to leap out of airplanes and lead combat units under enemy fire. [47]

Conti and Surdu reasoned, "Adding an efficient and effective cyber branch alongside the Army, Navy and Air Force would provide our nation with the capability to defend our technological infrastructure and conduct offensive operations. Perhaps more important, the existence of this capability would serve as a strong deterrent for our nation's enemies." [49]

In response to concerns about the military's right to respond to cyber attacks, General Alexander stated "The U.S. must fire back against cyber attacks swiftly and strongly and should act to counter or disable a threat even when the identity of the attacker is unknown" prior to his confirmation hearings before the United States Congress. This came in response to incidents such as a 2008 operation to take down a government-run extremist honeypot in Saudi Arabia. "Elite U.S. military computer specialists, over the objections of the CIA, mounted a cyberattack that dismantled the online forum". [50]

"The new U.S. Cyber Command needs to strike a balance between protecting military assets and personal privacy." stated Alexander, in a Defense Department release. If confirmed, Alexander said, his main focus will be on building capacity and capability to secure the networks and educating the public on the command's intent.

"This command is not about an effort to militarize cyber space," he said. "Rather, it's about safeguarding our military assets." [51]

In July 2011, Deputy Defense Secretary William Lynn announced in a conference that "We have, within Cyber Command, a full spectrum of capabilities, but the thrust of the strategy is defensive." "The strategy rests on five pillars, he said: treat cyber as a domain; employ more active defenses; support the Department of Homeland Security in protecting critical infrastructure networks; practice collective defense with allies and international partners; and reduce the advantages attackers have on the Internet." [52]

In 2013, USCYBERCOM held a classified exercise in which reserve officers (with extensive experience in their civilian cyber-security work) easily defeated active duty cyber warriors. [53] In 2015 Eric Rosenbach, the principal cyber adviser to Defense Secretary Ash Carter, said DoD was looking at alternatives to staffing with just active-duty military. [54] Beginning that year, USCYBERCOM added 133 teams (staffing out at 6,000 people), with the intent that at least 15% of the personnel would be reserve cyber operations airmen. [55] These new teams had achieved "initial operating capability" (IOC) as of 21 October 2016. Officials noted that IOC is not the same as combat readiness, but is the first step in that direction. [56]

President Barack Obama's Commission on Enhancing National Cybersecurity was formed to develop a plan for protecting cyberspace. The commission released a report in December 2016. The report made 16 major recommendations regarding the intertwining roles of the military, government administration and the private sector in providing cyber security. [57]

President Trump indicated that he wanted a full review of Cyber Command during his bid for presidency. [58] During his presidency, the Trump administration made Cyber Command a unified combatant command, and took other measures attempting to deter cyber attacks. However, the FBI reported that they logged a record number of complaints and economic losses in 2019, as cybercrime continued to grow. [59]

International effects and reactions

The creation of U.S. Cyber Command appears to have motivated other countries in this arena. In December 2009, South Korea announced the creation of a cyber warfare command. Reportedly, this was in response to North Korea's creation of a cyber warfare unit. [60] In addition, the British GCHQ has begun preparing a cyber force. [61] Furthermore, a shift in military interest in cyber warfare has motivated the creation of the first U.S. Cyber Warfare Intelligence Center. [62] In 2010, China introduced a department dedicated to defensive cyber war and information security in response to the creation of USCYBERCOM. [63]

Operations

In June 2019, Russia has conceded that it is "possible" its electrical grid was under cyberattack by the United States. [64] The New York Times reported that hackers from the U.S. Cyber Command planted malware potentially capable of disrupting the Russian electrical grid. [65]

Cyber command is using its 2021 exercise Cyber Flag 21–2 to improve its teams' tactics. [66] [67]

List of commanders

The commander of U.S. Cyber Command is a statutory office (10 U.S.C.   § 167b), and is held by a four-star general, or if the commander is a Navy officer, a four-star admiral.

No.CommanderTermService branch
PortraitNameTook officeLeft officeTerm length
1
General Keith B. Alexander in service uniform.jpg
Alexander, Keith B.General
Keith B. Alexander
(born 1951)
21 May 201028 March 20143 years, 311 days Mark of the United States Army.svg
U.S. Army
-
LtGen Jon M. Davis, USMC.jpg
Davis, Jon M.Lieutenant General
Jon M. Davis
Acting
29 March 20142 April 20144 days Emblem of the United States Marine Corps.svg
U.S. Marine Corps
2
Rogers 2018.jpg
Rogers, Michael S.Admiral
Michael S. Rogers
(born 1959)
3 April 20144 May 20184 years, 31 days Emblem of the United States Navy.svg
U.S. Navy
3
General Paul M. Nakasone (NSA).jpg
Nakasone Paul M.General
Paul M. Nakasone
(born 1963)
4 May 20182 February 20245 years, 270 days Mark of the United States Army.svg
U.S. Army
4
Gen Timothy D. Haugh.jpg
Haugh, Timothy D.General
Timothy D. Haugh
(born 1969)
2 February 2024Incumbent31 days Mark of the United States Air Force.svg
U.S. Air Force

See also

Further reading

Related Research Articles

The United States Armed Forces are the military forces of the United States. The armed forces consist of six service branches: the Army, Marine Corps, Navy, Air Force, Space Force, and Coast Guard. All six armed services are among the eight uniformed services of the United States.

<span class="mw-page-title-main">Information warfare</span> Battlespace use and management of information and communication technology

Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from cyberwarfare that attacks computers, software, and command control systems. Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is.

<span class="mw-page-title-main">United States Strategic Command</span> Unified combatant command based in Nebraska

The United States Strategic Command (USSTRATCOM) is one of the eleven unified combatant commands in the United States Department of Defense. Headquartered at Offutt Air Force Base, Nebraska, USSTRATCOM is responsible for strategic nuclear deterrence, global strike, and operating the Defense Department's Global Information Grid. It also provides a host of capabilities to support the other combatant commands, including integrated missile defense; and global command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR). This command exists to give "national leadership a unified resource for greater understanding of specific threats around the world and the means to respond to those threats rapidly".

<span class="mw-page-title-main">Joint Functional Component Command – Network Warfare</span> Military unit

The Joint Functional Component Command – Network Warfare (JFCC-NW) at Fort Meade, Maryland was a subordinate component command of United States Strategic Command (USSTRATCOM) active from 2005 to 2010. It was responsible for coordinating offensive computer network operations for the United States Department of Defense (DoD). JFCC-NW was created in 2005. It was merged into United States Cyber Command in October 2010.

<span class="mw-page-title-main">Global Information Grid</span> Communications project of the United States Department of Defense

The Global Information Grid (GIG) is a network of information transmission and processing maintained by the United States Department of Defense. More descriptively, it is a worldwide network of information transmission, of associated processes, and of personnel serving to collect, process, safeguard, transmit, and manage this information. It is an all-encompassing communications project of the United States Department of Defense. The GIG makes this immediately available to military personnel, to those responsible for military politics, and for support personnel. It includes all infrastructure, bought or loaned, of communications, electronics, informatics, and security. It is the most visible manifestation of network-centric warfare. It is the combination of technology and human activity that enables warfighters to access information on demand.

<span class="mw-page-title-main">Cyberwarfare</span> Use of digital attacks against a nation

Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare.

<span class="mw-page-title-main">United States Army Intelligence and Security Command</span> U.S. Army direct reporting unit

The United States Army Intelligence and Security Command (INSCOM) is a direct reporting unit that conducts intelligence, security, and information operations for United States Army commanders, partners in the Intelligence Community, and national decision-makers. INSCOM is headquartered at Fort Belvoir, Virginia.

<span class="mw-page-title-main">1st Information Operations Command (Land)</span> US Army Cyber Command unit

The 1st Information Operations Command (Land), formerly the Land Information Warfare Activity Information Dominance Center (LIWA/IDC), is an information operations unit under the operational control of U.S. Army Cyber Command (ARCYBER) and headquartered at Fort Belvoir, Virginia.

A cyber force is a military branch of a nation's armed forces that conducts military operations in cyberspace and cyberwarfare. The world's first independent cyber force was the People's Liberation Army Strategic Support Force, which was established in 2015 and also serves as China's space force. As of 2022, the world's only independent cyber forces are the PLA Strategic Support Force, the German Cyber and Information Domain Service, Norwegian Cyber Defence Force, and the Singapore Digital and Intelligence Service.

Proactive cyber defense, means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defense can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or deterring an attack or a threat's preparation to attack, either pre-emptively or in self-defence.

<span class="mw-page-title-main">United States Army Cyber Command</span> Information dominance and cyberspace

The U.S. Army Cyber Command (ARCYBER) conducts information dominance and cyberspace operations as the Army service component command of United States Cyber Command.

Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States is highly dependent on the Internet and therefore greatly exposed to cyber attacks. At the same time, the United States has substantial capabilities in both defense and power projection thanks to comparatively advanced technology and a large military budget. Cyber warfare presents a growing threat to physical systems and infrastructures that are linked to the internet. Malicious hacking from domestic or foreign enemies remains a constant threat to the United States. In response to these growing threats, the United States has developed significant cyber capabilities.

<span class="mw-page-title-main">Marine Corps Forces Cyberspace Command</span> Cyber warfare command of the U.S. Marine Corps

The U.S. Marine Corps Forces Cyberspace Command is a functional formation of the United States Marine Corps to protect critical infrastructure from cyberattack. Marine Corps Forces Cyberspace Command is the Marine Corps component to U.S. Cyber Command. It comprises a command element, the Marine Corps Cyber Operations Group, and the Marine Corps Cyber Warfare Group, a total of approximately 800 personnel. MARFORCYBER was established on January 21, 2010 under the command of LtGen George J. Flynn,. As of 7 July 2021, MajGen Ryan P. Heritage is in command.

<span class="mw-page-title-main">Military-digital complex</span> Link between militaries and cyberwarfare

The military-digital complex (MDC) is the militarization of cyber operations by governments and corporations, often through monetary relationships between computer programmers in private companies and the military to combat the threat of cyber terrorism and warfare. Cyber operations since 2000 have increased dramatically, with the recent branch of the US Strategic Command the United States Cyber Command. Cyber operations has been defined by the Washington Post as,

The 2011 U.S. Department of Defense Strategy for Operating in Cyberspace is a formal assessment of the challenges and opportunities inherent in increasing reliance on cyberspace for military, intelligence, and business operations. Although the complete document is classified and 40 pages long, this 19 page summary was released in July 2011 and explores the strategic context of cyberspace before describing five “strategic initiatives” to set a strategic approach for DoDʼs cyber mission.

<span class="mw-page-title-main">U.S. Fleet Cyber Command</span> U.S. Navy operating force

The U.S. Fleet Cyber Command is an operating force of the United States Navy responsible for the Navy's information network operations, offensive and defensive cyber operations, space operations and signals intelligence. It was created in January 2010 "to deter and defeat aggression and to ensure freedom of action to achieve military objectives in and through cyberspace". U.S. Tenth Fleet was simultaneously reactivated as its force provider. Since it was founded, the command has grown into an operational force composed of more than 16,000 active and reserve sailors and civilians organized into 27 active commands, 40 Cyber Mission Force units, and 27 reserve commands around the world.

Presidential Policy Directive 20 (PPD-20), provides a framework for U.S. cybersecurity by establishing principles and processes. Signed by President Barack Obama in October 2012, this directive supersedes National Security Presidential Directive NSPD-38. Integrating cyber tools with those of national security, the directive complements NSPD-54/Homeland Security Presidential Directive HSPD-23.

<span class="mw-page-title-main">Joint Cyberspace Command</span>

The Joint Cyberspace Command (MCCE), known until 2020 as Joint Cyber-Defence Command (MCCD), is a Spanish cyberspace service of the Defence Staff responsible for planning and carrying out the actions related to cyber defence in networks and information and telecommunications systems of the Ministry of Defense or others that might be entrusted, as well as contributing to the adequate response in cyberspace to threats or aggressions that may affect to the National Defense.

The Third Department (3PLA) of the People's Liberation Army Joint Staff Department was responsible for China's military computer network operations (CNO) and signals intelligence (SIGINT) operations. It has been compared to the United States' National Security Agency or British GCHQ. In 2016, its functions were transferred to the Network Systems Department of the PLA Strategic Support Force.

References

  1. "Gen. Timothy D. Haugh, USAF". U.S. Cyber Command. Retrieved 3 February 2024.
  2. "Lt. Gen. William J. Hartman, USA". U.S. Cyber Command. Retrieved 19 January 2024.
  3. "Holly Baroody". U.S. Cyber Command. Retrieved 30 April 2023.
  4. "Command Sergeant Major Sheryl D. Lyon". U.S. Department of Defense. Retrieved 30 September 2023.
  5. "What is U.S. Cyber Command (USCYBERCOM)? - Definition from Techopedia". Techopedia.com. 7 November 2012. Retrieved 15 February 2022.
  6. "Memorandum" (PDF). nsarchive2.gwu.edu. Retrieved 3 March 2024.
  7. 1 2 Nakashima, Ellen (13 September 2016). "Obama to be urged to split cyberwar command from NSA". The Washington Post . Archived from the original on 14 September 2016.
  8. Office of the Press Secretary. "Statement by President Donald J. Trump on the Elevation of Cyber Command". whitehouse.gov via National Archives.
  9. Dept of the USAF (23 May 2023). "Biden nominates Lt. Gen. Timothy Haugh to lead NSA, Cyber Command". politico.com via Politico.
  10. "Cyber Command Fact Sheet". U.S. Department of Defense. 21 May 2010. Archived from the original on 16 April 2014. Retrieved 16 April 2014.
  11. 1 2 Jelinek, Pauline (8 July 2010). "A code you can hack: On CYBERCOM's logo". Marine Corps Times. Associated Press. Archived from the original on 15 July 2010. Retrieved 8 July 2010.
  12. U.S. Department of Defense, Cyber Command Fact Sheet, 21 May 2010
  13. Mazzetti, Mark; Sanger, David E. (12 March 2013). "Security Chief Says Computer Attacks Will Be Met". The New York Times.
  14. "The Department of Defense Cyber Strategy". United States Department of Defense. October 2016. Archived from the original on 4 November 2016.
  15. "ARCYBER Organization".
  16. "MARFORCYBER Units".
  17. "US Navy Fleet Cyber Command".
  18. "16th Air Force Units".
  19. Pomerleau, Mark (20 December 2022). "Cyber National Mission Force Declared Sub-Unifed Command". DefenseScoop News.
  20. 1 2 3 "The Evolution of Cyber: Newest Subordinate Unified Command is Nation's Joint Cyber Force". U.S. Cyber Command. Retrieved 27 February 2023.
  21. 1 2 "Cyber National Mission Force elevated in fight against foreign hackers". The Record from Recorded Future News. 19 December 2022. Retrieved 27 February 2023.
  22. DOD Fact Sheet: Cyber Mission Force U.S. Army Cyber Command. Retrieved 23 July 2022. PD-icon.svg This article incorporates text from this source, which is in the public domain .
  23. Cyber Mission Force Achieves Full Operational Capability United States Department of Defense. Retrieved 23 July 2022. PD-icon.svg This article incorporates text from this source, which is in the public domain .
  24. Here's How DOD Organizes its Cyber Warriors C4ISRNet. Retrieved 23 July 2022.
  25. "The Cyber National Mission Force Is the Newest Military Command". MyBaseGuide. Retrieved 27 February 2023.
  26. 1 2 "U.S. Cyber Command completes defensive cyber mission in Croatia". CyberScoop. 18 August 2022. Retrieved 27 February 2023.
  27. John C.K. Daly (9 October 2006). "US Air Force Prepares For Cyber Warfare". Space Daily.
  28. "US needs 'digital warfare force'". BBC News. 5 May 2009. Retrieved 10 October 2017.
  29. "preparedness and security news - DC Summit Convenes Military 'Cyber Warriors'". Homeland Security Today. 18 November 2009. Archived from the original on 11 July 2010. Retrieved 10 July 2010.
  30. "News Release: Flag and General Officer Announcements". Department of Defense. 12 March 2009. Retrieved 10 July 2010.
  31. "Cyberwar Commander Survives Senate Hearing, Threat Level". Wired.com. 15 April 2010. Retrieved 10 July 2010.
  32. "U.S. Senate: Legislation & Records Home > Nominations Confirmed (Non-Civilian)". U.S. Senate. Retrieved 10 July 2010.
  33. "Photos : News Photo". Defense.gov. 21 May 2010. Retrieved 10 July 2010.
  34. "DoD Cyber Command is officially online, 21 May 2010, Army Times" . Retrieved 27 April 2021.
  35. "Military Mulls Joint Cyber Defense". Govinfosecurity.com. Retrieved 10 July 2010.
  36. "Fort Meade cyber security center sought (www.HometownGlenBurnie.com - The Maryland Gazette)". HometownGlenBurnie.com. Archived from the original on 14 July 2010. Retrieved 10 July 2010.
  37. "Release". www.defense.gov. Retrieved 27 April 2021.
  38. Jackson, William (24 June 2009). "DoD creates Cyber Command as U.S. Strategic Command subunit - Federal Computer Week". Fcw.com. Retrieved 10 July 2010.
  39. "S. 2943; National Defense Authorization Act for Fiscal Year 2017" (PDF). congress.gov. Retrieved 18 June 2017.
  40. Monroe, John S. (2 July 2009). "Cyber Command: So much still to know". Federal Computer Week (FCW). 1105 Media, Inc. Retrieved 22 November 2016.
  41. "U.S Cyber Command Goes Online". Democracy Arsenal. 1 October 2009. Retrieved 22 November 2016.
  42. Lynn, William J. (12 November 2009). "Remarks at the Defense Information Technology Acquisition Summit". United States Department of Defense. Archived from the original on 15 April 2010.
  43. Shachtman, Noah (23 September 2010). "Military's Cyber Commander Swears: "No Role" in Civilian Networks"". Brookings. The Brookings Institution. Archived from the original on 7 November 2016.
  44. Conti, Gregory; Easterly, Jen (29 July 2010). "Recruiting, Development, and Retention of Cyber Warriors Despite an Inhospitable Culture". Small Wars Journal. Archived from the original on 7 January 2011. Retrieved 29 July 2010.
  45. Costa, Robert (April 2002). "Supporting the Information-Centric 2001 Quadrennial Defense Review: The Case for an Information Service". Maxwell Air Force Base, Alabama: Air Command and Staff College, Air University. p. 261. Archived from the original on 1 December 2012.
  46. Chabrow, Eric (22 April 2009). "Report: Cybersecurity Military Command Coming". GovInfoSecurity (Information Security Media Group). Archived from the original on 24 December 2015.
  47. 1 2 Conti, Gregory; Surdu, John "Buck" (2009). "Army, Navy, Air Force, Cyber: Is it Time for a Cyberwarfare Branch of the Military" (PDF). Information Assurance Newsletter. Vol. 12, no. 1. pp. 14–18. Archived (PDF) from the original on 11 June 2016.
  48. At the time, Lieutenant Colonel Gregory Conti was a United States Military Academy Professor and Director of West Point's Cyber Security Research Center.
  49. Chabrow, Eric (25 March 2009). "New Cyber Warfare Branch Proposed: Time Ripe to Create Fourth Branch of Military". GovInfoSecurity (Information Security Media Group). Archived from the original on 22 December 2015.
  50. Nakashima, Ellen (19 March 2010). "Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies". The Washington Post. Retrieved 10 July 2010.
  51. Daniel, Lisa (15 April 2010). "Nominee Urges Government, Private Sector Cooperation". DoD News. United States Department of Defense. Archived from the original on 14 July 2015.
  52. Parrish, Karen (14 July 2011). "News Article: Lynn: Cyber Strategy's Thrust is Defensive". DoD News. United States Department of Defense. Archived from the original on 14 July 2015.
  53. Tilghman, Andrew (4 August 2014). "In supersecret cyberwar game, civilian-sector techies pummel active-duty cyberwarriors". www.armytimes.com. Gannett Government Media. Retrieved 6 August 2014.
  54. Baldor, Lolita C. (14 April 2015). "Pentagon eyes recruiting cyber talent through National Guard". Military Times. Associated Press. Archived from the original on 28 January 2016.
  55. Pawlyk, Oriana K. (3 January 2015). "Calling up the Reserves: Cyber mission is recruiting". Air Force Times. Sightline Media Group. Retrieved 5 November 2016.
  56. "All Cyber Mission Force Teams Achieve Initial Operating Capability". United States Cyber Command, United States Department of Defense. 24 October 2016. Archived from the original on 28 October 2016.
  57. Rockwell, Mark (21 November 2016). "Cyber panel closes in on final recommendations". Federal Computer Week (FCW). 1105 Media, Inc. Retrieved 22 November 2016.
  58. Costello, John (10 November 2016). "Overview of President-Elect Donald Trump's Cyber Policy". Flashpoint. Archived from the original on 22 November 2016.
  59. Fidler, David (2 December 2020). "President Trump's Legacy on Cyberspace Policy". CFR. Archived from the original on 11 May 2021.
  60. "Cyber Warfare Command to Be Launched in January". Koreatimes.co.kr. December 2009. Retrieved 10 July 2010.
  61. Clark, Colin (29 June 2009). "StratCom Plows Ahead on Cyber". DoD Buzz. Retrieved 10 July 2010.
  62. "Construction begins on first cyber warfare intelligence center". Af.mil. Archived from the original on 30 June 2012. Retrieved 10 July 2010.
  63. Branigan, Tania (22 July 2010). "Chinese army to target cyber war threat". The Guardian. London. Retrieved 25 July 2010.
  64. "US and Russia clash over power grid 'hack attacks". BBC News. 18 June 2019.
  65. "How Not To Prevent a Cyberwar With Russia". Wired . 18 June 2019.
  66. Pomerleau, Mark (23 June 2021). "US Cyber Command exercise will help shape new tactics for changing threats". C4ISRNet.
  67. Mark Pomerleau (25 May 2021) US Army emphasizes ‘information advantage’ "five pillars of information advantage: enable decision-making, protect friendly information, inform and educate domestic audiences, inform and influence international audiences, and conduct information warfare"