United States Cyber Command

United States Cyber Command
Emblem of U.S. Cyber Command
Active 23 June 2009–present
Country  United States of America
Type Unified Combatant Command
Cyber force
Role Cyberwarfare
Part of Department of Defense
Garrison/HQ Fort George G. Meade, Maryland
General Paul M. Nakasone, USA

United States Cyber Command (USCYBERCOM) is one of ten unified commands of the United States Department of Defense. It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise.

USCYBERCOM was created in 2009 at the National Security Agency (NSA) headquarters in Fort George G. Meade, Maryland. It cooperates with NSA networks and has been concurrently headed by the Director of the National Security Agency since its inception.[1] While originally created with a defensive mission in mind, it has increasingly been viewed as an offensive force.[1] On 18 August 2017, it was announced that USCYBERCOM would be elevated to the status of a full and independent Unified Combatant Command.[2] This elevation occurred on 4 May 2018.

Mission statement

According to the US Department of Defense (DoD), USCYBERCOM "plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."[3]

The text "9ec4c12949a4f31474f299058ce2b22a", located in the command's emblem, is the MD5 hash of their mission statement.[4]

The command is charged with pulling together existing cyberspace resources, creating synergies and synchronizing war-fighting effects to defend the information security environment. USCYBERCOM is tasked with centralizing command of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD's cyber expertise.[5][6]


USCYBERCOM is an armed forces unified command under Department of Defense (DoD).

Service components

U.S. Cyber Command is composed of several service components, units from military services who will provide Joint services to Cyber Command.

Military specialties

These are the known military specialties directly involved with cyber. Service members enlisted under these specialties may be assigned to their respective Cybercommand Service Component Command.

  • US Army - 17A Cyber Operations Officer,[15] 170A Cyber Operations Technician,[16] 17C enlisted Cyber Operations Specialists[15]
  • US Navy - CTN Cryptologic Technician Networks [17]
  • US Air Force - 1B4X1 (Enlisted) - Cyberspace Warfare Operations - (Not open to first term airmen) & 17S (Officer)[18]
  • US Marine Corps - 0651 Marine Cyber Network Operator and 2611 Cryptologic Digital Network Operator/Analyst[19]

Cyber teams

In 2015 the U.S. Cyber Command added 133 new cyber teams.[20] The breakdown was:

  • Thirteen National Mission Teams to defend against broad cyberattacks
  • Sixty-eight Cyber Protection Teams to defend priority DoD networks and systems against priority threats
  • Twenty-seven Combat Mission Teams to provide integrated cyberspace attacks in support of operational plans and contingency operations
  • Twenty-five Support Teams to provide analytic and planning support


An intention by the U.S. Air Force to create a 'cyber command' was announced in October 2006.[21] An Air Force Cyber Command was created in a provisional status in November 2006. However, in October 2008, it was announced the command would not be brought into permanent activation.

On 23 June 2009, the Secretary of Defense directed the Commander of U.S. Strategic Command (USSTRATCOM) to establish USCYBERCOM. In May 2010, General Keith Alexander outlined his views in a report for the United States House Committee on Armed Services subcommittee:[22][23][24][25][26]

My own view is that the only way to counteract both criminal and espionage activity online is to be proactive. If the U.S. is taking a formal approach to this, then that has to be a good thing. The Chinese are viewed as the source of a great many attacks on western infrastructure and just recently, the U.S. electrical grid. If that is determined to be an organized attack, I would want to go and take down the source of those attacks. The only problem is that the Internet, by its very nature, has no borders and if the U.S. takes on the mantle of the world's police; that might not go down so well.

Initial operational capability was attained on 21 May 2010. General Alexander was promoted to four-star rank, becoming one of 38 US Generals, and took charge of U.S. Cyber Command in a ceremony at Fort Meade that was attended by Commander of U.S. Central Command GEN David Petraeus, and Secretary of Defense Robert M. Gates.[27][28][29][30] USCYBERCOM reached full operational capability on 31 October 2010.[31]

The command assumed responsibility for several existing organizations. The Joint Task Force for Global Network Operations (JTF-GNO) and the Joint Functional Component Command for Network Warfare (JFCC-NW) were absorbed by the command. The Defense Information Systems Agency, where JTF-GNO operated, provides technical assistance for network and information assurance to USCYBERCOM, and is moving its headquarters to Ft. Meade.[32]

President Obama signed into law, on 23 December 2016, the National Defense Authorization Act (NDAA) for fiscal year (FY) 2017, which elevated USCYBERCOM to a unified combatant command. The FY 2017 NDAA also specified that the dual-hatted arrangement of the commander of USCYBERCOM will not be terminated until the Secretary of Defense and Chairman of the Joint Chiefs of Staff jointly certify that ending this arrangement will not pose risks to the military effectiveness of CYBERCOM that are unacceptable to the national security interests of the United States.[33]


There are concerns that the Pentagon and NSA will overshadow any civilian cyber defense efforts.[34] There are also concerns on whether the command will assist in civilian cyber defense efforts.[35] According to Deputy Secretary of Defense William J. Lynn, the command "will lead day-to-day defense and protection of all DoD networks. It will be responsible for DoD's networks – the dot-mil world. Responsibility for federal civilian networks – dot-gov – stays with the Department of Homeland Security, and that's exactly how it should be."[36] Alexander notes, however, that if faced with cyber hostilities an executive order could expand Cyber Command's spectrum of operations to include, for instance, assisting the Department of Homeland Security in defense of their networks.[37]

Some military leaders claim that the existing cultures of the Army, Navy, and Air Force are fundamentally incompatible with that of cyber warfare.[38] Major Robert Costa (USAF) even suggested a sixth branch of the military, an Information (Cyber) Service with Title 10 responsibilities analogous to its sister services in 2002 noting,

While no one [Instrument of National Power] operates in a vacuum..., Information increasingly underpins the other three [Diplomatic, Economic and Military], yet has proven to be the most vulnerable, even as US society becomes more dependent on it in peace, conflict, and war. To attack these centers of gravity, an adversary will use the weakest decisive point, ...the Information IOP. In addition, the other IOPs benefit from Unity of Effort--Constitutional balances of power ensure the Diplomatic and Military IOPs exercised by the President in concert with Congress are focused, while the Economic IOP achieves Unity of Action through international market controls and an international body of law. [In 2002], [t]he Information IOP however, [was] rudderless, lacking both Unity of Action and Unity of Command.[39]

Others have also discussed the creation of a cyber-warfare branch.[40][41] Lieutenant Colonel Gregory Conti[42] and Colonel John "Buck" Surdu (chief of staff of the United States Army Research, Development and Engineering Command) stated that the three major services are properly positioned to fight kinetic wars, and they value skills such as marksmanship, physical strength, the ability to leap out of airplanes and lead combat units under enemy fire.[41]

Conti and Surdu reasoned, "Adding an efficient and effective cyber branch alongside the Army, Navy and Air Force would provide our nation with the capability to defend our technological infrastructure and conduct offensive operations. Perhaps more important, the existence of this capability would serve as a strong deterrent for our nation's enemies."[43]

In response to concerns about the military's right to respond to cyber attacks, General Alexander stated "The U.S. must fire back against cyber attacks swiftly and strongly and should act to counter or disable a threat even when the identity of the attacker is unknown" prior to his confirmation hearings before the United States Congress. This came in response to incidents such as a 2008 operation to take down a government-run extremist honeypot in Saudi Arabia. "Elite U.S. military computer specialists, over the objections of the CIA, mounted a cyberattack that dismantled the online forum".[44]

"The new U.S. Cyber Command needs to strike a balance between protecting military assets and personal privacy." stated Alexander, in a Defense Department release. If confirmed, Alexander said, his main focus will be on building capacity and capability to secure the networks and educating the public on the command's intent.

"This command is not about an effort to militarize cyber space," he said. "Rather, it's about safeguarding our military assets."[45]

In July 2011, Deputy Defense Secretary William Lynn announced in a conference that "We have, within Cyber Command, a full spectrum of capabilities, but the thrust of the strategy is defensive." "The strategy rests on five pillars, he said: treat cyber as a domain; employ more active defenses; support the Department of Homeland Security in protecting critical infrastructure networks; practice collective defense with allies and international partners; and reduce the advantages attackers have on the Internet." [46]

In 2013, USCYBERCOM held a classified exercise in which reserve officers (with extensive experience in their civilian cyber-security work) easily defeated active duty cybermen.[47] In 2015 Eric Rosenbach, the principal cyber adviser to Defense Secretary Ash Carter, said DoD was looking at alternatives to staffing with just active-duty military.[48] Beginning that year, USCYBERCOM added 133 teams (staffing out at 6,000 people), with the intent that at least 15% of the personnel would be reserve cyber operations airmen.[49] These new teams had achieved "initial operating capability" (IOC) as of 21 October 2016. Officials noted that IOC is not the same as combat readiness, but is the first step in that direction.[50]

President Barack Obama's Commission on Enhancing National Cybersecurity is expected to release its substantial report prior to 20 January 2017. The report will make recommendations regarding the intertwining roles of the military, government administration and the private sector in providing cyber security.[51] Incoming President Trump has indicated that he wants a full review of Cyber Command.[52]

International effects and reactions

The creation of U.S. Cyber Command appears to have motivated other countries in this arena. In December 2009, South Korea announced the creation of a cyber warfare command. Reportedly, this is in response to North Korea's creation of a cyber warfare unit.[53] In addition, the British GCHQ has begun preparing a cyber force.[54] Furthermore, a shift in military interest in cyber warfare has motivated the creation of the first U.S. Cyber Warfare Intelligence Center.[55] In 2010, China introduced a department dedicated to defensive cyber war and information security in response to the creation of USCYBERCOM.[56]


List of Cyber Command commanders
No. Image Rank Name Service Start of Term End of Term
1. GEN Keith B. Alexander USA 21 May 2010 28 March 2014
(Acting) LtGen Jon M. Davis USMC 29 March 2014 2 April 2014
2. ADM Michael S. Rogers USN 3 April 2014 4 May 2018
3. GEN Paul M. Nakasone USA 4 May 2018 Incumbent

The current Deputy Commander is Lieutenant General Vincent R. Stewart, USMC.[57]

See also


  1. 1 2 Nakashima, Ellen (13 September 2016). "Obama to be urged to split cyberwar command from NSA". The Washington Post. Archived from the original on 14 September 2016.
  2. Office of the Press Secretary. "Statement by President Donald J. Trump on the Elevation of Cyber Command". whitehouse.gov.
  3. "Cyber Command Fact Sheet". U.S. Department of Defense. 21 May 2010. Archived from the original on 16 April 2014. Retrieved 16 April 2014.
  4. Jelinek, Pauline (8 July 2010). "A code you can hack: On CYBERCOM's logo". Marine Corps Times. Associated Press. Archived from the original on 15 July 2010. Retrieved 8 July 2010.
  5. U.S. Department of Defense, Cyber Command Fact Sheet, 21 May 2010
  6. Mazzetti, Mark; Sanger, David E. (12 March 2013). "Security Chief Says Computer Attacks Will Be Met". The New York Times.
  7. Harris, Shane (14 November 2009). "The Cyberwar Plan". National Journal. Vol. 14. Archived from the original on 15 November 2009.
  8. Jackson, Patrick (15 March 2010). "Meet USCybercom: Why the US is fielding a cyber army". BBC News. Retrieved 10 July 2010.
  9. "News Release: Army Forces Cyber Command Headquarters Standup Plan Announced". Defense.gov. Retrieved 10 July 2010.
  10. Chief of Naval Operations, 'Fleet Cyber Command/Commander Tenth Fleet Implementation Plan,' Memorandum, United States Navy, 2009
  11. Communication, Mass (29 January 2010). "Cryptologists in Monterey Preview Navy's Newest Numbered Fleet". Navy.mil. Retrieved 10 July 2010.
  12. 24th Air Force - Home. 24af.af.mil. Retrieved on 2014-04-28.
  13. 24th AF becomes AFCYBER. Archive.is. Retrieved on 2014-04-28.
  14. "Fort Mead News: USMC Cyber Command". Ftmeade.army.mil. 28 January 2010. Archived from the original on 13 April 2010. Retrieved 10 July 2010.
  15. 1 2 http://www.armytimes.com/article/20141008/CAREERS03/310080059/Officers-can-apply-go-cyber-voluntary-transfer-program
  16. Tice, Jim (15 June 2015). "More than 200 warrants sought for cyber MOS 170A". Army Times. Retrieved 2017-10-10.
  17. "Cryptologic Technician - Networks (CTN)". Navy Personnel Command. Retrieved 28 April 2014.
  18. Air Force Adds Computer Networking Career Field. Usmilitary.about.com. Retrieved on 2014-04-28.
  19. Career Profile: Marine Cyber Network Operator. Militarycareers.about.com. Retrieved on 2014-04-28.
  20. "The Department of Defense Cyber Strategy". United States Department of Defense. October 2016. Archived from the original on 5 November 2016.
  21. John C.K. Daly (9 October 2006). "US Air Force Prepares For Cyber Warfare". Space Daily.
  22. "US needs 'digital warfare force'". BBC News. 5 May 2009. Retrieved 2017-10-10.
  23. "Homeland Security Today - preparedness and security news - DC Summit Convenes Military 'Cyber Warriors'". Hstoday.us. 2009-11-18. Retrieved 2010-07-10.
  24. "News Release: Flag and General Officer Announcements". Defense.gov. 2009-03-12. Retrieved 2010-07-10.
  25. "Cyberwar Commander Survives Senate Hearing , Threat Level". Wired.com. 15 April 2010. Retrieved 2010-07-10.
  26. "U.S. Senate: Legislation & Records Home > Nominations Confirmed (Non-Civilian)". Senate.gov. Retrieved 2010-07-10.
  27. "Photos : News Photo". Defense.gov. 2010-05-21. Retrieved 2010-07-10.
  28. DoD Cyber Command is officially online, 21 May 2010, Army Times
  29. "Military Mulls Joint Cyber Defense". Govinfosecurity.com. Retrieved 2010-07-10.
  30. "Fort Meade cyber security center sought (www.HometownGlenBurnie.com - The Maryland Gazette)". www.HometownGlenBurnie.com. Retrieved 2010-07-10.
  31. Cyber Command Achieves Full Operational Capability
  32. Jackson, William (2009-06-24). "DoD creates Cyber Command as U.S. Strategic Command subunit - Federal Computer Week". Fcw.com. Retrieved 2010-07-10.
  33. "S. 2943; National Defense Authorization Act for Fiscal Year 2017" (PDF). congress.gov. Retrieved 18 June 2017.
  34. Monroe, John S. (2 July 2009). "Cyber Command: So much still to know". Federal Computer Week (FCW). 1105 Media, Inc. Retrieved 22 November 2016.
  35. "U.S Cyber Command Goes Online". Democracy Arsenal. 1 October 2009. Retrieved 22 November 2016.
  36. Lynn, William J. (12 November 2009). "Remarks at the Defense Information Technology Acquisition Summit". United States Department of Defense. Archived from the original on 15 April 2010.
  37. Shachtman, Noah (23 September 2010). "Military's Cyber Commander Swears: "No Role" in Civilian Networks"". The Brookings Institution. Archived from the original on 7 November 2016.
  38. Conti, Gregory; Easterly, Jen (29 July 2010). "Recruiting, Development, and Retention of Cyber Warriors Despite an Inhospitable Culture". Small Wars Journal. Archived from the original on 7 January 2011. Retrieved 29 July 2010.
  39. Costa, Robert (April 2002). "Supporting the Information-Centric 2001 Quadrennial Defense Review: The Case for an Information Service". Maxwell Air Force Base, Alabama: Air Command and Staff College, Air University. p. 261. Archived from the original on 1 December 2012.
  40. Chabrow, Eric (22 April 2009). "Report: Cybersecurity Military Command Coming". GovInfoSecurity (Information Security Media Group). Archived from the original on 24 December 2015.
  41. 1 2 Conti, Gregory; Surdu, John "Buck" (2009). "Army, Navy, Air Force, Cyber: Is it Time for a Cyberwarfare Branch of the Military" (PDF). Information Assurance Newsletter. Vol. 12 no. 1. pp. 14–18. Archived (PDF) from the original on 11 June 2016.
  42. At the time, Lieutenant Colonel Gregory Conti was a United States Military Academy Professor and Director of West Point's Cyber Security Research Center.
  43. Chabrow, Eric (25 March 2009). "New Cyber Warfare Branch Proposed: Time Ripe to Create Fourth Branch of Military". GovInfoSecurity (Information Security Media Group). Archived from the original on 22 December 2015.
  44. Nakashima, Ellen (19 March 2010). "Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies". The Washington Post. Retrieved 2010-07-10.
  45. Daniel, Lisa (15 April 2010). "Nominee Urges Government, Private Sector Cooperation". DoD News. United States Department of Defense. Archived from the original on 14 July 2015.
  46. Parrish, Karen (14 July 2011). "News Article: Lynn: Cyber Strategy's Thrust is Defensive". DoD News. United States Department of Defense. Archived from the original on 14 July 2015.
  47. Tilghman, Andrew (4 August 2014). "In supersecret cyberwar game, civilian-sector techies pummel active-duty cyberwarriors". www.armytimes.com. Gannett Government Media. Retrieved 6 August 2014.
  48. Baldor, Lolita C. (14 April 2015). "Pentagon eyes recruiting cyber talent through National Guard". Military Times. The Associated Press. Archived from the original on 5 November 2016.
  49. Pawlyk, Oriana K. (3 January 2015). "Calling up the Reserves: Cyber mission is recruiting". Air Force Times. Sightline Media Group. Retrieved 5 November 2016.
  50. "All Cyber Mission Force Teams Achieve Initial Operating Capability". United States Cyber Command, United States Department of Defense. 24 October 2016. Archived from the original on 5 November 2016.
  51. Rockwell, Mark (21 November 2016). "Cyber panel closes in on final recommendations". Federal Computer Week (FCW). 1105 Media, Inc. Retrieved 22 November 2016.
  52. Costello, John (10 November 2016). "Overview of President-Elect Donald Trump's Cyber Policy". Flashpoint. Archived from the original on 22 November 2016.
  53. "Cyber Warfare Command to Be Launched in January". Koreatimes.co.kr. Retrieved 2010-07-10.
  54. Clark, Colin (2009-06-29). "StratCom Plows Ahead on Cyber". DoD Buzz. Retrieved 2010-07-10.
  55. "Construction begins on first cyber warfare intelligence center". Af.mil. Archived from the original on 30 June 2012. Retrieved 2010-07-10.
  56. Branigan, Tania (2010-07-22). "Chinese army to target cyber war threat". The Guardian. London. Retrieved 25 July 2010.
  57. "DIA's Stewart tapped to be deputy commander at CYBERCOM". InsideDefense.com. 2017-06-19. Retrieved 2017-10-10.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.