62-477: United States Cyber Command ( USCYBERCOM ) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise which focus on securing cyberspace. USCYBERCOM was established as a Sub-Unified command under U.S. Strategic Command at
124-525: A United States Space Command (USSPACECOM). A previous unified combatant command for unified space operations was decommissioned in 2002. The new USSPACECOM will include "(1) all the general responsibilities of a Unified Combatant Command; (2) the space-related responsibilities previously assigned to the Commander, United States Strategic Command ; and (3) the responsibilities of Joint Force Provider and Joint Force Trainer for Space Operations Forces". USSPACECOM
186-584: A four-star general , or if the commander is a Navy officer, a four-star admiral . Notes Further reading Unified combatant command A unified combatant command , also referred to as a combatant command ( CCMD ), is a joint military command of the United States Department of Defense that is composed of units from two or more service branches of the United States Armed Forces , and conducts broad and continuing missions. There are currently 11 unified combatant commands, and each
248-478: A balance between protecting military assets and personal privacy." stated Alexander, in a Defense Department release. If confirmed, Alexander said, his main focus will be on building capacity and capability to secure the networks and educating the public on the command's intent. "This command is not about an effort to militarize cyber space," he said. "Rather, it's about safeguarding our military assets." In July 2011, Deputy Defense Secretary William Lynn announced in
310-508: A conference that "We have, within Cyber Command, a full spectrum of capabilities, but the thrust of the strategy is defensive." "The strategy rests on five pillars, he said: treat cyber as a domain; employ more active defenses; support the Department of Homeland Security in protecting critical infrastructure networks; practice collective defense with allies and international partners; and reduce
372-507: A fully unified commander under the broader title of Commander in Chief, Atlantic (CINCLANT). The Army and Air Force objected, and CINCLANTFLT was activated as a unified command on 1 November 1947. A few days later, the CNO renewed his suggestion for the establishment of a unified Atlantic Command. This time his colleagues withdrew their objections, and on 1 December 1947, the U.S. Atlantic Command (LANTCOM)
434-568: A report in December 2016. The report made 16 major recommendations regarding the intertwining roles of the military, government administration and the private sector in providing cyber security. President Trump indicated that he wanted a full review of Cyber Command during his bid for presidency. During his presidency, the Trump administration made Cyber Command a unified combatant command, and took other measures attempting to deter cyber attacks. However,
496-484: A sixth branch of the military, an Information (Cyber) Service with Title 10 responsibilities analogous to its sister services in 2002 noting: While no one [IOP, Instrument of National Power] operates in a vacuum... Information increasingly underpins the other three [Diplomatic, Economic and Military], yet has proven to be the most vulnerable, even as US society becomes more dependent on it in peace, conflict, and war. To attack these centers of gravity, an adversary will use
558-767: A specific type of nontransferable operational command authority over assigned forces, regardless of branch of service. The chain of command for operational purposes (per the Goldwater–Nichols Act ) goes from the president of the United States through the secretary of defense to the combatant commanders. The Department of Defense defines at least four types of command authority: Geographic combatant commands Functional combatant commands Currently, four geographic combatant commands have their headquarters located outside their geographic area of responsibility. The current system of unified commands in
620-605: A threat even when the identity of the attacker is unknown" prior to his confirmation hearings before the United States Congress . This came in response to incidents such as a 2008 operation to take down a government-run extremist honeypot in Saudi Arabia . "Elite U.S. military computer specialists, over the objections of the CIA, mounted a cyberattack that dismantled the online forum". "The new U.S. Cyber Command needs to strike
682-539: A unified combatant command. The FY 2017 NDAA also specified that the dual-hatted arrangement of the commander of USCYBERCOM will not be terminated until the Secretary of Defense and Chairman of the Joint Chiefs of Staff jointly certify that ending this arrangement will not pose risks to the military effectiveness of CYBERCOM that are unacceptable to the national security interests of the United States. There are concerns that
SECTION 10
#1732845424078744-553: Is charged with pulling together existing cyberspace resources, creating synergies and synchronizing war-fighting effects to defend the information security environment. USCYBERCOM is tasked with centralizing command of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD's cyber expertise. Since 2015, the U.S. Cyber Command added 133 new cyber teams. The breakdown was: *These Subordinates fall under United States Army Intelligence and Security Command , however Operational Control (OPCON)
806-688: Is established as the highest echelon of military commands, in order to provide effective command and control of all U.S. military forces, regardless of branch of service, during peace or during war time. Unified combatant commands are organized either on a geographical basis (known as an " area of responsibility ", AOR) or on a functional basis, e.g., special operations , force projection , transport , and cybersecurity . Currently, seven combatant commands are designated as geographical, and four are designated as functional. Unified combatant commands are "joint" commands and have specific badges denoting their affiliation. The Unified Command Plan (UCP) establishes
868-455: Is given to ARCYBER for cyber-related effects. The Cyber National Mission Force (CNMF) was activated on January 27, 2014, as an element of Cyber Command. At inception the CNMF consisted of 21 teams, broken down into 13 National Mission Teams (NMT) and 8 National Support Teams (NST). Today, the CNMF has expanded to 39 joint cyber teams consisting of over 2,000 service members and civilian members across
930-969: Is one of three Cyber Command forces that would react to a cyber attack on the United States. The other two forces are the Cyber Combat Mission Force assigned to the operational control of individual U.S. combatant commanders, and the Cyber Protection Force that helps operate and defend the DODIN. CNMF is composed of cyber mission force teams across services that support the CNMF mission through their specific respective assignments: The Cyber National Mission Force operates in both defensive and offensive cyber operations to carry out its missions of: U.S. election defense, counter-ransomware operations, global hunt operations, combating foreign malicious cyber actors, and providing support to national security operations. Global hunt operations began in 2018 as part of
992-550: Is the final list of Air Force bases that were in competition to host the Cyber Command headquarters, listed alphabetically by state: On 14 May 2009, the Air Force announced that Lackland AFB in San Antonio, Texas, "has been selected as headquarters of the 24th Air Force, the Air Force's downgraded version of its provisional Cyber Command." However, it was also reported that "continued separate armed services cyber operations exist under
1054-477: Is to be proactive. If the U.S. is taking a formal approach to this, then that has to be a good thing. The Chinese are viewed as the source of a great many attacks on western infrastructure and just recently, the U.S. electrical grid. If that is determined to be an organized attack, I would want to go and take down the source of those attacks. The only problem is that the Internet, by its very nature, has no borders and if
1116-603: The Department of Homeland Security , and that's exactly how it should be." Alexander notes, however, that if faced with cyber hostilities an executive order could expand Cyber Command's spectrum of operations to include, for instance, assisting the Department of Homeland Security in defense of their networks. Some military leaders claim that the existing cultures of the Army, Navy, and Air Force are fundamentally incompatible with that of cyber warfare . Major Robert Costa (USAF) even suggested
1178-536: The Joint Chiefs of Staff also created specified commands that had broad and continuing missions but were composed of forces from only one service. Examples include the U.S. Naval Forces, Eastern Atlantic and Mediterranean and the U.S. Air Force's Strategic Air Command. Like the unified commands, the specified commands reported directly to the JCS instead of their respective service chiefs. These commands have not existed since
1240-626: The Joint Forces Command in the 1990s after the Soviet threat to the North Atlantic had disappeared and the need rose for an integrating and experimentation command for forces in the continental United States. Joint Forces Command was disbanded on 3 August 2011 and its components placed under the Joint Staff and other combatant commands. In January 2002, for the first time the entire surface of
1302-535: The Pacific War proved more difficult to organize, as neither General of the Army Douglas MacArthur nor Fleet Admiral Chester W. Nimitz was willing to be subordinate to the other, for reasons of interservice rivalry . The Joint Chiefs of Staff continued to advocate in favor of establishing permanent unified commands, and President Harry S. Truman approved the first plan on 14 December 1946. Known as
SECTION 20
#17328454240781364-493: The Pentagon and NSA will overshadow any civilian cyber defense efforts. There are also concerns on whether the command will assist in civilian cyber defense efforts. According to Deputy Secretary of Defense William J. Lynn , the command "will lead day-to-day defense and protection of all DoD networks. It will be responsible for DoD's networks – the dot-mil world. Responsibility for federal civilian networks – dot-gov – stays with
1426-646: The President , combatant commanders and the American people can rely on for preserving the freedom of access and commerce , in air, space and now cyberspace . On 14 August 2008, the Air Force made a statement about a pause in standing up the AFCYBER command, which was set for 1 October 2008. The Air Force remains committed to providing full-spectrum cyber capabilities to include global command and control, electronic warfare and network defense. The Secretary and Chief of Staff of
1488-543: The Unified Command Plan of 1956–1957. A 1958 "reorganization in National Command Authority relations with the joint commands" with a "direct channel" to unified commands such as Continental Air Defense Command (CONAD) was effected after President Dwight Eisenhower expressed concern about nuclear command and control. CONAD itself was disestablished in 1975. Although not part of the original plan,
1550-522: The United States Cyber Command (USCYBERCOM) would be elevated to the status of a unified combatant command from a sub-unified command. It was also announced that the separation of the command from the NSA would be considered. USCYBERCOM was elevated on 4 May 2018. Vice President Mike Pence announced on 18 December 2018 that President Donald Trump had issued a memorandum ordering the stand-up of
1612-482: The United States Forces Korea (USFK) and United States Forces Japan (USFJ) under USINDOPACOM , and United States Forces—Afghanistan (USFA) under USCENTCOM . Air Force Cyber Command (Provisional) Air Force Cyber Command (Provisional) ( AFCYBER (P) ) was a proposed United States Air Force Major Command that existed only in provisional status. On 6 October 2008, the Air Force announced that
1674-409: The "Outline Command Plan", it would become the first in a series of Unified Command Plans. The original "Outline Command Plan" of 1946 established seven unified commands: Far East Command , Pacific Command , Alaskan Command , Northeast Command , the U.S. Atlantic Fleet , Caribbean Command, and European Command. However, on 5 August 1947, the CNO recommended instead that CINCLANTFLT be established as
1736-567: The "persistent engagement" strategy with the goal of looking for malicious cyber activity and vulnerabilities on significant networks. Since its inception, the hunt operations have been requested and conducted in 18 countries and over 50 foreign networks. An intention by the U.S. Air Force to create a 'cyber command' was announced in October 2006. An Air Force Cyber Command was created in a provisional status in November 2006. However, in October 2008, it
1798-455: The Air Force have considered delaying currently planned actions on Air Force Cyber Command to allow ample time for a comprehensive assessment of all AFCYBER requirements and to synchronize the AFCYBER mission with other key Air Force initiatives. The new Air Force leaders continue to make a fresh assessment of all our efforts to provide our Nation and the joint force the full spectrum of air, space, and cyberspace capabilities. On 8 October 2008,
1860-656: The Air Force followed up on its previous findings and decided to place AFCYBER as a Numbered Air Force within Air Force Space Command . On Wednesday, 19 August 2009, the 24th Air Force was stood up, following an environmental impact analysis as required by law. Leadership also decided to establish a Numbered Air Force for cyber operations within Air Force Space Command and discussed how the Air Force will continue to develop capabilities in this new domain and train personnel to execute this new mission. This
1922-478: The Armed Forces and the Joint Chiefs of Staff" (informally known as the " Key West Agreement "). The responsibilities of the unified commands were further expanded on 7 September 1948 when the commanders' authority was extended to include the coordination of the administrative and logistical functions in addition to their combat responsibilities. Far East Command and U.S. Northeast Command were disestablished under
United States Cyber Command - Misplaced Pages Continue
1984-728: The Army , Secretary of the Navy , and the Secretary of the Air Force ) are legally responsible to "organize, train and equip" combatant forces and, as directed by the Secretary of Defense, assign their forces for use by the combatant commands. The Secretaries of the Military Departments thus exercise administrative control (ADCON) rather than operational control (OPCON—the prerogative of the combatant commander) over their forces. A sub-unified command, or, subordinate unified command, may be established by combatant commanders when authorized to do so by
2046-482: The Army, Navy and Air Force would provide our nation with the capability to defend our technological infrastructure and conduct offensive operations. Perhaps more important, the existence of this capability would serve as a strong deterrent for our nation's enemies." In response to concerns about the military's right to respond to cyber attacks , General Alexander stated "The U.S. must fire back against cyber attacks swiftly and strongly and should act to counter or disable
2108-470: The British GCHQ has begun preparing a cyber force. Furthermore, a shift in military interest in cyber warfare has motivated the creation of the first U.S. Cyber Warfare Intelligence Center. In 2010, China introduced a department dedicated to defensive cyber war and information security in response to the creation of USCYBERCOM. In June 2019, Russia has conceded that it is "possible" its electrical grid
2170-538: The Chairman does not exercise military command over any combatant forces. Under Goldwater–Nichols, the service chiefs (also four stars in rank) are charged with the responsibility of the strategic direction; unified operation of combatant commands; and the integration of all land, naval, and air forces in an efficient "unified combatant command" force. Furthermore, the Secretaries of the Military Departments (i.e., Secretary of
2232-447: The FBI reported that they logged a record number of complaints and economic losses in 2019, as cybercrime continued to grow. The creation of U.S. Cyber Command appears to have motivated other countries in this arena. In December 2009, South Korea announced the creation of a cyber warfare command. Reportedly, this was in response to North Korea 's creation of a cyber warfare unit. In addition,
2294-609: The Joint Functional Component Command for Network Warfare ( JFCC-NW ) were absorbed by the command. The Defense Information Systems Agency , where JTF-GNO operated, provides technical assistance for network and information assurance to USCYBERCOM, and is moving its headquarters to Fort Meade . President Obama signed into law, on 23 December 2016, the National Defense Authorization Act (NDAA) for fiscal year (FY) 2017, which elevated USCYBERCOM to
2356-486: The Secretary of Defense or the president. They are created to conduct a portion of the mission or tasking of their parent geographic or functional command. Sub-unified commands may be either functional or geographic, and the commanders of sub-unified commands exercise authority similar to that of combatant commanders. Examples of former and present sub-unified commands are the Alaskan Command (ALCOM) under USNORTHCOM ,
2418-547: The Strategic Air Command was disestablished in 1992. The relevant section of federal law, however, remains unchanged, and the President retains the power to establish a new specified command. The Goldwater–Nichols Defense Reorganization Act of 1986 clarified and codified responsibilities that commanders-in-chief (CINCs) undertook, and which were first given legal status in 1947. After that act, CINCs reported directly to
2480-662: The U.S. Joint Chiefs of Staff . In the European Theater , Allied military forces fell under the command of the Supreme Headquarters Allied Expeditionary Force (SHAEF). After SHAEF was dissolved at the end of the war, the American forces were unified under a single command, the US Forces, European Theater (USFET), commanded by General of the Army Dwight D. Eisenhower . A truly unified command for
2542-612: The U.S. Armed Forces On October 25, 2022, Defense Secretary Lloyd Austin authorized that the Cyber National Mission Force become a subordinate unified command underneath the United States Cyber Command. Following this, on December 19, 2022, General Paul Nakasone presided over a ceremony to establish the CNMF with the new "sub-unified" command status. Major General William J. Hartman , United States Army has served as CNMF commander since August 2019. The CNMF
United States Cyber Command - Misplaced Pages Continue
2604-545: The U.S. military emerged during World War II with the establishment of geographic theaters of operation composed of forces from multiple service branches that reported to a single commander who was supported by a joint staff. A unified command structure also existed to coordinate British and U.S. military forces operating under the Combined Chiefs of Staff , which was composed of the British Chiefs of Staff Committee and
2666-643: The U.S. takes on the mantle of the world's police; that might not go down so well. Initial operational capability was attained on 21 May 2010. General Alexander was promoted to four-star rank , becoming one of United States's 38 four-star officers, and took charge of U.S. Cyber Command in a ceremony at Fort Meade that was attended by Commander of U.S. Central Command GEN David Petraeus , and Secretary of Defense Robert M. Gates. USCYBERCOM reached full operational capability on 31 October 2010. The command assumed responsibility for several existing organizations. The Joint Task Force for Global Network Operations ( JTF-GNO ) and
2728-669: The United States Secretary of Defense , and through him to the President of the United States. Then-Secretary of Defense Dick Cheney announced in 1993 that the strategic command system should continue to evolve toward a joint global structure. The 1997 UCP assigned the former Soviet European republics and the whole of Russia to EUCOM which thus stretched from the Atlantic to the Pacific. The former Soviet Central Asian republics were assigned to CENTCOM. The U.S. Atlantic Command became
2790-487: The advantages attackers have on the Internet." In 2013, USCYBERCOM held a classified exercise in which reserve officers (with extensive experience in their civilian cyber-security work) easily defeated active duty cyber warriors. In 2015 Eric Rosenbach , the principal cyber adviser to Defense Secretary Ash Carter , said DoD was looking at alternatives to staffing with just active-duty military. Beginning that year, USCYBERCOM added 133 teams (staffing out at 6,000 people), with
2852-471: The case of senior admirals nominated for these positions. The operational chain of command runs from the President to the Secretary of Defense to the combatant commanders of the combatant commands. The Chairman of the Joint Chiefs of Staff may transmit communications to the Commanders of the combatant commands from the President and Secretary of Defense and advises both on potential courses of action, but
2914-474: The command would not be brought into permanent activation, and that the cyber mission would be transferred, with the standup of the Twenty-Fourth Air Force , to Air Force Space Command . The development of AFCYBER was announced by the Secretary of the Air Force on 2 November 2006. Originally designated to stand up around Summer 2007, but pushed back to late 2008, AFCYBER was planned to draw upon
2976-574: The creation of a cyber-warfare branch. Lieutenant Colonel Gregory Conti and Colonel John "Buck" Surdu (chief of staff of the United States Army Research, Development and Engineering Command ) stated that the three major services are "properly positioned to fight kinetic wars, and they value skills such as marksmanship, physical strength, the ability to leap out of airplanes and lead combat units under enemy fire." Conti and Surdu reasoned, "Adding an efficient and effective cyber branch alongside
3038-479: The decades following enactment of Goldwater–Nichols, these JPME requirements have yet to come to overall fruition. This is particularly true in the case of senior naval officers, where sea duty / shore duty rotations and the culture of the naval service has often discounted PME and JPME as a measure of professional development for success. Although slowly changing, the JPME requirement still continues to be frequently waived in
3100-621: The direction of Secretary of Defense Robert Gates on June 23, 2009 at the National Security Agency (NSA) headquarters in Fort George G. Meade , Maryland . It cooperates with NSA networks and has been concurrently headed by the director of the National Security Agency since its inception. While originally created with a defensive mission in mind, it has increasingly been viewed as an offensive force. On 18 August 2017, it
3162-519: The earth was divided among the US geographic commands. Rumsfeld assigned the last unassigned region— Antarctica —to PACOM, which stretched from Pole to Pole and covered half of the globe. On 24 October 2002, Secretary of Defense Donald H. Rumsfeld announced that in accordance with Title 10 of the US Code (USC), the title of " Commander-in-Chief " would thereafter be reserved for the President, consistent with
SECTION 50
#17328454240783224-441: The intent that at least 15% of the personnel would be reserve cyber operations airmen. These new teams had achieved "initial operating capability" (IOC) as of 21 October 2016. Officials noted that IOC is not the same as combat readiness, but is the first step in that direction. President Barack Obama 's Commission on Enhancing National Cybersecurity was formed to develop a plan for protecting cyberspace. The commission released
3286-517: The missions, command responsibilities, and geographic areas of responsibility of the combatant commands. Each time the Unified Command Plan is updated, the organization of the combatant commands is reviewed for military efficiency and efficacy, as well as alignment with national policy. Each unified combatant command is led by a combatant commander (CCDR), who is a four-star general or admiral . The combatant commanders are entrusted with
3348-485: The operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. The text "9ec4c12949a4f31474f299058ce2b22a", located in the command's emblem, is the MD5 hash of their mission statement. The command
3410-546: The personnel resources of the 67th Network Warfare Wing as well as other resources of the Eighth Air Force . It was planned to be placed under the command of Major General William T. Lord . Former Secretary of the Air Force Michael Wynne summarized the mission of AFCYBER: The aim was to develop a major command that stands alongside Air Force Space Command and Air Combat Command as the provider of forces that
3472-811: The terms of Article II of the United States Constitution . Thereafter, the military CINCs would be known as "combatant commanders", as heads of the unified combatant commands. A sixth geographical unified command, United States Africa Command (USAFRICOM), was approved and established in 2007 for Africa. It operated under U.S. European Command as a sub-unified command during its first year, and transitioned to independent Unified Command Status in October 2008. In 2009, it focused on synchronizing hundreds of activities inherited from three regional commands that previously coordinated U.S. military relations in Africa. President Donald Trump announced on 18 August 2017 that
3534-675: The weakest decisive point, ... the Information IOP. In addition, the other IOPs benefit from Unity of Effort --Constitutional balances of power ensure the Diplomatic and Military IOPs exercised by the President in concert with Congress are focused, while the Economic IOP achieves Unity of Action through international market controls and an international body of law. [In 2002], [t]he Information IOP however, [was] rudderless, lacking both Unity of Action and Unity of Command. Others have also discussed
3596-504: Was announced that USCYBERCOM would be elevated to the status of a full and independent unified combatant command. On 23 May 2023, it was announced that President Biden nominated Lt. Gen. Timothy Haugh to the Senate to be the next USCYBERCOM Commander. According to the US Department of Defense (DoD): USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct
3658-510: Was announced the command would not be brought into permanent activation. On 23 June 2009, the Secretary of Defense directed the Commander of U.S. Strategic Command (USSTRATCOM) to establish USCYBERCOM. In May 2010, General Keith Alexander outlined his views in a report for the United States House Committee on Armed Services subcommittee: My own view is that the only way to counteract both criminal and espionage activity online
3720-462: Was created under the Commander in Chief, Atlantic (CINCLANT). Under the original plan, each of the unified commands operated with one of the service chiefs (the Chief of Staff of the Army or Air Force , or the Chief of Naval Operations ) serving as an executive agent representing the Joint Chiefs of Staff. This arrangement was formalized on 21 April 1948 as part of a policy paper titled the "Function of
3782-829: Was re-established on 29 August 2019. Each combatant command (CCMD) is headed by a four-star general or admiral (the CCDR) recommended by the Secretary of Defense, nominated for appointment by the President of the United States, confirmed by the Senate and commissioned, at the President's order, by the Secretary of Defense. The Goldwater–Nichols Act and its subsequent implementation legislation also resulted in specific Joint Professional Military Education (JPME) requirements for officers before they could attain flag or general officer rank thereby preparing them for duty in Joint assignments such as UCC staff or Joint Chiefs of Staff assignments, which are strictly controlled tour length rotations of duty. However, in
SECTION 60
#17328454240783844-449: Was under cyberattack by the United States. The New York Times reported that hackers from the U.S. Cyber Command planted malware potentially capable of disrupting the Russian electrical grid. Cyber command is using its 2021 exercise Cyber Flag 21–2 to improve its teams' tactics. The commander of U.S. Cyber Command is a statutory office ( 10 U.S.C. § 167b ), and is held by
#77922