US Cyber Warfare Strategy

US #Cyber Warfare Strategy

The challenges [in cyberspace] are so broad… it is going to take a true partnership between the private sector, the government and academia to address [them]. – Navy Adm. Michael S. Rogers, commander, US Cyber Command and NSA Director, 20 November 2014.

The internet connects billions of people, helps deliver goods and services globally, and brings ideas and knowledge to those who would otherwise lack access. Like all Western countries, the United States relies on the internet and the systems and data of cyberspace for a wide range of critical services. This reliance leaves the USA vulnerable in the face of a real and dangerous cyber threat, as state and non-state actors plan to conduct disruptive and destructive cyberattacks on critical infrastructure and steal US intellectual property to undercut technological and military advantage.

The purpose of the new Department of Defense Cyber Strategy, the Department’s second, is to guide the development of DoD’s cyber forces and strengthen its cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD’s three cyber missions.

The strategy sets five strategic goals and establishes specific objectives for the DoD to achieve over the next five years and beyond. Three major factors drove the DoD to develop a new cyber strategy. First is the increasing severity and sophistication of the cyber threat to US interests, to include DoD networks, information, and systems. The Department of Defense has the largest network in the world and DoD must take aggressive steps to defend its networks, secure its data, and mitigate risks to DoD missions. Second, in 2012 the President directed the DoD to organize and plan to defend the nation against cyber attacks of significant consequence, in concert with other U.S. government agencies. This new mission required new strategic thinking. Finally, in response to the threat, in 2012 the DoD began to build a Cyber Mission Force (CMF) to carry out the DoD’s cyber missions. The CMF will include nearly 6,200 military, civilian, and contractor support personnel from across the military departments and defense components.

Deterrence is a key part of the DoD’s new cyber strategy. This strategy describes the Department of Defense contributions to a broader national set of capabilities to deter adversaries from conducting cyber attacks. The Department of Defense assumes that the deterrence of cyber attacks on US interests will be achieved through the totality of US actions, including declaratory policy, substantial indications and warning capabilities, defensive posture, effective response procedures, and the overall resiliency of US networks and systems.

The US DoD’s Three Primary Cyber Missions:

Icon of shield and Network lines.Defend DoD networks, systems, and information.

Icon of shield and USA silhouette.Defend the US homeland and US national interests against cyber attacks of significant consequence.

Icon of network and armed forces.Provide cyber support to military operational and contingency plans.

Cyber Mission Force: 133 Teams by 2018

State and non-state actors threaten disruptive and destructive attacks against the United States and conduct cyber-enabled theft of intellectual property to undercut the United States’ technological and military advantage. the DoD must develop its cyber forces and strengthen its cyber defense and cyber deterrence posture.

National Mission Teams: 13 Teams

Defend the United States and its interests against cyberattacks of significant consequence.

Cyber Protection Teams: 68 Teams

Defend priority DoD networks and systems against priority threats.

Combat Mission Teams: 27 Teams

Provide support to Combatant Commands by generating integrated cyberspace effects in support of operational plans and contingency operations.

Support Teams: 25 Teams

Provide analytic and planning support to the National Mission and Combat Mission teams.

US Military Cyber Websites


You can read the full 2015 DoD Cyber Strategy report here.

Source: Special Report: Cyber Strategy

One comment

Leave a Reply