Military Cyber: An Evolution In Command Relationships Essay

Military Cyber: An Evolution In Command Relationships Essay

Length: 1382 words (3.9 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

Future conflicts will not have to start with a bang. An Air Force C-17 carries a special payload, and somewhere over the Indian Ocean the cargo is released. This cargo consists of the latest in unmanned aerial vehicles (UAV) technology: swarms of mini UAVs with the appearance and perceived characteristics of locusts. The objective of this swarm is to disrupt and not destroy key electrical nodes in a target nation, allowing USSOCOM troops to enter the country undetected. Simultaneously, US cyber forces are disrupting the backup generator systems to ensure radar systems stay down. This could be the beginning of a major offensive or the preparation of a capital region to give rebel forces the freedom of movement and surprise to conduct a bloodless coup. The complexity of this operation demands unity of effort and cyber operations can play an important part. Is this unity of effort best achieved with our present operational and strategic cyber force structure? Would cyber operations benefit from a structure such as the USSOCOM model?
United States military personnel have proven time and again that they can overcome the challenges of fractured command relationships. Title 32 and Title 10 forces worked side by side during the response to Hurricane Katrina and broadened the other’s situational awareness while taking advantage of the uniqueness of each force. Informal working groups were established to see how each group could help the other and Judge Advocate Generals (JAGs) helped deal with the grey areas. Congress amended the Title/Title32 command relationship regarding defense of the homeland with the creation of the dual status commander. Congress also is concerned with improving our cyber operations capabilities to make...


... middle of paper ...


...resentatives One Hundred Twelfth Congress Second Session Hearing Held July 25, 2012, H.A.S.C. No. 112-146, Vice Admirals testimony to Mr Langevin.
2 Ibid 1, Major General Vautrinot Testimony to Mr Langevin
3 Department of Defense Strategy for Operating in Cyberspace, http://www.defense.gov/news/d20110714cyber.pdf, July 2011, page 5
4 Ibid 1, Mr. Lagevin question to the cyber commanders
5 Ibid 3, page 6
6 Zachary Fryer-Biggs, “U.S. Military Goes on Cyber Offensive”, Defensenews.com May 24, 2012
7 Joint Publication 3.0, “Joint Operations”, August 11, 2011, III-3 – III-5
8 Harry M. Friberg, “U.S. Cyber Command Support to Geographic Combatant Commands”, US Army War College, Carlisle Barracks, PA, February 3, 2011, page 13
9 Ibid GEN Keith B. Alexander, “ Building a New Command in Cyberspace” Strategic Studies Quarterly, Maxwell AFB, AL Summer 2011,
10 Ibid 9, page 10

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Military Cyber: An Evolution In Command Relationships Essay

- United States Cyber Command is less than four years old. The merger and stand down of the Joint Functional Component Command for Network Warfare (JFCC-NW) and the Joint task Force for Global Network Operations (JTF-GNO) formed the bulk of the new organization. 9 This new construct integrated offensive and defensive cyber capabilities in one organization resulting in efficient and effective planning and execution of cyberspace operations. United States Cyber Command is tasked with operations to defend DOD information networks and to conduct full spectrum military cyberspace operations across all domains....   [tags: United States, Cyber Command]

Strong Essays
1417 words (4 pages)

Cyber Warfare: STUXNET Discovery and Evolution Essay

- STUXNET When we hear the word Stuxnet, we believe this to be one of the first incidents involving the term "Cyber Warfare". As the term Cyber War is still not exactly defined, we know that in the present day, cyber attacks are on the rise and are constantly happening around the world. The cyber domain introduces a new attack vector for military war. The event of Stuxnet brings people into perspective of the logical cyber and computer realms affecting the actual physical world. Although the events of Stuxnet are highly debatable because we don't know the true origins of the Stuxnet programming itself, we can come to the conclusion that cyber attacks using advanced persistent threats from sta...   [tags: spyware program, malware history]

Strong Essays
2622 words (7.5 pages)

The Impacts of Cyber Warfare Essay

- Society has become ever-increasingly dependent upon technology, more specifically, computers to conduct personal and business transactions and communications. Consequently, criminals have targeted these systems to conduct information and cyber warfare, which can include politically motivated attacks and to profit through ill-gotten means. In an article written by Koblentz and Mazanec (2013), cyber warfare is the act of disabling an enemy’s ability to use or obtain information, degrade its ability to make decisions, and to command its military forces....   [tags: Cyber, warfare, E-commerce]

Strong Essays
1833 words (5.2 pages)

Essay on What Are Cyber-Relationships?

- What are cyber-relationships. They are not only romantic relationships, but normal relationships between friends and family as well. Cyber-relationship addiction occurs when an individual focuses more on their virtual life in social networking sites, texting and chat rooms to the extent that their real-life relationships with family and friends are compromised for online ones. The main reason is that all of us use mobile phones, laptops, tablets, and etc, to cultivate our friendships and relationships with others (Bargh and Mckenna, 575)....   [tags: computers, ipads, addiction]

Strong Essays
1420 words (4.1 pages)

A Research Study On Evolution And Evolution Essay

- Insert Research Paper Title Here According to The Huffington Post, only 66% of adults in the U.S. believe in evolution and about half of the 66% believe that there was a divine being guiding evolution (Kaleem). A lot more people believe in creationism than expected. In order to know the full significance of this statistic, one must first know what it means. We have learned in school that evolution is thought to be a long-term, ongoing process by which single-celled organisms grew to be complicated organisms through natural selection....   [tags: Evolution, Creationism]

Strong Essays
1515 words (4.3 pages)

Evolution And Evolution Of Evolution Essay

- In order for a species to survive, its population has to evolve. Evolution is the process of gradual change driven by natural selection to improve survival. Evolution is the explanation of how life got to its current state. Before the idea of evolution, the Bible gave the explanation of how things came to be, the Theory of Creation. Charles Darwin is credited for developing the theory of evolution. Scientist such as Georges Cuiver, James Hutton and Charles Lyell, and Jean-Baptiste Lamarck heavily influenced Darwin....   [tags: Dog, Dog breed, Evolution, Charles Darwin]

Strong Essays
1633 words (4.7 pages)

The Dangers Of Cyber Bullying Essay

- As technology takes on the challenge of expanding accessibility to the public the potential uses have been shifted towards malevolent acts. Centuries ago the thought of rectangular touch screens in which one could listen to music , play games, video chat , and access the internet would have made anyone seem crazy . However , through the sprung that technology is developing by it is now only “ normal” to own devices such as iPods, iPads, Tablets, and iPhones. This new device convergence that enables the users to multitask and have access to various features in one single object is what has caused the prevalence of cyber bullying ....   [tags: Bullying, Abuse, Cyber-bullying, Cyberstalking]

Strong Essays
1398 words (4 pages)

Essay about Cyber Security as an International Security Threat

- Cyber Security as an International Security Threat National and International Security is a sum of the actions taken by countries and other organizations that can guarantee the safety and well being of their population. It is vital for a nation to pre-emptively discover what issues could affect their security, and take action to prevent any detrimental or harmful events from happening. With the development of technology and the transition into a more technologically savvy society, cyber security has become one of the most prevalent and important economic and national security issues that the United States will come to face....   [tags: cyber terrorists, cyberspace]

Strong Essays
2186 words (6.2 pages)

Essay about Cyber Attacks on the Government’s Transportation Grid

- Breaches and Security Implications by Penetration of the Western Interconnection’s Traffic Control System and its Effects on Modern Day Life Year after year, a number of films are released involving computer hacking of some sort along with cyber-villainy. As entertaining as they are, the validity of these possibilities is not explored. Many of these films center revolve around a chaotic vehicle-related scene where a form of the government’s transportation grid is compromised. The breach typically involves traffic control....   [tags: Cyber Terrorism, Cyber Terrorists]

Strong Essays
3307 words (9.4 pages)

Cyber Attacks Essay

- On April 27, 2007 cyber-attacks began crippling key infrastructures of banks, ministries, and newspapers. These attacks took place, in part, because of a statue. This statue is not just a two-meter tall man holding a helmet; this individual represents and symbolizes the lives lost in the Second World War. The statue has been under a lot of speculation and has torn the population of the country in half. Some believe the status is a symbol of Soviet, formerly Nazi, while some see this statue as symbol of Soviet victory over the Nazis and Russian claims Estonia....   [tags: Cyber Crime]

Strong Essays
1170 words (3.3 pages)