About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

1 [1] (December 8, 2016)

handle is hein.crs/crsmthmbbzi0001 and id is 1 raw text is: 




De    e Congressional Research Service
   If o rmrg the itive debate since 1914



Defense Primer: Cyberspace Operations


0


December 8, 2016


Overview
The Department of Defense (DOD) has defined cyberspace
as a global domain within the information environment
consisting of the interdependent network of information
technology infrastructures and resident data, including the
Internet, telecommunications networks, computer systems,
and embedded processors and controllers. The DOD
Information Network (DODIN) is a global infrastructure
carrying DOD, national security, and related intelligence
community information and intelligence.

Cyberspace operations are composed of the military,
intelligence, and ordinary business operations of the DOD
in and through cyberspace. Military cyberspace operations
use cyberspace capabilities to create effects that support
operations across the physical domains and cyberspace.
Cyberspace operations differ from information operations
(1O), which are specifically concerned with the use of
information-related capabilities, such as military
information support operations or military deception,
during military operations to affect the decision making of
adversaries while protecting our own. 1O may use
cyberspace as a medium, but it may also employ
capabilities from the physical domains.

Cyberspace operations are categorized into the following:

* Offensive Cyberspace Operations, intended to project
   power by the application of force in and through
   cyberspace. These operations are authorized like
   operations in the physical domains.

* Defensive Cyberspace Operations, to defend DOD or
   other friendly cyberspace. These are both passive and
   active defense operations and are conducted inside and
   outside of DODIN.

* DODIN Operations, to design, build, configure, secure,
   operate, maintain, and sustain DOD communications
   systems and networks across the entire DODIN.

Cyber Strategy
In 2012, President Obama directed DOD to organize and
plan to defend the nation against cyberattacks of significant
consequence, in concert with other U.S. government
agencies. The resulting DOD Cyber Strategy focuses on
three primary cyber missions:

1. Defend DOD networks, systems, and information.

2. Defend the U.S. homeland and U.S. national interests
    against cyberattacks of significant consequence.

3. Provide cyber support to military operational and
    contingency plans.


Guided by this strategy document, DOD began to build a
Cyber Mission Force (CMF) in 2012 to carry out DOD's
cyber missions.

Cyber Mission Force
The Cyber Mission Force consists of 133 teams that are
organized to meet DOD's three cyber missions.
Specifically, Cyber Mission Force teams support these
mission sets though their respective assignments:

*  Cyber National Mission Force teams defend the nation
   by seeing adversary activity, blocking attacks, and
   maneuvering in cyberspace to defeat them.

*  Cyber Combat Mission Force teams conduct military
   cyber operations in support of combatant commands.

*  Cyber Protection Force teams defend the DOD
   information networks, protect priority missions, and
   prepare cyber forces for combat.

*  Cyber Support Teams provide analytic and planning
   support to National Mission and Combat Mission teams.

Cyber Mission Force teams reached initial operating
capability in October 2016. Currently comprising around
5,000 individuals, the cyber mission force is expected to
grow to 6,200 by the end of 2018. Organizationally, the
Cyber Mission Force is an entity of the United States Cyber
Command.

United States Cyber Command
In response to the growing cyber threat, in 2009 the
Secretary of Defense directed the establishment of a new
military command devoted to cyber activities.
USCYBERCOM is a sub-unified command, under the U.S.
Strategic Command, whose stated mission is to direct the
operations and defense of specified Department of Defense
information networks and; prepare to, and when directed,
conduct full spectrum military cyberspace operations in
order to enable actions in all domains, ensure US/Allied
freedom of action in cyberspace and deny the same to our
adversaries. Previously existing components, such as the
Joint Task Force for Global Network Operations (JTF-
GNO) and the Joint Functional Component Command for
Network Warfare (JFCC-NW), were absorbed by
USCYBERCOM and reorganized to provide centralized
planning for cyberspace operations.

USCYBERCOM is commanded by a four-star general, who
is also the director of the National Security Agency and
chief of the Central Security Service. The commander
manages day-to-day global cyberspace operations and leads
defense and protection of DODIN. Each of the military
services provides support to USECYBERCOM.


www.crs.gov i 7-570

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Contact us for annual subscription options:

Already a HeinOnline Subscriber?

profiles profiles most