Cyber Force A Defense Imperative
Cyber Force A Defense Imperative
A Defense Imperative
FOUNDATION FOR DEFENSE OF DEMOCRACIES
FDD PRESS
A division of the
FOUNDATION FOR DEFENSE OF DEMOCRACIES
Washington, DC
United States Cyber Force: A Defense Imperative
Table of Contents
EXECUTIVE SUMMARY...................................................................................................................... 6
IN THEIR OWN WORDS: GAPS AND CHALLENGES IN THE CURRENT MODEL ................ 13
CONCLUSION...................................................................................................................................... 31
APPENDIX A:
SELECT QUOTATIONS FROM INTERVIEWS................................................................................. 32
APPENDIX B:
HISTORICAL CASE STUDIES: THE AIR FORCE AND SPACE FORCE ........................................ 35
APPENDIX C:
THE HISTORY OF U.S. INFORMATION OPERATIONS
AND THE CREATION OF CYBERCOM............................................................................................. 37
Page 5
United States Cyber Force: A Defense Imperative
Executive Summary these officers by rank and service but withholds their
names for reasons of privacy.
In the U.S. military, an officer who had never fired a
rifle would never command an infantry unit. Yet officers This research paints an alarming picture. The inefficient
with no experience behind a keyboard are commanding division of labor between the Army, Navy, Air Force,
cyber warfare units. This mismatch stems from the U.S. and Marine Corps prevents the generation of a cyber
military’s failure to recruit, train, promote, and retain force ready to carry out its mission. Recruitment
talented cyber warriors. The Army, Navy, Air Force, and suffers because cyber operations are not a top priority
Marines each run their own recruitment, training, and for any of the services, and incentives for new recruits
promotion systems instead of having a single pipeline vary wildly. The services do not coordinate to ensure
for talent. The result is a shortage of qualified personnel that trainees acquire a consistent set of skills or that
at U.S. Cyber Command (CYBERCOM), which has their skills correspond to the roles they will ultimately
responsibility for both the offensive and defensive fulfill at CYBERCOM. Promotion systems often hold
aspects of military cyber operations. back skilled cyber personnel because the systems were
designed to evaluate servicemembers who operate on
For the last decade, Congress, on a bipartisan basis, land, at sea, or in the air, not in cyberspace. Retention
has made clear its sharp concern about cyber personnel rates for qualified personnel are low because of
issues. In 2022, it required the secretary of defense to inconsistent policies, institutional cultures that do not
deliver a report that addresses “how to correct chronic value cyber expertise, and insufficient opportunities for
shortages of proficient personnel in key work roles” at advanced training.
CYBERCOM. The report is due on June 1.1
Resolving these issues requires the creation of a new
Often, however, military leaders have addressed independent armed service — a U.S. Cyber Force
personnel shortages by massaging statistics rather than — alongside the Army, Navy, Air Force, Marine
fixing the underlying problem. In 2018, CYBERCOM Corps, and Space Force. There is ample precedent
appeared to reach a major milestone when it certified for this approach; battlefield evolutions led to the
that all 133 of its Cyber Mission Force (CMF) teams establishment of the Air Force in 1947 and the
had enough properly trained and equipped personnel Space Force in 2019. An independent cyber service
to execute their missions. Yet multiple officers revealed would naturally prioritize the creation of a uniform
these certifications to be hollow; CYBERCOM merely approach to recruitment, training, promotion,
shifted a limited number of effective personnel from and retention of qualified personnel whose skills
team to team to make them appear complete at the correspond to CYBERCOM’s needs. In addition to
time of certification. a single, dedicated cyber training and development
schoolhouse, an independent service could establish a
To deepen the understanding of the cyber personnel cyber war college for advanced research and training,
system and its flaws, this study draws on more than 75 akin to the Army War College and its peers. Without
interviews with U.S. military officers, both active-duty the responsibility for procuring planes, tanks, or
and retired, with significant leadership and command ships, a Cyber Force could also prioritize the rapid
experience in the cyber domain.2 The study identifies acquisition of new cyber warfare systems.
1. James M. Inhofe National Defense Authorization Act for Fiscal Year 2023, Pub. L. 117-263, 136 Stat. 2903, §1533. (https://www.
congress.gov/117/plaws/publ263/PLAW-117publ263.pdf )
2. FDD made minor edits to some of the interviews for reasons of grammar and style. No substantive changes were made. Appendix A
preserves excerpts of the interviews in their original form.
Page 6
United States Cyber Force: A Defense Imperative
3. Joshua Rovner, “Warfighting in Cyberspace,” War on the Rocks, March 17, 2021. (https://warontherocks.com/2021/03/warfighting-
in-cyberspace)
Page 7
United States Cyber Force: A Defense Imperative
well-organized state actor.”4 The next year, the Joint dual-hatted structure and gave CYBERCOM a direct
Chiefs of Staff defined cyberspace as a warfighting line of communication to the secretary of defense plus
domain,5 and DoD released its first National Military greater authority to request budgetary resources.7
Strategy for Cyberspace Operations in 2006.6 (A more
detailed account can be found in Appendix C.)
4. Omry Haizler, “The United States’ Cyber Warfare History: Implications on Modern Cyber Operational Structures and Policymaking,”
Cyber, Intelligence, and Security, January 2017. (https://www.inss.org.il/wp-content/uploads/2017/03/The-United-States%E2%80%99-
Cyber-Warfare-History-Implications-on.pdf )
5. The Joint Chiefs of Staff, “The National Military Strategy of the United States of America,” 2004. (https://nssarchive.us/wp-content/
uploads/library/nms/nms2004); Michael Warner, “US Cyber Command’s First Decade,” Hoover Institution, December 3, 2020. (https://
www.hoover.org/sites/default/files/research/docs/warner_webready.pdf )
6. Department of Defense, “National Military Strategy for Cyberspace Operations (NMS-CO),” December 11, 2005. (https://nsarchive2.
gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-023.pdf )
7. Andrew Feickert, “The Unified Command Plan and Combatant Commands: Background and Issues for Congress,” Congressional
Research Service, updated January 3, 2013. (https://crsreports.congress.gov/product/pdf/R/R42077/11)
8. U.S. Department of the Army, “Army Regulation 71-32. Force Development and Documentation Consolidated Policies,” March 20,
2019. (https://armypubs.army.mil/epubs/DR_pubs/DR_a/pdf/web/ARN8238_AR71_32_FINAL.pdf ); “J7 Directorate for Joint Force
Development,” Joint Chiefs of Staff, accessed January 8, 2024. (https://www.jcs.mil/Directorates/J7-Joint-Force-Development)
9. National Security Commission on Artificial Intelligence, “NSCAI Final Report Recommendations,” October 5, 2021. (https://www.
nscai.gov/wp-content/uploads/2021/01/Final-Report-Slides.pdf )
10. See, for example, “Cyber Service Academy,” Office of Sen. Kirsten Gillibrand, accessed January 5, 2024. (https://www.gillibrand.senate.
gov/cyberacademy)
Page 8
United States Cyber Force: A Defense Imperative
Current Organization of the U.S. support functions. This latter group makes up the bulk
Military in Cyberspace of COF personnel.13 Separately, some U.S. military cyber
personnel, serving outside the COF, conduct traditional
The U.S. military’s Cyberspace Operations Forces (COF)11 business functions, protect service-specific systems, and
encompass elements that conduct reconnaissance, support other functional or geographic commands (see
operational preparation of the environment, and Figure 1 below).
network-enabled operations, along with subordinate
logistics and administrative elements.12 In addition, the Within the COF, the Cyber Mission Force directs,
COF includes DoD network operations centers and coordinates, and executes cyber operations. It comprises
cybersecurity service providers that conduct traditional less than 3 percent of the COF, or approximately 6,200
network defense and information technology (IT) military and civilian personnel.14 The CMF currently
11. Joint Chiefs of Staff, “Cyberspace Operations, Joint Publication 3-12,” June 8, 2018. (https://irp.fas.org/doddir/dod/jp3_12.pdf );
Note that Joint Publication 3-12 was updated in December 2022, but there is not a public source for the updated doctrine. Department
of Defense, “DoD Directive 8140.01: Cyberspace Workforce Management,” October 5, 2020. (https://www.esd.whs.mil/Portals/54/
Documents/DD/issuances/dodd/814001p.pdf ); Department of Defense, “Memorandum for Chief Management Officer of the Department
of Defense: Definition of the Department of Defense Cyberspace Operations Forces (DoD COF).” December 12, 2019.
12. U.S. Department of Defense, “Memorandum for Chief Management Officer of the Department of Defense: Definition of the
Department of Defense Cyberspace Operations Forces (DoD COF).” December 12, 2019.
13. Joint Force Headquarters DODIN, Fact Sheet, “Protecting DOD Networks for Mission Success,” April 2023. (https://www.
jfhq-dodin.mil/Portals/69/PDFs/JFHQ-DODIN%20Fact%20Sheet%20-%20Command%20Overview_April2023.pdf?ver=YhyI
-lKbmblkx7TsTbR4bw%3d%3d)
14. U.S. Cyber Command Public Affairs, “Cyber 101 – Cyber Mission Force,” U.S. Cyber Command, November 1, 2022. (https://www.
cybercom.mil/Media/News/Article/3206393/cyber-101-cyber-mission-force)
Page 9
United States Cyber Force: A Defense Imperative
includes 133 teams. But in 2022, DoD announced the to fully employ its cyber weapons with adequately
CMF would expand to 147 teams, including:15 trained, equipped, and supported servicemembers.17
Of those 133 CMF teams, 41 came from the Army,
• Thirteen Cyber National Mission Force (CNMF) 40 from the Navy, 39 from the Air Force, and 13 from
teams responsible for “defend[ing] the nation by the Marine Corps.18
seeing adversary activity, blocking attacks, and
maneuvering in cyberspace to defeat them.” These In 2022, the CNMF became a sub-unified
operations are largely conducted as independent combatant command, endowing it with additional
campaigns, not in support of combatant authorities and responsibilities. Its commander
command missions. explained that this status will enable CNMF to build
“a force that can move faster than our adversaries,
• Twenty-seven Cyber Combat Mission Teams, which
because we have the right set of equipment, the right
“conduct military cyber operations in support of
authorities, and the right procedures that move with
combatant commands.”
agility and speed.”19
• Sixty-eight Cyber Protection Teams responsible
for “defend[ing] the DOD information networks, The 14 additional CMF teams are supposed to be
protect[ing] priority missions, and prepar[ing] cyber stood up between fiscal years 2022 and 2026. Five
forces for combat.” of the new teams are slated to come from the Army,
• Twenty-five Cyber Support Teams, which provide with the Air Force and Navy providing five and four,
analytic and planning support to CNMF and the respectively.20 By mid-2023, however, it became clear
Cyber Combat Mission Teams.16 that CYBERCOM would need to delay its plans.
In particular, the Navy will not be able to deliver
• Fourteen new teams responsible for supporting new teams for at least a few years because it needs
combatant commanders in space operations and to focus on improving the readiness of its existing
countering cyber influence. cyber personnel.21
In 2018, CYBERCOM attested that the original 133 Moreover, even the existing teams have not actually
CMF teams achieved full operational capacity (FOC). reached FOC despite what CYBERCOM claims.
In other words, each team ostensibly had the ability
15. “Our History,” U.S. Cyber Command, accessed January 8, 2024. (https://www.cybercom.mil/About/History); U.S. Department of
Defense, “Fiscal Year 2024 Defense Budget Overview,” Office of the Comptroller, April 2022, page 24. (https://comptroller.defense.gov/
Portals/45/Documents/defbudget/FY2023/FY2023_Budget_Request_Overview_Book.pdf )
16. Catherine A. Theohary, “Defense Primer: Cyberspace Operations,” Congressional Research Service, updated December 9, 2022. (https://
sgp.fas.org/crs/natsec/IF10537.pdf )
17. U.S. Cyber Command Public Affairs, “Cyber Mission Force achieves Full Operational Capability,” U.S. Cyber Command, May 17,
2018. (https://www.cybercom.mil/Media/News/News-Display/Article/1524492/cyber-mission-force-achieves-full-operational-capability)
18. Mark Pomerleau, “Here’s how DoD organizes its cyber warriors,” C4ISRNET, July 25, 2017. (https://www.c4isrnet.com/workforce/
career/2017/07/25/heres-how-dod-organizes-its-cyber-warriors)
19. Cyber National Mission Force Public Affairs, “The Evolution of Cyber: Newest Subordinate Unified Command is Nation’s Joint Cyber
Force,” U.S. Cyber Command, December 19, 2022. (https://www.cybercom.mil/Media/News/Article/3250075/the-evolution-of-cyber-
newest-subordinate-unified-command-is-nations-joint-cybe)
20. C. Todd Lopez, “Cyber Mission Force Set to Add More Teams,” DOD News, April 6, 2022. (https://www.defense.gov/News/
News-Stories/Article/Article/2991699/cyber-mission-force-set-to-add-more-teams)
21. Martin Matishak, “Cyber Command Reshuffles Force Expansion Due to Navy Readiness Woes,” The Record, June 14, 2023. (https://
therecord.media/cyber-command-reshuffles-cyber-mission-force-due-to-navy-readiness-woes); Mark Pomerleau, “Following reforms,
Navy seeing cyber mission force readiness improvements,” DefenseScoop, February 22, 2024. (https://defensescoop.com/2024/02/22/
navy-reforms-cyber-mission-force-readiness-improvements)
Page 10
United States Cyber Force: A Defense Imperative
22. Robert Chesney, “Traditional Military Activities in Cyberspace: Clarifying DOD’s Authority and the Line Between T10
and T50 Activities?” Lawfare. May 9, 2011. (https://www.lawfaremedia.org/article/traditional-military-activities-cyberspace-
clarifying-dods-authority-and-line-between-t10-and-t50); Paul C. Ney Jr., “DOD General Counsel Remarks,” Speech before
the U.S. Cyber Command Legal Conference, March 2, 2020. (https://www.defense.gov/News/Speeches/speech/article/2099378/
dod-general-counsel-remarks-at-us-cyber-command-legal-conference)
23. John S. McCain National Defense Authorization Act for Fiscal Year 2019, Pub. L. 115-232, 132 Stat. 2123 and 132 Stat. 2132,
§§ 1632 and 1642. (https://www.govinfo.gov/app/details/PLAW-115publ232); Catherine A. Theohary, “Defense Primer: Cyberspace
Operations,” Congressional Research Service, updated December 9, 2022. (https://sgp.fas.org/crs/natsec/IF10537.pdf ); Robert
Chesney, “The Law of Military Cyber Operations and the New NDAA,” Lawfare, July 26, 2018. (https://www.lawfareblog.com/
law-military-cyber-operations-and-new-ndaa)
24. Mark Pomerleau, “What good are ‘exceptional’ cyber capabilities without authority?” C4ISRNET, July 16, 2019. (https://www.c4isrnet.
com/dod/2019/07/16/what-good-are-exceptional-cyber-capabilities-without-authority)
25. “NSPM-13 and the Future of Cyber Warfare,” The Hudson Institute, May 5, 2022. (https://www.hudson.org/events/2109-virtual-event-
nspm-13-and-the-future-of-cyber-warfare52022)
26. Paul M. Nakasone, “2023 Posture Statement of General Paul M. Nakasone,” U.S. Cyber Command, March 7, 2023. (https://www.
cybercom.mil/Media/News/Article/3320195/2023-posture-statement-of-general-paul-m-nakasone)
27. Ibid.
28. U.S. Department of Defense, U.S. Cyber Command, “Fiscal Year 2024 Budget Estimates United States Cyber Command,” March
2023. (https://comptroller.defense.gov/Portals/45/Documents/defbudget/fy2024/budget_justification/pdfs/01_Operation_and_
Maintenance/O_M_VOL_1_PART_1/CYBERCOM_OP-5.pdf )
29. U.S. Department of Defense, “Fiscal Year (FY) 2024 Budget Estimates. Operation and Maintenance, Defense-Wide,” March 2023.
(https://comptroller.defense.gov/Portals/45/Documents/defbudget/fy2024/budget_justification/pdfs/01_Operation_and_Maintenance/
O_M_VOL_1_PART_1/OM_Volume1_Part1.pdf )
Page 11
United States Cyber Force: A Defense Imperative
The promise of EBC was that it would bring not as a result of, the U.S. military’s current organization
CYBERCOM closer to the U.S. Special Operations for cyberspace operations.
Command (SOCOM) model, in which the force
employer helps guide procurement. However, the Congress has repeatedly raised concerns about
services still retain the vast majority of cyber-specific these issues. At a March 2023 hearing, Rep. Mike
funding, continuing CYBERCOM’s dependency Gallagher (R-WI) noted: “Since 2013, Congress has
on the services. The persistent structural problems tried to address force design and readiness through
render CYBERCOM unable to provide for itself. 24 different pieces of legislation. Twenty-four. And
It continues to rely on the military services and, in over that same period, we have tried to address the
some circumstances, the NSA for personnel, funding, civilian and military cyber workforce dilemma 45
foundational intelligence support, procurement and times; CYBERCOM acquisition matters, 12 times;
acquisition activities for cyber-specific capabilities, and defense industrial base cybersecurity, 42 times.”34
research and development for tools, and infrastructure
supporting cyber operations. Nearly every year for the past decade, Congress has
requested information or reports about military cyber
Congressional Concerns About readiness — a clear indication DoD has been unable
to satisfy congressional concerns. In 2016, Congress
CYBERCOM’s Insufficient Maturity mandated that CYBERCOM launch an expedited two-
Over the past five years, CYBERCOM has achieved year force-generation effort because the CMF had not
important operational successes. It has conducted achieved sustainable readiness.35 The next year, Congress
“hunt forward” operations at the invitation of allied and requested briefings on cyber readiness shortfalls.36 In
partner nations to help uncover and defeat cyber threats the FY 2020 NDAA, Congress required the secretary
in their networks.30 It has also defended U.S. elections,31 of defense to analyze the benefits and drawbacks of
responded to Iranian hackers in Albania,32 and helped “establishing a cyber force as a separate uniformed
Ukraine shore up its cyber systems following Russia’s service.”37 Two years later, Congress again called for an
2022 invasion.33 However, these successes came despite, assessment of U.S. cyber posture.38
30. U.S. Cyber Command, Press Release, “‘Building Resilience’: U.S. returns from second defensive Hunt Operation in Lithuania,” September
12, 2023. (https://www.cybercom.mil/Media/News/Article/3522801/building-resilience-us-returns-from-second-defensive-hunt-operation-
in-lithuania)
31. David Vergun, “Cybercom’s Partnership with NSA Helped Secure US Elections, General Says,” DoD News, March 25, 2021. (https://
www.defense.gov/News/News-Stories/Article/Article/2550364/cybercoms-partnership-with-nsa-helped-secure-us-elections-general-says)
32. Cyber National Mission Force Public Affairs, “‘Committed Partners in Cyberspace’: Following cyberattack, US conducts first defensive
Hunt Operation in Albania,” U.S. Cyber Command, March 23, 2023. (https://www.cybercom.mil/Media/News/Article/3337717/
committed-partners-in-cyberspace-following-cyberattack-us-conducts-first-defens)
33. David Vergun, “Partnering with Ukraine on Cybersecurity Paid Off, Leaders Say,” DoD News, December 3, 2022. (https://www.defense.
gov/News/News-Stories/Article/Article/3235376/partnering-with-ukraine-on-cybersecurity-paid-off-leaders-say)
34. Mike Gallagher, “Cyberspace Operations: Conflict in the 21st Century,” Hearing before the House Armed Services Committee, Cyber,
Information Technologies, and Innovation Subcommittee, March 30, 2023. (https://armedservices.house.gov/hearings/cyber-information
-technologies-and-innovation-subcommittee-hearing-cyberspace-operations)
35. National Defense Authorization Act for Fiscal Year 2017, Pub. L. 114-328, 130 Stat. 2602, §1643. (https://www.congress.gov/
bill/114th-congress/senate-bill/2943/text)
36. National Defense Authorization Act for Fiscal Year 2018, Pub. L. 115-91, 131 Stat. 1748 §1644. (https://www.congress.gov/
bill/115th-congress/house-bill/2810/text)
37. National Defense Authorization Act for Fiscal Year 2020, Pub. L. 116-92, 133 Stat. 1748, §1635. (https://www.congress.gov/116/
plaws/publ92/PLAW-116publ92.pdf )
38. National Defense Authorization Act for Fiscal Year 2022, Pub. L. 117-81, 135 Stat. 2033, §1509. (https://www.congress.gov/
bill/117th-congress/senate-bill/1605/text)
Page 12
United States Cyber Force: A Defense Imperative
39. Kristy N. Kamarck and Catherine A. Theohary, “FY2023 NDAA: Cyber Personnel Policies,” updated March 6, 2023. (https://
crsreports.congress.gov/product/pdf/R/R47270); James M. Inhofe National Defense Authorization Act for Fiscal Year 2023, Pub. L. 117-
263, 136 Stat. 2903, §1533. (https://www.congress.gov/117/plaws/publ263/PLAW-117publ263.pdf )
40. U.S. Cyber Command Public Affairs, “Commander, US Cyber Command rolls out new Strategic Priorities,” U.S. Cyber Command, May
18, 2023. (https://www.cybercom.mil/Media/News/Article/3399867/commander-us-cyber-command-rolls-out-new-strategic-priorities)
41. Grace Dille, “DoD Fleshing out Cyber Command 2.0 Options,” MeriTalk, December 8, 2023. (https://www.meritalk.com/articles/
nakasone-calls-for-a-revamped-cybercom-2-0)
42. Jaspreet Gill, “With new threats, ‘CYBERCOM 2.0’ must push past ‘status quo’: Nakasone,” Breaking Defense, December 8, 2023.
(https://breakingdefense.com/2023/12/with-new-threats-cybercom-2-0-must-push-past-status-quo-nakasone)
43. All of the personal accounts included in this monograph are excerpted from interviews with active and recently retired servicemembers
and Defense Department civilians between December 2022 and January 2024.
Page 13
United States Cyber Force: A Defense Imperative
the other warfighting domains. Acquisition of software deficiencies in the U.S. military’s current cyber force
or exploits, for example, must occur rapidly to ensure generation model and readiness. They also help explain
they are not rendered obsolete.44 Moreover, many of the why the establishment of a Cyber Force is the best
most cutting-edge capabilities reside within the private and only solution to these challenges. (See Appendix
sector, including in industries not traditionally part of A for excerpts from the interviews and a demographic
the defense-industrial base. Finally, there is a potentially breakdown of the interviewees.)
greater role for non-uniformed civilian personnel in
cyberspace capability development and employment. Recruitment and Retention Shortfalls
The U.S. military is failing to recruit and retain
44. U.S. Department of Defense, “DoD Instruction 5000.87 Operation of the Software Acquisition Pathway,” October 2, 2020. (https://
www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/500087p.PDF?ver=virAfQj4v_LgN1JxpB_dpA%3D%3D)
45. See also: John Fernandes, Nicolas Starck, Richard Shmel, Charles Suslowicz, and Jan Kallberg, “Assessing the Army’s Cyber Force
Structure,” The US Army War College Quarterly, August 25, 2022. (https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=3170&
context=parameters)
46. Chad Bates and Charlene Rose, “Understanding-and Fixing-The Army’s Challenge in Keeping Cyber Talent,” Modern War Institute,
May 17, 2022. (https://mwi.usma.edu/understanding-and-fixing-the-armys-challenge-in-keeping-cyber-talent). For its part, the Army
still insists it does not have a retention problem because it is able to maintain its target staffing numbers. However, those numbers may
be misleading given that, as discussed later, the services are currently unable to ensure they have sufficient staffing for CYBERCOM work
roles. Moreover, the issue is not just the sheer number of personnel but their talent. Multiple interviewees decried the challenges of retaining
talented personnel. Even if the services retain enough people, they are losing some of their most qualified.
Page 14
United States Cyber Force: A Defense Imperative
A Cyber Force would be far better equipped to manning CYBERCOM refrain from pursuing these
recruit and retain cyber personnel, as the success of choices aggressively because cyber is only one mission
the Space Force has shown. Despite competing with and not their primary charge.” A Cyber Force, by
private sector firms that offer more attractive salaries, contrast, would naturally put cyber first.51
the Space Force has not faced problems recruiting
high-level talent.47 Because it is relatively small, the Inconsistent Compensation
Space Force can selectively recruit highly skilled In addition to being inadequate, U.S. military
individuals rather than pursuing bulk accessions to compensation for cyber personnel is inconsistent across
fill the ranks like the larger services.48 the services, damaging morale and esprit de corps.
Services Fail to Use Tools at Their Disposal Once the services recruit personnel, each service
To be fair to the services, the U.S. military is not the separately determines which ranks serve in which jobs.
only one struggling to recruit cyber talent. There is a The Marines might assign a staff sergeant (E-6) to the
national shortage of cyber personnel, and the federal same job the Air Force assigns a first sergeant (E-8).
government struggles to compete with the private With different pay scales and incentives for these
sector, which offers much better pay.49 different ranks, the result is wide pay discrepancies
between individuals performing identical work.
Unlike the military, civilian government agencies Even when the servicemembers have similar levels
use creative promotion schemes to ensure their of experience, compensation varies significantly.
cyber workforce is well-compensated, even if salaries For example, the monthly salaries of two Interactive
do not match the private sector. The military also On-Net Operators (IONs) from different services,
has some tools it can use to improve compensation, each with four to five years of experience, serving in
but the services are not using them effectively. the same location and performing largely the same
For example, the 2022 GAO study found that job, may differ by more than $700.52 This discrepancy
the Army was not offering enlistment bonuses to does not even take into account differences in housing
cyber personnel.50 allowances or pay incentives.
As one Army captain explained, CYBERCOM itself GAO studies have found that enlistment bonuses
“is not able or empowered to use these options.” also vary dramatically across the services. Whereas
Meanwhile, “the service components responsible for GAO found in 2022 that the Army was not offering
47. Lauren C. Williams, “Recruiting Crisis? Not at Space Force,” Defense One, December 2, 2022. (https://www.defenseone.com/
policy/2022/12/recruiting-crisis-not-space-force/380369)
48. Leo Shane III, “Space Force eyes easing enlistment rules to target high-demand skills,” Air Force Times, September 13, 2022. (https://
www.airforcetimes.com/news/pentagon-congress/2022/09/13/space-force-eyes-easing-enlistment-rules-to-target-high-demand-skills)
49. Sue Poremba, “The cybersecurity talent shortage: The outlook for 2023,” Cybersecurity Dive, January 5, 2023. (https://www.
cybersecuritydive.com/news/cybersecurity-talent-gap-worker-shortage/639724)
50. Government Accountability Office, “Military Cyber Personnel: Opportunities Exist to Improve Service Obligation Guidance and Data
Tracking,” December 21, 2022, page 26. (https://www.gao.gov/assets/gao-23-105423.pdf )
51. The Cyber Force could also remove combat fitness test requirements, establish more flexible grooming standards, or recruit
neurodiverse individuals for certain work roles. For an example of how other countries are recruiting non-traditional cyber
servicemembers, see: Shira Rubin, “The Israeli Army Unit That Recruits Teens With Autism,” The Atlantic, January 6, 2016.
(https://www.theatlantic.com/health/archive/2016/01/israeli-army-autism/422850); Anna Ahronheim, “IDF aims to recruit
500 soldiers with autism by end of 2022,” The Jerusalem Post (Israel), November 8, 2021. (https://www.jpost.com/israel-news/
idf-aims-to-recruit-500-soldiers-with-autism-by-the-end-of-2022-684354)
52. Government Accountability Office, “Military Cyber Personnel: Opportunities Exist to Improve Service Obligation Guidance and Data
Tracking,” December 21, 2022, page 27. (https://www.gao.gov/assets/gao-23-105423.pdf )
Page 15
United States Cyber Force: A Defense Imperative
enlistment bonuses, the Marine Corps was offering not included in this Army regulation. As a result,
$2,000 for cyber career fields, and the Navy was personnel could attend an expensive year-long cyber
offering $5,000 with an additional $30,000 bonus training course and leave the military soon afterward.57
after training completion.53 Until legislative intervention in 2023, the Marine
Corps could not assign additional service obligations
The services also use bonuses and incentives for lengthy and expensive cyber training.58
inconsistently and without regard for who is a worthy
recipient. According to the 2022 GAO study, the Culture
services base retention bonuses for cyber personnel
Many officers have described how service culture
on their broader military career, not their unique
denigrates cyber talent, damaging the morale of cyber
skill sets.54 These findings matched conclusions from
personnel and eroding retention.59 “Retention rates of
a 2017 GAO study.55 The persistence of these issues
cyber personnel are abysmal,” one retired Navy captain
five years after the initial GAO study underscores that
remarked. “The biggest reason the services hemorrhage
the services cannot fix these problems themselves.
talent is that cyber personnel do not feel valued by
Inconsistent and Poorly Designed their service’s culture.” Similarly, a retired Army
Length-of-Service Requirements colonel shared, “I’ve seen senior warfighting leaders
dismissively call cyber research ‘book reports,’ cyber
Low cyber retention rates stem in part from inconsistent operators ‘nerds,’ and cyber capability development
and poorly designed length-of-service requirements. ‘science projects.’” Only the creation of a new service
Because each service has its own retention policies, dedicated to cyberspace can address these kinds of
they have distinct requirements for how long their entrenched cultural challenges.
servicemembers, including cyber personnel, must
remain on active duty. What is more, these requirements Inconsistent Career Field Designations,
do not adequately account for the “lengthy and
expensive advanced cyber training” provided to cyber
Skill Sets, and Training
personnel, according to the GAO.56 Across the services, cyber-related career field assessments,
assignments, designations, and skill sets60 are ill-defined
For example, the Army usually requires officers and disjointed. This fragmented approach undermines
to serve three times the length of their training. training and personnel management.
However, many advanced cyber training courses are
53. Government Accountability Office, “Military Cyber Personnel: Opportunities Exist to Improve Service Obligation Guidance and Data
Tracking,” December 21, 2022, page 26. (https://www.gao.gov/assets/gao-23-105423.pdf )
54. Government Accountability Office, “Military Cyber Personnel: Opportunities Exist to Improve Service Obligation Guidance and Data
Tracking,” December 21, 2022, page 11. (https://www.gao.gov/assets/gao-23-105423.pdf )
55. Government Accountability Office, “Military Compensation: Additional Actions Are Needed to Better Manage Special and Incentive
Pay Programs,” February 3, 2017. (https://www.gao.gov/products/gao-17-39)
56. Government Accountability Office, “Military Cyber Personnel: Opportunities Exist to Improve Service Obligation Guidance and Data
Tracking,” December 21, 2022. (https://www.gao.gov/assets/gao-23-105423.pdf )
57. Government Accountability Office, “Military Cyber Personnel: Opportunities Exist to Improve Service Obligation Guidance and Data
Tracking,” December 21, 2022, pages 12-13. (https://www.gao.gov/assets/gao-23-105423.pdf )
58. Government Accountability Office, “Military Cyber Personnel: Opportunities Exist to Improve Service Obligation Guidance and Data
Tracking,” December 21, 2022, page 14. (https://www.gao.gov/assets/gao-23-105423.pdf ); National Defense Authorization Act for Fiscal
Year 2024, Pub. L. 118-31, 137 Stat. 243, §509. (https://www.congress.gov/bill/118th-congress/house-bill/2670)
59. Suzanne Smalley, “Cyber Command’s rotation ‘problem’ exacerbates talent shortage amid growing digital threat,” CyberScoop, August
18, 2022. (https://cyberscoop.com/military-rotation-norms-challenge-cyber-command)
60. While each military service refers to career fields differently, for the purposes of this section, we will refer generically to Military
Occupational Specialty (MOS) in reference to both officer and enlisted career fields.
Page 16
United States Cyber Force: A Defense Imperative
61. Geoff Ziezulewicz, “A new Navy ‘cyber’ rating is in the works,” Navy Times, February 15, 2023. (https://www.navytimes.com/news/
your-navy/2023/02/15/a-new-cyber-rating-is-in-the-works)
Page 17
United States Cyber Force: A Defense Imperative
Figure 2 contrasts CYBERCOM-defined work roles for a Naval aviator is $2.2 million, according to a
with service-specific cyber career field designations and RAND report.63 By contrast, the GAO found that
titles for both officers and enlisted personnel.62 There the training and subsequent certification to become
is little overlap between the two. Furthermore, the an interactive on-net operator costs between $220,000
service-based training with each military occupational and $500,000.64
specialty (MOS) does not slot into any particular
CYBERCOM work role. The GAO also found that courses are “not listed in
regulation or in Army or joint training systems of
Compared to the other warfighting domains, the record.” There are long breaks between courses, and
U.S. military spends relatively little time and money the length of the courses themselves fluctuates. In
on training for cyber officers. The initial cost of addition, there are often significant delays between
training an Air Force fighter pilot ranges from $5.6 when candidates are nominated for training and
to $10.9 million, and the annual cost of training when they attend.65
Figure 2: Service-Specific Cyber Career Field Designations and CYBERCOM Work Roles
Source: Adapted from the Government Accountability Office with additional research and input from interviewed experts (https://www.
gao.gov/assets/gao-23-105423.pdf page 8).
62. Government Accountability Office, “Federal Workforce: OPM Advances Efforts to Close Government-wide Skills Gaps but Needs a
Plan to Improve Its Own Capacity,” February 27, 2023, pages 18-22. (https://www.gao.gov/products/gao-23-105528)
63. For more information, see also: Michael G. Mattock, Beth J. Asch, James Hosek, and Michael Boito, “The Relative Cost-Effectiveness of
Retaining Versus Accessing Air Force Pilots,” RAND Corporation, March 27, 2019. (https://www.rand.org/pubs/research_reports/RR2415.html)
64. Government Accountability Office, “Military Cyber Personnel: Opportunities Exist to Improve Service Obligation Guidance and Data
Tracking,” December 21, 2022, page 12. (https://www.gao.gov/assets/gao-23-105423.pdf )
65. Government Accountability Office, “Military Cyber Personnel: Opportunities Exist to Improve Service Obligation Guidance and Data
Tracking,” December 21, 2022, page 14. (https://www.gao.gov/assets/gao-23-105423.pdf )
Page 18
United States Cyber Force: A Defense Imperative
Across the services, there is also a lack of continual replete with commissioned and non-commissioned
training for the officer corps. An April 2023 paper officers who may be good leaders but lack the cyber-
published by the National Defense University specific skills and experience necessary to excel.
concluded that the cyber domain requires continual
training with some technical training delivered every Standard service processes require an individual to
18 to 24 months.66 Although servicemembers often have held certain positions to be promoted. These
have the opportunity to attend graduate school, such roles are often entirely unrelated to CYBERCOM
courses are also not well suited to technical training for priorities. In the Army, for example, a lieutenant must
a dynamic, rapidly changing field. Such courses are also serve as a platoon leader before being promoted. But
different from the more specialized cyber upskilling many technically proficient cyber operators never
needed to create effective leaders. hold the positions deemed necessary for advancement.
Consequently, they are passed over for promotion, while
Inability to Manage Cyber Personnel those without cyber expertise are placed in command.
Because the services do not designate personnel for Compounding this issue, the personnel in charge of
particular CYBERCOM work roles, “military service the promotion process within each service typically
officials cannot determine if specific work roles are lack the requisite cyber knowledge to make effective
experiencing staffing gaps,” the GAO concluded. Put promotion decisions. A U.S. Army colonel noted that
simply, the services do not know if they have “the right the individuals on service promotion boards struggle
personnel to carry out key missions.”67 to differentiate between “officers with advanced,
skilled degrees in computer science from esteemed
Likewise, there is no system or method to track
institutions” and “those who received online degrees in
individuals with cyber skills as they transition to and
information management. … This is akin to equating
from the services and CYBERCOM. This means a
a brain surgeon with a field medic.”
servicemember may enter with initial training for
a cyber-related career field but could be moved to a It does not have to work this way. The Space Force
non-cyber career track during one of these transitions. provides an illustration. As a first lieutenant in the
Such reassignments stem from the reality that the Air Force explained, the “Space Force gives the best-
services understandably prioritize their unique needs qualified commanders the best-qualified experts (long-
and missions, which may not allow for individual time members who have reached the major, lieutenant
personnel to stay on a cyber-specific track for the colonel, or warrant officer levels), and those experts
duration of their career.68 retain the ability to work a technical role while still
benefiting from career progression.” By contrast, the
Promotion Processes Do Not Reward current promotion system for cyber “robs all highly
Technical Competence technical career fields of their most qualified experts, as
The services determine promotions for their cyber our antiquated career progression system demands they
personnel, but they use systems designed for the go on to command something rather than do their best
non-cyber world. These systems reward command work at the keyboard.”
experience — usually in non-cyber fields — over
technical competence. As a result, the services are
66. Lieutenant Colonel Jeffrey A Couillard, “Cyber Military Force,” National Defense University, April 26, 2023.
67. Government Accountability Office, “Military Cyber Personnel: Opportunities Exist to Improve Service Obligation Guidance and Data
Tracking,” December 21, 2022. (https://www.gao.gov/assets/gao-23-105423.pdf )
68. Suzanne Smalley, “Cyber Command’s rotation ‘problem’ exacerbates talent shortage amid growing digital threat,” CyberScoop, August
18, 2022. (https://cyberscoop.com/military-rotation-norms-challenge-cyber-command)
Page 19
United States Cyber Force: A Defense Imperative
The current promotion system creates real risks to Indeed, interviewees for this project cite numerous
U.S. security. In a June 2023 military journal article, examples of senior officers who have little to no
Navy Reserve Lieutenant Commander Eric Seligman experience in the cyber domain — even though
notes that officers without cyber warfare experience the services have had 13 years since the creation of
struggle to assess the risks stemming from cyber CYBERCOM to develop qualified senior leaders. Of
operations. They face decision paralysis, improperly the U.S. military’s more than 45 general and flag officers
staff subordinate positions, and often fail to employ involved in cyber as of summer 2023, fewer than five
technical solutions necessary to achieve operational had any technical experience in the cyber domain.71
and tactical objectives. They also have difficulty
translating doctrine into action, distinguishing CYBERCOM today has promotable talent, but the
good from bad operational and tactical advice, and military is not properly utilizing it. A Marine Corps
predicting enemy maneuvers.69 captain stated that he “personally had career setbacks
because (he) pursued a master’s degree in computer
science instead of a military war-college certificate.”
69. Eric Seligman, “Changing the Cyber Warfare Leadership Paradigm | Proceedings,” U.S. Naval Institute, June 2023. (https://www.usni.
org/magazines/proceedings/2023/june/changing-cyber-warfare-leadership-paradigm)
70. Ibid.
71. Michael J. Vassalotti, Sofia Plagakis, and Barbara Salazar Torreon, “General and Flag Officers in the US Armed Forces: Background and
Considerations for Congress,” Congressional Research Service, February 1, 2019. (https://sgp.fas.org/crs/natsec/R44389.pdf ); “Leadership,”
U.S. Fleet Cyber Command/U.S. Tenth Fleet, accessed March 9, 2024. (https://www.fcc.navy.mil/LEADERSHIP)
Page 20
United States Cyber Force: A Defense Imperative
mission,” a U.S. Air Force major commented. “Less centers for other warfighting domains, such as the Army’s
than 10 percent of team members have been on the National Ground Intelligence Center or the Navy’s
team for over a year,” placing a significant burden Office of Naval Intelligence. These centers address
on the few experienced analysts to both execute standing intelligence requirements about adversary
operations and train new personnel. The CNMF’s capabilities and strategies. Last year, the outgoing
elevation to a sub-unified command in December commander of CYBERCOM’s Joint Intelligence
2022 partly resolved this issue, but the CNMF is only Operations Center called the absence of a comparable
one-third of the CMF. The other teams continue to center for cyber intelligence a “gaping hole.”74
lack administrative support.
In 2023, CYBERCOM announced it would establish
The administrative burden foisted onto cyber operators a foundational cyber center in partnership with the
undermines talent retention. A 2019 internal survey of Defense Intelligence Agency (DIA) and NSA. In
the U.S. Army Cyber Command workforce found that effect, CYBERCOM attempted to build a service-
“a factor in their decision to leave after their contracts like capability to remediate the gaps stemming
or service obligations expired was their inability to from the absence of an independent cyber service.
focus on the mission or tradecraft (i.e., time spent The final version of the FY 2024 NDAA, however,
on keyboard) due to the constant distractions from did not include the proposed provision to establish
administrative requirements.”72 such a center.75
72. Chad Bates and Charlene Rose, “Understanding—And Fixing—The Army’s Challenge In Keeping Cyber Talent,” Modern War Institute,
May 17, 2022. (https://mwi.westpoint.edu/understanding-and-fixing-the-armys-challenge-in-keeping-cyber-talent)
73. Michael Warner, “Intelligence in Cyber—and Cyber in Intelligence,” Carnegie Endowment for International Peace, October 16, 2017.
(https://carnegieendowment.org/2017/10/16/intelligence-in-cyber-and-cyber-in-intelligence-pub-73393)
74. Alexandra Lohr, “Cyber Command plans an intelligence center to call its own,” Federal News Network, March 1, 2023. (https://
federalnewsnetwork.com/defense-main/2023/03/cyber-command-plans-an-intelligence-center-to-call-its-own)
75. Mark Pomerleau, “Lawmakers nix proposal to create military cyber intelligence capability,” DefenseScoop, December 7, 2023. (https://
defensescoop.com/2023/12/07/congress-nixes-proposal-to-create-military-cyber-intelligence-capability). As noted in the article, while
the conference report on the bill argued that intelligence support “must be substantially improved,” lawmakers did not want to “dictate a
specific organizational solution, but expect the Secretary of Defense to generate and implement one.”
Page 21
United States Cyber Force: A Defense Imperative
in other fields.76 Mental health initiatives exist across A lieutenant colonel in the U.S. Army Reserves, speaking
the DoD, including for Special Operations Forces, from personal experience at the CNMF, observed a
pilots, and operators involved with unmanned aerial “general tension” between the administrative control
flight operations.77 However, there are no programs and operational control commands. “[W]e are forced
for the distinct challenges faced by cyber personnel. to pull servicemembers away from operational tasks to
instead conduct service-related activities … This is a
Without an understanding of the work roles and systemic problem that, in mine and others’ opinions,
tasks of cyber operators, the services (and specific hurts retention, as it undermines morale,” the officer
commanders) may not appreciate the need for mental said. Administrative control commanders “often create
health services. One officer shared his troubling requirements at the expense of the mission. There are
experience: “I think many folks in military cyber have well documented times when units have closed down
been struggling with inexperienced leadership. But joint mission areas en masse to conduct unit events.”
in [my service], those put in charge of cyber units can
be downright hostile to technical cyber officers. For An Air Force major shared a similar experience: “In
example, how about getting retaliated against by your one instance, a group commander required a 12-week
[commanding officer] and your chain of command ‘life skills’ course that taught new airmen how to
simply for going to mental health [treatment]? That cook, how to date, and how to be emotionally healthy.
thing they said in the yearly [general military training] Meanwhile, the mission was manned at less than 60
about how going to mental health won’t affect your percent.” The major said, “Another commander cited
clearance … it happened to me.” an ‘unwritten rule’ stating that he only owed the [NSA]
80 percent of his airmen’s time and the other 20 percent
Service Control and Service-Related belongs to the USAF.”
Requirements Degrade Full Operational In addition to impinging on cyber operators’ time,
Capability the services can also rotate them to different, non-
“Years of investment and training are lost when cyber assignments. As one Army colonel explained,
servicemembers are moved away from the cyber “Upskilling talent is hard, takes years, and as soon as
mission,” a general officer lamented. But because someone reaches a threshold, the service rotates that
the services retain administrative control over cyber person out of the team and back to a service assignment
personnel assigned to CYBERCOM, the services … The demands within the services are continuing to
can pull them out for service-related requirements pull talent away from the CMF.”
unrelated to their cyber roles. This is one important
reason why CYBERCOM was unable to get all 133 The services’ FOC shell game
CMF teams up to FOC status and why it is so difficult By 2018, all the existing CMF teams had officially
for teams to maintain that status. reached FOC, meaning they were supposed to have
sufficiently trained and equipped personnel to execute
76. Jim Garamone, “Cybercom, NSA Senior Enlisted Leader Discusses Troops, Training, and Mental Health,” Defense.gov, May 14, 2019.
(https://www.defense.gov/News/News-Stories/Article/Article/1847532/cybercom-nsa-senior-enlisted-leader-discusses-troops-
training-mental-health)
77. “Preservation of the Force and Family,” Special Operations Command Headquarters, accessed March 9, 2024. (https://www.socom.
mil/POTFF/Pages/mind-mental_health.aspx); U.S. Department of Defense, Press Release, “Department of Defense Mental Health
Resources for Service Members and Their Families,” August 18, 2021. (https://www.defense.gov/News/Releases/Release/Article/2737954/
department-of-defense-mental-health-resources-for-service-members-and-their-fam)
Page 22
United States Cyber Force: A Defense Imperative
their missions.78 Yet fewer CMF teams are actually at a core squad of fully trained people cleverly assigned
FOC than official metrics indicate. to launder the reality that most soldiers were not
fully trained.” This deception “was compounded
First of all, the services have not recruited and trained by unrealistic training timelines.” U.S. Army Cyber
enough cyber personnel to fill 133 teams. As an Army Command “issued demanding deadlines to reach
colonel noted, “The lack of talented personnel to fill FOC, and lower-level commanders would then
the positions on the teams has been and continues force timelines to move even faster — presumably to
to be a severely limiting factor for the overall force. maximize their personal performance evaluations.”
From the onset of U.S. Cyber Command, [the] The result was an “environment that incentivized
services focused on recruiting, retaining, and filling exaggerating how many soldiers and [Cyber
teams to reach fully operational capable (FOC) Protection Teams] were FOC and disguising our
status. Once teams achieve FOC, they often filled numbers to higher headquarters.”
between 67-75 percent capacity.” As a result, teams
that are officially considered to be FOC are not, in Acquisitions Challenges
reality, at 100 percent strength.
Across the U.S. military, it takes an average of 10 to
According to multiple interviewees, proficient cyber 15 years to field a new capability.79 Yet in the cyber
operators are double-counted to make it appear like domain, tools are frequently updated and rendered
all the teams are at full strength. The services “play obsolete within a year or two of development (if not
a shell game [with their] top tier talent,” one Army sooner). Nevertheless, the services continue to enjoy
major warned. “It is a common occurrence that the a preponderant share of the budget and acquisitions
same 50 people are constantly task-organized from authority for cyberspace even though they have
across the force to solve any and all of the command’s not adapted to meet CYBERCOM’s timeline for
hardest problems.” An Army captain gave a similar tool acquisition. Thus, CYBERCOM is stuck with
account of how his service initially brought its cyber out-of-date capabilities and is forced to borrow the
teams up to FOC: “The Army’s rush to get teams to NSA’s tools, explaining why assessments continue to
Full Operational Capability (FOC) was built on a conclude that severing CYBERCOM from the NSA
farcical shell game in which the same personnel were would have detrimental effects.
moved from recently certified teams to new teams
until all teams had certified. Yet few are able to provide
capability if asked.” “Across the U.S. military, it takes an average of
10 to 15 years to field a new capability. Yet in
An Army Reserve major similarly said that U.S. the cyber domain, tools are frequently updated
Army Cyber Command “consistently bent numbers, and rendered obsolete within a year or two of
changed interpretations, and moved soldiers from
team to team, or mission element to mission
development (if not sooner).
”
element, to paint the picture that teams were both
fully manned and fully trained.” In fact, the officer Recognizing this problem, Congress has intervened
said, “most [Cyber Protection Teams] never exceeded several times to grant CYBERCOM greater control over
75 percent of their intended manning and relied on the acquisition of capabilities, resulting in incremental
78. Samuel Souvannason, “Navy Cyber Mission Force Teams Achieve Full Operational Capacity,” U.S. Department of Defense,
November 2, 2017. (https://www.defense.gov/News/News-Stories/Article/Article/1361059/navy-cyber-mission-force-teams-achieve-full-
operational-capability)
79. Jen Judson, “US Army looks to cut typical acquisition timeline in half,” DefenseNews, December 7, 2017. (https://www.defensenews.
com/land/2017/12/07/army-looks-to-cut-typical-acquisition-timeline-in-half )
Page 23
United States Cyber Force: A Defense Imperative
changes to ameliorate this issue. However, this solution and education. This leads to redundant and
runs contrary to civilian oversight of acquisition, which disparate efforts, not effective preparation for joint
services have and CYBERCOM does not. warfighting. As a major in the U.S. Air Force noted,
“The services and the other combatant commands
In the FY 2016 NDAA, Congress granted have taken it upon themselves to acquire their own
CYBERCOM authority for the development, cyber capabilities to meet their needs, resulting in
acquisition, and sustainment of cyber-specific vast duplication and reliance on defense contractors
equipment and capabilities.80 The following year, to provide questionable and often self-serving
Congress amended DoD’s special emergency operational guidance.”
procurement authority to facilitate defense against
and recovery from a cyberattack.81 As a result of Another Air Force major similarly shared:
more recent congressional direction, CYBERCOM
in 2027 will assume “service-like acquisition decision I’ve witnessed vendors sell the same $100M offering
authority” over platforms that the command uses to to two services under a different name so those
conduct cyber operations.82 services could independently lobby for resources.
I’ve witnessed one service sabotage another’s cyber
Since the passage of the FY 2016 NDAA, CYBERCOM operation (both under the same ‘Joint’ Force
has been able to hire some acquisition professionals, Headquarters) simply because that service did not
but it continues to outsource most contracting, as the receive credit. I’ve seen the services’ acquisition
services make the large purchases on its behalf.83 The communities spend over $1B on poorly defined and
director of CYBERCOM’s acquisitions directorate duplicative cyber requirements to deliver tools that
said that since Congress granted the command EBC, will never be used. Every effort to unify resources
he hoped to hire 40 people in 2023 and up to another and address national priorities is undermined and
50 in 2024. But this is still a fraction of the personnel resisted by the services who perceive no benefit to
required to manage a $3 billion budget. In comparison, their domains.
the Army boasts that its acquisition workforce “is
composed of approximately 32,000 civilian and All of this ultimately reduces force readiness. Without
military professionals,”84 or about one person for every the correct equipment, even the best-trained cyber
$6 million of discretionary budget. warrior cannot be effective in conflict. Moreover,
the ongoing effort to transfer acquisition authority
Despite CYBERCOM’s acquisition authorities and to CYBERCOM, while borne out of a legitimate
EBC, the lion’s share of funding for cyberspace frustration with the status quo, will result in the
activities remains with the services. The services, removal of traditional civilian oversight of acquisition,
however, lack a unified process for spending money which only the services can provide.
on cyber-related capabilities, equipment, training,
80. National Defense Authorization Act for Fiscal Year 2016, Pub. L. 114-92, 129 Stat. 886, §807. (https://www.congress.gov/114/plaws/
publ92/PLAW-114publ92.pdf )
81. National Defense Authorization Act for Fiscal Year 2017, Pub. L. 114-328, 130 Stat. 2600, §1641. (https://www.congress.gov/
bill/114th-congress/senate-bill/2943)
82. Paul M. Nakasone, “2023 Posture Statement of General Paul M. Nakasone,” U.S. Cyber Command, March 7, 2023. (https://www.
cybercom.mil/Media/News/Article/3320195/2023-posture-statement-of-general-paul-m-nakasone)
83. Mark Pomerleau, “Cyber Command looking to bolster acquisition office as it prepares to handle $3B annually,” FedScoop, July 27,
2022. (https://fedscoop.com/cyber-command-looking-to-bolster-acquisition-office-as-it-prepares-to-handle-3b-annually)
84. “Officers in the Army Acquisition Workforce,” United States Army Acquisition Support Center, accessed March 9, 2024. (https://asc.
army.mil/web/career-development/military-officer/information)
Page 24
United States Cyber Force: A Defense Imperative
85. See, for example, Military Cyber Professionals Association, “HammerCon 2023: US Cyber Force Panel (Schafer, Cleary, Franz, and
Montgomery),” June 13, 2023. (https://www.youtube.com/watch?v=CUYfjnlXGDk)
86. Sandra Erwin, “U.S. Air Force to transfer 23 units to the Space Force,” SpaceNews, March 31, 2020. (https://spacenews.
com/u-s-air-force-to-transfer-23-units-to-the-space-force)
87. Bryan Bender, “What the Space Force is, and isn’t,” Politico, February 3, 2021. (https://www.politico.com/news/2021/02/03/
space-force-explained-465799)
88. David Ignatius, “The Space Force needs to get bigger,” The Washington Post, August 22, 2023. (https://www.washingtonpost.com/
opinions/2023/08/22/us-space-force-military-pentagon-competition)
Page 25
United States Cyber Force: A Defense Imperative
should apply the SOCOM model to cyberspace — However, there are no land, sea, or air-specific cyber
notwithstanding SOCOM’s own growing pains over functions that only particular services can provide.
its 30-year history.89 However, while SOCOM and As one U.S. Navy captain noted, SOCOM’s “success
CYBERCOM both possess highly skilled operators, is achieved by allowing each of the service-specific
they are otherwise very different. commands to specialize in discrete types of warfare,
technologies, and operational environments.” By
In the SOCOM model, each of the services provides contrast, as a retired Navy captain noted, “Cyberattacks
the force employer — SOCOM — with expert will not be, nor are they currently, service-specific
personnel who possess skills suited to their particular nor sector-specific, so it does not make sense to
domain. For instance, an Army Ranger trains for have created service-specific mission teams, different
special operations on land, while Navy SEALs possess designators, MOSs, etc., to respond to the broad scale
skills tailored to maritime special operations. Rangers of cyberattacks.”
and SEALs are not interchangeable. The Army
cannot train SEALS, nor the Navy Rangers. Thus, A side-by-side comparison of the SOCOM and CMF
SOCOM actually gains strength from this one-of-a- structures depicts two wholly different organizational
kind distributed force-generation model. architectures, as illustrated in figures 3 and 4. SOCOM’s
Subunified
Special Operations Special Operations Special Operations
Commands Command Central Command Korea Command Pacific
Theater Special
Operations Command
89. Christopher E. Paul and Michael Schwille, “The Evolution of Special Operations as a Model for Information Forces,” National Defense
University Press, Joint Force Quarterly 100, February 10, 2021. (https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2497069/
the-evolution-of-special-operations-as-a-model-for-information-forces)
Page 26
United States Cyber Force: A Defense Imperative
organization into many sub-unified commands and these challenges unavoidable, yet the U.S. military
geographic commands does not reflect the requisite has a better option for cyber force generation.
structure of CMF and its component parts.
Counterargument 4: CYBERCOM should
SOCOM has also faced the same challenges as
CYBERCOM regarding drawing personnel from
absorb many of the man, train, and equip
disparate services. The services’ inconsistent definitions responsibilities from the services.
of overlapping skill sets create incompatibility. This
Rather than creating a Cyber Force, some argue that
makes interoperability challenging, particularly in
CYBERCOM should evolve to absorb the force-
dynamic, high-operational-tempo environments.
generation responsibilities from the other services.
Although the defense community is largely content
This approach would be tantamount to carving out
with the way SOCOM is organized, led, and
an exception for cyber-related military matters from
operated, a GAO report from October 2022 noted
the 1986 Goldwater-Nichols Act, the landmark
that SOCOM has its own challenges concerning
legislation that drew the line between force generation
oversight and command and control.90 For SOCOM,
and force employment.
a dependence on multiple services makes some of
National Mission
Consists of Teams
Cyber Combat
Mission Force
National Support
Teams
Co
n
sis
Cyber National
ts
of
Mission Force
Headquarters
Directed by
National CPTs
Directed by
Service PTs
Service
Cyberspace
Component
Commands
90. Government Accountability Office, “Special Operations Forces: Better Data Necessary to Improve Oversight and Address Command
and Control Challenges,” October 2022. (https://www.gao.gov/assets/gao-23-105163.pdf )
Page 27
United States Cyber Force: A Defense Imperative
DoD Business
Function Elements
DoD Component
Network Operations
Centers and Intelligence Units and Personnel
Cybersecurity
Providers
SOCOM-assigned forces
91. Ellen Nakashima and Tim Starks, “NSA, Cyber Command should continue to share a leader, a key review suggests,” The Washington Post,
December 22, 2022. (https://www.washingtonpost.com/politics/2022/12/22/nsa-cyber-command-should-continue-share-leader-key-review
-suggests)
Page 28
United States Cyber Force: A Defense Imperative
encompass the billets that currently comprise the roles even though it requires highly technical and skilled
CMF: a 6,200-person mission group consisting of personnel.93 At a leadership level, the Space Force’s
servicemembers, civilians, and contractors (see Figure 5).92 establishment mostly required the lateral transfer of
Beyond the CMF, the Cyber Force could also absorb personnel from Air Force Space Command.94 The Space
a select number of billets for cyberspace operators that Force, which currently has 8,400 billets, attributes
currently fall within the SOCOM enterprise. much of its recruiting success to being small, agile, and
selective with applicants. Its leaders understand they
In addition, the Cyber Force would require the transfer do not need to mimic the larger services.95 To boost
(or addition) of support staff billets and infrastructure. recruitment, the service has also taken advantage of
The services would likely need to retain some cyber opportunities for the direct commissioning of civilians
support staff, but a percentage of the cyber-specific with requisite skills for space.96
force-generation billets from each of the services would
transfer to the Cyber Force, particularly those necessary Most importantly, the creation of a Cyber Force would
for Cyber Force training institutions. And some Cyber not require an extensive or complex shuffle of personnel,
Force recruitment of existing servicemembers would be and the services would retain defensive cyber personnel
necessary to fill the remaining gaps in support staff. This and IT infrastructure management capabilities for
shift, however, should not strain the resources of any the DoD information networks (DODIN). The
one service. In total, the Cyber Force would probably creation of a Cyber Force, however, would preclude
initially comprise approximately 10,000 personnel, service-retained personnel from conducting offensive
although this number would likely grow over time as cyberspace operations. Figure 6 illustrates proposed
cyber threats continue to expand. responsibilities of the Cyber Force and the services.
The Cyber Force could draw on lessons from the Space An initial budget for the Cyber Force would be
Force, which has encountered few issues filling its new approximately $16.5 billion, a fraction of the
Figure 6: Proposed Responsibilities for the Cyber Force and the Services
Man, train, equip for the portion of the DoD Information Networks Man, train, equip for the portions of the DODIN owned and operated
(DODIN) owned and operated by Cyber Force owned and operated by the other services
Man, train, equip for the build/operation/maintenance/defense of Man, train, equip for the build/operation/maintenance/defense of
Cyber Force IT infrastructure service-retained IT infrastructure
92. U.S. Cyber Command Public Affairs, “Cyber 101 – Cyber Mission Force,” U.S. Cyber Command, November 1, 2022. (https://www.
cybercom.mil/Media/News/Article/3206393/cyber-101-cyber-mission-force)
93. Lauren C. Williams, “Recruiting Crisis? Not at Space Force,” Defense One, December 2, 2022. (https://www.defenseone.com/
policy/2022/12/recruiting-crisis-not-space-force/380369)
94. “People,” U.S. Space Force, accessed January 8, 2024. (https://www.spaceforce.mil/About-Us/About-Space-Force/USSF-People)
95. Leo Shane III, “Space Force eyes easing enlistment rules to target high-demand skills,” Air Force Times, September 13, 2022. (https://
www.airforcetimes.com/news/pentagon-congress/2022/09/13/space-force-eyes-easing-enlistment-rules-to-target-high-demand-skills)
96. Air Force Recruiting Service, “Constructive Service Credit now offered to applicants for two Space Force career fields,” U.S. Space Force,
October 28, 2022. (https://www.spaceforce.mil/News/Article/3205270/constructive-service-credit-now-offered-to-applicants-for-two-space-
force-caree)
Page 29
United States Cyber Force: A Defense Imperative
97. Estimates do not include the cyberspace activities from SOCOM-aligned units/components. U.S. Department of Defense, “Fiscal Year
2024 Budget Estimates United States Cyber Command,” March 2023. (https://comptroller.defense.gov/Portals/45/Documents/defbudget/
fy2024/budget_justification/pdfs/01_Operation_and_Maintenance/O_M_VOL_1_PART_1/CYBERCOM_OP-5.pdf )
98. U.S. Department of Defense, “Fiscal Year (FY) 2024 Budget Estimates. Operation and Maintenance, Defense-Wide,” March 2023.
(https://comptroller.defense.gov/Portals/45/Documents/defbudget/fy2024/budget_justification/pdfs/01_Operation_and_Maintenance/
O_M_VOL_1_PART_1/OM_Volume1_Part1.pdf )
99. On issues of equipment and capabilities, Cyber Force should be responsible only for Deployable Mission Support Systems, a stand-alone
cyber technology suite based upon an approved USCYBERCOM hardware/software baseline designed to enable the core CPT functions of
hunt, clear, harden, and assess. Commander, Naval Information Forces, Press Release “DMSS on Deck,” September 26, 2022. (https://www.
navifor.usff.navy.mil/Press-Room/Press-Releases/Article/3169924/dmss-on-deck)
100. Michael Warner, “US Cyber Command’s First Decade,” Hoover Institution, 2008. (https://www.hoover.org/sites/default/files/
research/docs/warner_webready.pdf ); Mark Pomerleau, “Key lawmakers in favor of keeping ‘dual hat’ arrangement between Cybercom
and NSA,” DefenseScoop, November 17, 2022. (https://defensescoop.com/2022/11/17/two-key-lawmakers-in-favor-of-keeping-dual-hat-
arrangement-between-cybercom-and-nsa)
Page 30
United States Cyber Force: A Defense Imperative
101. John Plumb, “Testimony Before House Armed Services Committee,” March 30, 2023. (https://armedservices.house.gov/sites/
republicans.armedservices.house.gov/files/Plumb%20Testimony.pdf )
102. James Stavridis, “The US Military Needs to Create a Cyber Force,” Bloomberg, March 8, 2023. (Archived version available at https://
web.archive.org/web/20230311100830/https://www.washingtonpost.com/business/2023/03/08/the-us-needs-a-seventh-branch-of-the-
military-cyber-force/aa72d5dc-bdab-11ed-9350-7c5fccd598ad_story.html)
Page 31
United States Cyber Force: A Defense Imperative
Thirty-four percent of the interviewees came from the “Years of investment and training are lost when service
U.S. Army, 30 percent from the U.S. Navy, and 26 members are moved away from the cyber mission.
percent from the U.S. Air Force. A small number of Complicated and inconsistently applied incentive
accounts also come from the Marine Corps, Space Force, programs result in retention issues.”
and DoD civilians. Most of the accounts (61 percent)
“Differences in training also impact USCYBERCOM’s
came from officers with ranks of O-4 to O-6. Another
ability to conduct operations.”
26 percent come from officers with ranks of O-3.
Notably, one interview is with a general officer (O-7).
Colonel, United States Air Force
Figure 7: The Service of Interviewees “In aggregate, we see a combatant command spending
an inordinate amount of time executing Service-
1
3
3
like responsibilities at the expense of its primary
Army | 34.2% responsibilities to defend the [Department of Defense
Navy | 30.3% Information Networks], provide support to combatant
26
20 Air Force | 26.3% commanders for execution of their missions around
Marines | 3.9% the world, and strengthen our nation’s ability to
Space Force | 1.3% withstand and respond to cyber-attack. Instead,
Civilian | 3.9% we have a Department of Defense with no single
service incentivized to put cyberspace operations at
23
the forefront.”
Figure 8: The Rank of Interviewees “If you look [at] who leads cyberspace operations in
the Department of Defense, they are not typically
3
1 2 1
6
O7 | 1.3% grown from within the cyberspace operations force.
3 O6 | 7.9% Cyber leaders should lead cyberspace operations and
O5 | 22.4% represent cyberspace operations in joint warfighting.
17 O4 | 30.3% We need ‘cyber minded’ leaders.”
20 O3 | 26.3%
O2 | 3.9% Colonel, United States Army
Chief Warrant Officer | 1.3%
E7 | 2.6%
“Having been on both the inside and outside of the
23
Civilian | 3.9%
Cyber Mission Force since it was first established, the
Page 32
United States Cyber Force: A Defense Imperative
lack of talented personnel to fill the positions on both … Applying the USCYBERCOM methodology to
teams has been and continues to be a severely limiting air warfare would be akin to requiring every service to
factor for the overall force.” operate the same aircraft, to accomplish every aspect of
air warfare, in every operational environment.”
“In fact, it was once found that about 10% of
the personnel execute as much as 80% of the
operational missions.” Captain, United States Marine Corps
[On the subject of officers sitting on promotion “Leading in the cyberspace domain demands technical
boards] “Officers with advanced, skilled degrees in competency that cannot be taught in a twelve-month
computer science from esteemed institutions are schoolhouse alone. One of my worst professional
equated with those who received online degrees in experiences involved working underneath a woefully
information management; they are given no additional unprepared commander with a degree in culinary
consideration for their knowledge, skills, or abilities arts … Under no circumstances would a cyber officer
and are disadvantaged. This is akin to equating a brain be asked to lead a squadron of aircraft, and yet the
surgeon with a field medic.” opposite is often true.”
Captain (Ret.), United States Navy Major, United States Air Force
“The development of service-specific cyber specialty “I’ve witnessed vendors sell the same $100M offering
fields without dedicated senior level commitments has to two services under a different name so those services
yielded varying levels of fragmented support to cyber could independently lobby for resources. I’ve witnessed
operations, lack of continuity of cyber personnel, one service sabotage another’s cyber operation (both
unclear career paths, insufficient experience, wide use of under the same ‘Joint’ Force Headquarters) simply
noncyber personnel in cyber leadership positions, and because that service did not receive credit. I’ve seen
cyber operations being treated always as a supporting the services’ acquisition communities spend over $1B
entity across all services.” on poorly defined and duplicative cyber requirements
to deliver tools that will never be used. Every effort
“[C]yber attacks will not be nor are they currently to unify resources and address national priorities is
service-specific nor sector-specific, so it does not make undermined and resisted by the services who perceive
sense to have created service-specific mission teams, no benefit to their domains.”
different designators, MOSs, etc., to respond to the
broad scale of cyber attacks.” Colonel (Ret.), United States Army
Captain, United States Navy “I’ve seen senior warfighting leaders dismissively call
cyber research ‘book reports,’ cyber operators ‘nerds,’
“[United States Special Operations Command]’s and cyber capability development ‘science projects.’
success is achieved by allowing each of the service These … leaders who make critical cyber operational,
specific commands to specialize in discrete types of resource allocation, and risk assessment decisions
warfare, technologies, and operational environments. control promotions to choose people that look
USSOCOM picks the ‘best athlete’ depending on the like themselves.”
operational outcome they are trying to achieve.”
“USCYBERCOM assigns the military services … Lieutenant Colonel,
essentially requiring every team to master every aspect United States Marine Corps
of cyber warfare to successfully operate against their
“I can’t speak for the other services, but I perceive
assigned target. This methodology is completely out of
a lack of career progression for cyber officers in the
sync with the way the rest of the DoD is constructed
Marine Corps. I commanded a Combat Mission
Page 33
United States Cyber Force: A Defense Imperative
Team and am fully qualified to join the cyber field told me ‘Someday you can change things; when
but decided not to apply for the specialty because of you’re a general.’ They didn’t know what that really
the limited command opportunities.” communicated to me.”
Page 34
United States Cyber Force: A Defense Imperative
Appendix B: Historical Case Studies: The Air Force and Space Force
In the past, when the DoD has faced force-generation Board’s recommendation. The National Security Act of
or force-employment challenges, the U.S. military has 1947 established the U.S. Air Force as an independent,
undergone significant reorganization. uniformed service, 30 years after Congress began
documenting officers raising that the domain could not
World War I firmly demonstrated the ability of aircraft be effectively handled by the compartmentalized efforts
to “impact an enemy beyond a depth that could be of the U.S. Army and U.S. Navy.
readily imagined by those operating in [land and sea].”103
After the war, the War Department (the predecessor to In 1982, the Air Force established the first Air
DoD) and congressional leaders began to evaluate the Force Space Command. In 1985, the United States
implications of flying for future military operations and established a unified U.S. Space Command,106 tasked
subsequently renamed the Air Service the U.S. Army Air with coordinating Army, Naval, and Air Force space
Corps. While the Corps was not an independent service, forces and providing “space-based missile warning,
it “strengthen[ed] the conception of military aviation communications, navigation, weather, and imagery
as an offensive, striking arm rather than an auxiliary capabilities.”107 The 2001 Rumsfeld Commission first
Service.”104 Each service began investing in its own proposed the establishment of a Space Force.108 But a year
aviation capabilities. later, DoD disbanded the U.S. Space Command and
gave its responsibilities to U.S. Strategic Command.109
During the interwar period, multiple boards examined
the country’s readiness for, and resources dedicated Over the next 16 years, however, DoD leaders began to
to, military flying missions. Most notably, the 1919 recognize that no one military entity was placing sufficient
Menoher Board found the “best way to take advantage emphasis on space security. China’s demonstration of
of the new technology in aviation was to create a new its anti-satellite capabilities, along with other threats,
military organization.”105 ignited conversations among policymakers that mirrored
those prior to the establishment of the Air Force.110
By the end of World War II, air power had emerged as DoD leaders also began realizing that U.S. Strategic
a pivotal force, affirming the wisdom of the Menoher
103. John Venable, “How the Air Force Got Its Start 72 Years Ago,” Heritage Foundation, September 18, 2019. (https://www.heritage.org/
defense/commentary/how-the-air-force-got-its-start-72-years-ago)
104. “1926 – The US Army Air Corps Act,” Air Force Historical Support Division, accessed March 9, 2024. (https://www.afhistory.af.mil/
FAQs/Fact-Sheets/Article/459017/1926-the-us-army-air-corps-act)
105. Dr. James P. Tate, “The Army and Its Air Corps: Army Policy Toward Aviation 1919-1941,” Air University Press, June 1998. (https://
media.defense.gov/2017/Apr/07/2001728467/-1/-1/0/B_0062_TATE_ARMY_AIR_CORPS.PDF)
106. Benjamin S. Lambeth, “A Short History of Military Space,” Air & Space Forces Magazine, December 1, 2004. (https://www.
airandspaceforces.com/article/1204space)
107. Frank A. Rose, “Re-establishing US Space Command is a great idea,” Brookings Institution, January 7, 2019. (https://www.brookings.
edu/blog/order-from-chaos/2019/01/07/re-establishing-u-s-space-command-is-a-great-idea)
108. Marcia S. Smith, “Military Space Activities: Highlights of the Rumsfeld Commission Report and Key Organization and Management
Issues,” Congressional Research Service, February 21, 2001. (https://digital.library.unt.edu/ark:/67531/metadc806331/m2/1/high_res_d/
RS20824_2001Feb21.pdf )
109. Frank A. Rose, “Re-establishing US Space Command is a great idea,” Brookings Institution, January 7, 2019. (https://www.brookings.
edu/blog/order-from-chaos/2019/01/07/re-establishing-u-s-space-command-is-a-great-idea)
110. Everett Carl Dolman, “New Frontiers, Old Realities,” Strategic Studies Quarterly, Spring 2012. (https://www.airuniversity.af.edu/
Portals/10/SSQ/documents/Volume-06_Issue-1/dolman.pdf ); Terri Moon Cronk, “Space-Based Capabilities Critical to US National Security,
DOD Officials Say,” DOD News, May 24, 2021. (https://www.defense.gov/News/News-Stories/Article/Article/2629675/space-based-
capabilities-critical-to-us-national-security-dod-officials-say); Tom Roeder and Tony Peck, “Space Force: A timeline of change,” The Gazette,
July 26, 2018. (https://gazette.com/military/space-force-a-timeline-of-change/article_44285b42-7573-11e8-b983-e3bc886964a1.html)
Page 35
United States Cyber Force: A Defense Imperative
Command’s responsibilities were becoming “too big for for force employment in space. In the FY 2020 NDAA,
one combatant commander to manage.”111 Congress then established an independent U.S. Space
Force to man, train, and equip personnel for U.S. Space
In 2008, Congress commissioned the Institute for Command. Articulating the connection between these
Defense Analyses to write a report on “Leadership, two entities, then commander of U.S. Space Command
Management, and Organization for National Security Air Force Gen. John “Jay” Raymond noted, “U.S. Space
Space.” It highlighted the need for a greater number of Command will only be as strong as the capabilities it is
operators who are “steeped in space.”112 Over the next provided by the United States Space Force.”113
decade, the U.S. military increased its capabilities in space
and focused on specializing organizational, acquisitions, Ultimately, it took congressional intervention to
and personnel training structures. establish independent uniformed services for air and
space. Congressional intervention is again needed to
In December 2018, President Donald Trump signed an address the significant readiness challenges stemming
executive order authorizing DoD to reinstate U.S. Space from the current organization and structure of
Command as a unified combatant command responsible U.S. cyber forces.
A combat command
that uses the military
SPACE services’ people
and technology to
Plans, operates, and
directs the forces for
Members from all
service branches
COMMAND conduct worldwide space warfighting.
operations in times
of war and peace.
111. Frank A. Rose, “Re-establishing US Space Command is a great idea,” Brookings Institution, January 7, 2019. (https://www.brookings.
edu/blog/order-from-chaos/2019/01/07/re-establishing-u-s-space-command-is-a-great-idea)
112. A. Thomas Young, Edward Anderson, Lyle Bien, Ronald R. Fogleman, Keith Hall, Lester Lyles, and Dr. Hans Mark, “Leadership,
Management, and Organization for National Security Space,” Institute for Defense Analyses, July 2008. (https://aerospace.csis.org/
wp-content/uploads/2018/09/AllardCommission.pdf )
113. Jim Garamone, “Trump Signs Law Establishing US Space Force,” DoD News, December 20, 2019. (https://www.defense.gov/News/
News-Stories/Article/Article/2046035/trump-signs-law-establishing-us-space-force)
Page 36
United States Cyber Force: A Defense Imperative
114. U.S. Cyber Command, Public Affairs, “Cyber 101 - US Cyber Command History,” U.S. Cyber Command, October 4, 2022.
(Archived version available at https://web.archive.org/web/20221011152417/https://www.cybercom.mil/Media/News/Article/3179270/
cyber-101-us-cyber-command-history); For a history of information operations in the U.S. Army, see: Sarah P. White, “The Organizational
Determinants of Military Doctrine: A History of Army Information Operations,” Texas National Security Review, Winter 2022/2023.
(https://tnsr.org/2023/01/the-organizational-determinants-of-military-doctrine-a-history-of-army-information-operations); For cyber, see,
Sarah P. White, “Subcultural Influence on Military Innovation: The Development of U.S. Military Cyber Doctrine,” Doctoral dissertation,
Harvard University, Graduate School of Arts & Sciences, 2019. (https://dash.harvard.edu/handle/1/42013038)
115. Joshua Rovner, “Warfighting in Cyberspace,” War on the Rocks, March 17, 2021. (https://warontherocks.com/2021/03/warfighting-
in-cyberspace)
116. U.S. Cyber Command, Public Affairs, “Cyber 101 - US Cyber Command History,” U.S. Cyber Command, October 4, 2022.
(Archived version available at https://web.archive.org/web/20221011152417/https://www.cybercom.mil/Media/News/Article/3179270/
cyber-101-us-cyber-command-history)
117. Omry Haizler, “The United States’ Cyber Warfare History: Implications on Modern Cyber Operational Structures and Policymaking,”
Cyber, Intelligence, and Security, January 2017. (https://www.inss.org.il/wp-content/uploads/2017/03/The-United-States%E2%80%99-
Cyber-Warfare-History-Implications-on.pdf )
118. The Joint Chiefs of Staff, “The National Military Strategy of the United States of America,” 2004. (https://nssarchive.us/wp-content/
uploads/library/nms/nms2004); Michael Warner, “US Cyber Command’s First Decade,” Hoover Institution, 2008. (https://www.hoover.org/
sites/default/files/research/docs/warner_webready.pdf )
119. U.S. Department of Defense, “National Military Strategy for Cyberspace Operations (NMS-CO),” December 11, 2005. (https://
nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-023.pdf )
Page 37
United States Cyber Force: A Defense Imperative
defending DoD information systems and the nation offensive operations in cyberspace “subject to the …
from significant cyberattacks.120 legal regimes that the Department follows for kinetic
capabilities, including the law of armed conflict and
CYBERCOM inherited the missions of defending the War Powers Resolution.”122
DoD information systems, supporting joint force
commanders in cyberspace, and advancing national The FY 2019 NDAA stated that clandestine cyber
interests in and through cyberspace. The services operations may be launched short of hostilities.
became responsible for force generation and force The law also gave DoD the authority “to take
development. They also developed their own appropriate and proportional action in foreign
components responsible for information and cyber cyberspace to disrupt, defeat, and deter” in response
operations in support of operations in their respective to “an active, systematic, and ongoing campaign of
warfighting domains. attacks against the Government or people of the
United States in cyberspace, including attempting to
In 2018, the president ordered the elevation of influence American elections and democratic political
CYBERCOM to a unified combatant command. processes.” The law further authorized CYBERCOM
Compared to a sub-unified command, each unified to disrupt and respond to attacks in cyberspace,
combatant command has additional support redefining cyber as a “traditional military activity.”123
mechanisms, a direct line of communication to the
secretary of defense through a four-star general, These new authorities largely aligned with the Trump
greater authority to request budgetary resources, and administration’s National Security Presidential
a distinct geographical or functional responsibility.121 Memorandum-13, which officials say streamlined the
CYBERCOM also has dedicated combatant command process for authorizing military cyber operations.124
staff, mirroring the organizational structure of the Joint These changes also coincided with CYBERCOM’s
Staff at the Pentagon. publication of its first command vision, “Achieve and
Maintain Cyberspace Superiority,” as well as DoD’s
In parallel, CYBERCOM gained additional authorities release of the 2018 DoD Cyber Strategy.125
to conduct military cyberspace operations short of
armed conflict to persistently engage and contest Finally, in the FY 2022 NDAA, Congress granted
adversaries outside of DoD-controlled cyberspace. In CYBERCOM Enhanced Budgetary Control (EBC).
FY 2012, the NDAA affirmed that DoD can conduct These authorities will take full effect in 2024, allowing
120. U.S. Cyber Command, Public Affairs, “Cyber 101 - US Cyber Command History,” U.S. Cyber Command, October 4, 2022.
(Archived version available at https://web.archive.org/web/20221011152417/https://www.cybercom.mil/Media/News/Article/3179270/
cyber-101-us-cyber-command-history)
121. Andrew Feickert, “The Unified Command Plan and Combatant Commands: Background and Issues for Congress,” Congressional
Research Service, updated January 3, 2013. (https://crsreports.congress.gov/product/pdf/R/R42077/11)
122. National Defense Authorization Act for Fiscal Year 2012, Pub. L. 112-81, 125 Stat. 1551, §954. (https://www.congress.gov/
bill/112th-congress/house-bill/1540)
123. Catherine A. Theohary, “Defense Primer: Cyberspace Operations,” Congressional Research Service, updated December 14, 2022.
(https://sgp.fas.org/crs/natsec/IF10537.pdf ); Robert Chesney, “The Law of Military Cyber Operations and the New NDAA,” Lawfare, July
26, 2018. (https://www.lawfareblog.com/law-military-cyber-operations-and-new-ndaa)
124. Mark Pomerleau, “What good are ‘exceptional’ cyber capabilities without authority?” C4ISRNET, July 16, 2019. (https://www.
c4isrnet.com/dod/2019/07/16/what-good-are-exceptional-cyber-capabilities-without-authority)
125. U.S. Cyber Command, “Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command,” April 2018.
(https://www.cybercom.mil/Portals/56/Documents/USCYBERCOM%20Vision%20April%202018.pdf ); U.S. Department of Defense,
“Cyber Strategy: Summary,” September 18, 2018. (https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_
SUMMARY_FINAL.PDF)
Page 38
United States Cyber Force: A Defense Imperative
CYBERCOM to directly control resources for In 2022, the secretary of defense elevated the CNMF
equipping the Cyber Mission Force.126 As General (within CYBERCOM) to a sub-unified combatant
Paul Nakasone testified to Congress in March 2023, command, providing it with additional authorities and
the objective is to better harmonize CYBERCOM’s responsibilities. After more than a decade, CYBERCOM
responsibilities and cyberspace operations by providing now has the Traditional Military Activities authority
the command with control over funding for major to conduct overt and clandestine action in support
acquisition programs that the services were previously of U.S. armed conflict.128 CYBERCOM also has
directing. In anticipation of these responsibilities, acquisition authority and statutory responsibility for
CYBERCOM has stood up a joint cyber weapons managing its personnel.
program management office.127
126. Paul M. Nakasone, “2023 Posture Statement of General Paul M. Nakasone,” U.S. Cyber Command, March 7, 2023. (https://www.
cybercom.mil/Media/News/Article/3320195/2023-posture-statement-of-general-paul-m-nakasone)
127. Mark Pomerleau, “Cyber Command prepares to gain significant budget control,” FedScoop, March 14, 2022. (https://
fedscoop.com/cyber-command-budget-control-preparations-pom); Alexandra Lohr, “CYBERCOM Acquisition has the money,
now it needs the manpower,” Federal News Network, May 8, 2023. (https://federalnewsnetwork.com/acquisition/2023/05/
cybercom-acquisition-has-the-money-now-it-needs-the-manpower)
128. Robert Chesney, “Traditional Military Activities in Cyberspace: Clarifying DOD’s Authority and the Line Between T10 and
T50 Activities?” Lawfare, May 9, 2011. (https://www.lawfaremedia.org/article/traditional-military-activities-cyberspace-clarifying-
dods-authority-and-line-between-t10-and-t50); Paul C. Ney Jr., “DOD General Counsel Remarks at U.S. Cyber Command Legal
Conference,” U.S. Department of Defense, March 2, 2020. (https://www.defense.gov/News/Speeches/speech/article/2099378/
dod-general-counsel-remarks-at-us-cyber-command-legal-conference)
Page 39
United States Cyber Force: A Defense Imperative
Acknowledgements
The authors would like to thank Logan Weber, who served as the principal researcher on this study while he
was a research analyst at FDD’s Center on Cyber and Technology Innovation. His spadework was critical to the
analysis and recommendations in this paper. Additionally, the authors would like to thank Mike Klipstein, Michael
McLaughlin, Derek Bernsen, Casey Miller, Alexei Bulazel, Rebecca Lively, Todd Arnold, Shawn Lonergan, and the
“operationally brilliant maverick” Navy lieutenant commander for sharing their insights and expertise. The authors
also wish to express their deepest gratitude to the men and women, both in and out of uniform, who courageously
offered their perspectives, views, and choice words to this report. The nation is indebted to these warfighters trying
daily to hold the country’s adversaries at risk and keep us safe in cyberspace. While many experts helped refine the
conclusions, any errors in fact or judgment are the authors’ alone. The authors are also grateful to Annie Fixler and
John Hardie for their careful edits to the draft and to Erin Blumenthal and Daniel Ackerman for the design and
production of this monograph.
RADM (Ret.) Mark Montgomery serves as senior director of FDD’s Center on Cyber and
Technology Innovation and as an FDD senior fellow. He also directs CSC 2.0, an initiative
that works to implement the recommendations of the congressionally mandated Cyberspace
Solarium Commission, where he served as executive director. Previously, Mark served as policy
director for the Senate Armed Services Committee, coordinating policy efforts on national
security strategy, capabilities and requirements, and cyber policy. Mark served for 32 years in
the U.S. Navy as a nuclear-trained surface warfare officer, retiring as a rear admiral in 2017.
His flag officer assignments included director of operations (J3) at U.S. Pacific Command;
commander of Carrier Strike Group 5, embarked on the USS George Washington, stationed
in Japan; and deputy director for plans, policy, and strategy (J5) at U.S. European Command.
FDD values diversity of opinion and the independent views of its scholars, fellows, and board members. The views of the
authors do not necessarily reflect the views of FDD, its staff, or its advisors.
P.O. Box 33249
Washington, DC 20033-3249
(202) 207-0190
www.fdd.org