Editors note: This post is part of a series exploring the findings and recommendations of the U.S. Cyberspace Solarium Commission.
The Cyber Mission Force is the locus of the Department of Defenses efforts to counter, disrupt and impose costs for malicious adversary behavior in cyberspace. Three key changes enabled it, under Title 10 authorities, to conduct cyber effects operations more routinely outside of the Defense Departments information network and outside of a defined area of hostilities in support of campaign plans. The first was the debut of the 2018 Department of Defense Cyber Strategy, which introduced the strategic concept of defend forward. The second was the 2019 National Defense Authorization Act (NDAA), which defined cyberspace operations as a traditional military activity. The third was National Security Presidential Memorandum-13 (NSPM-13), which, as described by the Pentagons General Counsel in March 2020, allows for the delegation of well-defined authorities to the Secretary of Defense to conduct time-sensitive military operations in cyberspace. Together, these changes reflect a significant shift in strategic thinking from the 2015 Department of Defense Cyber Strategy, and from operational engagement limited to the kinetic battlefield, such as Joint Task Force ARES. However, while the Cyber Mission Forces operational goals have grown in scope and scale commensurate with the threat environment, its force size and structure have remained constant. Therefore, one of the Cyberspace Solarium Commissions key recommendations is to ensure the Cyber Mission Force achieves the appropriate resourcing, force size and capability mix.
Planning and conducting cyber operations and campaigns demands a significant investment in resources, human capital, access and tool development, and time. Yet, the core component of the cyber force across the joint services is essentially the size of one conventional army brigade. The Cyber Mission Force reached full operational capability in the spring of 2018; this includes 133 teams comprising a total of approximately 6,200 individuals. These teams are responsible for a plethora of diverse missions, including national mission teams that defend the nation by countering malicious adversary activity, combat mission teams that support the missions of the geographic combatant commands, cyber protection teams that defend the Defense Departments information network, and cyber support teams that conduct analysis in support of the national mission teams and combat mission teams.
However, full operating capability requirements were determined in 2013, well before the U.S. experienced or observed key events that subsequently shaped our understanding of the urgency and salience of the threat posed by malicious adversary behavior. Examples of such activity include Russia conducting cyberattacks against Ukraines power grid in 2015, as well as Russian cyber-enabled interference in the 2016 U.S. presidential elections. The full operating capability requirements were also determined prior to the development of the Defense Departments defend forward strategic concept, which broadened the scope of what it means for the Cyber Mission Force to defend the nation in cyberspace short of war.
This raises a number of critical questions. First, is the Cyber Mission Force appropriately sized and resourced given current and future mission requirements? The Cyber Mission Force is tasked with conducting a diverse set of missions, at scale, and must also have sufficient capacity to maintain steady-state operations while surging to respond to an emerging crisis.
Second, is the allocation of resources across teams within the Cyber Mission Force matched to the prioritization of threats? For example, if U.S. strategy identifies the most salient and significant threat to be malicious adversary behavior against the homeland below the threshold of armed attack, it follows that the national mission teams, which make up the Cyber Mission Force and are the operational arm of U.S. Cyber Command, should merit additional teams.
Finally, concurrent with an increase in the size of the Cyber Mission Force, how can the U.S. ensure that supporting entities, particularly the National Security Agency (NSA) in its combat support agency role, are also appropriately resourced? The NSA provides critical intelligence support to cyber operations conducted by Cyber Mission Force teams, particularly at the tactical and operational levels. As the Cyber Mission Forces operations and needs grow, intelligence collection demands corresponding resourcing.
There has been some progress in assessing Defense Department cyber personnel, structure and organizations, particularly in Sections 1652, 1655, and 1656 of the recently passed FY2020 NDAA. However, Congress must also ensure that the Cyber Mission Force, in particular, conducts a force structure assessment and troop-to-task analysis that takes into account the increasing scope and scale of Cyber Mission Force missions compared to previous fiscal years and projected into the future, as well as an assessment of resource requirements for the NSA in support of this aspect of its mission. This is why the commission recommends that Congress should request in the next Cyber Posture Review, and quadrennially thereafter, that the Defense Department provide an assessment of the requirements to grow the Cyber Mission Force, including projected force size and mixture necessary to sustain all Defense Department missions in cyberspace. The results of this assessment should drive resource allocation, force size and mix, and continued congressional oversight of these efforts.
Further, the threat environment and rapid pace of technological change in cyberspace demand speed and agility. These realities drove additional recommendations from the commission. Here, we highlight three in particular that, taken together, would enhance the flexibility of acquisitions and decision-making to enable adaptability, and rapid response and maneuver.
First, Congress should establish a major force program funding category for U.S. Cyber Command. Congress requires the Defense Department, according to 10 U.S.C. 221, as part of the Future Years Defense Program, to annually submit a budget that includes estimated expenditures and appropriations projected over a 5-year period. This program is currently organized into 12 different major force program funding categories that represent a total amount of dollars, manpower and forces appropriated for each category. A new major force program funding category for U.S. Cyber Command, similar to what currently exists for U.S. Special Operations Command, would provide U.S. Cyber Command with acquisition authorities over goods and services unique to the commands needs. It should also provide a process to expeditiously resolve combatant command/service funding disputes.
Second, Congress should request that the Defense Department provide in the next Cyber Posture Review an analysis of, and recommendations for, the conditions under which further delegation of cyber-related authorities is appropriate to U.S. Cyber Command, as well as to other Defense Department components, such as the NSA. The pace of cyberspace operations may require delegated authorities under certain conditions to pursue and deliver effects against adversary targets. This would, when appropriate, remove friction and support rapid response and maneuver. Importantly, this recommendation does not call for new authorities within the scope of Title 10. Rather, it is focused on the cyber-related authorities that already exist within the Defense Department but may be fragmented across different elements (for example, functional combatant commands, geographic combatant commands and the various services). Examples of these authorities include those that support planning and implementing offensive cyber operations, such as information operations-related authorities that include creating, procuring and deploying personas. Relevant authorities to review for delegation to the NSA should include those authorities that enable the agency to rapidly tip relevant foreign intelligence collection to private entities within the Defense Industrial Base and their service providers to support the latters own defensive operations.
Finally, as part of the next Cyber Posture Review, the Defense Department should produce a study that assesses and provides recommendations for amendments as necessary to the Standing Rules of Engagement and Standing Rules for Use of Force for U.S. forces. These rules have not been updated in more than a decade, despite major changes in technology and the strategic environment. The commission, in particular, recommends assessing how these rules apply to activities in cyberspace below the level of war or armed conflict, and how unique aspects of cyberspace (for example, the absence of high seas and the definition of territory) affect their current application. Importantly, this recommendation should not be construed as necessarily calling for a loosening of the rules under all conditions. Rather, updating and clarifying how these apply in cyberspace where U.S. forces are already operating in day-to-day competition is as important for risk mitigation as for reducing operational friction.
Taken together, these recommendations will empower the Cyber Mission Force and U.S. Cyber Command to plan for cyber operations above the level of armed conflict as well as to rapidly maneuver against and engage adversaries below it.
Excerpt from:
To Defend Forward, the U.S. Must Strengthen the Cyber Mission Force - Lawfare
- WikiLeaks' Julian Assange: NSA critics got lucky because agency had no PR strategy [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- National Speakers Association New Jersey Chapter NSA [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- National Security Agency - Wikipedia, the free encyclopedia [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- NSA - Satu Hari Di Bulan Juni (TULUS) (COVER) - Video [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Hong Kong: Protesters blow whistles for NSA whistle blower - Video [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- An Inside Look at the NSA With Whistleblower William Binney (Part 2 of 2) - Video [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- UK: China will offer fig leaves to US exposed by NSA leaker - Assange - Video [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- NSA ~ (Autodidactism) Whistleblowing - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- Dropping #NSA Knowledge Like a Clumsy Librarian - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- Full Show: Disband The NSA or; Corruption in the Capitol FO SHIZZLE {aTV002} - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- NSA DOCUMENTARY SIX YEARS BEFORE SNOWDEN - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- ShmooCon 2014: The NSA: Capabilities and Countermeasures - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- NSA Knew Of Heartbleed Bug, Refused To Protect Americans - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- Former NSA Head To Become Columnist For Conservative Paper To Discuss Intelligence - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- An Inside Look at the NSA With Whistleblower William Binney (Part 1 of 2) - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- Keynote Address by Shri Shivshankar Menon, NSA at International Seminar on Kautilya - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- NSA Wiretapping: A 4th Amendment Violation?: Blake Norvell at TEDxSMU - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- Hang with Rand: Email Privacy, NSA Spying, and Defending Our Civil Liberties - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- NSA Surveillance and What To Do About It - Bruce Schneier - Video [Last Updated On: April 27th, 2014] [Originally Added On: April 27th, 2014]
- READER SUBMITTED: NSA CT April 2014 Meeting [Last Updated On: April 28th, 2014] [Originally Added On: April 28th, 2014]
- MVI 1847 Obama's NSA Denies FOIA About MH 370! - Video [Last Updated On: April 28th, 2014] [Originally Added On: April 28th, 2014]
- George Galloway's Sputnik: Ewen MacAskill on Guardian / Edward Snowden NSA leaks (26Apr14) - Video [Last Updated On: April 28th, 2014] [Originally Added On: April 28th, 2014]
- CIA & NSA DIRECTED ENERGY WEAPON ATTACK ON WHISTLE BLOWER - Video [Last Updated On: April 28th, 2014] [Originally Added On: April 28th, 2014]
- Book TV - 2014 San Antonio Book Festival: Panel on the NSA, Big Brother, and Democracy - Video [Last Updated On: April 28th, 2014] [Originally Added On: April 28th, 2014]
- NSA Throwdown: John Oliver v. 60 Minutes [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- NSA will sit on security vulnerabilities because of terrorism [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- New water records show NSA Utah Data Center likely behind schedule [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- MVI 1871 NSA Might Be OnTo Me! - Video [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- ZyXEL NSA 325 v2 Hands On - Deutsch / German notebooksbilliger.de - Video [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- German opposition says US should destroy Merkel's NSA file - Video [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- Germany: NSA spying "unacceptable" says SPD - Video [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- NSA Surveillance 2 - Video [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- NSA Surveillance Panel 1 - Video [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- Chalk Talk How Snowden Breached NSA Security - Video [Last Updated On: April 29th, 2014] [Originally Added On: April 29th, 2014]
- NSA reveals some cyber security flaws are left secret [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- NSA data center uses less water than expected [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- April 2014 Breaking News Do you use Google or Yahoo? NSA Intercepts Google And Yahoo Traffic - Video [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- Supreme Court could weigh in on NSA case, justice says [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- New NSA chief: Agency has lost trust [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- NSA on Heartbleed: 'We're not legally allowed to lie to you' [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- What's The NSA Doing Now? Training More Cyberwarriors [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Anonymous NSA - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Cutting off H2O to the NSA - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Brazil: Greenwald slams US media, shares tips to avoid NSA - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- NSA IS TRYINGG 2 KILL ME FAMS - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- What was more popular on Twitter, NSA, NRA or NBA..today? - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- CIS111: NSA Uncovered - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Views from the Street on NSA Activities and Liberty (6/6) - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Views from the Street on NSA Activities and Liberty (4/6) - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Views from the Street on NSA Activities and Liberty (3/6) - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Views from the Street on NSA Activities and Liberty (2/6) - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Views from the Street on NSA Activities and Liberty (1/6) - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Germany: NSA may have accidentally outed secret base - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- ZyXEL NSA 325 v2 Installations-Wizard - Deutsch / German notebooksbilliger.de - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Tech firms to increase alerts about police requests for data -- report [Last Updated On: May 2nd, 2014] [Originally Added On: May 2nd, 2014]
- German Chancellor Angela Merkel visits US, after the NSA eavesdropping scandal - Video [Last Updated On: May 2nd, 2014] [Originally Added On: May 2nd, 2014]
- NSA spies on more US citizens than Russians Snowden [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- THE NEXT NSA?Police under scrutiny for using spying technology [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- Ukraine and NSA will test Merkel - Video [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- The Latest Attacks On NSA Whistleblower Edward Snowden - Kevin Gosztola Discusses - Video [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- Still Report #246 - NSA Classifies MH370 Material - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- Code Talker Induction into NSA Hall of Honor - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- NSA ( National Security Agency ) refusal to release documents on UFO's - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- Obama & NSA Refuse FOIA Request on Malaysia Flight deemed classified - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- Kafkawinstons World`s Channel Terminated NSA is replacing Channel`s with Sockpuppet Channel`s - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- NSA Volunteer Justin Hall at the NSA Comedy Tour February 2014 - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- Barack Obama on NSA Surveillance I'd Be Concerned Too If I Wasn't in Government - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- GBPPR Vision #26: Overview of the NSA's TAWDRYYARD Radar Retro-Reflector - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- NSA proof phone Case - Video [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- 2014 NSA 2014 Million Dollar Publisher's Lab - Video [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- Gen. Michael Hayden - the Former Director of NSA and the CIA - Video [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- REVEALED: Here's The Solution To That Encoded NSA Puzzle Tweet [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- Michael Hayden's Unwitting Case Against Secret Surveillance [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- NSA's Encrypted Tweet: We're Hiring Code Breakers [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- Russ Tice: Life as a NSA Whistleblower - Video [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- What Is Going on at NSA These Days - Video [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- What is the Role of the NSA? AFF Dallas Debates - Video [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- Edward Snowden said CIA , and NSA had 52. 6 Billion for black budget - Video [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- NSA looks to appeal to young cryptographers through coded ads [Last Updated On: May 6th, 2014] [Originally Added On: May 6th, 2014]
- Code Cracked: Mysterious NSA Tweet Is Decrypted in Seconds [Last Updated On: May 6th, 2014] [Originally Added On: May 6th, 2014]