United States Cyber Command (USCYBERCOM) is one of the eleven
unified combatant commands of the
United States Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an United States federal executive departments, executive department of the federal government of the United States, U.S. federal government charged with coordinating and superv ...
(DoD). It unifies the direction of
cyberspace
Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise which focus on securing cyberspace.
USCYBERCOM was established as a Sub-Unified command under U.S. Strategic Command at the direction of Secretary of Defense
Robert Gates on 23 June 2009 at the
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA) headquarters in
Fort George G. Meade,
Maryland
Maryland ( ) is a U.S. state, state in the Mid-Atlantic (United States), Mid-Atlantic region of the United States. It borders the states of Virginia to its south, West Virginia to its west, Pennsylvania to its north, and Delaware to its east ...
. It cooperates with NSA networks and has been concurrently headed by the
director of the National Security Agency since its inception.
While originally created with a defensive mission in mind, it has increasingly been viewed as an offensive force.
On 18 August 2017, it was announced that USCYBERCOM would be elevated to the status of a full and independent unified combatant command. On 23 May 2023, it was announced that President Biden nominated
Lt. Gen. Timothy Haugh to the Senate to be the next USCYBERCOM Commander.
Mission statement
According to the US Department of Defense (DoD):
The text "9ec4c12949a4f31474f299058ce2b22a", located in the command's emblem, is the
MD5 hash of their mission statement.
The command is charged with pulling together existing cyberspace resources, creating synergies and synchronizing war-fighting effects to defend the
information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
environment. USCYBERCOM is tasked with centralizing command of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD's cyber expertise.
[U.S. Department of Defense, Cyber Command Fact Sheet, 21 May 2010]
Organizational structure
Cyber teams
Since 2015, the U.S. Cyber Command added 133 new cyber teams. The breakdown was:
* Thirteen National Mission Teams to defend against broad cyberattacks
* Sixty-eight Cyber Protection Teams to defend priority DoD networks and systems against priority threats
* Twenty-seven Combat Mission Teams to provide integrated cyberspace attacks in support of operational plans and contingency operations
* Twenty-five Cyber Support Teams to provide analytic and planning support to the national mission and combat mission teams.
Component Commands
Cyber National Mission Force
The Cyber National Mission Force (CNMF) was activated on 27 January 2014, as an element of Cyber Command.
At inception the CNMF consisted of 21 teams, broken down into 13 National Mission Teams (NMT) and 8 National Support Teams (NST).
Today, the CNMF has expanded to 39 joint cyber teams consisting of over 2,000 service members and civilian members across the U.S. Armed Forces
On 25 October 2022, Defense Secretary Lloyd Austin authorized that the Cyber National Mission Force become a subordinate unified command underneath the United States Cyber Command.
Following this, on 19 December 2022, General Paul Nakasone presided over a ceremony to establish the CNMF with the new "sub-unified" command status.
Major General Lorna Mahlock, United States Marine Corps has served as CNMF commander since January 2024.
The CNMF is one of three Cyber Command forces that would react to a cyber attack on the United States. The other two forces are the Cyber Combat Mission Force assigned to the operational control of individual U.S. combatant commanders, and the Cyber Protection Force that helps operate and defend the DODIN.
CNMF is composed of cyber mission force teams across services that support the CNMF mission through their specific respective assignments:
* National Mission Teams (NMT) defend the nation by identifying adversary activity, blocking attacked and maneuvering to defeat them.
* Combat Mission Teams (CMT) conduct military cyberspace operations in support of combatant commander priorities and missions.
* Cyber Protection Teams (CPT) defend DoD's information network, protect priority missions and prepare cyber forces for combat.
* National Support Teams (NST) provide analytic and planning support to national mission and combat mission teams.
The Cyber National Mission Force operates in both defensive and offensive cyber operations to carry out its missions of: U.S. election defense, counter-ransomware operations, global hunt operations, combating foreign malicious cyber actors, and providing support to national security operations.
Global hunt operations began in 2018 as part of the "persistent engagement" strategy with the goal of looking for malicious cyber activity and vulnerabilities on significant networks.
Since its inception, the hunt operations have been requested and conducted in 18 countries and over 50 foreign networks.
Standing joint task force
Background
An intention by the
U.S. Air Force to create a 'cyber command' was announced in October 2006. An
Air Force Cyber Command was created in a provisional status in November 2006. However, in October 2008, it was announced the command would not be brought into permanent activation.
On 23 June 2009, the Secretary of Defense directed the Commander of U.S. Strategic Command (USSTRATCOM) to establish USCYBERCOM. In May 2010,
General Keith Alexander outlined his views in a report for the
United States House Committee on Armed Services subcommittee:
Initial operational capability was attained on 21 May 2010. General Alexander was promoted to
four-star rank, becoming one of United States's 38 four-star officers, and took charge of U.S. Cyber Command in a ceremony at Fort Meade that was attended by Commander of U.S. Central Command GEN
David Petraeus, and Secretary of Defense Robert M. Gates.
USCYBERCOM reached full operational capability on 31 October 2010.
The command assumed responsibility for several existing organizations. The Joint Task Force for Global Network Operations (
JTF-GNO) and the Joint Functional Component Command for Network Warfare (
JFCC-NW) were absorbed by the command. The
Defense Information Systems Agency, where JTF-GNO operated, provides technical assistance for network and information assurance to USCYBERCOM, and is moving its headquarters to
Fort Meade
Fort George G. Meade is a United States Army installation located in Maryland, that includes the Defense Information School, the Defense Media Activity, the United States military bands#Army Field Band, United States Army Field Band, and the head ...
.
President Obama signed into law, on 23 December 2016, the National Defense Authorization Act (NDAA) for fiscal year (FY) 2017, which elevated USCYBERCOM to a unified combatant command. The FY 2017 NDAA also specified that the dual-hatted arrangement of the commander of USCYBERCOM will not be terminated until the Secretary of Defense and Chairman of the Joint Chiefs of Staff jointly certify that ending this arrangement will not pose risks to the military effectiveness of CYBERCOM that are unacceptable to the national security interests of the United States.
Concerns
There are concerns that the
Pentagon
In geometry, a pentagon () is any five-sided polygon or 5-gon. The sum of the internal angles in a simple polygon, simple pentagon is 540°.
A pentagon may be simple or list of self-intersecting polygons, self-intersecting. A self-intersecting ...
and NSA will overshadow any civilian cyber defense efforts. There are also concerns on whether the command will assist in civilian cyber defense efforts. According to
Deputy Secretary of Defense William J. Lynn, the command "will lead day-to-day defense and protection of all DoD networks. It will be responsible for DoD's networks – the
dot-mil world. Responsibility for federal civilian networks –
dot-gov – stays with the
Department of Homeland Security
The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
, and that's exactly how it should be." Alexander notes, however, that if faced with cyber hostilities an executive order could expand Cyber Command's spectrum of operations to include, for instance, assisting the Department of Homeland Security in defense of their networks.
Some military leaders claim that the existing cultures of the Army, Navy, and Air Force are fundamentally incompatible with that of
cyber warfare
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic ...
. Major Robert Costa (USAF) even suggested a sixth branch of the military, an Information (Cyber) Service with
Title 10 responsibilities analogous to its sister services in 2002 noting:
Others have also discussed the creation of a cyber-warfare branch.
Lieutenant Colonel Gregory Conti and Colonel John "Buck" Surdu (chief of staff of the
United States Army Research, Development and Engineering Command) stated that the three major services are "properly positioned to fight kinetic wars, and they value skills such as marksmanship, physical strength, the ability to leap out of airplanes and lead combat units under enemy fire."
Conti and Surdu reasoned, "Adding an efficient and effective cyber branch alongside the Army, Navy and Air Force would provide our nation with the capability to defend our technological infrastructure and conduct offensive operations. Perhaps more important, the existence of this capability would serve as a strong deterrent for our nation's enemies."
In response to concerns about the military's right to respond to
cyber attacks, General Alexander stated "The U.S. must fire back against cyber attacks swiftly and strongly and should act to counter or disable a threat even when the identity of the attacker is unknown" prior to his confirmation hearings before the
United States Congress
The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
. This came in response to incidents such as a 2008 operation to take down a government-run
extremist
Extremism is "the quality or state of being extreme" or "the advocacy of extreme measures or views". The term is primarily used in a political or religious sense to refer to an ideology that is considered (by the speaker or by some implied shar ...
honeypot in
Saudi Arabia
Saudi Arabia, officially the Kingdom of Saudi Arabia (KSA), is a country in West Asia. Located in the centre of the Middle East, it covers the bulk of the Arabian Peninsula and has a land area of about , making it the List of Asian countries ...
. "Elite U.S. military computer specialists, over the objections of the CIA, mounted a cyberattack that dismantled the online forum".
"The new U.S. Cyber Command needs to strike a balance between protecting military assets and personal privacy." stated Alexander, in a Defense Department release. If confirmed, Alexander said, his main focus will be on building capacity and capability to secure the networks and educating the public on the command's intent.
"This command is not about an effort to militarize cyber space," he said. "Rather, it's about safeguarding our military assets."
In July 2011, Deputy Defense Secretary William Lynn announced in a conference that "We have, within Cyber Command, a full spectrum of capabilities, but the thrust of the strategy is defensive." "The strategy rests on five pillars, he said: treat cyber as a domain; employ more active defenses; support the Department of Homeland Security in protecting critical infrastructure networks; practice collective defense with allies and international partners; and reduce the advantages attackers have on the Internet."
In 2013, USCYBERCOM held a classified exercise in which reserve officers (with extensive experience in their civilian cyber-security work) easily defeated active duty cyber warriors. In 2015
Eric Rosenbach, the principal cyber adviser to Defense Secretary
Ash Carter, said DoD was looking at alternatives to staffing with just active-duty military. Beginning that year, USCYBERCOM added 133 teams (staffing out at 6,000 people), with the intent that at least 15% of the personnel would be
reserve cyber operations airmen. These new teams had achieved "initial operating capability" (IOC) as of 21 October 2016. Officials noted that IOC is not the same as combat readiness, but is the first step in that direction.
President Barack Obama
Barack Hussein Obama II (born August 4, 1961) is an American politician who was the 44th president of the United States from 2009 to 2017. A member of the Democratic Party, he was the first African American president in American history. Ob ...
's
Commission on Enhancing National Cybersecurity was formed to develop a plan for protecting cyberspace. The commission released a report in December 2016. The report made 16 major recommendations regarding the intertwining roles of the military, government administration and the private sector in providing cyber security.
President Trump indicated that he wanted a full review of Cyber Command during his bid for presidency. During his presidency, the Trump administration made Cyber Command a unified combatant command, and took other measures attempting to deter cyber attacks. However, the FBI reported that they logged a record number of complaints and economic losses in 2019, as cybercrime continued to grow.
International effects and reactions
The creation of U.S. Cyber Command appears to have motivated other countries in this arena. In December 2009,
South Korea
South Korea, officially the Republic of Korea (ROK), is a country in East Asia. It constitutes the southern half of the Korea, Korean Peninsula and borders North Korea along the Korean Demilitarized Zone, with the Yellow Sea to the west and t ...
announced the creation of a cyber warfare command. Reportedly, this was in response to
North Korea
North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korea, Korean Peninsula and borders China and Russia to the north at the Yalu River, Yalu (Amnok) an ...
's creation of a cyber warfare unit. In addition, the British
GCHQ
Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
has begun preparing a cyber force.
Furthermore, a shift in military interest in
cyber warfare
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic ...
has motivated the creation of the first U.S. Cyber Warfare Intelligence Center. In 2010, China introduced a department dedicated to defensive cyber war and information security in response to the creation of USCYBERCOM.
Operations
In June 2019,
Russia
Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
has conceded that it is "possible" its
electrical grid
An electrical grid (or electricity network) is an interconnected network for electricity delivery from producers to consumers. Electrical grids consist of power stations, electrical substations to step voltage up or down, electric power tran ...
was under cyberattack by the United States. The ''
New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' reported that hackers from the U.S. Cyber Command planted malware potentially capable of disrupting the Russian electrical grid.
Cyber command is using its 2021 exercise Cyber Flag 21–2 to improve its teams' tactics.
[Mark Pomerleau (25 May 2021) US Army emphasizes ‘information advantage’]
"five pillars of information advantage: enable decision-making, protect friendly information, inform and educate domestic audiences, inform and influence international audiences, and conduct information warfare"
Pause on Offensive Cyber Operations
The U.S. government has formally paused offensive cyber operations against Russia. This decision was part of new guidance provided to USCYBERCOM in February 2025.
List of commanders
The commander of U.S. Cyber Command is a statutory office (), and is held by a
four-star general
A general officer is an Officer (armed forces), officer of high rank in the army, armies, and in some nations' air force, air and space forces, marines or naval infantry.
In some usages, the term "general officer" refers to a rank above colone ...
, or if the commander is a Navy officer, a four-star
admiral
Admiral is one of the highest ranks in many navies. In the Commonwealth nations and the United States, a "full" admiral is equivalent to a "full" general in the army or the air force. Admiral is ranked above vice admiral and below admiral of ...
.
See also
*
List of cyber warfare forces
*
United States Strategic Command
The United States Strategic Command (USSTRATCOM) is one of the eleven unified combatant commands in the United States Department of Defense. Headquartered at Offutt Air Force Base, Nebraska, USSTRATCOM is responsible for Strategic_nuclear_weap ...
*
Joint Task Force-Global Network Operations
* United States
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA)
*
United States Department of Homeland Security
The United States Department of Homeland Security (DHS) is the U.S. United States federal executive departments, federal executive department responsible for public security, roughly comparable to the Interior minister, interior, Home Secretary ...
*
U.S. Department of Defense Strategy for Operating in Cyberspace
*
Information assurance vulnerability alert
*
Cooperative Cyber Defence Centre of Excellence (NATO)
*
National Cyberdefence Centre
The National Cyber Defence Centre (NCDC or Cyber-DC) is a cooperation, communication and coordination platform of Germany, German Federal agency (Germany), Federal agencies and other institutions from different ministries dealing in particular wi ...
(Germany)
*
Cyberwarfare
Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
*
Cyberwarfare in the United States
*
Defense Information Systems Agency
*
2008 cyberattack on United States
*
2020 United States federal government data breach
References
Notes
Further reading
* Smeets, Max (4 July 2022). "
A US history of not conducting cyber attacks". ''Bulletin of the Atomic Scientists'' 78 (4): 208–213.
External links
U.S. Cyber Command website*
*
US Cyber Command Fact SheetUS Cyber Command Fact Sheet PowerPointFACT SHEET: Imposing Costs for Harmful Foreign Activities by the Russian Government White House. Retrieved 16 September 2023.
{{DOD agencies navbox
Cyber Command
United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrat ...
Cyber Command
United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrat ...
Cyberinfrastructure
Cyberwarfare in the United States
National cyber security centres
Net-centric
Cyber Command
United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrat ...
Military units and formations established in 2009
2009 establishments in the United States
Military installations in Maryland