An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

The Cyber Defense Review

Cyber Domain: Getting Ourselves Ready for Future Readiness and Conflict

By Chris Arney | September 07, 2016

The issue.  DoD has been trying to establish its plans, structures, processes, and systems to deal with its cybersecurity and operational issues for several years. These efforts have slowly evolved as DoD has clarified and understood its cyber mission. Given the latest proclamation of the cyber roles assigned to government agencies (in the Presidential Policy Directive 41), it is probably time to put together more definitive plans for the DoD cyber forces and the cyber duties associated with all units, service members, and DoD employees. Another recent document that helps DoD sort out its cyber roles comes from the Joint Operating Environment 2035 (JOE2035), subtitled The Joint Force in a Contested and Disordered World, published in 14 July 2016. Essentially, the President’s document assigns DoD to take care of DoD-related contested military cyber issues. The JOE2035 predicts there will be plenty to do by the cyber forces, and identifies a high-probability, almost continuous, context for future conflict in cyberspace by outlining the struggle to define and protect sovereignty in cyberspace for our military. The cyber domain is a growth area with the specter of continuous, sometimes intense, conflict for a long time. With the US depending heavily on the interdependent networks of information technology (Internet, telecommunications networks, computer systems, embedded processors and controllers) and the data, information, and knowledge that is stored and flows through and between these systems, the cyber domain is the place where a high-stakes competition has, is and will be taking place.


DoD is concerned about: 

Growth of state- and non-state-sponsored cyber forces and capabilities. These organizations will have more advanced cyber warfare capabilities. “Conflict and war are likely to occur as states struggle to define and credibly protect sovereignty in cyberspace. Defining the boundaries that exist between sovereign and non-sovereign areas has always been difficult, contentious, and usually resolved through war.” [JOE2035]  Because rules and norms are currently poorly established in cyberspace, our cyber forces will need to be agile and adaptive. The contest in cyberspace is likely to be chaotic, complex and full of ambiguity, friction, conflict, and war. The hope is that by 2035 international norms will be created and followed in cyberspace, but such a vision may be impossible in a virtual space where the identity of attackers can be hidden and their actions can have such devastating effects.

Other Countries’ cyber forces. The cyber forces of some states will be used to stress or fracture the social and political cohesion of competitors. The US cyber domain is likely to be a primary target for US adversaries to make maximum effect to influence key US political, business, and military leaders through targeted information warfare.

Military competitive space. Cyberspace may lead to new modes of conflict. The vulnerability of cyber-enabled systems allows competitors to probe, infiltrate, and attack without significant reprisal. Many nations may develop extensive offensive cyber forces to disrupt the functioning of competitors’ cyber-connected systems. Some nations will integrate cyber warfare capabilities with other operational capabilities.

Technical competitive space. Cyber operations will take place in an elevated tempo that will demand the development of artificial intelligence (AI) for battlespace characterization and management. The US Joint Force will be required to consider the nature of advanced AI systems and how to both defeat and protect systems that reside within the cyber domain. Additionally, game theoretic concepts will be needed to understand and compete in a contested cyberspace.

What do you think? So, what so you think about DoD’s readiness to enhance and build future cyber structures, processes and systems? How much will the cyber landscape change in the next 20 years? What areas of cybersecurity and operations does the US force need to develop to stay competitive and ready to perform its mission?

Some future topics. Let me know what you think lies ahead for cyber as I will soon follow this introduction with more on topics such as: the Army’s basic research in cyber topics; network science’s role in cyber operational planning; operations research’s role in cyber issues; where does AI, math modeling, and big data analysis fit into this topic; and how do we begin to get serious about educating and training DoD’s cyber forces.

US Army Comments Policy
If you wish to comment, use the text box below. Army reserves the right to modify this policy at any time.

This is a moderated forum. That means all comments will be reviewed before posting. In addition, we expect that participants will treat each other, as well as our agency and our employees, with respect. We will not post comments that contain abusive or vulgar language, spam, hate speech, personal attacks, violate EEO policy, are offensive to other or similar content. We will not post comments that are spam, are clearly "off topic", promote services or products, infringe copyright protected material, or contain any links that don't contribute to the discussion. Comments that make unsupported accusations will also not be posted. The Army and the Army alone will make a determination as to which comments will be posted. Any references to commercial entities, products, services, or other non-governmental organizations or individuals that remain on the site are provided solely for the information of individuals using this page. These references are not intended to reflect the opinion of the Army, DoD, the United States, or its officers or employees concerning the significance, priority, or importance to be given the referenced entity, product, service, or organization. Such references are not an official or personal endorsement of any product, person, or service, and may not be quoted or reproduced for the purpose of stating or implying Army endorsement or approval of any product, person, or service.

Any comments that report criminal activity including: suicidal behaviour or sexual assault will be reported to appropriate authorities including OSI. This forum is not:

  • This forum is not to be used to report criminal activity. If you have information for law enforcement, please contact OSI or your local police agency.
  • Do not submit unsolicited proposals, or other business ideas or inquiries to this forum. This site is not to be used for contracting or commercial business.
  • This forum may not be used for the submission of any claim, demand, informal or formal complaint, or any other form of legal and/or administrative notice or process, or for the exhaustion of any legal and/or administrative remedy.

Army does not guarantee or warrant that any information posted by individuals on this forum is correct, and disclaims any liability for any loss or damage resulting from reliance on any such information. Army may not be able to verify, does not warrant or guarantee, and assumes no liability for anything posted on this website by any other person. Army does not endorse, support or otherwise promote any private or commercial entity or the information, products or services contained on those websites that may be reached through links on our website.

Members of the media are asked to send questions to the public affairs through their normal channels and to refrain from submitting questions here as comments. Reporter questions will not be posted. We recognize that the Web is a 24/7 medium, and your comments are welcome at any time. However, given the need to manage federal resources, moderating and posting of comments will occur during regular business hours Monday through Friday. Comments submitted after hours or on weekends will be read and posted as early as possible; in most cases, this means the next business day.

For the benefit of robust discussion, we ask that comments remain "on-topic." This means that comments will be posted only as it relates to the topic that is being discussed within the blog post. The views expressed on the site by non-federal commentators do not necessarily reflect the official views of the Army or the Federal Government.

To protect your own privacy and the privacy of others, please do not include personally identifiable information, such as name, Social Security number, DoD ID number, OSI Case number, phone numbers or email addresses in the body of your comment. If you do voluntarily include personally identifiable information in your comment, such as your name, that comment may or may not be posted on the page. If your comment is posted, your name will not be redacted or removed. In no circumstances will comments be posted that contain Social Security numbers, DoD ID numbers, OSI case numbers, addresses, email address or phone numbers. The default for the posting of comments is "anonymous", but if you opt not to, any information, including your login name, may be displayed on our site.

Thank you for taking the time to read this comment policy. We encourage your participation in our discussion and look forward to an active exchange of ideas.