United States Cyber Command#List of commanders

{{Short description|Unified combatant command of the United States Armed Forces responsible for cyber operations}}

{{Use American English|date=June 2016}}

{{Use dmy dates|date=September 2020}}

{{Infobox military unit

| unit_name = United States Cyber Command

| image = Seal of the United States Cyber Command.svg

| caption =

| start_date = {{Start date|df=yes|2010|05|21}}
({{Age in years and months|2010|05|21}} ago)

| country = United States

| type = Unified combatant command and cyber force

| command_structure = U.S. Department of Defense

| motto =

| website = {{URL|https://www.cybercom.mil/|www.cybercom.mil}}

| commander1 = LTG William J. Hartman, USA {{cite news|last1=Nakashima|first1=Ellen|last2=Strobel|first2=Warren|url=https://www.washingtonpost.com/national-security/2025/04/03/nsa-director-fired-tim-haugh/|title=National Security Agency and Cyber Command chief Gen. Timothy Haugh ousted|date=2025-04-04|archive-url=https://archive.today/20250404032313/https://www.washingtonpost.com/national-security/2025/04/03/nsa-director-fired-tim-haugh/|archive-date=2025-04-04|newspaper=The Washington Post}}

| commander1_label = Commander

| commander2 = Rear Admiral Dennis Velez, USN

| commander2_label = Deputy Commander

| commander3 = Morgan Adamski{{cite web|url=https://www.cybercom.mil/About/Leadership/Bio-Display/Article/1651709/executive-director-uscybercom/ |title=Executive Director, USCYBERCOM }}

| commander3_label = Executive Director

| commander4 = CMSgt Kenneth M. Bruce Jr., USAF{{cite web | url=https://www.nsa.gov/Press-Room/Digital-Media-Center/Biographies/Biography-View-Page/Article/3556606/cmsgt-kenneth-m-bruce-jr-usaf/ | title=CMSGT Kenneth M. Bruce, Jr., USAF }}

| commander4_label = Senior Enlisted Leader

| garrison = Fort George G. Meade, Maryland, U.S.

| role = Cyberwarfare

| nickname = "USCYBERCOM", "CYBERCOM"

}}

{{United States Armed Forces sidebar}}

United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise which focus on securing cyberspace.{{Cite web|title=What is U.S. Cyber Command (USCYBERCOM)? - Definition from Techopedia|url=http://www.techopedia.com/definition/29026/us-cyber-command-uscybercom|access-date=2022-02-15|website=Techopedia.com|date=7 November 2012 |language=en}}

USCYBERCOM was established as a Sub-Unified command under U.S. Strategic Command at the direction of Secretary of Defense Robert Gates on 23 June 2009{{cite web|url=https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-029.pdf

|title=Memorandum|website=nsarchive2.gwu.edu|access-date=3 March 2024}} at the National Security Agency (NSA) headquarters in Fort George G. Meade, Maryland. It cooperates with NSA networks and has been concurrently headed by the director of the National Security Agency since its inception.{{Cite news|author=Nakashima, Ellen |date=13 September 2016 |title=Obama to be urged to split cyberwar command from NSA |newspaper=The Washington Post |url=https://www.washingtonpost.com/world/national-security/obama-to-be-urged-to-split-cyberwar-command-from-the-nsa/2016/09/12/0ad09a22-788f-11e6-ac8e-cf8e0dd91dc7_story.html |archive-url=https://web.archive.org/web/20160914182312/https://www.washingtonpost.com/world/national-security/obama-to-be-urged-to-split-cyberwar-command-from-the-nsa/2016/09/12/0ad09a22-788f-11e6-ac8e-cf8e0dd91dc7_story.html |archive-date=14 September 2016 |url-status=live}} While originally created with a defensive mission in mind, it has increasingly been viewed as an offensive force. On 18 August 2017, it was announced that USCYBERCOM would be elevated to the status of a full and independent unified combatant command.{{cite web|last1=Office of the Press Secretary|work=whitehouse.gov|title=Statement by President Donald J. Trump on the Elevation of Cyber Command|via=National Archives|url=https://trumpwhitehouse.archives.gov/the-press-office/2017/08/18/statement-donald-j-trump-elevation-cyber-command}} On 23 May 2023, it was announced that President Biden nominated Lt. Gen. Timothy Haugh to the Senate to be the next USCYBERCOM Commander.{{cite web|last1=Dept of the USAF|work=politico.com|title=

Biden nominates Lt. Gen. Timothy Haugh to lead NSA, Cyber Command

|date=23 May 2023 |via=Politico|url=https://www.politico.com/news/2023/05/23/biden-nominates-lt-gen-timothy-haugh-to-lead-nsa-cyber-command-00098372#:~:text=It%20announces%20that%20the%20president,ahead%20of%20a%20public%20announcement.}}

Mission statement

According to the US Department of Defense (DoD):{{cquote|USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.{{cite web | publisher=U.S. Department of Defense | title=Cyber Command Fact Sheet | date=21 May 2010 | url=http://www.stratcom.mil/factsheets/2/Cyber_Command/ | access-date=16 April 2014 | archive-url=https://web.archive.org/web/20140416192156/http://www.stratcom.mil/factsheets/2/Cyber_Command/ | archive-date=16 April 2014 | url-status=dead}}}}

The text "9ec4c12949a4f31474f299058ce2b22a", located in the command's emblem, is the MD5 hash of their mission statement.{{cite news|url=http://www.marinecorpstimes.com/news/2010/07/ap_military_cyber_command_logo_070810/|title=A code you can hack: On CYBERCOM's logo|last=Jelinek|first=Pauline|date=8 July 2010|agency=Associated Press|publisher=Marine Corps Times|access-date=8 July 2010|archive-url=https://web.archive.org/web/20100715055816/http://www.marinecorpstimes.com/news/2010/07/ap_military_cyber_command_logo_070810/|archive-date=15 July 2010|url-status=dead|df=dmy-all}}

The command is charged with pulling together existing cyberspace resources, creating synergies and synchronizing war-fighting effects to defend the information security environment. USCYBERCOM is tasked with centralizing command of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD's cyber expertise.U.S. Department of Defense, Cyber Command Fact Sheet, 21 May 2010{{cite news| url=https://www.nytimes.com/2013/03/13/us/intelligence-official-warns-congress-that-cyberattacks-pose-threat-to-us.html | work=The New York Times | first1=Mark | last1=Mazzetti | first2=David E. | last2=Sanger | title=Security Chief Says Computer Attacks Will Be Met | date=12 March 2013}}

Organizational structure

=Cyber teams=

Since 2015, the U.S. Cyber Command added 133 new cyber teams.{{Cite web|title=The Department of Defense Cyber Strategy |publisher=United States Department of Defense |date=October 2016 |url=http://www.defense.gov/News/Special-Reports/0415_Cyber-Strategy |archive-url=https://web.archive.org/web/20161104061430/http://www.defense.gov/News/Special-Reports/0415_Cyber-Strategy |archive-date=4 November 2016 |url-status=dead}} The breakdown was:

  • Thirteen National Mission Teams to defend against broad cyberattacks
  • Sixty-eight Cyber Protection Teams to defend priority DoD networks and systems against priority threats
  • Twenty-seven Combat Mission Teams to provide integrated cyberspace attacks in support of operational plans and contingency operations
  • Twenty-five Cyber Support Teams to provide analytic and planning support to the national mission and combat mission teams.

=Component Commands=

class="wikitable"
EmblemCommandAcronymCommanderEstablishedHeadquartersSubordinate Commands
75px 75px{{center|United States Army Cyber Command
Joint Force Headquarters–Cyber{{Cite web|url=https://www.arcyber.army.mil/Organization/Units/|title = ARCYBER Organization}}}}
ARCYBER / JFHQ–CLt General Maria B. Barrett{{dts|format=dmy|2010|10|01}}Fort Eisenhower, Georgia* 30px Army Network Enterprise Technology Command

*These Subordinates fall under United States Army Intelligence and Security Command, however Operational Control (OPCON) is given to ARCYBER for cyber-related effects.

75px{{center|Marine Corps Forces Cyberspace Command
Joint Force Headquarters–Cyber{{Cite web|url=https://www.marforcyber.marines.mil/Units/|title = MARFORCYBER Units}}}}
MARFORCYBER / JFHQ-CMajor General Joseph A. Matos III{{dts|format=dmy|2010|01|21}}Fort Meade, Maryland* Marine Corps Cyberspace Operations Group

75px 75px 75px{{center|U.S. Fleet Cyber Command/United States Tenth Fleet
Joint Force Headquarters–Cyber{{Cite web|url=https://www.fcc.navy.mil/|title = US Navy Fleet Cyber Command}}}}
FLTCYBER / 10F / JFHQ–CVice Admiral Craig A. Clapperton{{dts|format=dmy|2010|01|29}}Fort Meade, Maryland* 30px Naval Network Warfare Command (CTF 1010)
  • 30px Navy Cyber Defense Operations Command (CTF 1020)
  • 30px Navy Information Operations Command-Texas (CTF 1040)
  • 30px Navy Information Operations Command-Georgia (CTF 1050)
  • 30px Cryptologic Warfare Group Six (CTF 1060)
  • 30px Navy Information Operations Command-Hawaii (CTF 1070)
  • 30px Navy Cyber Warfare Development Group (CTF 1090)
  • 30px Navy Information Operations Command-Colorado (CTG 101)
  • 30px Navy Information Operations Command-Whidbey Island (CTG 102)
  • 30px Navy Information Operations Command-Pensacola (CTG 103)
  • 75px 75px 75px{{center|Sixteenth Air Force / Air Forces Cyber
    Joint Force Headquarters–Cyber{{Cite web|url=https://www.16af.af.mil/Units//|title = 16th Air Force Units}}}}
    16 AF (AFCYBER) / JFHQ–CLt General Thomas K. Hensley{{dts|format=dmy|2019|10|11}}JBSA-Lackland, Texas* 616th Operations Center
  • 30px 67th Cyberspace Wing
  • 30px 688th Cyberspace Wing
  • 30px 70th Intelligence, Surveillance and Reconnaissance Wing
  • 30px 363rd Intelligence, Surveillance and Reconnaissance Wing
  • 30px 480th Intelligence, Surveillance and Reconnaissance Wing
  • 30px 9th Reconnaissance Wing
  • 30px 319th Reconnaissance Wing
  • 30px 55th Wing
  • 30px 557th Weather Wing
  • 30px Air Force Technical Applications Center
  • = Cyber National Mission Force =

    The Cyber National Mission Force (CNMF) was activated on 27 January 2014, as an element of Cyber Command.{{Cite web|url=https://defensescoop.com/2022/12/19/cyber-national-mission-force-declared-sub-unified-command/ |title = Cyber National Mission Force Declared Sub-Unified Command |last=Pomerleau |first=Mark |website=DefenseScoop News|date = 20 December 2022 }}{{Cite web |title=The Evolution of Cyber: Newest Subordinate Unified Command is Nation's Joint Cyber Force |url=https://www.cybercom.mil/Media/News/Article/3250075/the-evolution-of-cyber-newest-subordinate-unified-command-is-nations-joint-cybe/https%3A%2F%2Fwww.cybercom.mil%2FMedia%2FNews%2FArticle%2F3250075%2Fthe-evolution-of-cyber-newest-subordinate-unified-command-is-nations-joint-cybe%2F |access-date=2023-02-27 |website=U.S. Cyber Command |language=en-US}} At inception the CNMF consisted of 21 teams, broken down into 13 National Mission Teams (NMT) and 8 National Support Teams (NST). Today, the CNMF has expanded to 39 joint cyber teams consisting of over 2,000 service members and civilian members across the U.S. Armed Forces On 25 October 2022, Defense Secretary Lloyd Austin authorized that the Cyber National Mission Force become a subordinate unified command underneath the United States Cyber Command.{{Cite web |date=2022-12-19 |title=Cyber National Mission Force elevated in fight against foreign hackers |url=https://therecord.media/cyber-national-mission-force-elevated-in-fight-against-foreign-hackers/ |access-date=2023-02-27 |website=The Record from Recorded Future News |language=en}} Following this, on 19 December 2022, General Paul Nakasone presided over a ceremony to establish the CNMF with the new "sub-unified" command status.

    Major General Lorna Mahlock, United States Marine Corps has served as CNMF commander since January 2024.

    The CNMF is one of three Cyber Command forces that would react to a cyber attack on the United States. The other two forces are the Cyber Combat Mission Force assigned to the operational control of individual U.S. combatant commanders, and the Cyber Protection Force that helps operate and defend the DODIN.[http://www.arcyber.army.mil/Resources/Fact-Sheets/Article/2079661/cyber-mission-force/ DOD Fact Sheet: Cyber Mission Force] U.S. Army Cyber Command. Retrieved 23 July 2022. {{PD-notice}}

    CNMF is composed of cyber mission force teams across services that support the CNMF mission through their specific respective assignments:[https://www.defense.gov/News/News-Stories/Article/Article/1524747/cyber-mission-force-achieves-full-operational-capability/ Cyber Mission Force Achieves Full Operational Capability] United States Department of Defense. Retrieved 23 July 2022. {{PD-notice}}[https://www.c4isrnet.com/workforce/career/2017/07/25/heres-how-dod-organizes-its-cyber-warriors/ Here's How DOD Organizes its Cyber Warriors] C4ISRNet. Retrieved 23 July 2022.

    • National Mission Teams (NMT) defend the nation by identifying adversary activity, blocking attacked and maneuvering to defeat them.
    • Combat Mission Teams (CMT) conduct military cyberspace operations in support of combatant commander priorities and missions.
    • Cyber Protection Teams (CPT) defend DoD's information network, protect priority missions and prepare cyber forces for combat.
    • National Support Teams (NST) provide analytic and planning support to national mission and combat mission teams.

    The Cyber National Mission Force operates in both defensive and offensive cyber operations to carry out its missions of: U.S. election defense, counter-ransomware operations, global hunt operations, combating foreign malicious cyber actors, and providing support to national security operations.{{Cite web |title=The Cyber National Mission Force Is the Newest Military Command |url=https://mybaseguide.com/cyber-national-mission-force/ |access-date=2023-02-27 |website=MyBaseGuide |language=en}}

    Global hunt operations began in 2018 as part of the "persistent engagement" strategy with the goal of looking for malicious cyber activity and vulnerabilities on significant networks.{{Cite web |date=2022-08-18 |title=U.S. Cyber Command completes defensive cyber mission in Croatia |url=https://cyberscoop.com/u-s-cyber-command-hunts-forward/ |access-date=2023-02-27 |website=CyberScoop |language=en-US}} Since its inception, the hunt operations have been requested and conducted in 18 countries and over 50 foreign networks.

    =Standing joint task force=

    class="wikitable"

    |+

    EmblemCommandAcronymCommanderEstablishedHeadquarters
    75pxDepartment of Defense Cyber Defense CommandDCDCLt General Paul T. Stanton, USA{{dts|2015}}Fort Meade, Maryland
    Joint Task Force AresJTF-Ares{{dts|2016}}

    Background

    An intention by the U.S. Air Force to create a 'cyber command' was announced in October 2006.{{cite web

    |url=http://www.spacedaily.com/reports/US_Air_Force_Prepares_For_Cyber_Warfare_999.html

    |title=US Air Force Prepares For Cyber Warfare

    |author=John C.K. Daly

    |publisher=Space Daily

    |date=9 October 2006}} An Air Force Cyber Command was created in a provisional status in November 2006. However, in October 2008, it was announced the command would not be brought into permanent activation.

    On 23 June 2009, the Secretary of Defense directed the Commander of U.S. Strategic Command (USSTRATCOM) to establish USCYBERCOM. In May 2010, General Keith Alexander outlined his views in a report for the United States House Committee on Armed Services subcommittee:{{Cite news|url=http://news.bbc.co.uk/2/hi/technology/8033440.stm|title=US needs 'digital warfare force'|date=5 May 2009|work=BBC News|access-date=2017-10-10|language=en-GB}}{{cite web |url=http://www.hstoday.us/content/view/11125/152/ |title=preparedness and security news - DC Summit Convenes Military 'Cyber Warriors' |publisher=Homeland Security Today |date=2009-11-18 |access-date=2010-07-10 |archive-date=11 July 2010 |archive-url=https://web.archive.org/web/20100711060434/http://www.hstoday.us/content/view/11125/152/ |url-status=dead }}{{cite web|url=http://www.defense.gov/releases/release.aspx?releaseid=13051 |archive-url=https://web.archive.org/web/20100228200856/http://www.defense.gov/releases/release.aspx?releaseid=13051 |url-status=dead |archive-date=28 February 2010 |title=News Release: Flag and General Officer Announcements |publisher=Department of Defense |date=2009-03-12 |access-date=2010-07-10}}{{cite news|url=https://www.wired.com/threatlevel/2010/04/cyberwar-commander/|title=Cyberwar Commander Survives Senate Hearing, Threat Level|date=15 April 2010|work=Wired.com|access-date=2010-07-10}}{{cite web|url=https://www.senate.gov/pagelayout/legislative/one_item_and_teasers/noms_confn.htm |title=U.S. Senate: Legislation & Records Home > Nominations Confirmed (Non-Civilian) |publisher=U.S. Senate |access-date=2010-07-10}}

    {{cquote|My own view is that the only way to counteract both criminal and espionage activity online is to be proactive. If the U.S. is taking a formal approach to this, then that has to be a good thing. The Chinese are viewed as the source of a great many attacks on western infrastructure and just recently, the U.S. electrical grid. If that is determined to be an organized attack, I would want to go and take down the source of those attacks. The only problem is that the Internet, by its very nature, has no borders and if the U.S. takes on the mantle of the world's police; that might not go down so well.}}

    Initial operational capability was attained on 21 May 2010. General Alexander was promoted to four-star rank, becoming one of United States's 38 four-star officers, and took charge of U.S. Cyber Command in a ceremony at Fort Meade that was attended by Commander of U.S. Central Command GEN David Petraeus, and Secretary of Defense Robert M. Gates.{{cite web|url=http://www.defense.gov/photos/newsphoto.aspx?newsphotoid=12630 |archive-url=https://web.archive.org/web/20100527142356/http://www.defense.gov/Photos/NewsPhoto.aspx?newsphotoid=12630 |url-status=dead |archive-date=27 May 2010 |title=Photos : News Photo |publisher=Defense.gov |date=2010-05-21 |access-date=2010-07-10}}{{Cite web|url=http://www.armytimes.com/news/2010/05/military_cyber_command_052110/|title=DoD Cyber Command is officially online, 21 May 2010, Army Times|access-date=27 April 2021}}{{cite web|url=http://www.govinfosecurity.com/articles.php?art_id=1450&search_keyword=Keith+Alexander&search_method=exact |title=Military Mulls Joint Cyber Defense |publisher=Govinfosecurity.com |access-date=2010-07-10}}{{cite web |url=http://www.hometownglenburnie.com/news/Business/2009/12/09-17/Fort+Meade+cyber+security+center+sought%0A.html |title=Fort Meade cyber security center sought (www.HometownGlenBurnie.com - The Maryland Gazette) |publisher=HometownGlenBurnie.com |access-date=2010-07-10 |archive-date=14 July 2010 |archive-url=https://web.archive.org/web/20100714145249/http://www.hometownglenburnie.com/news/Business/2009/12/09-17/Fort+Meade+cyber+security+center+sought%0A.html |url-status=dead }}

    USCYBERCOM reached full operational capability on 31 October 2010.{{Cite web|url=https://www.defense.gov/News/Releases/Release/Article/|title=Release|website=www.defense.gov|access-date=27 April 2021}}

    The command assumed responsibility for several existing organizations. The Joint Task Force for Global Network Operations (JTF-GNO) and the Joint Functional Component Command for Network Warfare (JFCC-NW) were absorbed by the command. The Defense Information Systems Agency, where JTF-GNO operated, provides technical assistance for network and information assurance to USCYBERCOM, and is moving its headquarters to Fort Meade.{{cite web|last=Jackson |first=William |url=http://www.fcw.com/Articles/2009/06/24/DOD-launches-cyber-command.aspx |title=DoD creates Cyber Command as U.S. Strategic Command subunit - Federal Computer Week |publisher=Fcw.com |date=2009-06-24 |access-date=2010-07-10}}

    President Obama signed into law, on 23 December 2016, the National Defense Authorization Act (NDAA) for fiscal year (FY) 2017, which elevated USCYBERCOM to a unified combatant command. The FY 2017 NDAA also specified that the dual-hatted arrangement of the commander of USCYBERCOM will not be terminated until the Secretary of Defense and Chairman of the Joint Chiefs of Staff jointly certify that ending this arrangement will not pose risks to the military effectiveness of CYBERCOM that are unacceptable to the national security interests of the United States.{{Cite web|url=https://www.congress.gov/114/bills/s2943/BILLS-114s2943enr.pdf|title=S. 2943; National Defense Authorization Act for Fiscal Year 2017|website=congress.gov|access-date=18 June 2017}}

    Concerns

    There are concerns that the Pentagon and NSA will overshadow any civilian cyber defense efforts.{{Cite magazine|last=Monroe |first=John S. |date=2 July 2009 |title=Cyber Command: So much still to know |magazine=Federal Computer Week (FCW) |publisher=1105 Media, Inc. |url=http://www.fcw.com/Articles/2009/07/06/buzz-cyber-command.aspx |access-date=22 November 2016 }} There are also concerns on whether the command will assist in civilian cyber defense efforts.{{Cite web|title=U.S Cyber Command Goes Online |date=1 October 2009 |publisher=Democracy Arsenal |url=http://www.democracyarsenal.org/2009/10/us-cyber-command-goes-online-.html |access-date=22 November 2016 }} According to Deputy Secretary of Defense William J. Lynn, the command "will lead day-to-day defense and protection of all DoD networks. It will be responsible for DoD's networks – the dot-mil world. Responsibility for federal civilian networks – dot-gov – stays with the Department of Homeland Security, and that's exactly how it should be."{{Cite web|author=Lynn, William J. |date=12 November 2009 |title=Remarks at the Defense Information Technology Acquisition Summit |publisher=United States Department of Defense |url=https://www.defense.gov/speeches/speech.aspx?speechid=1399 |archive-url=https://web.archive.org/web/20100415113237/http://www.defense.gov/speeches/speech.aspx?speechid=1399 |archive-date=15 April 2010 |url-status=live}} Alexander notes, however, that if faced with cyber hostilities an executive order could expand Cyber Command's spectrum of operations to include, for instance, assisting the Department of Homeland Security in defense of their networks.{{Cite news|author=Shachtman, Noah |url=https://www.brookings.edu/opinions/militarys-cyber-commander-swears-no-role-in-civilian-networks/ |title=Military's Cyber Commander Swears: "No Role" in Civilian Networks" |newspaper=Brookings |publisher=The Brookings Institution |date=23 September 2010|archive-url=https://web.archive.org/web/20161107160158/https://www.brookings.edu/opinions/militarys-cyber-commander-swears-no-role-in-civilian-networks/ |archive-date=7 November 2016 |url-status=live}}

    Some military leaders claim that the existing cultures of the Army, Navy, and Air Force are fundamentally incompatible with that of cyber warfare.{{Cite journal |first1=Gregory |last1=Conti |first2=Jen |last2=Easterly |title=Recruiting, Development, and Retention of Cyber Warriors Despite an Inhospitable Culture |journal=Small Wars Journal |date=29 July 2010 |url=http://smallwarsjournal.com/blog/2010/07/recruiting-development-and-ret/ |access-date=29 July 2010 |archive-url=https://web.archive.org/web/20110107150540/http://smallwarsjournal.com/blog/2010/07/recruiting-development-and-ret/ |archive-date=7 January 2011 |url-status=dead}} Major Robert Costa (USAF) even suggested a sixth branch of the military, an Information (Cyber) Service with Title 10 responsibilities analogous to its sister services in 2002 noting:

    {{cquote|While no one [IOP, Instrument of National Power] operates in a vacuum... Information increasingly underpins the other three [Diplomatic, Economic and Military], yet has proven to be the most vulnerable, even as US society becomes more dependent on it in peace, conflict, and war. To attack these centers of gravity, an adversary will use the weakest decisive point, ... the Information IOP. In addition, the other IOPs benefit from Unity of Effort--Constitutional balances of power ensure the Diplomatic and Military IOPs exercised by the President in concert with Congress are focused, while the Economic IOP achieves Unity of Action through international market controls and an international body of law. [In 2002], [t]he Information IOP however, [was] rudderless, lacking both Unity of Action and Unity of Command.{{Cite web|last=Costa |first=Robert |title=Supporting the Information-Centric 2001 Quadrennial Defense Review: The Case for an Information Service |date=April 2002 |page=261 |location=Maxwell Air Force Base, Alabama |publisher=Air Command and Staff College, Air University |url=http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA420669 |archive-url=https://web.archive.org/web/20121201040718/http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA420669 |archive-date=1 December 2012 |url-status=dead}}

    }}

    Others have also discussed the creation of a cyber-warfare branch.{{Cite web|first=Eric |last=Chabrow |date=22 April 2009 |title=Report: Cybersecurity Military Command Coming |publisher=GovInfoSecurity (Information Security Media Group) |url=http://www.govinfosecurity.com/report-cybersecurity-military-command-coming-a-1401 |archive-url=https://web.archive.org/web/20151224111253/http://www.govinfosecurity.com/report-cybersecurity-military-command-coming-a-1401 |archive-date=24 December 2015 |url-status=live}}{{Cite magazine|first1=Gregory |last1=Conti |first2=John "Buck" |last2=Surdu |date=2009 |title=Army, Navy, Air Force, Cyber: Is it Time for a Cyberwarfare Branch of the Military |magazine=Information Assurance Newsletter |volume=12 |issue=1 |pages= 14–18 |url=http://www.rumint.org/gregconti/publications/2009_IAN_12-1_conti-surdu.pdf |archive-url=https://web.archive.org/web/20160611101645/http://www.rumint.org/gregconti/publications/2009_IAN_12-1_conti-surdu.pdf |archive-date=11 June 2016 |url-status=live}} Lieutenant Colonel Gregory ContiAt the time, Lieutenant Colonel Gregory Conti was a United States Military Academy Professor and Director of West Point's Cyber

    Security Research Center. and Colonel John "Buck" Surdu (chief of staff of the United States Army Research, Development and Engineering Command) stated that the three major services are "properly positioned to fight kinetic wars, and they value skills such as marksmanship, physical strength, the ability to leap out of airplanes and lead combat units under enemy fire."

    Conti and Surdu reasoned, "Adding an efficient and effective cyber branch alongside the Army, Navy and Air Force would provide our nation with the capability to defend our technological infrastructure and conduct offensive operations. Perhaps more important, the existence of this capability would serve as a strong deterrent for our nation's enemies."{{Cite web|first=Eric |last=Chabrow |date=25 March 2009 |title=New Cyber Warfare Branch Proposed: Time Ripe to Create Fourth Branch of Military |publisher=GovInfoSecurity (Information Security Media Group) |url=http://www.govinfosecurity.com/blogs/new-cyber-warfare-branch-proposed-p-160/op-1 |archive-url=https://web.archive.org/web/20151222081310/http://www.govinfosecurity.com/blogs/new-cyber-warfare-branch-proposed-p-160/op-1 |archive-date=22 December 2015 |url-status=live}}

    In response to concerns about the military's right to respond to cyber attacks, General Alexander stated "The U.S. must fire back against cyber attacks swiftly and strongly and should act to counter or disable a threat even when the identity of the attacker is unknown" prior to his confirmation hearings before the United States Congress. This came in response to incidents such as a 2008 operation to take down a government-run extremist honeypot in Saudi Arabia. "Elite U.S. military computer specialists, over the objections of the CIA, mounted a cyberattack that dismantled the online forum".{{Cite news| first=Ellen | last=Nakashima |date=19 March 2010 |title=Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies |newspaper=The Washington Post |url=https://www.washingtonpost.com/wp-dyn/content/article/2010/03/18/AR2010031805464.html |access-date=2010-07-10 }}

    "The new U.S. Cyber Command needs to strike a balance between protecting military assets and personal privacy." stated Alexander, in a Defense Department release. If confirmed, Alexander said, his main focus will be on building capacity and capability to secure the networks and educating the public on the command's intent.

    "This command is not about an effort to militarize cyber space," he said. "Rather, it's about safeguarding our military assets."{{cite web|first=Lisa |last=Daniel |date=15 April 2010 |title=Nominee Urges Government, Private Sector Cooperation |work=DoD News|publisher=United States Department of Defense |url=https://www.defense.gov/News/News-Stories/ID/58772/ |archive-url=https://web.archive.org/web/20150714022326/http://www.defense.gov/news/newsarticle.aspx?id=58772 |archive-date=14 July 2015 |url-status=live}}

    In July 2011, Deputy Defense Secretary William Lynn announced in a conference that "We have, within Cyber Command, a full spectrum of capabilities, but the thrust of the strategy is defensive." "The strategy rests on five pillars, he said: treat cyber as a domain; employ more active defenses; support the Department of Homeland Security in protecting critical infrastructure networks; practice collective defense with allies and international partners; and reduce the advantages attackers have on the Internet."{{Cite web|first=Karen |last=Parrish |date=14 July 2011 |title=News Article: Lynn: Cyber Strategy's Thrust is Defensive |work=DoD News |publisher=United States Department of Defense |url=https://www.defense.gov/News/News-Stories/id/64682/|archive-url=https://web.archive.org/web/20150714021911/http://www.defense.gov/news/newsarticle.aspx?id=64682 |archive-date=14 July 2015 |url-status=live}}

    In 2013, USCYBERCOM held a classified exercise in which reserve officers (with extensive experience in their civilian cyber-security work) easily defeated active duty cyber warriors.{{cite news |url=http://www.militarytimes.com/story/military/tech/2014/08/04/in-supersecret-cyberwar-game-civilian-sector-techies-pummel-active-duty-cyberwarriors/13566549/ |title=In supersecret cyberwar game, civilian-sector techies pummel active-duty cyberwarriors |last1=Tilghman |first1=Andrew |date=4 August 2014 |website=www.armytimes.com |publisher=Gannett Government Media |access-date=6 August 2014}} In 2015 Eric Rosenbach, the principal cyber adviser to Defense Secretary Ash Carter, said DoD was looking at alternatives to staffing with just active-duty military.{{Cite news|title=Pentagon eyes recruiting cyber talent through National Guard |last1=Baldor |first1=Lolita C. |date=14 April 2015 |newspaper=Military Times |agency= Associated Press |url=http://www.militarytimes.com/story/military/tech/2015/04/14/pentagon-eyes-recruiting-cyber-talent-through-national-guard/25784919/|archive-url=https://web.archive.org/web/20160128203430/http://www.militarytimes.com/story/military/tech/2015/04/14/pentagon-eyes-recruiting-cyber-talent-through-national-guard/25784919/ |archive-date=28 January 2016 |url-status=live}} Beginning that year, USCYBERCOM added 133 teams (staffing out at 6,000 people), with the intent that at least 15% of the personnel would be reserve cyber operations airmen.{{Cite news|last1=Pawlyk |first1=Oriana K.|date=3 January 2015 |title=Calling up the Reserves: Cyber mission is recruiting |newspaper=Air Force Times |publisher=Sightline Media Group |url=https://www.airforcetimes.com/story/military/careers/air-force/2015/01/03/us-cyber-command-recruiting/21226161/ |access-date=5 November 2016 }} These new teams had achieved "initial operating capability" (IOC) as of 21 October 2016. Officials noted that IOC is not the same as combat readiness, but is the first step in that direction.{{Cite news|title=All Cyber Mission Force Teams Achieve Initial Operating Capability |date=24 October 2016 |publisher=United States Cyber Command, United States Department of Defense |url=https://www.defense.gov/News/News-Stories/Article/Article/984663/all-cyber-mission-force-teams-achieve-initial-operating-capability/ |archive-url=https://web.archive.org/web/20161028022704/http://www.defense.gov/News/Article/Article/984663/all-cyber-mission-force-teams-achieve-initial-operating-capability |archive-date=28 October 2016 |url-status=live}}

    President Barack Obama's Commission on Enhancing National Cybersecurity was formed to develop a plan for protecting cyberspace. The commission released a report in December 2016. The report made 16 major recommendations regarding the intertwining roles of the military, government administration and the private sector in providing cyber security.{{Cite magazine|last=Rockwell |first=Mark |date=21 November 2016 |title=Cyber panel closes in on final recommendations |magazine=Federal Computer Week (FCW) |publisher=1105 Media, Inc. |url=https://fcw.com/articles/2016/11/21/cnap-commission-report-rockwell.aspx |access-date=22 November 2016}}

    President Trump indicated that he wanted a full review of Cyber Command during his bid for presidency.{{Cite web|first=John |last=Costello |date=10 November 2016 |title=Overview of President-Elect Donald Trump's Cyber Policy |publisher=Flashpoint |url=https://www.flashpoint-intel.com/overview-trumps-cyber-policy/ |archive-url=https://web.archive.org/web/20161122192135/https://www.flashpoint-intel.com/overview-trumps-cyber-policy/ |archive-date=22 November 2016 |url-status=live}} During his presidency, the Trump administration made Cyber Command a unified combatant command, and took other measures attempting to deter cyber attacks. However, the FBI reported that they logged a record number of complaints and economic losses in 2019, as cybercrime continued to grow.{{Cite web|first=David |last=Fidler |date=2 December 2020 |title=President Trump's Legacy on Cyberspace Policy |publisher=CFR |url=https://www.cfr.org/blog/president-trumps-legacy-cyberspace-policy |archive-url=https://web.archive.org/web/20210511113650/https://www.cfr.org/blog/president-trumps-legacy-cyberspace-policy |archive-date=11 May 2021 |url-status=live}}

    International effects and reactions

    The creation of U.S. Cyber Command appears to have motivated other countries in this arena. In December 2009, South Korea announced the creation of a cyber warfare command. Reportedly, this was in response to North Korea's creation of a cyber warfare unit.{{cite web|url=https://www.koreatimes.co.kr/www/news/nation/2009/12/205_56502.html |title=Cyber Warfare Command to Be Launched in January |publisher=Koreatimes.co.kr |access-date=2010-07-10|date=December 2009 }} In addition, the British GCHQ has begun preparing a cyber force.{{cite web|last=Clark |first=Colin |url=http://www.dodbuzz.com/2009/06/29/stratcom-plows-ahead-on-cyber/ |title=StratCom Plows Ahead on Cyber |publisher=DoD Buzz |date=2009-06-29 |access-date=2010-07-10}} Furthermore, a shift in military interest in cyber warfare has motivated the creation of the first U.S. Cyber Warfare Intelligence Center.{{cite web|url=https://www.af.mil/News/story/id/123204543/ |title=Construction begins on first cyber warfare intelligence center |publisher=Af.mil |access-date=2010-07-10 |archive-url=https://archive.today/20120630131823/http://www.af.mil/news/story.asp?id=123204543 |archive-date=30 June 2012 |url-status=live }} In 2010, China introduced a department dedicated to defensive cyber war and information security in response to the creation of USCYBERCOM.{{cite news| title = Chinese army to target cyber war threat| url = https://www.theguardian.com/world/2010/jul/22/chinese-army-cyber-war-department| access-date =25 July 2010 | location=London | work=The Guardian | first=Tania | last=Branigan | date=2010-07-22}}

    Operations

    In June 2019, Russia has conceded that it is "possible" its electrical grid was under cyberattack by the United States.{{cite news |title=US and Russia clash over power grid 'hack attacks |url=https://www.bbc.com/news/technology-48675203 |publisher=BBC News |date=18 June 2019}} The New York Times reported that hackers from the U.S. Cyber Command planted malware potentially capable of disrupting the Russian electrical grid.{{cite magazine |title=How Not To Prevent a Cyberwar With Russia |url=https://www.wired.com/story/russia-cyberwar-escalation-power-grid/ |magazine=Wired |date=18 June 2019}}

    Cyber command is using its 2021 exercise Cyber Flag 21–2 to improve its teams' tactics.{{Cite web|url=https://www.c4isrnet.com/cyber/2021/06/23/us-cyber-command-exercise-will-help-shape-new-tactics-for-changing-threats/|title=US Cyber Command exercise will help shape new tactics for changing threats|first=Mark|last=Pomerleau|date=23 June 2021|website=C4ISRNet}}[https://www.c4isrnet.com/information-warfare/2021/05/25/us-army-emphasizes-information-advantage/ Mark Pomerleau (25 May 2021) US Army emphasizes ‘information advantage’] "five pillars of information advantage: enable decision-making, protect friendly information, inform and educate domestic audiences, inform and influence international audiences, and conduct information warfare"

    Pause on Offensive Cyber Operations

    The U.S. government has formally paused offensive cyber operations against Russia. This decision was part of new guidance provided to USCYBERCOM in February 2025.{{Cite web |title=MSN |url=https://www.msn.com/en-us/news/politics/defense-secretary-pete-hegseth-orders-a-halt-to-offensive-cyber-operations-against-russia/ar-AA1A6M4x |access-date=2025-03-19 |website=www.msn.com}}{{Cite web |title=The Geopolitical Fallout of a Potential US Cyber Stand-Down |url=https://thediplomat.com/2025/03/the-geopolitical-fallout-of-a-potential-us-cyber-stand-down/ |access-date=2025-03-19 |website=thediplomat.com |language=en-US}}{{Cite web |last=Ikeda |first=Scott |date=2025-03-07 |title=US Halts Cyber Operations Against Russia After Ukraine Flap |url=https://www.cpomagazine.com/cyber-security/us-halts-cyber-operations-against-russia-after-ukraine-flap/ |access-date=2025-03-19 |website=CPO Magazine |language=en-US}}{{Cite news |last=Nakashima |first=Ellen |title=As Trump warms to Putin, U.S. halts offensive cyber operations against Moscow |url=https://wapo.st/3Y0oQ6E |access-date=19 March 2025 |work=Washington Post}}

    List of commanders

    The commander of U.S. Cyber Command is a statutory office ({{USC|10|167b}}), and is held by a four-star general, or if the commander is a Navy officer, a four-star admiral.

    {{main|Leadership of the United States Cyber Command}}

    class="wikitable sortable" style="text-align:center;"
    rowspan=2| {{abbr|No.|Number}}

    ! colspan=2| Commander

    ! colspan=3| Term

    ! rowspan=2| Service branch

    Portrait

    ! Name

    ! Took office

    ! Left office

    ! Term length

    {{Officeholder table

    | order = 1

    | military_rank = General

    | image = General Keith B. Alexander in service uniform.jpg

    | officeholder = Keith B. Alexander

    | officeholder_sort = Alexander, Keith B.

    | officeholder_note =

    | born_year = 1951

    | died_year =

    | term_start = 21 May 2010

    | term_end = 28 March 2014

    | timeinoffice = {{ayd|2010|05|21|2014|03|28}}

    | defence_branch = 75px
    U.S. Army

    }}

    {{Officeholder table

    | order = –

    | military_rank = Lieutenant General

    | image = LtGen Jon M. Davis, USMC.jpg

    | officeholder = Jon M. Davis

    | officeholder_sort = Davis, Jon M.

    | officeholder_note =

    | born_year =

    | died_year =

    | term_start = 29 March 2014

    | term_end = 2 April 2014

    | timeinoffice = {{ayd|2014|03|29|2014|04|02}}

    | defence_branch = 75px
    U.S. Marine Corps

    | acting = y

    }}

    {{Officeholder table

    | order = 2

    | military_rank = Admiral

    | image = Rogers 2018.jpg

    | officeholder = Michael S. Rogers

    | officeholder_sort = Rogers, Michael S.

    | officeholder_note =

    | born_year = 1959

    | died_year =

    | term_start = 3 April 2014

    | term_end = 4 May 2018

    | timeinoffice = {{ayd|2014|04|03|2018|05|04}}

    | defence_branch = 75px
    U.S. Navy

    }}

    {{Officeholder table

    | order = 3

    | military_rank = General

    | image = General Paul M. Nakasone (NSA).jpg

    | officeholder = Paul M. Nakasone

    | officeholder_note =

    | officeholder_sort = Nakasone Paul M.

    | born_year = 1963

    | died_year =

    | term_start = 4 May 2018

    | term_end = 2 February 2024

    | timeinoffice = {{ayd|2018|05|08|2024|02|02}}

    | defence_branch = 75px
    U.S. Army

    }}

    {{Officeholder table

    | order = 4

    | military_rank = General

    | image = Gen Timothy D. Haugh.jpg

    | officeholder = Timothy D. Haugh

    | officeholder_note =

    | officeholder_sort = Haugh, Timothy D.

    | born_year = 1969

    | died_year =

    | term_start = 2 February 2024

    | term_end = 3 April 2025

    | timeinoffice = {{ayd|2024|02|02|2025|04|03}}

    | defence_branch = 75px
    U.S. Air Force

    }}

    {{Officeholder table

    | order = –

    | military_rank = Lieutenant General

    | image = LTG William J. Hartman (2).jpg

    | officeholder = William J. Hartman

    | officeholder_sort =

    | born_year =

    | died_year =

    | term_start = 3 April 2025

    | timeinoffice = {{ayd|2025|04|03

    }

    | defence_branch = 75px
    U.S. Army

    | acting = y

    }}

    |}

    See also

    References

    Notes

    {{reflist}}

    Further reading