An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Home : News
NEWS | Aug. 11, 2015

Phreaker, Maker, Hacker, Ranger: One Vision for Cyber Support to Corps and Below in 2025

By Small Wars Journal

"The operationalization of the Cyberspace Domain at the tactical-level continues to exacerbate both tactical theorists and practitioners alike. For theorists, much of this stress and anxiety stems from a deficiency in unclassified historical examples and the abstractness of cyberspace as a warfighting domain. The lack of historical examples and cross-domain nature of cyberspace makes it difficult to fit cyber-related tactical concepts into traditional doctrine. For tactical practitioners who employ troops on the battlefield, the lack of a concise and communicable Mission Essential Task List (METL) to assist commanders in understanding, visualizing, and describing operational concepts to their staffs continues to limit cyberspace integration into maneuver. The purpose of this paper is not to provide a concrete solution on which to base the tactical-level operationalization of cyberspace off of, but rather to establish an intellectual target reference point for Army thinkers to “adjust fire” off of as they develop the Army’s cyber way-ahead for the next decade. This paper proposes one hypothetical task organization structure in the form of a Cyber Electromagnetic Activities (CEMA) Troop and an example METL that could exist in the Army in 2025. Additionally, the paper offers a hypothetical operational narrative for one potential application of CEMA at the tactical-level that could become a reality for the Army over the next decade and beyond. To nest under ARCYBER’s ongoing initiative to operationalize cyberspace at the tactical edge, this paper will refer to tactical-level CEMA as Cyber Support to Corps and Below (CSCB)."
PUBLICATIONS
Data Privacy and Security as a National Security Imperative
October 30, 2023

Command by intent can ensure command post survivability
August 29, 2023

The Tipping Point for Army Distributed Command and Control
August 1, 2023

Acknowledging the Realities of the Cyber Workforce
July 20, 2023

The Buzz About Electromagnetic Pulse Weapons
July 19, 2023

Book review: ‘On Disinformation’ by Lee McIntyre
July 19, 2023

IRREGULAR WARFARE PODCAST: EXPLORING CYBER POLICY IN THE DEPARTMENT OF DEFENSE
June 20, 2023

ARE WE ASKING TOO MUCH OF CYBER?
May 3, 2023

West Point hosts Joint Service Academy Cybersecurity Summit as industry, government collaborate to defend against cyber threats
April 13, 2023

Soldiers innovating technology, refining tactical concepts, and strengthening partnerships
April 11, 2023