preview

Pacific Command Cyber Attack

Decent Essays

In the organization (O) area, the constant evolution of cyber threats and technologies in telecommunications imposes a permanent risk by exploiting the configuration of the joint and coalition forces. A constant update of the procedures results necessary as part of the adaptation of the cyber warriors to the changing environment. When the fast dynamic of the situation increases the risk to the mission, unity of effort may be achieved through effective coordination, exchange of liaisons, and interoperable communications and/or common operating systems. In the training (T) and personnel (P) areas, the specialized cyber warriors are becoming a scarce resource due to the competition with the private sector, where the cyber-attacks affects big …show more content…

A good example of this is the implementation of command and control exercises (C2Xs) performed by the U.S. Pacific Command to develop a C4I architecture. The program was used to validate the proficiency of primary Joint Task Force and component commander staffs by executing basic procedures using fielded and experimental tactical systems and applications, documenting subsequent shortfalls and workarounds, and identifying solutions and associated timelines. Focus and objectives alternate between communications networks and systems architectures, decision tools, and processes. The progressive results were useful to improve procedures and increase interoperability. Following this example, a worldwide C2X program can eliminate the barriers to connectivity between the Joint Force Commander and control element in regional commands on one side, and theater Joint Task Force or functional component commanders on the other. Testing compatibility with permanent, transiting, or rotational component commands and coalition partners will contribute significantly to increase interoperability and security. A global exercise program can facilitate technology induction as well as the coupling of command and control procedures in regional scenario vignettes. Besides, additional …show more content…

The JIE considers that the future security environment will continue to feature a range of adversaries attempting to shape political behavior by conducting damaging or disruptive cyber-attacks. This is a consequence of the globalization and cannot be stopped, however timely contention is needed. The Joint Force must minimize the consequences of threatened or successful cyberattacks against the United States, its allies, and partners by conducting Military Support to Cyber

Get Access