Military Review English Edition May-June 2016 | Page 116
cyberspace effort. Though USCYBERCOM is working
discernment of expertise and better management of
to establish common standards for all armed services’
human capital.
cyberspace training, the armed services’ interpretaOperating within cyberspace. The primary adtions will diverge, if only slightly. Professors at each of
vantage of establishing an independent Cyber Force is
these centers will deliver unequal results. For example,
the ability to develop the most capable force. However,
the Army may hire the best computer code trainer,
operating within cyberspace will also become less risky
while the Marine Corps may hire the best network
and more efficient. In the physical domains, it is relatrainer. Despite common training standards, divergent
tively easy to divide the battlefield by physical location:
interpretations
the Army operates
and varying skills
inland, the Navy
of instructors will
operates at sea, the
produce cyberwarMarines operate in
riors of suboptimal
the littorals, and the
quality. Conversely,
Air Force in the sky.
the Cyber Force
However, no such
could consolidate
obvious boundaries
the best professors
exist in cyberspace,
into a single cyand all four armed
berspace training
services operate
center and better
throughout it. The
oversee the impleopportunity for one
mentation of stanservice to infringe
dards. Additionally,
on, or inadvertently
because students
sabotage, another’s
would be consolicyberspace operation
(Image courtesy of CERDEC)
dated, the brightest
is much greater than
The boundaries between traditional cyber threats and traditional electronic
would interact with
in the separate physwarfare threats have blurred. The U.S. Army Materiel Command’s Communicaeach other, and
ical domains. The
tions-Electronics Research, Development, and Engineering Center (CERDEC)
Integrated
Cyber
and
Electronic
Warfare
program
employs
both
cyber
and
the faculty would
command-and-conelectronic warfare capabilities as an integrated system to increase the comfacilitate improved
trol burden and the
mander’s situational awareness.
cyberspace research.
risk of cyberspace
Development continues beyond training.
fratricide increase with the number of cyberwarriors
Assignments and practice pick up where training
from four different services operating independently
leaves off. As an independent service, the Cyber Force in the domain. Another consequence of four discrete
could skillfully tailor the career development of its
cyberspace efforts is the potential for unintended reduncyberwarriors. Appropriate fields might be established dancy (i.e., two services may commit resources to solving
(e.g., coding, networking, virus protection, or intruthe same problem or developing the same capability).
sion management), and career pathways might also be A joint oversight effort might reduce some redundandesigned, including assignments in cyberspace units,
cy, but more bureaucracy adds time and money to an
in capability development agencies, and on joint staffs, already time-consuming capability development process.
where they can integrate cyberspace effects with oper- Removing the four armed services from the battle for cyations in the physical domains. Currently, cyberwarberspace reduces the risk of their stepping on each other
riors are beholden to their services’ human resources
and wasting resources.
needs, and they often are seen as interchangeable with
Advantages for the armed services. In Good to
communications personnel. While there is certainGreat, Jim Collins modernizes some of Adam Smith’s
ly overlap between the fields of communications
thoughts and notes successful businesses stick to their
and cyberwarfare, a cyber force would enable better
core concepts, foreswearing distractions. Collins offers
114
May-June 2016 MILITARY REVIEW