Tactical cyber warfare within military circles is shrouded by a mystique that confounds many commanders and their staffs. Onerous regulations, extremely high and compartmented classification levels, and authorities that cut across multiple three-letter agencies place many cyber capabilities beyond the reach of most commanders. Determined to have a modicum of cyber capability at their level, tactical commanders send their personnel to credential-producing courses and schools that often cost thousands of dollars only to find out those same personnel then have six-figure job opportunities in the private sector when they depart the service in six months.1 Worse, requests for cyber effects or permissions to conduct offensive cyber operations (OCO) at the tactical level entails a process so burdensome and slow, the optimal window for their use passes quickly, leaving many commanders embittered. Commanders consequently are put in the position similar to that of the mythological Greek king Tantalus, doomed for eternity to stand in a pool of water with low-hanging fruit just out of reach.
1. Neal Ferrano, “Cyber Force Generation,” Marine Corps Gazette, 101, no. 2, February 2017.
2. “Cyber Steps up Its Role on the Battlefield,” Marine Corps Times, 25 August 2014.
3. Max Smeet, “How Much Does a Cyber Weapon Cost? Nobody Knows,” Council on Foreign Relations Blog, 21 November 2016.
4. Christopher Bartos, “Cyber Weapons Are Not Created Equal,” U. S. Naval Institute Proceedings 142, no. 6 (June 2016).
5. Scott Neuman, “As The Worm Turns: Cybersecurity Expert Tracks Blowback From Stuxnet,” National Public Radio, 1 June 2012.
6. Andrew Metcalf and Christopher Barber, “Tactical Cyber: How to Move Forward,” Small Wars Journal, no. 12, September 2014.
7. Charles C. Krulak, “The Strategic Corporal: Leadership in the Three Block War,” Marine Corps Gazette, 83, no. 1, January 1999.
8. Richard M. Swain and Albert C. Pierce, The Armed Forces Officer (Washington, D.C.: National Defense University Press, 2017), 7.
9. Stephen Covey, The Speed of Trust: The One Thing That Changes Everything (New York: Simon and Schuster, 2006), 255–257.
10. U.S. Marine Corps, “Marine Corps Doctrinal Publication (MCDP 1): Warfighting,” United States Marine Corps (1997), 72.
11. Thomas X. Hammes, “Technologies Converge and Power Diffuses,” Policy Analysis, CATO Institute, 786, 27 January 2016, 3.
12. DoD News Release, “Cyber Flag’ Exercise Tests Mission Skills,” 12 November 2014.
13. Michael Echols, “The Looming Cybersecurity Crisis And Why Opportunity Youth Are The Solution,” Forbes, 18 January 2017.
14. Michael T. McBride, The Proliferation of Contractors on the Battlefield a Changing Dynamic that Necessitates a Strategic Review, U.S. Army War College Strategic Research Project, 2003.
15. Defense Information Systems Agency, “Enabling the Joint Information Environment | Shaping the Enterprise for the Conflicts of Tomorrow,” 5 May 2014, 7.
16. Jill Richmond, “Advancing Cybersecurity with Blockchain Technology,” NASDAQ, 26 April 2017.
17. Greg Allen and Taniel Chan, “Artificial Intelligence and National Security,” Belfer Center for Science and International Affairs, July 2017, 15.