USCYBERCOM Mission Statement

USCYBERCOM plans, coordinates, integrates, synchronizes, and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

USCYBERCOM – is dedicated to protecting the nation’s military networks and interests. This brand new command is collocated with NSA on FT Meade, MD.

USCYBERCOM is the mix of old commands such as JTF-CNO and JFCC-NW together as a single combatant command. They are in the process now of releasing short fuse RFPs to fill capabilities and seats.

USCYBERCOM will need help in the future to determine their identity and the path which they will take.

They are interested in capabilities that include:

  • attack
  • defense
  • exploitation
  • monitoring
  • automated systems
  • patch management


Cybercom is critically important to track for enhanced understanding of mission needs of information assurance, computer network attack, computer network exploitation and computer network defense. The budget of Cybercom itself is relatively small, but they are huge influencers.

Items of Interest

‘Investing in People is Key’ at Cyber Command

Gen Alexander believes that the best way to build USCYBERCOM is concerted efforts into human capital. This will require intense training, as well as sustained retention. The large part of the Cybercom budget will be spent with workforce in mind.

Cyber Command Wrestling with Unresolved Technology and Policy Issues

Cybercom is affected by a dearth of doctrine and policy. The difficulty is to determine how to “operationalize” cyber, to find the “nexus between the technical and the conceptual.” Lines of authority during national cyber emergencies have yet to be determined. Once these lines are determined, it will be far easier to determine where Cybercom will move. Additionally, Cybercom’s insecure line of budget makes it difficult for them to acquire technologies and services. This will have to change in the near future so that they can fully operate.