• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER FLAG 15-1

November 18, 2014 by

JOINT AND COALITION CYBERSPACE FORCES COMPLETED CYBER FLAG 15-1

13 Nov 14. Joint and coalition cyberspace forces completed Cyber Flag 15-1, a cyberspace force-on-force training exercise fusing attack and defense across the full spectrum of military operations in a closed network environment, at Nellis Air Force Base, Nevada, Nov. 7, U.S. Cyber Command officials reported.

As Cybercom’s premier exercise, Cyber Flag 15-1 evaluated growing cyberspace capabilities within the Cyber Mission Force and joint headquarters elements, advancing Cybercom commander and National Security Agency and Central Security Service director, Navy Adm. Michael Rogers’ vision of operationalizing and fully integrating cyberspace operations into other military planning and operations.

Rogers has often emphasized that the Department of Defense must build operational capacity in cyberspace to generate military options for senior military leaders and decision makers. He has stressed that the U.S. cannot wait until a cyberspace crisis affects the nation or DoD’s ability to conduct military operations to develop partnerships, generate cyber capacity and capability, and ensure coordination processes are in place for national or military response.

Cyber Defense is Team Effort

“Cyber is a team effort, and given the resource constraints and capacity shortfalls, we need to partner in a way that optimizes operational outcomes. This exercise is an incredible opportunity to strengthen our relationships with critical partners,” said Rogers, noting that relationships are the key to success in the cyberspace domain.

The four main exercise objectives were to:
— execute joint and coalition cyberspace operations that were fully integrated with other combatant command air, land and sea operations;
— identify, prioritize and defend key cyber terrain against imminent or observed threats;
— operate in a denied, manipulated or contested cyber environment; and,
— rehearse how a coalition will conduct command and control of cyberspace forces at the tactical and operational levels in response to a regional crisis.

The exercise has evolved each year since its inception in 2011 by incorporating more participants from across DoD, other federal agencies, and allies in more sophisticated, realistic scenarios against opposing forces. This year’s scenario, devised by exercise planners, involved a simulated Combined Joint Task Force response to a notional regional crisis involving fictional state and non-state actors conducting significant activity in cyberspace.

Exercise Features Multiple Players

Teams from the Cyber Mission Force participated in the exercise, including the Cyber National Mission Force, which is responsible for, when ordered, the defense of U.S. critical infrastructure against sophisticated cyberattacks of significance to national security; the Cyber Combat Mission Force, which supports combatant commander requirements around the world; and the Cyber Protection Force, which is responsible for the defense of DoD information networks. Teams from allied nations brought comparable forces and capabilities, and integrated with U.S. joint forces into the coalition environment.

The exercise took place on a specially-constructed closed network designed to simulate the DoD and allied information networks and adversary networks. The event also featured an expert opposing force, which takes on the role of the adversary, using a range of tactics and weapons to provide a realistic training environment.

The opposing force simulated a range of cyberspace threat actors, testing the readiness and dynamic response capability of the CMF teams. Throughout the exercise, senior leadership stressed the importance of being able to continue military operations in denied or contested environments, fighting through degraded networks to achieve military objectives.

“The U.S. and allied participants dedicated a remarkable level of effort to par

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT