Skip Ribbon Commands
Skip to main content
reports_header.png

 
FULL_TCLC.pdfTowards a Cyber Leader Course: Not for the Weak or Faint Hearted
Gregory Conti, Michael Weigand, Ed Skoudis, David Raymond, Thomas Cook, Todd Arnold and Daniel Ragsdale
26 May 2014, Volume 1337, Number 3
Type: Report
Pages: 38
Cover_TCLC_small.jpgAbstract:
Since 1950, the U.S. Army Ranger School has garnered a well-earned reputation as one of the most demanding military schools in the world. Graduates have served with distinction in special operations units including the Ranger Regiment and Special Operations Command as well as line units throughout the Army. With the emergence of cyberspace as an operational domain and the critical shortage of technically and operationally competent cyber leaders, the time has come to create a U.S. Army Cyber Leader Course of equal intensity, reputation, and similar duration, but focused on cyber operations. This article presents a model for the creation of such a school. We are not attempting to create a longer-term training program akin to the U.S. Special Forces Qualification Course or to replicate classroom training programs found in industry, academia, government, or the intelligence community. What we propose is unique, demanding, immersive, and fills a necessary gap in Army cyber leader development. 
 

Todd Arnold, Rob Harrison and Gregory Conti

23 November 2013, Volume 1337, Number 2

Type: Report

Pages: 33

Report-Cover_PACOF_web.jpg
Abstract:
In this paper we argue for a revolutionary step forward: the creation of a unified cyber branch that brings together the best from each of the stakeholder communities, fills critical gaps not currently provided by the current stakeholders, and discards vestigial remnants from cold-war era organizations, personnel development, and human resource management approaches. We seek to design a cyber career path that is best for the Army while setting aside near-term parochial concerns for preservation of the status quo. This objective directly supports other transformational Army initiatives including the proposed formation of a Training and Doctrine Command (TRADOC) Cyber Center of Excellence (CCoE), the Army Cyber Institute at West Point, Cyber Mission Forces, and Army Cyber Command (ARCYBER). We propose an actionable way forward to achieve this objective by describing current obstacles, exploring multiple options for the creation of a unified cyber workforce, and finally proposing an accession-based branch and officer career progression.
 
Supporting Documentation:
 
David Raymond
30 September 2013, Volume 1337, Number 1
Added January 2014
Type: Report
Pages: 16
Abstract: ReportCover_PAIDOEM_web.jpg
Success in cyberspace operations requires strong leaders with expertise spanning the domains of communications, information technology, signals intelligence, and electronic warfare. The Army's cyber operators are currently a mixture of basic branch and functional area officers and Soldiers from the Signal and Military Intelligence (MI) Corps, as well the newly emerging Electronic Warfare (EW) functional area (29 Series). Analysis is underway by key stakeholders to determine the best way forward for the Army's cyber force. One possible way ahead, suggested by General Alexander, Commander of U.S. Cyber Command and Director of the NSA, is for a new Cyber Corps to emerge from and possibly replace the Army's Signal Corps, MI Corps, EW Corps, and current cyber operators. This approach has the potential to focus the Army's cyber security efforts and increase efficiency in facilities and training programs. I will refer to this new group as the Information Dominance Corps, a term currently used by the U.S. Navy. This paper proposes an education plan for Army Information Dominance officers during their entire career, with a special emphasis on immediate post-commissioning education and training. This plan is designed to produce officers that can function across the cyber and kinetic domains and integrate information technology, signals intelligence, and electronic warfare capabilities so they are prepared to employ cyberspace systems, information, and capabilities to achieve military objectives and to deny adversaries the ability to do the same.