tags: [actor_profile, intelligence] last_updated: 2026-03-21 # United States Cyber Command (USCYBERCOM) ## Executive Profile (BLUF) [[United States Cyber Command]] (USCYBERCOM) is the [[United States]]' unified combatant command responsible for securing the Department of Defense Information Network (DODIN) and projecting offensive cyberspace operations globally. Its primary power base is structurally integrated with the [[National Security Agency]] (NSA), utilising a "dual-hat" leadership arrangement that merges signals intelligence (SIGINT) capabilities with full-spectrum cyber effects. As of 2026, operating amid active kinetic deployments in the Middle East (such as [[Operation Epic Fury]] involving [[Iran]]), USCYBERCOM functions as a critical vanguard force for both strategic deterrence and active battlefield preparation, demonstrating a high-tempo and highly integrated operational posture. ## Grand Strategy & Strategic Objectives USCYBERCOM’s grand strategy aims to establish and maintain cyber superiority to ensure US operational freedom while degrading the capabilities of state and non-state adversaries. It operates under the doctrines of "Defend Forward" and "Persistent Engagement," proactively contesting adversaries in neutral or hostile networks before threats reach US domestic infrastructure. Long-term objectives focus on mitigating the asymmetric advantages of peer and near-peer competitors like [[China]] and [[Russia]], securing critical state infrastructure, and seamlessly integrating cyber effects into multi-domain conventional military operations, treating cyberspace as a primary theatre of conflict rather than solely a support domain. ## Capabilities & Power Projection **Kinetic/Military:** While USCYBERCOM does not directly field kinetic assets, it operates the [[Cyber Mission Force]] (CMF), structurally divided into the [[Cyber Combat Mission Force]] for offensive operations and the [[Cyber Protection Force]] for defensive operations. It executes active campaigns to degrade adversary Anti-Access/Area Denial ([[AD]]) networks, disrupt command and control (C2) architectures, and sabotage critical logistics. It works closely with geographic combatant commands (such as [[US Central Command]] and [[US Indo-Pacific Command]]) to synchronise zero-day exploits, electronic warfare, and malware payloads with conventional kinetic strikes. **Intelligence & Cyber:** Powered by its institutional symbiosis with the [[NSA]], USCYBERCOM possesses highly advanced SIGINT collection, cryptanalysis, and initial access capabilities. Its espionage focus targets adversary critical infrastructure—including power grids, telecommunications, and financial systems—for operational preparation of the environment (OPE) and potential "hold-at-risk" scenarios. It maintains a sophisticated arsenal of bespoke implants, persistent backdoors, and advanced network mapping tools to conduct covert operations and continuous surveillance. **Cognitive & Information Warfare:** Constrained by domestic laws regarding psychological operations, USCYBERCOM primarily focuses on international cognitive and information warfare. This involves the disruption of adversary propaganda networks, the strategic release of intelligence (doxing) regarding hostile cyber actors, and coordinated information operations. It counters foreign election interference and state-sponsored information campaigns by exposing adversary tactics through joint advisories and degrading the technical infrastructure utilised by foreign state-sponsored networks. ## Network & Geopolitical Alignment * **Primary Allies/Proxies:** * [[Five Eyes]] (FVEY) - Extensive intelligence sharing, joint operational planning, and capability integration. * [[NATO Cooperative Cyber Defence Centre of Excellence]] (CCDCOE) - Multilateral cyber defence coordination, interoperability testing, and capacity building. * [[Ukraine]] - Facilitates "hunt forward" operations and defensive capacity building against Russian network operations. * **Primary Adversaries:** * [[China]] ([[People's Liberation Army Strategic Support Force]] / [[PLA Information Support Force]]) - Viewed as the primary pacing threat, characterised by complex espionage, intellectual property acquisition, and pre-positioning in critical infrastructure. * [[Russia]] ([[GRU]], [[FSB]], [[SVR]]) - Friction driven by disruptive network operations, espionage, and the harbouring of non-state ransomware syndicates. * [[Iran]] ([[Ministry of Intelligence and Security]] / [[Islamic Revolutionary Guard Corps]]) - Active cyber-kinetic conflict targeting US and allied military and commercial interests across the Middle East. ## Leadership & Internal Structure As of March 2026, the command is led by [[General Joshua Rudd]], who serves in the dual-hat role as Commander of USCYBERCOM and Director of the NSA. The command's deputy is [[Lieutenant General Lorna Mahlock]]. The internal structure relies on service-specific cyber components: [[Army Cyber Command]] (ARCYBER), [[Fleet Cyber Command]] (FLTCYBERCOM), [[Air Forces Cyber]] (AFCYBER), and [[Marine Corps Cyberspace Command]] (MARFORCYBER). A critical joint operational element is the [[Cyber National Mission Force]] (CNMF), commanded by [[Brigadier General Matthew J. Lennox]], which is tasked with conducting full-spectrum cyberspace operations to disrupt adversary activities threatening national interests.