Budget Account
1109N - Procurement, Marine Corps
Budget Activity
04 - Communications and electronics equipment
Description
The Cyberspace Activities program under the Navy aims to enhance both defensive and offensive capabilities of the Marine Corps in cyberspace. A primary objective is to support Defensive Cyber Operations - Internal Defensive Measures (DCO-IDM). This involves equipping Marine Corps Cyber Protection Teams (CPT) and Marine Corps Air Ground Task Force (MAGTF) DCO-IDM teams with tools for vulnerability analysis and incident response. These teams are provided with self-contained, flyaway equipment to operate on classified and unclassified networks, ensuring effective counteraction against malicious cyber activities.
Another goal is developing a robust infrastructure for offensive cyber missions. This involves transitioning from multiple legacy platforms to a joint common access platform, enhancing interoperability across Joint Mission Operations Centers. The transition aims to improve efficiency and effectiveness of cyber mission forces by increasing mobility, resiliency, collaboration, and scalability. This enhancement is expected to boost the overall capability of offensive operations within cyberspace.
The program also focuses on securing, operating, defending, and enabling the Marine Corps Cyberspace Environment (MCCE). The Marine Corps Cyberspace Operations Group (MCCOG) plays a crucial role by providing network situational awareness, command and control, and technical support to Marine Corps operating forces. MCCOG's responsibilities include vulnerability management, malware protection, web assessment, hunt operations, and cyber incident response. These activities are vital for maintaining cybersecurity across the Marine Corps' networks and ensuring operational readiness.
Additionally, Enterprise Information Technology Security & Compliance is a significant component of the program. This initiative focuses on maintaining a framework for Public Key Infrastructure (PKI), ensuring secure electronic communications through digital credentials. The PKI program supports secure access to IT systems by managing keys and certificates used in public key-based security services. It ensures compliance with Department of Defense policies while enabling secure operations in both garrison and tactical environments.