Bridging the Cyber Divide
Common Ground in Cyber Operations
By Maj. John Plaziak
Article published on: July 1st, 2025 in the Gray Space Summer 2025 Edition
Read Time:< 8 mins
Maj. John Plaziak, U.S. Army Command, General Staff College
Four countries, thirty-seven attacks, and thousands
of lives lost. This was the devastating toll
of the Islamic State in Iraq and Syria’s (ISIS)
global campaign of terror following their 2014
capture of Mosul, Iraq’s second-largest city. As
the extremist group transformed the ancient metropolis
into their self-proclaimed capital, they unleashed
a wave of violence that would soon force
military strategists to reimagine modern warfare.
Online propaganda ran rampant. ISIS, through
the Cyber Caliphate, began recruiting and messaging
their cause through social media and dark
web forums. Military operations needed to expand
from the physical into the digital realm. The
increasing cyber threat led to the formation of
Joint Task Force ARES, a unit within U.S. Cyber
Command, tasked with conducting Operation
Glowing Symphony in 2016.
The mission aimed to disrupt ISIS’s digital
infrastructure by infiltrating and compromising
its media networks. Cyber operatives targeted
ISIS’s servers, websites, and social media accounts,
effectively impeding their ability to spread
propaganda and coordinate activities. This cyber
offensive significantly degraded ISIS’s online
presence, hindering its recruitment efforts and
operational planning.
Operation Glowing Symphony marked a pivotal
shift in modern warfare, highlighting the importance
of cyber operations in combating extremist
groups. By targeting the digital platforms that facilitated
ISIS’s growth, the operation showcased
the potential of cyber strategies to undermine the
capabilities of such organizations.1
Analysis of OGS Through Strategy
A significant theme throughout OGS is the
herculean task of understanding the parts and
interconnected nature of the ISIS media network.
Through Joint Intelligence Preparation of the
Operational Environment, USCYBERCOM teams
could “map out” this network of people, places,
physical infrastructure, logical links, and information.
The resulting web of information seemed
complex. The cause-and-effect analysis placed
on different parts of the network map was difficult
to understand, thus making it difficult to prescribe
action against them. However, through careful
analysis, a captain on a cyber mission team was
able to identify patterns in the network map.
Through these patterns, he began center of gravity
analysis, an analysis of the source of strengths
of the ISIS media network. He discovered critical
capabilities, critical requirements, and critical
vulnerabilities of the ISIS media network (Joint
Staff, 2024, pp. IV-22 to IV-27). These critical vulnerabilities
could be targeted to have a measured
effect. He conducted intellectual bracketing by
using a combination of intuition and cognition with
the data, information, and knowledge available
to him, resulting in a deeper understanding of his
problem (McConnell, Mong, & Ptaschek, 2021).
The ISIS media network was, in fact, a complicated
system rather than a complex one. Joint Task Force Ares was created to conduct the operation
against these identified vulnerabilities.
Analysis of OGS Through Tactics
Defeat mechanisms are essential in describing
the desired effect of an offensive operation. Of
the four mechanisms—destroy, dislocate, disintegrate,
and isolate—OGS displayed qualities
associated with destruction and disintegration
(HQDA, 2022, pp. 3-20). It is conceivable that offensive
cyberspace operations could support any
defeat mechanism. Leaders across formations
and branches must communicate their expectations
in this common language to accomplish the
commander’s intent.
In a traditional offensive operation, combat
force ratios favor the defender, giving them a
relative advantage (HQDA, 2023, p. 8-24). In cyberspace,
however, this favor is reversed. In the
military and industry, cyber defenders struggle to
maintain the defensive posture required to keep
an adversary out of their systems and networks.
Due to the relatively low cost of an attack, as opposed
to a traditional military offensive operation,
an offensive cyber operation only needs to be
successful once. The defender, however, must be
successful every time. This concept flips the traditional
framework that military planners use and
should be accounted for when considering offensive
and defensive operations in cyberspace.
OGS planners could then use this analysis when
planning and executing their mission.
Analysis of OGS Through Force Management
The Joint Capabilities Integration and Development
System (JCIDS), a Department of Defense
(DoD) process for identifying capability requirements
and validating solutions, can be used literally
and metaphorically during Operation Glowing
Symphony (USAWC, 2021, pp. 2-14).
From a metaphorical perspective, the Department
of Defense identified a critical gap in its plan
to defeat ISIS. This gap led to a cyberspace line
of effort aimed at combating the Cyber Caliphate
and its associated media networks. Operation
Glowing Symphony was born through this identified
and filled capability gap.
From a literal perspective, JCIDS represents the mechanisms for leaders to identify gaps in the
current cyber capability set through the Doctrine,
Organization, Training, Material, Leadership and
Education, Personnel, and Facilities (DOTMLPF)
lenses. Once the gaps are identified, the force
management system could create the appropriate
material or non-material solution.
Analysis of OGS Through Sustainment
Sustainment provides three things to a commander:
operational reach, freedom of action,
and prolonged endurance (U.S. Joint Chiefs of
Staff, 2023, p. III-26). While sustainment in the
traditional sense provides resources to continue
the fight in an area of operations, cyberspace
operations typically defy those requirements
due to their non-theater requirements, as depicted
during OGS. However, operational contract
support and finance are critical when considering
cyberspace operations writ large.
Operational Contract Support is the process
of obtaining supplies, services, and construction
efforts from civilian sources to support military operations
(HQDA, 2021, p. 1-1). The ability to hire
contractors allows USCYBERCOM to bolster its
capabilities, which it cannot create through force
generation. Contracted support is paramount to
accomplishing cyberspace operations missions.
Similarly, the Army utilizes its Military Personnel,
Army (MPA) funding to provide the Cyber
Assignment Incentive Pay to offset the difference
between military and potential civilian pay. This
pay differential rewards Soldiers fulfilling key, critical
cyber work roles within the Army (ARCYBER,
2024).
Analysis of OGS Through Leadership
Leadership is paramount across the military,
and cyberspace operations are no different. A
mission commander on the OGS team described
how he identified the vulnerabilities in the ISIS
media network. As a captain, he was able to use
influence techniques centered around his expertise
to convince his supervisor that this idea was
feasible. The pair then convinced senior military
leadership across USCYBERCOM that their plan
was viable, ultimately resulting in OGS itself.
They demonstrate high emotional intelligence,
the ability to influence beyond positional power and organizational trust, a willingness of senior
leaders to trust their subordinates, and their
subordinates’ willingness to come forward with
ideas throughout USCYBERCOM and the OGS
team. Their eventual approval reflected the organization’s
commitment to fostering initiative and
trust. This culture was further validated during the
mission’s execution when an intelligence analyst
provided a mission-critical response to an unforeseen
threat. This action demonstrated the operational
advantages of a command climate that
values subordinate input, empowering leaders to
remain agile under unpredictable conditions.
Analysis of OGS Through History
While it may seem unusual to consider cyberspace
operations in a historical context due to
their recent invention, history provides ways to
compare the importance of events, thoughts, and
actions over time.
During World War I, aircraft were primarily
used for reconnaissance and surveillance (Muller,
1996, pp. 152–154). Towards the end, however,
weapons were attached to the aircraft, and a new
domain of warfare began to take shape. OGS
faced a similar evolution. Initially, cyberspace
operations were conducted for purely intelligence
purposes. Worldwide events, namely a terrorist
attack in Paris in 2015, led to the extension of
operations against ISIS. A small “test” operation
precluded OGS.
This “precursor” concept was present in World
War II. Operation Torch allowed U.S. forces to
demonstrate their mettle in combat operations to
the Allies. A successful Operation Torch was the
precursor to Operation Overlord, just as initial
cyber effects operations were the predecessor to
OGS.
Historical military thought is also present in
cyberspace operations. Carl Von Clausewitz’s
“fog of war,” or the uncertainty present in all
military operations, was present during the initial
planning for OGS (Clausewitz, 2006). The fog of
war allowed the ISIS media network to masquerade
itself as a complex system, decreasing the
planning team’s ability to understand its structure.
The fog of war seems omnipresent across all
types of military operations.
Implications for Future Joint and Multinational
Operations
Analyzing OGS through these lenses provides
an opportunity to examine the future.
From the dawn of the internet to the execution
of OGS in 2016, the operation represents a
culmination of all technological and political acceptance
of cyberspace operations and its place
in modern warfare. From the Moonlight Maze to
Stuxnet to OGS operations, we see a change in
political acceptance from total secrecy to modest
public discourse surrounding cyberspace operations.
OGS was inherently joint and multinational but
was still a very strategic capability. As the U.S.
builds partners and allies around the globe, it
may become prudent to create a subset of cyberspace
operations at the tactical level that can be
shared with our multinational partners.
Utilizing the JCIDS process through DOTMLPF,
potential solutions arise through the DOTMLPF
framework. An organizational solution could
be to create a cyberspace operations unit that is
organic to the Corps. These organizations could
use open-source and non-classified tools, tactics,
techniques, and procedures at the operational
and tactical levels. These Corps-level assets
could then operate in step with Cyber Mission
Force (CMF) capabilities to extend these capabilities’
reach, scope, and availability.
For example, a Cyber Protection Team (CPT)
could deploy to a partner nation in the Indo-Pacific
to assess and analyze critical port infrastructure.
After their operation, the Corps could
deploy its organic cyber unit during routine security
cooperation exercises to provide follow-up
assessments, analysis, and partner training that
builds on the CPT’s original work. This redundancy
would increase the number of touchpoints with
our partner force while supporting potential U.S.
interests in port operations in the Indo-Pacific.
In short, the CMF would maintain its strategic
capability set while cyber units across the force
could leverage non-classified tools to extend the
capabilities and incorporate more multinational
partners. Cyberspace operations are also helpful when
creating and exploiting information advantages
in support of decision dominance and imposing
multiple dilemmas on the enemy, two imperatives
of MDO. The Army has traditionally been excellent
at integrating land, sea, and air across all
levels of warfare, while cyberspace and space
operations have traditionally lived in the strategic.
Through critical and creative thinking and technological
adaptation and innovation, there are ways
to integrate cyberspace operations into the operational
and tactical levels.
Conclusion
The pace of technology is increasing. While
OGS represents a culmination of all development
to that point in time, it also represents a springboard
into the future. Leaders’ ability to analyze
future possibilities is paramount to ensuring that
the United States is at the forefront of technological
solutions. This involves adapting these solutions
across all levels of warfare while incorporating
our multinational partners.
The analysis of Operation Glowing Symphony
through these lenses underscores the need for
military leaders to think critically and creatively
about the evolving nature of warfare in the digital
age. We understand the challenges and opportunities
ahead by examining the operation’s implications
for strategy, tactics, force management,
sustainment, leadership, and history. As we strive
to integrate cyberspace operations into the operational
and tactical levels of warfare, we must
remain adaptable, innovative, and committed to
developing and integrating cyberspace operations
and education for leaders across the Army.
Notes
1. For detailed information surrounding the events of OGS, the author recommends a podcast episode (https://darknetdiaries.com/episode/50/) and an article (https://www.npr.org/2019/09/26/763545811/how-the-u-s-hacked-isis).
References
Army Cyber Command (2024). Cyber Assignment Incentive Pay. https://www.arcyber.army.mil/Resources/Fact-Sheets/Article/3737184/cyber-assignment-incentive-pay/
BBC. (2013, October 27). US bugged Merkel’s phone from 2022 until 2013, report claims. BBC News.
https://www.bbc.com/news/world-europe-24690055
Clausewitz, C. (1832). On War. (2021). Project Gutenberg. https://www.gutenberg.org/files/1946/1946-h/1946-h.htm#chap07
FBI. (2018, July 13). Russian Interference on 2016 U.S. Elections. https://www.fbi.gov/wanted/cyber/russian-interference-in-2016-u-s-elections
Forno, R. (2024, December 6). What is Salt Typhoon? A security expert explains the Chinese hackers
and their attack on US telecommunications networks. UMBC. https://umbc.edu/stories/what-issalt-typhoon-a-security-expert-explains-the-chinese-hackers-and-their-attack-on-us-telecommunications-networks/
Headquarters, Department of the Army (2021). ATP 4-10 Multi-Service Tactics, Techniques, and Procedures
for Operational Contract Support, 1-1. HQDA.
Headquarters, Department of the Army (2022). FM 3-0 Operations, 3-20. HQDA.
Headquarters, Department of the Army (2023). FM 3-90 Tactics, 8-24. HQDA.
House Foreign Affairs Committee. (2020, February). Egregious Cases of Chinese Theft of American
Intellectual Property. https://foreignaffairs.house.gov/wp-content/uploads/2020/02/Egregious-
Cases-of-Chinese-Theft-of-American-Intellectual-Property.pdf
McConnel, R. A., Mong, J.A., & Ptaschek, D. (2021). Seeing Through the Fog Developing Fog of War
Resistant Visualization. The Military Review. https://www.armyupress.army.mil/Journals/Military-
Review/English-Edition-Archives/January-February-2021/McConnell-Fog-of-War/
Melody, P. (2021). How the Army Runs A Senior Leader Reference Book. U.S. Army War College,
2-14. https://usawc-ssi-media.s3.us-east-1.amazonaws.com/pubs/2021-2022_HTAR.pdf
Muller, R. (1996). Close Air Support: The British, American, and German experiences, 1918-1941. In
W. Murray & A.R. Millet (Eds.), Military Innovation in the Interwar Period (pp. 152–154). Cambridge
University Press.
U.S. Joint Chiefs of Staff (2023). Joint Publication 1, Volume 1, Joint Warfighting, III-2. JCS.
U.S. Joint Chiefs of Staff (2024). Joint Publication 5-0, Joint Planning, IV-22 to IV-27. JCS.
Author
Maj. John Plaziak, U.S. Army Command, General Staff College.