What started with two PowerPoint slides, ultimately developed into the concept of operations approved by DOD leadership to integrate DCO and DODIN Operations as part of USCYBERCOM’s full spectrum cyberspace operations. In the planning process, BG (Ret) Donahue identified significant issues with the existing operational command structure, which lead to the establishment of the Joint Force Headquarters – DODIN (JFHQ-DODIN); a revised command and control (C2) framework; and new authorities to compel unity of action to “Secure, Operate, and Defend the DODIN.”
Soon after JFHQ-DODIN was established within a revised C2 framework and with new directive authority, it was challenged by the scope, scale, and complexity of its mission. JFHQ-DODIN’s span of control includes ten Combatant Commands, five Services, and twenty-eight DOD Agencies and Field Activities. The cyberspace terrain encompasses the totality of DOD cyberspace, which includes all DOD networks, enterprise services, weapon systems, programs of record, IT platforms, and ICS/SCADA technologies. JFHQ-DODIN must also operate simultaneously as a supporting and supported command in support of all four core DOD functions; Joint Operations, Service “Man, Train, and Equip” functions, Intelligence functions; and Departmental Business and technology functions. Today, JFHQ-DODIN is fully operational capable (FOC). BG (Ret.) Donahue and his By Light team, augmenta Leidos-led effort to provide the contract workforce for the JFHQ-DODIN. By Light’s core expertise provides the foundational knowledge base for this one-of-a-kind headquarters with a diverse and complex mission, and together, they provide operational and technical solutions to the many challenges in this mission area.
By Light does provide material solutions, such as the Tactical RoIP Inter-Communications System (TRICS) developed to support special operations organizations at Fort Bragg; however, it is their full range of IT and cybersecurity services that demonstrates their depth and far ranging technical expertise. They provide turnkey IT solutions, implement secure architectures, integrate software and applications and provide a variety of cybersecurity services. For example, By Light now applies its 15 years of technical and operational experience to provide Red Team, penetration testing, inspections, and HITRUST certified assessment services. According to BG (Ret.) Donahue, “the real value that By Light offers is our unique expertise planning and conducting operations in cyberspace.”