That same year, cyber space was adopted by the military as the fifth domain of warfare (Rowen, 2016). Since then, the Army has been racing to react to this new battlefield by assigning new CI agents directly from Counterintelligence Special Agent Course (CISAC) to specialized cyber units with limited knowledge in computer systems, networks, and CI as a whole. The current process is undermining and weakening the necessary support, strength, and expertise to mitigate, neutralize, and exploit Foreign Intelligence Entities and International Terrorist Organizations in the cyber domain. When Soldiers are accepted to CISAC and become a CI Special Agents, the Soldiers are taught the basics of the multiple disciplines in the CI field. Support cyber is barely covered in the course brief compared to the other …show more content…
During the first year or more, they are required to learn two different unique and specialized career fields; how to become a CI agent through the Counterintelligence Probation Program (CIPP) and become a subject matter expert (SME) in the cyber field. Agents will attend the Defense Cyber Investigation Training Academy for basic training and certifications during their first year in the unit. The training includes: Introduction to Network and Computer Hardware, Computer Incident Response Course, Windows Forensic Environment, and Forensic Intrusion in a Windows Environment (See Appendix for each course description). Each course requires a set time period in order to have the agents apply their understanding of the material and to develop the necessary skills required to attend the next course. The average time for completing all courses and receive certifications is over a year. Once through the required courses, agents can complete investigations and collections pertaining to cyber intrusions and forensics. Time on station is typically three years, the unit is able to utilize these now highly trained agents for two years at most. This unique issue is a hindrance to the accomplishment of these complex and technical cyber