Results:
Category: Cybersecurity

Jan. 22, 2019

A Cyber Force for Persistent Operations

Persistent engagement and forward defense are two key concepts in this article by General Paul Nakasone, Commander of USCYBERCOM. This means remaining in constant contact with adversaries while operating as close to them as possible. The idea is to support the National Security Strategy and protect the DOD Information Network while denying advantage to adversaries so the Joint Force can conduct secure operations. Although cyberspace represents a new strategic environment, Nakasone says USCYBERCOM is maturing as a combatant command, transitioning from force generation to sustained readiness for persistent engagement with cyber adversaries.

July 3, 2018

Intelligence in a Data-Driven Age

In this article, the authors explore alternative methods to create long-term competitive advantage by increasing collaboration between the intelligence community and machines, with an emphasis on artificial intelligence and machine learning. The intelligence community is battle-trained if overworked as a result of continuous operations since 2001, and its technological advantage may be at risk because intelligence systems are collecting data in too many disconnected and diverse formats, and relying on systems that are disconnected, non-standard or inaccessible. Nonetheless, artificial intelligence and machine learning will be instrumental to increase the effectiveness of future intelligence analysts and to sustain our competitive advantage.

April 19, 2018

Paradigm Change: Operational Art and the Information Joint Function

The need for this addition to the joint functions has become increasingly obvious to military leaders over time. It reveals itself in the difficulty of addressing gray zone challenges. During a recent effort by the Joint Staff to update Joint Publication (JP) 3-13, Information Operations, leaders recognized that the joint force was already attempting to use information as a function and that the time to institutionalize information as a function was therefore overdue.

April 11, 2018

The Practical Implications of Information as a Joint Function

The integration of the Information as a Joint Function (IJF) with the other six joint functions offers new opportunities for developing and conducting operational art and design. IJF will result in the development of executable plans to deal with future conflicts that are TMM in nature. The ultimate result will be that joint force commanders are able to dominate the informational aspect of their operating environment (the IE) the same way they dominate land, sea, air space, and cyberspace.

April 11, 2018

Introducing Information as a Joint Function

In July 2017, the Chairman of the Joint Chiefs of Staff issued a change to Joint Publication (JP) 1, Doctrine for the Armed Forces of the United States, introducing information as a new and seventh joint function. This issuance portends significant changes in how the joint force will plan and execute transregional, multidomain, and multifunctional operations. As such, it represents an opportunity to reimagine what “combined arms” means in 21st-century warfare.

March 1, 2018

Technology and National Security: The United States at a Critical Crossroads

Globalization of science and technology, emerging and unpredictable threats (both manmade and natural), conventional and emerging weapons of mass destruction, and an inversion of technology flow from the private to public sectors all present challenges to our national security.

Oct. 1, 2017

Open Sources for the Information Age: Or How I Learned to Stop Worrying and Love Unclassified Data

After years of major spending on intelligence, surveillance, and reconnaissance (ISR) collection capabilities, the Intelligence Community (IC) is beginning to make a commensurate investment in technology to improve intelligence analysis. However, absent a change that recognizes the increasing value of open source information, the IC will not realize a return on its investments.

May 22, 2017

Like, Comment, Retweet: The State of the Military's Nonpartisan Ethic in the World of Social Media

Through a survey of more than 500 military elites attending the United States Military Academy and National Defense University, this project seeks to establish the nature and extent of political expression by members of the military throughout social media and whether or not such expression is in keeping with the norm of nonpartisanship.

April 1, 2017

Information Warfare in an Information Age

In the past week, how many devices have you used that were connected to the Internet or relied on an algorithm to accomplish a task? Likely, the number is upward of 10 to 15, and most of those devices are used daily, if not hourly. Examples may include a Fit-Bit, cell phone, personal computer, work computer, home monitoring system, car, Internet television, printer, scanner, maps, and, if you are really tech savvy, maybe your coffee pot or refrigerator.

April 1, 2017

Operational Graphics for Cyberspace

Symbols have been part of military tactics, operations, and strategy since armies became too large for personal observation on the battlefield. In joint military operations, it is crucial to have a set of common symbols familiar to all users. The inability of cyber warriors to easily express operational concepts inhibits the identification of cyber key terrain, development of tactics and strategies, and execution of command and control.

Dec. 12, 2016

Chapter 8 | Cyber Policy

The effective use of the informational instrument of national power in all domains, and the use of all the instruments of national power in the cyber domain, will be a serious and growing challenge for the United States. The next U.S. President must have a clear understanding of the relationship of technology, law, and policy in formulating options. Centralized but not procrustean, leadership at the highest level, providing a clear and rational delineation of authorities, will be needed to coordinate and effectively employ U.S. cyber and information capabilities. Internationally, engaging with allies and partners will be vital to our defense; engaging with adversaries will require a new understanding of deterrence and counter-espionage in cyberspace. Domestically, new approaches to public-private partnerships will be key to addressing threats, preserving civil liberties, and unleashing our potential for improved governance and expanded commerce.

Oct. 1, 2016

Predicting the Proliferation of Cyber Weapons into Small States

Recent analysis of cyber warfare has been dominated by works focused on the challenges and opportunities it presents to the conventional military dominance of the United States. This was aptly demonstrated by the 2015 assessment from the Director of National Intelligence, who named cyber threats as the number one strategic issue facing the United States.1 Conversely, questions regarding cyber weapons acquisition by small states have received little attention. While individually weak, small states are numerous. They comprise over half the membership of the United Nations and remain important to geopolitical considerations.2 Moreover, these states are facing progressively difficult security investment choices as the balance among global security, regional dominance, and national interests is constantly being assessed. An increasingly relevant factor in these choices is the escalating costs of military platforms and perceptions that cyber warfare may provide a cheap and effective offensive capability to exert strategic influence over geopolitical rivals.

July 1, 2016

Twenty-First Century Information Warfare and the Third Offset Strategy

It is well established that both state and nonstate adversaries are gaining parity with current U.S. military-technological capabilities, and as a result adversaries are eroding the tremendous asymmetrical conventional warfare advantages once exclusively enjoyed by U.S. forces. This leveling of the playing field has been enabled through decreased costs of modern information technology and low barriers of entry to attaining precision weapons; stealth capabilities; sophisticated commercial and military command and control (C2) capabilities; advanced intelligence, surveillance, and reconnaissance (ISR); and relatively cheap access to commercial and government-sponsored space and cyber capabilities. As a result, in November 2014, then–Secretary of Defense Chuck Hagel announced the Defense Innovation Initiative to counter adversary technical and tactical progress that, if left unchecked, will ultimately hinder U.S. ability to project power across the globe and permanently challenge its aims of retaining its coveted status as a global hegemon. While there are many aspects to this initiative, the Third Offset Strategy, as outlined in policy, does not adequately address the need for advanced information operations (IO), particularly IO wargaming, modeling and simulation (M&S), and training systems. The purpose of this article is to make the case that increasing the investment in joint live, virtual, and constructive (LVC) IO wargaming and simulations will generate lasting asymmetrical advantages for joint force commanders and will significantly contribute to the achievement of the Third Offset Strategy.

July 1, 2016

#SocialMediaMatters: Lessons Learned from Exercise Trident Juncture

Headquarters from the brigade to combatant command levels must understand how to establish credibility and gain popularity through social media if they are to effectively shape the information environment during modern military operations.

Oct. 1, 2015

Strategic Development of Special Warfare in Cyberspace

How does the United States develop a strategic cyber-enabled special warfare capability? Why are regional powers such as Iran and Russia better prepared for cyber-enabled special warfare operations than the United States?

Oct. 1, 2015

Transforming Defense Analysis

The Defense Intelligence Enterprise is on the precipice of tremendous change. The global environment is experiencing a mind-numbing quantity and diversity of challenging crises.

July 1, 2015

Detangling the Web: A Screenshot of U.S. Government Cyber Activity

Blackouts. School testing. Electrical grids. Insurance. These all have one major thing in common: they have all been targets for cyber attacks in a period of two weeks during March 2015. The United States faces thousands of cyber assaults every day. States, state-sponsored organizations, other groups and individuals all combine to incessantly probe, spy on, and attack public and private organizations as well as denizens of the United States. These ongoing problems require a U.S. Government response, so it adopted a bureaucratic approach that has resulted in a complex system that is constantly evolving as new problems are recognized. This article provides a comprehensive look at how the United States has organized to address these challenges. Although U.S. Government efforts seem sizable, private use of the Internet dwarfs government usage.

July 1, 2015

One Size Does Not Fit All: The Multifaceted Nature of Cyber Statecraft

To better evaluate the strategic implications of cyber as a domain in which to achieve national security objectives—from antiaccess/area denial to governance, democratization, and economic growth—policymakers need a rigorous, multifaceted framework that examines cyber statecraft not only as a military tool, but also as a more holistic form of statecraft. Such a framework is long overdue to help make sense of the great technological disruption that continues to shape the international political system. While the military component is essential, cyber statecraft is often viewed only through this coercive lens, when in fact it is much broader.

April 1, 2015

Rethinking the Cyber Domain and Deterrence

As the Department of Defense (DOD) formulates strategy and doctrine for operating in cyberspace, it is vital to understand the domain and how it relates to the traditional domains of land, sea, air, and space.

April 1, 2015

Relying on the Kindness of Machines? The Security Threat of Artificial Agents

Modern technology is a daily part of our lives. It serves critical functions in defense, responding to natural disasters, and scientific research. Without technology, some of the most common human tasks would become laborious or, in many cases, impossible. Since we have become dependent on technology and its uses, and technology is becoming ever more capable, it is necessary that we consider the possibility of goal-driven, adaptive agents becoming an adversary instead of a tool.

Dec. 30, 2014

A Theater-Level Perspective on Cyber

Most U.S. military cyber professionals will tell you that “defense is the main effort” and that providing secure and reliable communication is job one. In practice, however, most cyber discussions focus on sophisticated computer hackers conducting exploitation (espionage) or attack (sabotage) operations. The reasons for this seeming contradiction include cyber espionage intrusions, industrial-scale intellectual property theft, and denial-of-service attacks that cost millions of dollars and naturally capture headlines and the imagination. Likewise, the potential for cyber attacks to disrupt infrastructure with kineticlike consequences provides fodder for books and articles that bridge reality and science fiction, empowering armchair theorists to contemplate a new and different type of war and warrior.

Sept. 30, 2014

The Limits of Cyberspace Deterrence

As a concept, deterrence has been part of the military vernacular since antiquity. In his History of the Peloponnesian War, Thucydides quotes Hermocrates as stating, “Nobody is driven into war by ignorance, and no one who thinks that he will gain anything from it is deterred by fear.”2 In the 2,400 years since then, the domains for the conduct of military affairs have expanded from the original land and maritime domains to air, space, and now cyberspace. As warfighting expanded its scope, strategic theory did as well. Today, U.S. doctrine declares that the fundamental purpose of the military is to deter or wage war in support of national policy.3 Therefore, military strategists and planners have a responsibility to assess how adversaries may be deterred in any warfighting domain. Through the joint planning process, planners, working through the interagency process, consider deterrent options for every instrument of national power—diplomatic, informational, military, and economic—across all phases of military operations.4 However, most of the thought and analysis in deterrence has revolved around the use of conventional and nuclear weapons.

Sept. 30, 2014

Cyber Security as a Field of Military Education and Study

Information and communication technologies are acknowledged as enablers and the core arsenal of military capabilities, functions, and operations. An increasing number of nations pursue improved fluency and agility of armed forces personnel in information and communication technology, its contemporary uses, and relevant defense and security implications. Underdeveloped terminology and concepts, combined with recognized functional needs and national ambitions to control the relatively new battlespace and domain, create ambiguity and even anxiety among the current generation of planners and leaders. Particularly challenging is the balance between technical in-depth knowledge requirements and strategic understanding of the cyber domain desirable for joint planners, field commanders, and senior decisionmakers.

Sept. 30, 2014

Determining Hostile Intent in Cyberspace

According to the Joint Chiefs of Staff, hostile intent is defined as the threat of imminent use of force against the United States, U.S. forces, or other designated persons or property. It is the indication, the belief, a commander has that an adversary is about to attack. That belief provides the groundwork for “anticipatory self-defense,” an American legal concept that allows a commander to attack before being attacked.

July 1, 2014

Cyber Power in 21st-Century Joint Warfare

Used militarily, cyberspace superiority should ensure the capability to conduct cyber interdiction, thus assisting in kinetic operations, especially air. It could also defeat enemy cyber attacks and neutralize enemy surveillance and finally suppress enemy cyber defense measures and data fusion centers, forcing adversary miscalculation and obtaining a decisionmaking advantage.

April 1, 2014

The Joint Force Commander’s Guide to Cyberspace Operations

Cyberspace can be leveraged by first, finding a theory to express and teach the constantly changing vagaries of that domain, including a suitable lexicon, and second, overcoming assorted turf wars and adequately resourcing the study, manning, equipping, and training of the cyberspace force so it can integrate with other domains.

April 1, 2014

Achieving Accountability in Cyberspace: Revolution or Evolution?

Cyberspace considerations are irreversibly proliferating, and five core ideas will help commanders fight a perpetual cyberwar: education and training, a clear chain of custody, explicit processes and procedures and guidance, advanced methods of controlling access to networks and information, and a formal cyberspace mishap investigation process throughout the Defense Department.

April 1, 2014

Information-Sharing with the Private Sector

The Obama administration’s Executive Order 13636 and Presidential Policy Directive 21 are a beginning, but establishing public-private information sharing requires matching cyber security legislation to fill in the gaps found in the 2003 National Strategy to Secure Cyberspace, address a multitude of contentious issues, and achieve a unified cyberspace focus.

Aug. 1, 2012

Preparing the Pipeline: The U.S. Cyber Workforce for the Future

In 2008, the Comprehensive National Cybersecurity Initiative listed “expanded cyber education” as one of its key recommendations. In 2009, the Partnership for Public Service produced a report stating that the current pipeline of cybersecurity workers into the government was inadequate. In the same year, Secretary of Defense Robert Gates stated that the military was “desperately short of people who have the capabilities [to operate in cyberspace].” And in 2011, the Inspector General of the Federal Bureau of Investigation reported that 35 percent of the special agents investigating national security cyber-intrusion cases lacked necessary training and technical skills. Nonetheless, the U.S. Government and private sector still seek to increase their online operations and dependency in spite of these shortcomings. An expert at the Atlantic Council of the United States sums up this problem: “cyber workforce management efforts resemble a Ferris wheel: the wheel turns on and on . . . we move, but around and around, never forward.”

Jan. 1, 2012

Sino-American Strategic Restraint in an Age of Vulnerability

For all their power, both the United States and China are increasingly vulnerable. Each faces a range of strategic dangers, from nuclear weapons to disruption of critical computer networks and space links.1 Because their relationship is at once interdependent and potentially adversarial, the United States and China are especially vulnerable to each other: interdependence exposes each to the other, while the potential for conflict impels each to improve strategic capabilities against which defenses can be futile. Strategic vulnerability cannot be eliminated, only mitigated.

Dec. 1, 2011

Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace Fit?

Warfare has become even more complicated since Richard Smoke wrote this description of escalation in 1977. The National Security Space Strategy describes space as “congested, contested, and competitive,” yet satellites underpin U.S. military and economic power. Activity in cyberspace has permeated every facet of human activity, including U.S. military operations, yet the prospects for effective cyber defenses are bleak. Many other actors depend on continued access to these domains, but not nearly as much as the United States.

Sept. 1, 2009

Cyberspace and the “First Battle” in 21st-century War

Wars often start well before main forces engage. In the 19th and early 20th centuries, combat often began when light cavalry units crossed the border. For most of the 20th century, the “first battle” typically involved dawn surprise attacks, usually delivered by air forces. While a few of these attacks were so shattering that they essentially decided the outcome of the struggle or at least dramatically shaped its course—the Israeli air force’s attack at the opening of the June 1967 Six-Day War comes to mind—in most cases the defender had sufficient strategic space—geographic and/or temporal—to recover and eventually redress the strategic balance to emerge victorious. The opening moments of World War II for Russia and the United States provide two examples.

Jan. 1, 2008

Cyber Influence and International Security

Cyber influence is an ongoing source of power in the international security arena. Although the United States has an enormous cyber information capacity, its cyber influence is not proportional to that capacity. Impediments to American cyber influence include the vastness and complexity of the international information environment, multiplicity of cultures and differing audiences to which communications must be addressed, extensiveness and significance of contending or alternative messages, and complexity and importance of using appropriate influential messengers and message mechanisms.

Jan. 1, 2008

Strategic Fragility: Infrastructure Protection and National Security in the Information Age

Modern societies have reached unprecedented levels of prosperity, yet they remain vulnerable to a wide range of possible disruptions. One significant reason for this growing vulnerability is the developed world’s reliance on an array of interlinked, interdependent critical infrastructures that span nations and even continents. The advent of these infrastructures over the past few decades has resulted in a tradeoff: the United States has gained greater productivity and prosperity at the risk of greater exposure to widespread systemic collapse. The trends that have led to this growing strategic fragility show no sign of slowing. As a result, the United States faces a new and different kind of threat to national security.

Feb. 1, 2007

I-Power: The Information Revolution and Stability Operations

Information and information technology (I/IT) can significantly increase the likelihood of success in stability operations— if they are engaged as part of an overall strategy that coordinates the actions of outside intervenors and focuses on generating effective results for the host nation. Properly utilized, I/IT can help create a knowledgeable intervention, organize complex activities, and integrate stability operations with the host nation, making stability operations more effective.

Feb. 1, 2006

Custer in Cyberspace

The combination of abundant networked information and fluid, unfamiliar situations in the current era makes it at once possible and imperative to improve decisionmaking in combat. The key to improvement is to integrate faster reasoning and more reliable intuition into a cognitive whole to achieve battle-wisdom. Although the technologies that both demand and facilitate battle- wisdom are new, military history holds lessons on combining reasoning and intuition in conditions of urgency, danger, and uncertainty.

Oct. 1, 2005

Sweden’s Use of Commercial Information Technology for Military Applications

Sweden, a nation of only 9 million people with a political climate that has fostered a posture of nonalignment for over half a century, has nevertheless maintained highly credible, modern, and high-technology military forces. Sweden has expanded the mission of forces originally designed for the Cold War to include international peacekeeping. The focus of this study is the Swedish formula for achieving the high-technology military capabilities that successfully compensate for a small standing force. What policies and processes enabled the Swedish military to take advantage of leading-edge producers of commercial information technology (CIT)? What lessons does the Swedish model hold for the U.S. Department of Defense?