1,981 research outputs found

    Enter the cyber dragon: understanding Chinese intelligence agencies cyber capabilities

    Get PDF
    This paper argues that the nature and tempo of Chinese cyber‑activities have policy implications for the Australian government. The paper provides an understanding of the key elements of the Chinese intelligence agencies that exploit the cyberdomain. It also shows that, while cybersecurity is a concern, much media coverage tends to oversimplify the issue and not present the public with the fuller picture. 2013 is the year that cyber issues have taken on a heightened priority and strategic weight. Governments must now work out how to handle cyber matters as an element of their foreign policy to prevent long-term damage to international relationships

    Identification of Command and Control Information Requirements for the Cyberspace Domain

    Get PDF
    The purpose of this research was to develop an information requirements analysis method that would provide the Director of Cyberspace Forces with the information required to support effective command and control of cyberspace. This research investigates the role of information in command and control, information in the traditional war fighting domains, cyberspace as a war fighting domain, and various methods of determining information requirements of organizations. This research produced an information requirements analysis method that is suitable for identifying the command and control information requirements of the Director of Cyberspace Forces

    Cyber This, Cyber That...So What?

    Get PDF
    This article endorses the idea that cyber operations may be conducted in all war-fighting domains: air, space, cyberspace, land, and sea. In addition, despite the immaturity of cyberspace operational doctrines, the doctrines from air and space remain relevant and applicable to the cyberspace domain. Cyber operations are just another set of tools in the commander\u27s toolbox. Although cyber operations have distinct ways of achieving effects, from an Air Force perspective they are similar too the air and space operations that support air and space (and cyberspace) functions. Known and established cyber operations provide war fighters with viable options to kinetic means. This article highlights the role of cyber operations in supporting the air and space functions

    Cyber Power in the 21st Century

    Get PDF
    Historically, the United States Congress has acknowledged that a separate branch of military service is required to exert supremacy over each of the recognized Domains of Operation. Throughout the evolution of modern warfare, leading minds in military theory have come to the conclusion that due to fundamental differences inherent in the theory and tactics that must be employed in order to successfully wage war within a domain’s associated environment, a specialized force was needed - until now. With the recent inclusion of Cyberspace as an operational domain by the Department of Defense, the case should be made that it, too, is far too specialized an area to be rolled up into any or all of the current branches of service.This research investigated the concept of cyber power in the 21st century, what it means to wield it, and how this capability may be used to wage war. It argues that cyberspace as a domain should be treated no differently than the traditional warfighting domains: that it, too, is an arena where defense may best be secured by attacking the enemy, where battles occur for control of territory, where denial affects combat in other domains, and where political motives dictate the course of hostilities. Because the strategic challenges and concepts are the same and yet the environment so specialized, the research concludes that the only way to properly secure the domain and to prosecute war effectively is to create a U.S. Cyber Force

    Integration of Information Operations Theory into the Corporate Air Force

    Get PDF
    The purpose of this research was to determine the desired end-state for company grade officers in terms of an information operations education. Specifically, an examination of company grade officer curricula from the pre-commissioning sources to the Squadron Officer College was performed. This assessment was then compared to the Air Force Institute of Technology Cyber Competency Areas Framework. Any areas that were missing from the current company grade officer curricula were identified and a proposed implementation plan was presented to correct these deficiencies. To aid in developing an implementation plan, redundancies between the two Squadron Officer College courses were identified. Furthermore, the Air Force process for determining subject content for Air Force professional military education was identified, as were potential ways to influence professional military education curricula. This research resulted in several recommendations designed to bridge the gap between the current company grade officer curricula and the proposed company grade officer curricula, as determined by the Air Force Institute of Technology Cyber Competency Areas Framework

    Warfighting for cyber deterrence: a strategic and moral imperative

    Get PDF
    Theories of cyber deterrence are developing rapidly. However, the literature is missing an important ingredient—warfighting for deterrence. This controversial idea, most commonly associated with nuclear strategy during the later stages of the Cold War, affords a number of advantages. It provides enhanced credibility for deterrence, offers means to deal with deterrence failure (including intrawar deterrence and damage limitation), improves compliance with the requirements of just war and ultimately ensures that strategy continues to function in the post-deterrence environment. This paper assesses whether a warfighting for deterrence approach is suitable for the cyber domain. In doing so, it challenges the notion that warfighting concepts are unsuitable for operations in cyberspace. To do this, the work constructs a conceptual framework that is then applied to cyber deterrence. It is found that all of the advantages of taking a warfighting stance apply to cyber operations. The paper concludes by constructing a warfighting model for cyber deterrence. This model includes passive and active defences and cross-domain offensive capabilities. The central message of the paper is that a theory of victory (strategy) must guide the development of cyber deterrence

    Ten Years In: Implementing Strategic Approaches to Cyberspace

    Get PDF
    This book represents a look beyond theories and analogies to examine the challenges of strategy implementation. In the essays that follow, practitioners who are building cyberspace forces at-scale join scholars who study power and force in this new domain to collectively offer a unique perspective on the evolution and future of cyber strategy and operations.https://digital-commons.usnwc.edu/usnwc-newport-papers/1044/thumbnail.jp
    • …
    corecore