Cyber security has become a focal point for conflicting domestic and international interests, and increasingly for the projection of state power. The military utility of the cyber domain is linked to the economic and social potential of information and communications technologies (ICTs), while technologies with military and national-security applications have become essential to the conduct of modern life.
In light of this, Evolution of the Cyber Domain provides a holistic review of the strategic, operational and technical issues at the centre of the international cyber-security debate. The Dossier charts and contextualises the key developments and trends that have shaped the cyber domain since the 1950s. As well as tracking the events and decisions underlying the military potential of ICTs, it examines the issues and policies that affect global governance of the internet.
Continue reading “Evolution of the Cyber Domain: The Implications for National and Global Security”
The global reliance on computers, networks and systems continues to grow. As our dependency grows so do the threats that target our military s Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance (C4ISR) systems as well as the operational components and electronic controls for our critical infrastructure. Over the past decade we have experienced a substantial rise in the complexity and sophistication of cyber attacks as well as a frightening increase in the impact of some of the attacks. Every computer is a potential cyber weapon waiting to be loaded and used by extremists, criminals, terrorists and rogue nation states. As the world becomes more and more dependent on computers and information technology, the greater the risk of cyber attacks. Government and military leaders now face this fact and our critical systems and infrastructure remain at great risk! This risk has made the ability to defend these critical systems and direct cyber attacks core capabilities required for the modern military. In the age of cyber conflict, leaders need to understand the weapons and strategies used to wage this rapidly evolving type of warfare. This handbook will provide the background needed to understand the new world of cyber warfare, define the tools and techniques for offensive and defensive action, and provide insight into the strategies behind building a dynamic and relevant cyber warfare capability.
- Information Warfare: How to Survive Cyber Attacks (tobem.com)
- Surviving Cyberwar (tobem.com)
- Cyberwar and Cyber-attack: How is our strongest network at risk of becoming our weakest link? (tobem.com)
- Hybrid and Cyber War As Consequences of the Asymmetry: A Comprehensive Approach Answering Hybrid Actors and Activities in Cyberspace (tobem.com)
- Safeguarding Infrastructure from Cyber-terrorism: Measuring and Protecting SCADA (tobem.com)
Bradley Manning perpetrated the biggest breach of military security in American history. While serving as an Army intelligence analyst, he leaked an astounding amount of classified information to WikiLeaks: classified combat videos, plus hundreds of thousands of documents from the wars in Afghanistan and Iraq and from embassies around the globe. Nearly all of WikiLeaks' headline-making releases of information have come from a single source: Bradley Manning.
The leaks affected governments the world over–the Arab Spring may have been sparked, in part, by Manning's revelations. They propelled WikiLeaks to a level of international prominence it never had before and forever changed the delicate dance between secrecy and transparency.
Continue reading “Private: Bradley Manning, WikiLeaks, and the Biggest Exposure of Official Secrets in American History”
There has been a great deal of speculation recently concerning the likely impact of the ‘Information Age‘ on warfare. In this vein, much of the Revolution in Military Affairs (RMA) literature subscribes to the idea that the Information Age will witness a transformation in the very nature of war. In this book, David Lonsdale puts that notion to the test.
Using a range of contexts, the book sets out to look at whether the classical Clausewitzian theory of the nature of war will retain its validity in this new age. The analysis covers the character of the future battlespace, the function of command, and the much-hyped concept of Strategic Information Warfare. Finally, the book broadens its perspective to examine the nature of ‘Information Power’ and its implications for geopolitics. Through an assessment of both historical and contemporary case studies (including the events following September 11 and the recent war in Iraq), the author concludes that although the future will see many changes to the conduct of warfare, the nature of war, as given theoretical form by Clausewitz, will remain essentially unchanged.