Amazon Price: N/A (as of June 25, 2017 00:20 –
This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. As the United States Air Force develops doctrine, education, and organization for cyberspace, we need to consider the traditional principles of war and how/if they apply to cyberspace, and under what situations, so we can develop a conceptual foundation for effective cyberspace warfighting doctrine. Most importantly, we should understand the cyberspace domain requires a new and different way of thinking to develop the most useful doctrine, education, and organizational structures. We must avoid falling into the trap of merely rewording existing air and space doctrine by simply replacing "air" or "space" with "cyber."
There are generally two predominant traditions for principles of war—the western view of Clausewitz and the eastern view of Sun Tzu. Clausewitz's western Newtonian world conceptualizes war using mass, objective, and maneuver among other principles in a state-on-state kinetic war for a political objective. However, Sun Tzu's eastern world conceptualizes war focusing on the criticality of intelligence, deception to defeat the mind of the enemy, and knowing that relationships between things matter most in the strategy of war. It is essential to examine which tradition is the best guide for developing cyber strategy; or do we need a combination?
Continue reading “Principles of War for Cyberspace – Cultures of Strategy in Cyberspace, Clausewitzian Cyberthink, Sun Tzu Cyberthink, Yin and Yang in Cyberspace, Doctrine and Education”
Amazon Price: N/A (as of June 24, 2017 15:49 –
Professionally converted for accurate flowing-text e-book format reproduction, this unique book discusses the realities of deterrence and retaliatory options to attacks in space and cyberspace.
Since the last years of the 20th Century, threats in space and cyberspace have become prominent, to the point where an attack can threaten state sovereignty and have regional, if not global consequences. These threats are emerging at the same time that the United States' reliance on its own space and cyber capabilities increases to maintain international diplomatic leadership and conventional military superiority. US national policy speaks to deterring and defending against such attacks, but a lack of international precedent and the legal limitations of war, specifically attribution, proportionality and discrimination, limit United States response options to an unprovoked attack in these domains. In order to establish an effective deterrence, the United States must move away from the Cold War model and fashion a global environment that fosters effective deterrent strategies. Building this new order requires the United States lead the international debate to define attacks in space and cyberspace and appropriate "self-defense" responses under Article 51 of the United Nations Charter. The United States must demonstrate the political will to take action unilaterally, if necessary, to set precedent, and erase the failures of past transgressions, including NATO's failure to respond to the Estonia cyber attacks in 2007. As deterrence is predicated on the ability to attribute in order to hold an adversary at risk, the United States must improve its ability to detect and attribute attacks in space and cyberspace. Finally, the United States must reduce its space and cyberspace vulnerabilities and prove to any potential adversary that its military can successfully fight through any degradation and win. Unless the United States takes prominent actions on these fronts and establishes an international recognized lexicon on space and cyberspace, any deterrent posture will likely fail and it will remain at risk to asymmetric attacks by adversaries emboldened by a veil of anonymity, who see the benefits of attacking the United States outweighing the risk of an unprovoked first strike.
Amazon Price: N/A (as of June 24, 2017 01:27 –
This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This research paper develops the foundation for a new military operating concept to "fight the net" in support of 8th Air Force requirements and stand-up as the new Cyber Command. It applies the Air Force Concept Development framework to examine cyberspace as a newly designated warfare domain, and proposes cyber capabilities and effects that the Air Force should develop and apply as it seeks to execute its mission in cyberspace. Before the Air Force can effectively lead in the cyber domain, it must first fully characterize cyber conditions, threats, and vulnerabilities, and clearly define how and where it can contribute to the national cyberspace strategy. Once the Air Force accomplishes these tasks, it can then focus on the nature of war in the cyber domain and consider the implications for military doctrine and operations. In order to successfully build capability and capacity for operating in cyberspace, the Air Force needs to institutionalize "cyber-mindedness" to underpin organizational, research and development, and human capital investments that the Air Force needs "to fly and fight" effectively in cyberspace.
THE CYBER DILEMMA * Bounding the Cyberspace Domain * Requirement for a New Framework * Physical Attributes * Domain Differentiation: Cyber versus Information Operations in Cyberspace * Broad Implications for Joint Military Operating Concepts * Effects in Cyberspace * Implications for Command and Control, Network Operations, and ISR * A New Military Problem and New Solutions * Missions that Assure Operations in Cyberspace * Time Horizon, Assumptions, and Risks * Relevance and Concluding Thoughts * THE U.S. CYBER SITUATION – THE PERFECT STORM? * Current Conditions in the Cyber Domain * Information Infrastructure and Critical Infrastructure * Existing "Weather Fronts" – Cyber Threat Agents * Threat and Threat Agent Defined * Threat Agent Profiles * Strong Tropical Disturbance Feeding Energy to the Weather Fronts a.k.a. Cyber Vulnerabilities * Battling the Simultaneously Challenging Winds of Change * U.S. National Strategic Way Ahead * National Strategy * Government Report Card * The Air Force and the Cyber Domain * THE CYBERSPACE DOMAIN OF WAR * Conduct of War in Cyberspace * The Classics * The American Way of War * Military Operational Design * The Role of Technology * Principles and Functions of War * OPERATING IN CYBERSPACE * Intrinsic Characteristics as a Unique Combat Domain * Broader Span of Effects * Surgical Precision * Stealthy/Low Probability of Detection * Non-attribution/Untraceable * Cyber Capabilities * Cyber ISR * Target System Identification and Profiling * Access and Installation of a Persistent Presence * Mapping of Enemy Systems and Data * Analyzing Adversary Capabilities * Determining Adversary Intentions * Attack/Retaliatory Strike Planning * Cyber Defense * Protection from Attack * Attack Detection and Attribution * Automated Attack Responses and Operator Alerts * Self-healing of Systems and Networks * Rapid Recovery after Attack * Cyber Attack * Cyber Attack Authorization * Disruption of Adversary C2 Systems, Processes, and Data * Denying Access to Adversary Systems and Data * Degrading Adversary System Performance * Destruction of Adversary Data, Computers, Networks * Cyberspace Effects * Cyber ISR * Cyber Defense * Cyber Attack * RECOMMENDATIONS ON THE WAY AHEAD * Methodology * Cyberspace and the Revolution in Military Affairs Debate * Revolution in Military Affairs Defined * So What? * Cyberspace Operations as a Mission Capability Package * Critical Factors * Constituting a Cyber Warfare Corps * Training for Cyber Combat * Organizing Cyber Forces * Cyber Weapon Funding * CONCLUDING THOUGHTS * BIBLIOGRAPHY