Principles of War for Cyberspace – Cultures of Strategy in Cyberspace, Clausewitzian Cyberthink, Sun Tzu Cyberthink, Yin and Yang in Cyberspace, Doctrine and Education

Amazon Price: N/A (as of December 11, 2017 15:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. As the United States Air Force develops doctrine, education, and organization for cyberspace, we need to consider the traditional principles of war and how/if they apply to cyberspace, and under what situations, so we can develop a conceptual foundation for effective cyberspace warfighting doctrine. Most importantly, we should understand the cyberspace domain requires a new and different way of thinking to develop the most useful doctrine, education, and organizational structures. We must avoid falling into the trap of merely rewording existing air and space doctrine by simply replacing "air" or "space" with "cyber."

There are generally two predominant traditions for principles of war—the western view of Clausewitz and the eastern view of Sun Tzu. Clausewitz's western Newtonian world conceptualizes war using mass, objective, and maneuver among other principles in a state-on-state kinetic war for a political objective. However, Sun Tzu's eastern world conceptualizes war focusing on the criticality of intelligence, deception to defeat the mind of the enemy, and knowing that relationships between things matter most in the strategy of war. It is essential to examine which tradition is the best guide for developing cyber strategy; or do we need a combination?
Continue reading “Principles of War for Cyberspace – Cultures of Strategy in Cyberspace, Clausewitzian Cyberthink, Sun Tzu Cyberthink, Yin and Yang in Cyberspace, Doctrine and Education”

2015 U.S. Intelligence Community Worldwide Threat Assessment – Clapper Testimony: Islamic State, ISIS, Cyber Threats, Russia, Iran, Terrorism, al-Qaida, North Korea, Syria, National Security Strategy

Amazon Price: N/A (as of December 11, 2017 21:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Director of National Intelligence James R. Clapper Jr. presented the 2015 annual U.S. intelligence community worldwide threat assessment in Congressional testimony on February 26, 2015. In the published report, Clapper provides a thorough review of the status of possible threats from a wide variety of nations and terror groups. In addition to the 2015 assessment, this compilation includes the 2014, 2013, and 2012 assessments for comparison and historical reference, plus important additional material, including the 2015 Defense Intelligence Agency worldwide threat assessment, the Obama White House National Security Strategy issued in early February 2015, remarks by National Security Advisor Susan Rice on the NSS, and dozens of statements on national security and the intelligence community from expert witnesses and officials.

Obviously, the Islamic State (ISIS, or ISIL) is a major focus of these assessments, along with cyber threats from Russia, China, Iran, and North Korea. Other topics covered: Cyber * Counterintelligence * Terrorism * Weapons of Mass Destruction and Proliferation * Space and Counterspace * Transnational Organized Crime * Economics and Natural Resources * Human Security * REGIONAL THREATS * Middle East and North Africa * Iraq * Syria * Islamic State of Iraq and the Levant * Iran * Libya * Yemen * Lebanon * Egypt * Tunisia * Europe * Turkey * Key Partners * Russia and Eurasia * Russia * Ukraine, Moldova, and Belarus * The Caucasus and Central Asia * East Asia * China * North Korea * South Asia * Afghanistan * Pakistan * India * Sub-Saharan Africa * West Africa * Sudan * South Sudan * Nigeria * Somalia * Lord's Resistance Army * Central African Republic * The Sahel * Latin America and the Caribbean * Cuba * Central America * Venezuela * Haiti
Continue reading “2015 U.S. Intelligence Community Worldwide Threat Assessment – Clapper Testimony: Islamic State, ISIS, Cyber Threats, Russia, Iran, Terrorism, al-Qaida, North Korea, Syria, National Security Strategy”

Globalization and Asymmetrical Warfare – Information and Technology, Media Effects, Merging of Defense and Commercial Technologies, Nuclear and Cyber Attack Threats to America, Force Structure

Amazon Price: N/A (as of December 11, 2017 18:16 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This research paper analyzes the globalization trend and the effect it is having on the ability to conduct asymmetrical attacks against the United States and our Allies worldwide. This research is intended to provide insight into the way that globalization is allowing our potential adversaries to act on a global scale.

Globalization is having a tremendous effect on the ability of terrorist and criminal organizations to act on a global scale. These organizations are using asymmetrical means to target U.S. interests at home and abroad. The events of September 11th were the culminating effect of this trend that has played an increasingly greater role in the world in which we live. This research paper analyzes the globalization trend and the effect it is having on the ability to wage this new type of war. The negative effects of globalization have continued to create a large disenfranchised population primarily centered in the Middle East, Africa, and Asia. This disenfranchised population has become the recruitment pool and their countries have become training bases for the networked terrorist and criminal who take advantage of the tools of globalization. Those tools include the internet that provides secure means of communication, the technology that enables them to act, and the porous environment that allows one to move around the world undetected. The U.S. needs to develop a better National Security Structure to deal with this threat and solve longstanding foreign policy issues. This security structure would take advantage of a network architecture that would be much more suited to managing information which is the primary weapon in the globally connected world. Policy changes would address issues that only fuel resentment and hatred towards the U.S. and make it easier for our adversaries to plan and conduct asymmetrical attacks.
Continue reading “Globalization and Asymmetrical Warfare – Information and Technology, Media Effects, Merging of Defense and Commercial Technologies, Nuclear and Cyber Attack Threats to America, Force Structure”

U.S. Army War College Information Operations Primer – Fundamentals of Information Operations – Botnet, Stuxnet, Cyber Warfare, NSA, Service Organizations

Amazon Price: $9.99 $9.99 (as of December 11, 2017 13:36 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This latest revision of the Information Operations Primer provides an overview of Department of Defense (DoD) Information Operations (IO) doctrine and organizations at the joint and individual service levels. It is primarily intended to serve students and staff of the U.S. Army War College as a ready reference for IO information extracted and summarized from a variety of sources. Wherever possible, Internet websites have been given to provide access to additional and more up-to-date information. This booklet is intentionally UNCLASSIFIED so that the material can be easily referenced during course work, while engaged in exercises, and later in subsequent assignments. This booklet begins with an overview of Information Operations, Strategic Communication and Cyberspace Operations. At each level it describes strategies or doctrine, agencies, organizations, and educational institutions dedicated to the information element of national power. Finally, the document concludes with an IO specific glossary and hyperlinks to information operations, cyberspace operations and strategic communication related websites. CHAPTER I – CONCEPTS * Information Operations * Strategic Communication * Cyberspace and Cyberspace Operations * CHAPTER II – STRATEGIES, GUIDANCE & DOCTRINE * National Strategy and Guidance * U.S. International Strategy for Cyberspace * National Framework for Strategic Communication * Department of Defense Strategy and Guidance * DoD Strategy for Operating in Cyberspace * DoD Report on Strategic Communication * DoD Principles of Strategic Communication * Department of Defense Directive (DoDD) 3600.01 Information Operations * Joint Doctrine * Joint Information Operations Doctrine * Service Doctrine * Army Information Doctrine * Marine Corps Information Operations Doctrine * Navy Information Operations Doctrine * Air Force Information Operations Doctrine * CHAPTER III – ORGANIZATIONS * Department of State * Under Secretary of State for Public Diplomacy and Public Affairs * The Center for Strategic Counterterrorism Communications * National Agencies * National Security Agency (NSA) * Department of Defense * Under Secretary of Defense – Policy (USD(P)) * Assistant Secretary of Defense for Public Affairs – Communication Planning and Integration (CPI) * Department of Defense Chief Information Officer (DoD CIO) * Defense Information Systems Agency (DISA) * Information Assurance Technology Analysis Center (IATAC) * Joint Organizations and Educational Institutions * Joint Staff, Deputy Director for Global Operations (DDGO J39) * Joint Spectrum Center (JSC) * Joint Public Affairs Support Element (JPASE) * Joint Information Operations Warfare Center (JIOWC) * U.S. Strategic Command (USSTRATCOM) * U.S. Cyber Command (USCYBERCOM) * U.S. Special Operations Command (USSOCOM) * Joint Forces Staff College – Information Operations Program * Information Operations Center for Excellence Naval Postgraduate School * Service Organizations * Army Cyber Command/2nd Army * Army – 1st Information Operations Command (1st IO Cmd) * Army Reserve Information Operations Command (ARIOC) * United States Army Information Proponent Office (USAIPO) * Marine Corps Information Operations Center * Navy Information Operations Organizations * Air Force Intelligence, Surveillance and Reconnaissance Agency * Headquarters 24th Air Force * 624th Operations Center * 67th Network Warfare Wing * 688th Information Operations Wing * 689th Combat Communications Wing * Glossary * Information Operations, Cyberspace, and Strategic Communication Related Websites

U.S. Army War College Information Operations Primer – Fundamentals of Information Operations – Botnet, Stuxnet, Cyber Warfare, NSA, Service Organizations

Amazon Price: N/A (as of December 11, 2017 16:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This latest revision of the Information Operations Primer provides an overview of Department of Defense (DoD) Information Operations (IO) doctrine and organizations at the joint and individual service levels. It is primarily intended to serve students and staff of the U.S. Army War College as a ready reference for IO information extracted and summarized from a variety of sources. Wherever possible, Internet websites have been given to provide access to additional and more up-to-date information. This booklet is intentionally UNCLASSIFIED so that the material can be easily referenced during course work, while engaged in exercises, and later in subsequent assignments.
This booklet begins with an overview of Information Operations, Strategic Communication and Cyberspace Operations. At each level it describes strategies or doctrine, agencies, organizations, and educational institutions dedicated to the information element of national power. Finally, the document concludes with an IO specific glossary and hyperlinks to information operations, cyberspace operations and strategic communication related websites.

CHAPTER I – CONCEPTS * Information Operations * Strategic Communication * Cyberspace and Cyberspace Operations * CHAPTER II – STRATEGIES, GUIDANCE & DOCTRINE * National Strategy and Guidance * U.S. International Strategy for Cyberspace * National Framework for Strategic Communication * Department of Defense Strategy and Guidance * DoD Strategy for Operating in Cyberspace * DoD Report on Strategic Communication * DoD Principles of Strategic Communication * Department of Defense Directive (DoDD) 3600.01 Information Operations * Joint Doctrine * Joint Information Operations Doctrine * Service Doctrine * Army Information Doctrine * Marine Corps Information Operations Doctrine * Navy Information Operations Doctrine * Air Force Information Operations Doctrine * CHAPTER III – ORGANIZATIONS * Department of State * Under Secretary of State for Public Diplomacy and Public Affairs * The Center for Strategic Counterterrorism Communications * National Agencies * National Security Agency (NSA) * Department of Defense * Under Secretary of Defense – Policy (USD(P)) * Assistant Secretary of Defense for Public Affairs – Communication Planning and Integration (CPI) * Department of Defense Chief Information Officer (DoD CIO) * Defense Information Systems Agency (DISA) * Information Assurance Technology Analysis Center (IATAC) * Joint Organizations and Educational Institutions * Joint Staff, Deputy Director for Global Operations (DDGO J39) * Joint Spectrum Center (JSC) * Joint Public Affairs Support Element (JPASE) * Joint Information Operations Warfare Center (JIOWC) * U.S. Strategic Command (USSTRATCOM) * U.S. Cyber Command (USCYBERCOM) * U.S. Special Operations Command (USSOCOM) * Joint Forces Staff College – Information Operations Program * Information Operations Center for Excellence Naval Postgraduate School * Service Organizations * Army Cyber Command/2nd Army * Army – 1st Information Operations Command (1st IO Cmd) * Army Reserve Information Operations Command (ARIOC) * United States Army Information Proponent Office (USAIPO) * Marine Corps Information Operations Center * Navy Information Operations Organizations * Air Force Intelligence, Surveillance and Reconnaissance Agency * Headquarters 24th Air Force * 624th Operations Center * 67th Network Warfare Wing * 688th Information Operations Wing * 689th Combat Communications Wing * Glossary * Information Operations, Cyberspace, and Strategic Communication Related Websites