Strategic studies institute ssi us army war college. Rather, cyber effects will be produced by the manipulation of software, data, knowledge, and opinion. The cyberspace domain that existed at the creation of us cyber command uscybercom has changed. Maintaining an effective nuclear deterrent is much less expensive than fighting a war that we were unable to deter. Although the media has paid a good deal of attention to information warfare, most treatments so far are overly broad and without analytical foundations. Military cyber capabilities appear to be on the same path. January 2021, 2010 ronald reagan building and international trade center. Strategic competition in cyberspace the united states strategic competitors are conducting cyber enabled campaigns to erode u. Understanding military strategy and the four levels of war when strategy gets thrown around by politicians and the media, you can bet its being misused. Understanding military strategy and the four levels of war. Continued, exponential progress in processing power and memory capacity has made it hardware not only faster but also smaller, lighter, cheaper, and easier to use. Espionage meets strategic deterrence 3 the dynamics of the cyberspace realm mean that it is easier to attack than to defend. Center for strategic and international studies r unidi. Jp 30, joint operations, 17 january 2017, incorporating.
Unlike the cold war era in which the study of deterrence focused primarily on deterrence. A comparative analysis of the development of mdo and the historical concepts of active defense and airland battle reveals the necessity of greater insight into sources of russian and chinese behavior and countering mechanisms, what constitutes effective deterrence, and greater clarity regarding the political will. War from cyberspace mara commissioned work that developed a strategy of deterrence, including withhold ing attacks on cities, controlling escalation. Lt col rattray is uniquely qualified to write this book, serving as commander of the 23rd information operations squadron in the air force information warfare center. Air university press, 1997 excerpt modern military theory divides war into strategic, operational, and tactical levels. Trends and challenges in research amir lupovici in recent years a growing number of researchers have expanded the discussion of deterrence strategy to a host of new threats. Center for strategic and budgetary assessments about not so much. The authors would like to extend their thanks to dr. But could not a state use cyber means as a weapon of mass destruction or disruption, targeting an enemys nicholas a. Treat cyberspace as an operational domain to organize, train, and equip so that dod can take full advantage of cyberspace s. All this might lead to a belief that the historic constructs of warforce, offense, defense, deterrencecan be applied to cyberspace with little modification. All this might lead to a belief that the historic constructs of war force, offense, defense, deterrencecan be applied to cyberspace with little modification. Cyber operations, to the russian mind, are regarded more broadly. This strategic guide follows the operational design methodology and the joint operation planning process jopp detailed in joint publication 50, joint operation planning and applies these principles to the cyberspace domain found in joint publication 312r, cyberspace operations.
A comprehensive analysis of strategic information warfare waged via digital means as a distinct concern for the united states and its allies. In late 2015, the peoples liberation army pla initiated reforms that have brought dramatic changes to its structure, model of warfighting, and organizational culture, including the creation of a strategic support force ssf that centralizes most pla space, cyber, electronic, and psychological warfare capabilities. As such, it joins the historic domains of land, sea, air, and space. Russias use of strategic cyber espionage and information operations in ukraine. It defines cyberspace, cyberspace operations, computer network exploitation cne, and computer network attack cna. The department must respond to these activities by exposing, disrupting, and degrading cyber. In brief congressional research service 1 he information technology it industry has evolved greatly over the last half century. Strategic information warfare and postcold war strategy. Maintenance costs for todays nuclear deterrent are approximately three percent of the annual defense budget. Use the link below to share a fulltext version of this article with your friends and colleagues. Aggressive cyber warfare strategies and tactics offer many advantages to their prospective. Lambert brits krieg the strategy of economic warfare 8. Request pdf on jun 1, 2002, john arquilla and others published strategic warfare in cyberspace by gregory j. Why america will remain the worlds sole superpower.
Department of defense strategy for operating in cyberspace department of defense strategy for operating in cyberspace. Levels of warfare three levels of warfare strategic, operational, and tacticalmodel the relationship between national objectives and tactical actions. The center for strategic and budgetary assessments csba is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. Chapter 1 provides an overview of cyberspace operations, operational design. Today, small teams of special operators armed with asymmetric cybertools, irregular warfare tactics, and mass disinformation can have truly strategic effects.
The may 2011 department of defense strategy for operating in cyberspace guided the defense departments cyber activities and operations in support of u. Army war college strategic cyberspace operations guide contains six chapters. Trump the white house september 2018 ii the national cyber strategy demonstrates my commitment to strengthening americas. According to international relations scholar erik gartzke, cyber war. This paper offers five strategic reasons why cyber warfare is on the rise. In the information age, information systems may serve as both weapons and targets. Strategic cyberspace operations guide army war college. Strategic targets in the united states may be just as vulnerable to attack as intheater command, control, communications, and intelligence c3i targets. Fleet cyber command tenth fleet strategic plan 20152020 strategic environment technology doesnt change human nature, it just extends the reach and speed at which human nature can play out. Three levels of war usaf college of aerospace doctrine, research and education cadre air and space power mentoring guide, vol.
Isbn 9789949954452 pdf nato cooperative cyber defence. Understanding the strategic purpose for cyber power is important. Cognitive effect and state conflict in cyberspace center. She is currently pursuing her phd in the harvard department of government, where her research interests include military innovation and comparative cyberspace doctrine. Chinas rapid progress in space, cyber, and electronic warfare technologies holds important implications for asian security. Does the us army in multidomain operations 2028 lack a clear theory of victory.
This trend raises questions regarding norms for cyberwarfare, the obligations of states regarding the application of offensive cyber capabilities, and the applicability of existing laws of war and norms on use of force in cyberspace. Chinese military observers and scholars argue that in order to guarantee victory in a modern war, the peoples liberation army pla must first achieve superiority in the information domain, preferably by striking first. Just as operating in the air domain requires having the capacity to. However, having the cyberspace capacity to achieve this freedom of action should not be taken for granted. Cyber command marks the ascent of cyberspace as a military domain. The paper examines the russian approach to cyber warfare, addressing both its theoretical and its practical underpinnings. This chapter introduces the core concepts of cyberspace and cyber warfare in detail and serves as a primer for later discussions of the application of deterrence theory to cyberspace and potential mitigating solutions.
Employ new defense operating concepts to protect dod networks and systems 6. It examines the possibility of successfully implementing the strategy of deterrence in order to prevent cyber attacks, or analyzes the way the us can use cyber warfare in order to deter other threats it faces. Strategic development of special warfare in cyberspace. The employment of cyber warfare to assist combat forces is operational, while targeting critical economic infrastructure is a precision attack on physical assets. Our exercise scenario highlighted from the start a fundamental aspect of strategic information warfare.
Treat cyberspace as an operational domain to organize, train, and equip so that dod can take full advantage of cyberspace s potential 5. Sally white is a cyberspace operations officer in the us army. Gabi siboni and supported by the philadelphiabased joseph and jeanette neubauer foundation. In brief congressional research service summary recent incidents have highlighted the lack of consensus internationally on what defines a cyberattack, an act of war in cyberspace, or cyberterrorism. Our adversaries have exploited the velocity and volume of data and events in cyberspace to make the domain more hostile. Whether at the tactical, operational, or strategic level, be the expertdeliver relevant outcomes. Strategic warfare in cyberspace swic takes discussions of information security policy to a new level. Freedom of action in cyberspace is a basic requirement for mission assurance. The strategic promise of offensive cyber operations air university. The white house, national military strategy for cyberspace operations, 2006. Russia views cyber very differently than its western counterparts, from the way russian theorists define cyberwarfare to how the kremlin employs its cyber capabilities. This new strategy sets prioritized strategic goals and objectives for dods cyber activities and missions to achieve over the next five years. Request pdf on sep 1, 2003, blaise cronin and others published strategic warfare in cyberspace, by gregory j.