Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310564222
Publisher: Progressive Management Publication: October 6, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310564222
Publisher: Progressive Management
Publication: October 6, 2014
Imprint: Smashwords Edition
Language: English

In 2005, the Department of Defense recognized cyberspace as the fifth operational domain. In 2009, the Commander of U.S. Strategic Command directed the creation of U.S. Cyber Command on the heels of recently reported cyber attacks against Estonia and Georgia. These cyber attacks negatively affected the state's ability to provide effective governance. Sovereign nations across the world took notice. Cyber terrorism, at best cyber hacktivism, had crossed the threshold to embody what most consider acts of war. This strategic research paper utilizes the Estonia and Georgia cyber attacks to observe how cyber forces draw on the joint functions like a Brigade Combat Team or Air Expeditionary Wing uses the functions in their respective domains. The paper briefly describes cyber criminal activity, cyber hacktivism, and cyber terrorism to differentiate those activities from offensive cyber operations. The paper succinctly discusses U.S. Cyber Command's three mission areas, further defining the discipline of military offensive cyber operations. The paper then explores how Joint Force Commanders may utilize the joint warfighting functions depicted in Joint and Army doctrine to integrate and synchronize offensive cyber operations.

The cyber attacks on Estonia and Georgia negatively affected their ability to provide effective governance. Nations across the world took notice. Cyber terrorism, or at best cyber hacktivism, had crossed the threshold to embody what most sovereign nations consider acts of war. The Estonia and Georgia cyber attacks were not happenstance events, rather planned, integrated, and synchronized operations to achieve intended effects. The joint functions / warfighting functions provide an operational framework for Joint Force Commanders (JFC) to coordinate, integrate, and synchronize cyber operations. The ensuing analysis illustrates that cyber operations share many of the same qualities as the more traditional operations in the land, sea, air, and space domains. But, before any analysis can begin, we must review a few key actions the military has taken over the last ten years, define what constitutes cyberspace, and understand how cyber operations differs from cyber crimes, cyber hacktivism, and cyber terrorism.

In 2005, the Department of Defense (DoD) recognized cyberspace as the fifth operational domain, a move that brought cyber operations from a largely supporting effort into an operational space equal to the land, sea, air, and space domains.2 Cyber operations certainly existed prior to 2005, but in the past decade, the United States Government has become increasingly more reliant on cyberspace to manage its governance responsibilities. The Executive Branch's International Strategy for Cyber Space defines the importance of cyberspace stating, the "Digital infrastructure is increasingly the backbone of prosperous economies, vigorous research communities, strong militaries, transparent governments, and free societies."3 However, America's cyberspace reliance creates strategic weaknesses our governmental leaders must address and mitigate. The cyber attacks on Estonia and Georgia only serve to highlight these strategic vulnerabilities.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In 2005, the Department of Defense recognized cyberspace as the fifth operational domain. In 2009, the Commander of U.S. Strategic Command directed the creation of U.S. Cyber Command on the heels of recently reported cyber attacks against Estonia and Georgia. These cyber attacks negatively affected the state's ability to provide effective governance. Sovereign nations across the world took notice. Cyber terrorism, at best cyber hacktivism, had crossed the threshold to embody what most consider acts of war. This strategic research paper utilizes the Estonia and Georgia cyber attacks to observe how cyber forces draw on the joint functions like a Brigade Combat Team or Air Expeditionary Wing uses the functions in their respective domains. The paper briefly describes cyber criminal activity, cyber hacktivism, and cyber terrorism to differentiate those activities from offensive cyber operations. The paper succinctly discusses U.S. Cyber Command's three mission areas, further defining the discipline of military offensive cyber operations. The paper then explores how Joint Force Commanders may utilize the joint warfighting functions depicted in Joint and Army doctrine to integrate and synchronize offensive cyber operations.

The cyber attacks on Estonia and Georgia negatively affected their ability to provide effective governance. Nations across the world took notice. Cyber terrorism, or at best cyber hacktivism, had crossed the threshold to embody what most sovereign nations consider acts of war. The Estonia and Georgia cyber attacks were not happenstance events, rather planned, integrated, and synchronized operations to achieve intended effects. The joint functions / warfighting functions provide an operational framework for Joint Force Commanders (JFC) to coordinate, integrate, and synchronize cyber operations. The ensuing analysis illustrates that cyber operations share many of the same qualities as the more traditional operations in the land, sea, air, and space domains. But, before any analysis can begin, we must review a few key actions the military has taken over the last ten years, define what constitutes cyberspace, and understand how cyber operations differs from cyber crimes, cyber hacktivism, and cyber terrorism.

In 2005, the Department of Defense (DoD) recognized cyberspace as the fifth operational domain, a move that brought cyber operations from a largely supporting effort into an operational space equal to the land, sea, air, and space domains.2 Cyber operations certainly existed prior to 2005, but in the past decade, the United States Government has become increasingly more reliant on cyberspace to manage its governance responsibilities. The Executive Branch's International Strategy for Cyber Space defines the importance of cyberspace stating, the "Digital infrastructure is increasingly the backbone of prosperous economies, vigorous research communities, strong militaries, transparent governments, and free societies."3 However, America's cyberspace reliance creates strategic weaknesses our governmental leaders must address and mitigate. The cyber attacks on Estonia and Georgia only serve to highlight these strategic vulnerabilities.

More books from Progressive Management

Cover of the book Russia and NATO Ballistic Missile Defense: The European Phased Adaptive Approach Experience, 2009-2017, Obama Plan and BMD History, Response of Poland, Czech Republic, and Russia by Progressive Management
Cover of the book Secret Weapon: High-value Target Teams as an Organizational Innovation - Iraq, Afghanistan, Taliban, al-Qaeda, Petraeus, Odierno, The Surge in Iraq, SOF, Tommy Franks, Task Force Freedom in Mosul by Progressive Management
Cover of the book Space Shuttle Orbiter Approach and Landing Test (ALT) Program Final Evaluation Report - Complete Details on the 1977 Captive and Free Flight Tests on the 747 STS Carrier Aircraft by Progressive Management
Cover of the book The Strategic Dimension of Chinese Engagement with Latin America: Commercial Activities in Strategic Sectors, Military Relationship, Organized Crime Ties, Triangle with America, Way Forward by Progressive Management
Cover of the book Political Warfare and Contentious Politics: Chilean Case Study under Kennedy, Johnson, Nixon, Social Movement, Italian Political Parties, Socialists, Communists, Polity Models, Direct and Indirect by Progressive Management
Cover of the book China and North Korea: A Peculiar Relationship - Cheonan, Significance as Buffer State, Nuclear Brinksmanship, Potential for Collapse and Mass Migration, Reunification, China's Coercive Capability by Progressive Management
Cover of the book Saddam Hussein's Nuclear Vision: An Atomic Shield and Sword for Conquest - Iraq's Enemies, Iran, Israel, Osirak Airstrike, Duelfer Report, A.Q. Khan, WMD by Progressive Management
Cover of the book Perceptions of Airpower and Implications for the Leavenworth Schools: Interwar Student Papers (Art of War Paper) – History and Effectiveness of Command and General Staff School During the 1930s by Progressive Management
Cover of the book Fire Monitoring Handbook (FMH Fire Management Program Center, National Interagency Fire Center) Part 1 - Wildfire and Wildland Fire Environmental and Fire Observation, Vegetation Monitoring Protocols by Progressive Management
Cover of the book 2011 Report on Implementing 9/11 Commission Recommendations: U.S. Department of Homeland Security Status Report on Airline Passenger Screening, Aviation Security, NBC Threats, Border Security by Progressive Management
Cover of the book 2014 United States Air Force Reserve Handbook: Citizen Airmen, Jackie Cochran, Jimmy Doolittle, Jimmy Stewart, Organizations, Reservist Categories, Disaster Response, Locations, Leadership by Progressive Management
Cover of the book 21st Century VA Independent Study Course: Health Effects from Chemical, Biological, and Radiological Weapons, Nuclear and Dirty Bombs, Radiation, WMD (Veterans Health Issues Series) by Progressive Management
Cover of the book U.S. Joint Forces Army Command Commander's Handbook for Strategic Communication and Communication Strategy (Joint Warfighting Center), Afghanistan, Iraq, al-Qaeda, War on Terror, Petraeus, Media by Progressive Management
Cover of the book FAA's NextGen Implementation Plan: Comprehensive Overhaul of National Airspace System for Safety and Efficiency, Benefits, Challenges, Investments for Operators and Airports by Progressive Management
Cover of the book FBI Forensic DNA Analysis and Database: CODIS, National DNA Index System, Federal DNA Database Unit (FDDU), Familial Search, Quality Assurance, National DNA Index System (NDIS) Procedures by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy