Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310564222
Publisher: Progressive Management Publication: October 6, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310564222
Publisher: Progressive Management
Publication: October 6, 2014
Imprint: Smashwords Edition
Language: English

In 2005, the Department of Defense recognized cyberspace as the fifth operational domain. In 2009, the Commander of U.S. Strategic Command directed the creation of U.S. Cyber Command on the heels of recently reported cyber attacks against Estonia and Georgia. These cyber attacks negatively affected the state's ability to provide effective governance. Sovereign nations across the world took notice. Cyber terrorism, at best cyber hacktivism, had crossed the threshold to embody what most consider acts of war. This strategic research paper utilizes the Estonia and Georgia cyber attacks to observe how cyber forces draw on the joint functions like a Brigade Combat Team or Air Expeditionary Wing uses the functions in their respective domains. The paper briefly describes cyber criminal activity, cyber hacktivism, and cyber terrorism to differentiate those activities from offensive cyber operations. The paper succinctly discusses U.S. Cyber Command's three mission areas, further defining the discipline of military offensive cyber operations. The paper then explores how Joint Force Commanders may utilize the joint warfighting functions depicted in Joint and Army doctrine to integrate and synchronize offensive cyber operations.

The cyber attacks on Estonia and Georgia negatively affected their ability to provide effective governance. Nations across the world took notice. Cyber terrorism, or at best cyber hacktivism, had crossed the threshold to embody what most sovereign nations consider acts of war. The Estonia and Georgia cyber attacks were not happenstance events, rather planned, integrated, and synchronized operations to achieve intended effects. The joint functions / warfighting functions provide an operational framework for Joint Force Commanders (JFC) to coordinate, integrate, and synchronize cyber operations. The ensuing analysis illustrates that cyber operations share many of the same qualities as the more traditional operations in the land, sea, air, and space domains. But, before any analysis can begin, we must review a few key actions the military has taken over the last ten years, define what constitutes cyberspace, and understand how cyber operations differs from cyber crimes, cyber hacktivism, and cyber terrorism.

In 2005, the Department of Defense (DoD) recognized cyberspace as the fifth operational domain, a move that brought cyber operations from a largely supporting effort into an operational space equal to the land, sea, air, and space domains.2 Cyber operations certainly existed prior to 2005, but in the past decade, the United States Government has become increasingly more reliant on cyberspace to manage its governance responsibilities. The Executive Branch's International Strategy for Cyber Space defines the importance of cyberspace stating, the "Digital infrastructure is increasingly the backbone of prosperous economies, vigorous research communities, strong militaries, transparent governments, and free societies."3 However, America's cyberspace reliance creates strategic weaknesses our governmental leaders must address and mitigate. The cyber attacks on Estonia and Georgia only serve to highlight these strategic vulnerabilities.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In 2005, the Department of Defense recognized cyberspace as the fifth operational domain. In 2009, the Commander of U.S. Strategic Command directed the creation of U.S. Cyber Command on the heels of recently reported cyber attacks against Estonia and Georgia. These cyber attacks negatively affected the state's ability to provide effective governance. Sovereign nations across the world took notice. Cyber terrorism, at best cyber hacktivism, had crossed the threshold to embody what most consider acts of war. This strategic research paper utilizes the Estonia and Georgia cyber attacks to observe how cyber forces draw on the joint functions like a Brigade Combat Team or Air Expeditionary Wing uses the functions in their respective domains. The paper briefly describes cyber criminal activity, cyber hacktivism, and cyber terrorism to differentiate those activities from offensive cyber operations. The paper succinctly discusses U.S. Cyber Command's three mission areas, further defining the discipline of military offensive cyber operations. The paper then explores how Joint Force Commanders may utilize the joint warfighting functions depicted in Joint and Army doctrine to integrate and synchronize offensive cyber operations.

The cyber attacks on Estonia and Georgia negatively affected their ability to provide effective governance. Nations across the world took notice. Cyber terrorism, or at best cyber hacktivism, had crossed the threshold to embody what most sovereign nations consider acts of war. The Estonia and Georgia cyber attacks were not happenstance events, rather planned, integrated, and synchronized operations to achieve intended effects. The joint functions / warfighting functions provide an operational framework for Joint Force Commanders (JFC) to coordinate, integrate, and synchronize cyber operations. The ensuing analysis illustrates that cyber operations share many of the same qualities as the more traditional operations in the land, sea, air, and space domains. But, before any analysis can begin, we must review a few key actions the military has taken over the last ten years, define what constitutes cyberspace, and understand how cyber operations differs from cyber crimes, cyber hacktivism, and cyber terrorism.

In 2005, the Department of Defense (DoD) recognized cyberspace as the fifth operational domain, a move that brought cyber operations from a largely supporting effort into an operational space equal to the land, sea, air, and space domains.2 Cyber operations certainly existed prior to 2005, but in the past decade, the United States Government has become increasingly more reliant on cyberspace to manage its governance responsibilities. The Executive Branch's International Strategy for Cyber Space defines the importance of cyberspace stating, the "Digital infrastructure is increasingly the backbone of prosperous economies, vigorous research communities, strong militaries, transparent governments, and free societies."3 However, America's cyberspace reliance creates strategic weaknesses our governmental leaders must address and mitigate. The cyber attacks on Estonia and Georgia only serve to highlight these strategic vulnerabilities.

More books from Progressive Management

Cover of the book Third War: Irregular Warfare on the Western Border 1861-1865 - Civil War, Confederate Guerrillas, Abolitionists, Bushwhackers, Cherokee, Jayhawkers, Highwaymen, Indian Territory-Arkansas by Progressive Management
Cover of the book Apollo and America's Moon Landing Program - Oral Histories of Managers, Engineers, and Workers (Set 3) - including Jay Greene, Griffin, Milt Heflin, Holloway, Jeffs, Kelly (Lunar Module Manager) by Progressive Management
Cover of the book Manufacturing the Horns of Dilemma: A Theory of Operational Initiative – Case Studies of Grant's 1864 Overland Campaign, Eighth Army in Korean War, Israeli-Hezbollah War of 2006 by Progressive Management
Cover of the book 21st Century U.S. Air Force (USAF) Judge Advocate General (JAG): Overview and History, Judge Advocate General's Corps Year in Review, Legal Services for the 21st Century by Progressive Management
Cover of the book George Washington and the Establishment of Civil-Military Operations in Relation to the Declaration of Independence: Military Subordination to the Continental Congress During the Revolutionary War by Progressive Management
Cover of the book Breaking the Ice: Potential U.S. - Russian Maritime Conflict in the Arctic - Disputed Areas, Lomonosov Ridge, Bering Strait, Beaufort Sea, Northwest Passage, Hans Island, NATO Perspective, UNCLOS by Progressive Management
Cover of the book U.S. Marines History: The 1st Marine Division and Its Regiments, 5th Marines, 7th Marines, 11th Marines, Guadalcanal, Lineage, Honors and Commanding Officers by Progressive Management
Cover of the book A History of Innovation: U.S. Army Adaptation in War and Peace - M1 Garand Rifle, Radar, Benning Revolution, Air Observation Posts, Bazooka, Amphibian Tank, Airmobility, Artillery Speed Shifter by Progressive Management
Cover of the book 2010 American Nuclear Posture Review: Nuclear Weapons Policy Changes by the Obama Administration, Nonproliferation and Terrorism, Sustaining the Nuclear Arsenal, Security Strategy by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Martial Arts Close Combat - Marine Corps Reference Publication (MCRP) 3-02B (Value-Added Professional Format Series) by Progressive Management
Cover of the book 21st Century FEMA Study Course: Disaster Basics (IS-292) - FEMA's Role, Emergency Response Teams (ERTs), Stafford Act, History of Federal Assistance Program by Progressive Management
Cover of the book The U.S. Forest Service: An Overview - History, Fast Facts and Key Points, Forestry Mission, Wildfires, Forests, and Communities, The National Fire Plan and Fire Management Programs by Progressive Management
Cover of the book Complete Guide to the Controversy over Joint Task Force Guantanamo Bay Detention Facility (JTF-GTMO, GITMO) and Treatment of War on Terror Enemy Combatants: Pros and Cons, History, Closure Issues by Progressive Management
Cover of the book Essential Guide to Russian Hybrid Warfare: Three Studies on Putin's Crimea Annexation, Assaults on Georgia, Ukraine and Syria, Proxy Forces and Little Green Men, NATO Strategy for Countering Threat by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Guide To Mountain Operations MCRP 3-35.2A (Value-Added Professional Format Series) by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy