The Quadrennial roles and mission review report is from the Department of Defense (DOD) to congress and highlights key aspects of the core mission areas and competencies of the military. The documents as written also includes a section on roles and…
Category: Cyber Conflict
State on State conflict using a variety of assets within and outside of cyberspace to create specific effects as a form of projection of power.
Deeper into the terrain: Cyber warfare and cyber space
When considering the terrain of cyber space we have a tendency to make that terrain as limited as possible. Most people equate the Internet to the world wide web. The world wide web though is a much smaller entity than…
Generation warfare a cohesive explanatory model
When considering the variable methods of depicting a model it sometimes is not so obvious what will happen when that model is expanded to take on newer and more distinct concepts. I started with a basic two dimensional model that…
Gathering dimensions of conflict into a unified model
When considering the generation warfare model as a tool of categorizing the types or scopes of conflict a few things are exposed rather rapidly. At ComingAnarchy.Com Younghusband identifies several of the same issues I did in attempting to bring the discussion…
A unified generational warfare theorem: Introduction to basic argument and concepts
The idea of nation state conflict and conflict of ideology becomes a descriptive problem when looking at the scope of history. How best to describe the antecedent conflicts and the methods utilized? A focus of the military establishment has been…
Social networks, events, entities, actors, actions
There is a fairly substantial body of work that looks at the difference between hierarchical organized groups and network organized groups. The relative merits of each argument fall into a few camps. The hierarchical organization allows for direction of action…
Commentary and refutation: CSIS & Securing cyberspace for the 44th presidency
The Center for Strategic and International Studies (CSIS) recently released a report titled “Securing Cyberspace for the 44th Presidency: A report of the CSIS commission on cybersecurity for the 44th presidency”. This report is an in depth look at policy…
A possible information operations curriculum
I have been working on an information operations graduate/masters degree curriculum using the sections, topics, and strategies found in Information Operations (JP3-13) as a starting point for course titles, and course learning objectives. The expectation is that each course would…
Cyberwarfare or hooliganism: A short consideration of the difference
Media reports have created a meme that any or all conflict that occurs in cyber space is cyber warfare. This is an injurious concept of the conflicts within cyber space. It leads to gross generalizations and political punditry that could…
From Information operations to cyber warfare and a new terrain
Where in the hierarchy of information operations does cyber warfare belong? What is the definition of information warfare, information operations, and such? In my research into cyber warfare I have found a variety of definitions and almost all of them…
Air Force to suspend all efforts toward cyber command
Reported today at NextGov.Com The Air Force on Monday suspended all efforts related to development of a program to become the dominant service in cyberspace, according to knowledgeable sources. Top Air Force officials put a halt to all activities related…
Cyber warfare: Russian and Georgian conflict
There has been a lot of hysteria and accusations thrown around in the idea that Russia is engaging in cyber warfare currently with Georgia. There are a lot of reasons to think that cyber warfare is actually occurring. It…
Cyber warfare: Examining the relationships
When considering the doctrinal documents of computer network attack (CNA), and the hierarchical relationship to information warfare there is a likelihood of misunderstanding of the concepts of cyber warfare. It is hard for somebody in academia to get traction with…
Beyond the data network: Looking at connections you might not notice
Short post to posit a what if. “What if” you could analyze the entire network infrastructure of the electric power grid, water grid, the command and control networks (cyber grid) and any other utilities to find logical and geographic connections…
Air force cyberspace symposia: Loose ends in cyber space
The definition of cyber space came up again as a primary topic at the United States Air Force Cyberspace symposia at Maxwell Air Force Base. The Air University has a strict non attribution policy so all comments that follow are…