Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Entire DC Network

Command And Control For Cyberspace Operations - A Call For Research, Adam S. Morgan, Steve W. Stone Oct 2019

Command And Control For Cyberspace Operations - A Call For Research, Adam S. Morgan, Steve W. Stone

Military Cyber Affairs

The United States Department of Defense (DoD) declared cyberspace as an operational domain in 2011. The DoD subsequently formed US Cyber Command and the Cyber Mission Force to conduct operations to achieve national and military objectives in and through cyberspace. Since that time, the DoD has implemented and evolved through multiple command and control (C2) structures for cyberspace operations, derived from traditional military C2 doctrine, to achieve unity of effort across both the global cyberspace domain and with military operations in the physical domains (land, sea, air, and space). The DoD continues to struggle to adapt its C2 methods from …


Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka Oct 2019

Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka

Military Cyber Affairs

The primary concern of United States national security policy, as detailed in the 2018 National Defense Strategy, has shifted from asymmetrical counter-insurgency operations to countering inter-state strategic competition by rogue regimes and revisionist powers. This doctrinal shift has prompted an increased emphasis on military lethality, particularly in strategic-level cyberspace operations intended to counter open challenges to the global security environment and United States preeminence. Drawing from the theory of constraints in industrial engineering and Bayesian search theory in operations research, this paper identifies the key organizational constraints that hinder the lethality of the Department of Defense’s strategic-level cyberspace operations units …


Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier Oct 2019

Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier

Military Cyber Affairs

Reasoning about complex and abstract ideas is greatly influenced by the choice of metaphors through which they are represented. In this paper we consider the framing effect in military doctrine of considering cyberspace as a domain of action, parallel to the traditional domains of land, sea, air, and space. By means of the well-known Victorian science-fiction novella Flatland, we offer a critique of this dominant cyber metaphor. In Flatland, the problems of lower-dimensional beings comprehending additional dimensions are explored at some length. Inspired by Flatland, our suggested alternate metaphor for cyber is an additional (fourth) dimension. We …


Introduction To Command And Control Of Cyberspace Operations, Bobbie Stempfley Oct 2019

Introduction To Command And Control Of Cyberspace Operations, Bobbie Stempfley

Military Cyber Affairs

In this issue we look at the means and doctrine for command and control of cyberspace operations today and in the future.


China’S Quantum Quandary, Elsa B. Kania Mar 2019

China’S Quantum Quandary, Elsa B. Kania

Military Cyber Affairs

No abstract provided.


Strategic Challenges Of Declining International Power For Democracies In A Hostile Cyber World: The Case Of China, Nigel Inkster Feb 2019

Strategic Challenges Of Declining International Power For Democracies In A Hostile Cyber World: The Case Of China, Nigel Inkster

Military Cyber Affairs

No abstract provided.


The Financial Sector’S Vulnerabilities, Villains, And Options For Defense, John T. Harvey Feb 2019

The Financial Sector’S Vulnerabilities, Villains, And Options For Defense, John T. Harvey

Military Cyber Affairs

The consequences of cyber attacks on the financial sector go well beyond those suffered by the individuals and firms directly involved and may even lead to the destabilization of the system itself. The concern is all the greater given that banks and similar institutions play a much more critical role than most people realize and the nature of their operation already invites risk taking at the best of times. Bad actors hoping to sow chaos surely understand the trouble they could cause by targeting the financial underpinning of our economy. This paper will argue that while the cyber defense of …


Dry Rivers, Scary Strangers: Are Financial And Cyber Crises Alike?, Claudia Biancotti, Paolo Ciocca Feb 2019

Dry Rivers, Scary Strangers: Are Financial And Cyber Crises Alike?, Claudia Biancotti, Paolo Ciocca

Military Cyber Affairs

The internet and the financial system show crucial affinities: both are tightly interconnected global networks whose orderly functioning is a prerequisite for economic prosperity. In financial and cyber crises alike, vulnerabilities are a consequence of distorted economic incentives, contagion is fast, and the most serious risk is loss of trust. Lessons learned from financial meltdowns translate to the cybersecurity world: stability cannot be achieved until policies are in place to address all of these issues. Steps have been taken to rectify incentives, as exemplified by recent European Union legislation. Data that helps identify weak nodes are still scarce, notwithstanding recent …


Systemic Cyber Risks And Defense: Valuation, Innovation And Strategic Implications, Pythagoras N. Petratos Feb 2019

Systemic Cyber Risks And Defense: Valuation, Innovation And Strategic Implications, Pythagoras N. Petratos

Military Cyber Affairs

No abstract provided.


Trouble On The High “C’S” – China, Cyber, And The Trading System, Robert Fisher Feb 2019

Trouble On The High “C’S” – China, Cyber, And The Trading System, Robert Fisher

Military Cyber Affairs

No abstract provided.


Strategy Needed To Protect National Sovereignty Of Us Telecommunications Backbone, Thomas Donahue Feb 2019

Strategy Needed To Protect National Sovereignty Of Us Telecommunications Backbone, Thomas Donahue

Military Cyber Affairs

No abstract provided.


Regaining The Technological Edge: Authoritarians, Democracies, It Innovation’S Future, Andrea Little Limbago Feb 2019

Regaining The Technological Edge: Authoritarians, Democracies, It Innovation’S Future, Andrea Little Limbago

Military Cyber Affairs

No abstract provided.


Countering "Made In China 2025": Strategy For Western Powers In A Cybered World, David Mussington Feb 2019

Countering "Made In China 2025": Strategy For Western Powers In A Cybered World, David Mussington

Military Cyber Affairs

No abstract provided.