Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Defense and Security Studies

Establishing A Cyber Warrior Force, Scott D. Tobin Sep 2004

Establishing A Cyber Warrior Force, Scott D. Tobin

Theses and Dissertations

Cyber Warfare is widely touted to be the next generation of warfare. As America's reliance on automated systems and information technology increases, so too does the potential vulnerability to cyber attack. Nation and non-nation states are developing the capability to wage cyber warfare. Historically, the Air Force and DoD have concentrated their efforts toward defensive network operations. However, a shift in doctrine has shown both the Air Force and DoD acknowledging the potential for Information Warfare. What appears to be lacking is the trained and educated cyber warrior force that will carry out the information operations if needed. This research …


Modeling And Simulation Of The Military Intelligence Process, Carl R. Pawling Mar 2004

Modeling And Simulation Of The Military Intelligence Process, Carl R. Pawling

Theses and Dissertations

There is concern within U.S. space and intelligence organizations that the current Tasking, Processing, Exploitation, and Dissemination processes may be insufficient to support current and future Intelligence, Surveillance, and Reconnaissance systems. As part of a larger intelligence process, more detailed analysis becomes critical to determine what portions need to be improved. This analysis can be accomplished by simulation, which is appropriate due to the complexity of the process and the ability to compare variations in the process. We construct a high level model of a generalized military intelligence process based in part on the Intelligence Cycle outlined in Joint Publications. …