Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

Selected Works

Cyber Operations

Articles 1 - 10 of 10

Full-Text Articles in Business

Falha Na Defesa Cibernética: As Consequências Ambientais De Ações Hostis, Jan Kallberg, Rosemary Burk Feb 2014

Falha Na Defesa Cibernética: As Consequências Ambientais De Ações Hostis, Jan Kallberg, Rosemary Burk

Jan Kallberg

Falha na Defesa Cibernética: As Consequências Ambientais de Ações Hostis. Jan Kallberg e Rosemary A. Burk; Neste artigo, apresentamos um argumento claro de que a guerra cibernética pode infligir danos contínuos à sociedade visada, além da destruição de uma rede de computadores específica. As consequências ambientais de longo prazo de uma derrota em uma guerra cibernética e de uma falha na defesa cibernética nacional não têm sido devidamente consideradas.


La Defensa Cibernética Fallida: Las Consecuencias Ambientales De Actos Hostiles., Jan Kallberg, Rosemary Burk Feb 2014

La Defensa Cibernética Fallida: Las Consecuencias Ambientales De Actos Hostiles., Jan Kallberg, Rosemary Burk

Jan Kallberg

UNA DEFENSA CIBERNÉTICA fallida puede tener efectos más generales que los tratados anteriormente en debates sobre las futuras consecuencias de un ataque cibernético. La necesidad de una defensa cibernética para proteger el ambiente no ha recibido la debida atención como un asunto de seguridad nacional. Los países adversarios secretamente buscan métodos para perjudicar y dañar a Estados Unidos mediante un conflicto cibernético futuro.


Cyber Defense As Environmental Protection - The Broader Potential Impact Of Failed Defensive Counter Cyber Operations, Jan Kallberg, Rosemary A. Burk Jul 2013

Cyber Defense As Environmental Protection - The Broader Potential Impact Of Failed Defensive Counter Cyber Operations, Jan Kallberg, Rosemary A. Burk

Rosemary A. Burk

Key in the critique of the likelihood of cyber conflict has been the assumption that cyber does not lead to long-term and irrevocable effects – therefore it cannot be fought as a war. This might be true if cyber attacks are constrained to specific functions of a computer system or set of client computers, however, a failed cyberdefense can have wider effects than discussed in earlier debates of potential consequences and risks. The environmental aspect of cyberdefense has not drawn attention as a national security matter. We all, as people, react to threats to our living space and natural environment. …


Cyber Defense As Environmental Protection - The Broader Potential Impact Of Failed Defensive Counter Cyber Operations, Jan Kallberg, Rosemary Burk Jul 2013

Cyber Defense As Environmental Protection - The Broader Potential Impact Of Failed Defensive Counter Cyber Operations, Jan Kallberg, Rosemary Burk

Jan Kallberg

Key in the critique of the likelihood of cyber conflict has been the assumption that cyber does not lead to long-term and irrevocable effects – therefore it cannot be fought as a war. This might be true if cyber attacks are constrained to specific functions of a computer system or set of client computers, however, a failed cyberdefense can have wider effects than discussed in earlier debates of potential consequences and risks. The environmental aspect of cyberdefense has not drawn attention as a national security matter. We all, as people, react to threats to our living space and natural environment. …


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


Designer Satellite Collisions From Covert Cyber War, Jan Kallberg Feb 2012

Designer Satellite Collisions From Covert Cyber War, Jan Kallberg

Jan Kallberg

Outer space has enjoyed two decades of fairly peaceful development since the Cold War, but once again it is becoming more competitive and contested, with increased militarization. Therefore, it is important the United States maintain its space superiority to ensure it has the capabilities required by modern warfare for successful operations. Today is different from earlier periods of space development,1 because there is not a blatantly overt arms race in space,2 but instead a covert challenge to US interests in maintaining superiority, resilience, and capability. A finite number of states consider themselves geopolitical actors; however, as long as the United …