cyber warfare http://archive.smallwarsjournal.com/index.php/ en The Indigenous Appraoch Podcast: Cyber Strategy and Tactical Cyber Integration http://archive.smallwarsjournal.com/index.php/blog/indigenous-appraoch-podcast-cyber-strategy-and-tactical-cyber-integration <span>The Indigenous Appraoch Podcast: Cyber Strategy and Tactical Cyber Integration</span> <div class="field field--name-field-body field--type-text-with-summary field--label-hidden field--item"><p as="p" class="_72b584a33b4aad1bec787e057cf07946-scss _8a9c5cc886805907de5073b8ebc3acd8-scss">Spotify: https://open.spotify.com/episode/2OWwyC8qulOAWMJcympfMX</p> <p as="p" class="_72b584a33b4aad1bec787e057cf07946-scss _8a9c5cc886805907de5073b8ebc3acd8-scss">Apple: https://podcasts.apple.com/us/podcast/cyber-strategy-and-tactical-cyber-integration/id1534621849?i=1000511633577</p> <p as="p" class="_72b584a33b4aad1bec787e057cf07946-scss _8a9c5cc886805907de5073b8ebc3acd8-scss">(Also available on most other podcast services) </p> <p as="p" class="_72b584a33b4aad1bec787e057cf07946-scss _8a9c5cc886805907de5073b8ebc3acd8-scss">Col. Eric Kreitz, 1st Special Forces Command (Airborne)'s Director of Information Warfare sits down with Dr. Richard Harknett, one of the world's leading cybersecurity experts, and Maj.Jay Kosturko, an Electronic Warfare Officer assigned to 1st SFC(A) to help frame how we should think about the cyber domain.</p> <p as="p" class="_72b584a33b4aad1bec787e057cf07946-scss _8a9c5cc886805907de5073b8ebc3acd8-scss">Bio's: Col. Eric Kreitz is the Director of Information Warfare at 1st Special Forces Command (Airborne). He has more than 14 years in the PSYOP Regiment and has commanded at the Detachment and Battalion levels. Maj. Jay Kosturko is leading the effort for tactical cyber integration at 1st Special Forces Command (Airborne). Dr. Richard Harknett is a Professor and the Department Head of the Political Science Department at the University of Cincinnati, where he's also the Co-Director of the Ohio Cyber Range Institute and Chair of the University’s Center for Cyber Strategy and Policy. Previously, he served as a Fulbright Scholar in Cyber Studies at Oxford University and as the inaugural Scholar-in-Residence at US Cyber Command and the National Security</p> </div> <span><span>Riley.C.Murray</span></span> <span>Sat, 03/06/2021 - 4:36pm</span> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/blog/indigenous-appraoch-podcast-cyber-strategy-and-tactical-cyber-integration" rel="tag" title="The Indigenous Appraoch Podcast: Cyber Strategy and Tactical Cyber Integration" hreflang="en">Read more<span class="visually-hidden"> about The Indigenous Appraoch Podcast: Cyber Strategy and Tactical Cyber Integration</span></a></li><li class="comment-comments"><a href="/index.php/blog/indigenous-appraoch-podcast-cyber-strategy-and-tactical-cyber-integration#comments" title="Jump to the first comment." hreflang="en">2 comments</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/418/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1619150517" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Sat, 06 Mar 2021 21:36:42 +0000 Riley.C.Murray 139269 at http://archive.smallwarsjournal.com Cyber-States and US National Security: Learning from Covid-19 http://archive.smallwarsjournal.com/index.php/jrnl/art/cyber-states-and-us-national-security-learning-covid-19 <span>Cyber-States and US National Security: Learning from Covid-19</span> <span><span>SWJED</span></span> <span>Fri, 03/20/2020 - 11:42am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">What are the current implications for US national security? The first implication is our open market view of cyberspace and the sale of data by private social network companies like Facebook. Our national security is encumbered when private companies can use the data of citizens to sell to any entity who can pay, like the Cambridge Analytica case.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/cyber-states-and-us-national-security-learning-covid-19" rel="tag" title="Cyber-States and US National Security: Learning from Covid-19" hreflang="en">Read more<span class="visually-hidden"> about Cyber-States and US National Security: Learning from Covid-19</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/cyber-states-and-us-national-security-learning-covid-19#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/418/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632478795" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Fri, 20 Mar 2020 15:42:45 +0000 SWJED 136645 at http://archive.smallwarsjournal.com False Flags During Times of Geopolitical Conflict – The Right Time to Strike http://archive.smallwarsjournal.com/index.php/jrnl/art/false-flags-during-times-geopolitical-conflict-right-time-strike <span>False Flags During Times of Geopolitical Conflict – The Right Time to Strike</span> <span><span>SWJED</span></span> <span>Wed, 03/11/2020 - 8:18am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">The question of attribution has always remained a murky effort, largely because of the difficulty in proving direct links between the activity and a specific state, but it appears that over the past few years the threshold for that rigor has significantly decreased.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/false-flags-during-times-geopolitical-conflict-right-time-strike" rel="tag" title="False Flags During Times of Geopolitical Conflict – The Right Time to Strike" hreflang="en">Read more<span class="visually-hidden"> about False Flags During Times of Geopolitical Conflict – The Right Time to Strike</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/false-flags-during-times-geopolitical-conflict-right-time-strike#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/418/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632478834" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Wed, 11 Mar 2020 12:18:59 +0000 SWJED 136066 at http://archive.smallwarsjournal.com Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States http://archive.smallwarsjournal.com/index.php/jrnl/art/cyberwar-kinetic-war-2020-election-and-possibility-cyber-attack-critical-infrastructure <span>Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States</span> <span><span>SWJED</span></span> <span>Wed, 01/29/2020 - 12:26am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">The current possibility of the United States walking into a trap of a kinetic war is exceptionally likely, given the conditions that will be enumerated here, and the historical pattern of the US reacting to surprise attacks with the force of a giant rudely awakened from a deep slumber is not ahistorical. The Election of 2016 was a sure indicator of one phase of election manipulation.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/cyberwar-kinetic-war-2020-election-and-possibility-cyber-attack-critical-infrastructure" rel="tag" title="Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States" hreflang="en">Read more<span class="visually-hidden"> about Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/cyberwar-kinetic-war-2020-election-and-possibility-cyber-attack-critical-infrastructure#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/418/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632483147" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Wed, 29 Jan 2020 05:26:21 +0000 SWJED 132766 at http://archive.smallwarsjournal.com Would da Vinci Support the Pentagon’s New Cyber Strategy? http://archive.smallwarsjournal.com/index.php/jrnl/art/would-da-vinci-support-pentagons-new-cyber-strategy <span>Would da Vinci Support the Pentagon’s New Cyber Strategy?</span> <span><span>SWJED</span></span> <span>Thu, 01/16/2020 - 8:03am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Drawing inspiration from da Vinci’s observations on force, power, and movement – elements in which “all the works of mortals have their beginning and their end” – this article suggests four cyberspace operations principles.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/would-da-vinci-support-pentagons-new-cyber-strategy" rel="tag" title="Would da Vinci Support the Pentagon’s New Cyber Strategy?" hreflang="en">Read more<span class="visually-hidden"> about Would da Vinci Support the Pentagon’s New Cyber Strategy?</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/would-da-vinci-support-pentagons-new-cyber-strategy#comments" title="Jump to the first comment." hreflang="en">3 comments</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/418/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632483504" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Thu, 16 Jan 2020 13:03:51 +0000 SWJED 131408 at http://archive.smallwarsjournal.com Controlling Cognitive Domains http://archive.smallwarsjournal.com/index.php/jrnl/art/controlling-cognitive-domains <span>Controlling Cognitive Domains</span> <span><span>SWJED</span></span> <span>Sat, 08/24/2019 - 3:52pm</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">What is now categorized as the “cognitive domain” includes areas of influence in all sectors of society. Cognitive domain(s) should not be restricted to influence and information operations, social engineering and ‘winning hearts and minds’ approaches, but expanded to include all areas where ideological attacks are possible. </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/controlling-cognitive-domains" rel="tag" title="Controlling Cognitive Domains" hreflang="en">Read more<span class="visually-hidden"> about Controlling Cognitive Domains</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/controlling-cognitive-domains#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/418/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632571427" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Sat, 24 Aug 2019 19:52:45 +0000 SWJED 124320 at http://archive.smallwarsjournal.com Cyber-Realpolitik: US Foreign Policy and a Fragmented International System http://archive.smallwarsjournal.com/index.php/jrnl/art/cyber-realpolitik-us-foreign-policy-and-fragmented-international-system <span>Cyber-Realpolitik: US Foreign Policy and a Fragmented International System</span> <span><span>SWJED</span></span> <span>Tue, 08/06/2019 - 11:04am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Cyber-realpolitik or cyber-realism is an anarchic international system that is fragmented beyond the multiplicity of a multipolar distribution of state power. Nation-states are increasingly finding governance difficult as technology is propagated into the internet of things (IoT), and innovations in artificial intelligence (AI) and blockchain technology. The power to disrupt and appeal to public impulses are redistributed to tech companies and their executives, developers, coders, technicians, and computer engineers.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/cyber-realpolitik-us-foreign-policy-and-fragmented-international-system" rel="tag" title="Cyber-Realpolitik: US Foreign Policy and a Fragmented International System" hreflang="en">Read more<span class="visually-hidden"> about Cyber-Realpolitik: US Foreign Policy and a Fragmented International System</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/cyber-realpolitik-us-foreign-policy-and-fragmented-international-system#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/418/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632571923" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Tue, 06 Aug 2019 15:04:04 +0000 SWJED 123658 at http://archive.smallwarsjournal.com The Need for Détente: Cyberwarfare in India/Pakistan Conflict http://archive.smallwarsjournal.com/index.php/jrnl/art/need-detente-cyberwarfare-indiapakistan-conflict <article data-history-node-id="123591" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/need-detente-cyberwarfare-indiapakistan-conflict" rel="bookmark"><span>The Need for Détente: Cyberwarfare in India/Pakistan Conflict</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Tue, 07/23/2019 - 9:25am</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Sometimes brutal honesty is the best form of diplomacy, and if there is a conflict that is in immediate need for some kind of resolution, it is the conflict over the region of Kashmir between Pakistan and India.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/need-detente-cyberwarfare-indiapakistan-conflict" rel="tag" title="The Need for Détente: Cyberwarfare in India/Pakistan Conflict" hreflang="en">Read more<span class="visually-hidden"> about The Need for Détente: Cyberwarfare in India/Pakistan Conflict</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Tue, 23 Jul 2019 13:25:12 +0000 SWJED 123591 at http://archive.smallwarsjournal.com Beyond Twitter: The Emergence of the Cyber-Presidency and Small Cyber Wars http://archive.smallwarsjournal.com/index.php/jrnl/art/beyond-twitter-emergence-cyber-presidency-and-small-cyber-wars <article data-history-node-id="123297" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/beyond-twitter-emergence-cyber-presidency-and-small-cyber-wars" rel="bookmark"><span>Beyond Twitter: The Emergence of the Cyber-Presidency and Small Cyber Wars</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Sun, 07/14/2019 - 12:17am</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">When cyberwarfare is the top defensive policy for the Pentagon, including the protection of critical infrastructure from a catastrophic cyber-attack, the Commander-in-Chief should strategically avoid social media if at all possible.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/beyond-twitter-emergence-cyber-presidency-and-small-cyber-wars" rel="tag" title="Beyond Twitter: The Emergence of the Cyber-Presidency and Small Cyber Wars" hreflang="en">Read more<span class="visually-hidden"> about Beyond Twitter: The Emergence of the Cyber-Presidency and Small Cyber Wars</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Sun, 14 Jul 2019 04:17:24 +0000 SWJED 123297 at http://archive.smallwarsjournal.com SWJ Primer: Chinese Cyber Espionage and Information Warfare http://archive.smallwarsjournal.com/index.php/jrnl/art/swj-primer-chinese-cyber-espionage-and-information-warfare <article data-history-node-id="119898" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/swj-primer-chinese-cyber-espionage-and-information-warfare" rel="bookmark"><span>SWJ Primer: Chinese Cyber Espionage and Information Warfare</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Mon, 04/29/2019 - 5:03am</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">"There is no doubt that China poses one of the greatest espionage and cyber-attack threats to the United States. The Chinese government has committed to becoming the world’s cyber leader and has made no real attempt to hide that notion. When assessing Chinese cybersecurity, we look at the infrastructure the government has built to address cybersecurity. From creating some of the strictest domestic cyber laws in the world to building a cyber army larger than a standing army of most countries, proves that China is establishing a presence in cyber operations.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/swj-primer-chinese-cyber-espionage-and-information-warfare" rel="tag" title="SWJ Primer: Chinese Cyber Espionage and Information Warfare" hreflang="en">Read more<span class="visually-hidden"> about SWJ Primer: Chinese Cyber Espionage and Information Warfare</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Mon, 29 Apr 2019 09:03:34 +0000 SWJED 119898 at http://archive.smallwarsjournal.com