cyberwarfare https://archive.smallwarsjournal.com/index.php/ en NATO Is in a Cyberwar with Russia and Must Expand Article 5 to Include Cyberwarfare or Risk Losing and Diminishment https://archive.smallwarsjournal.com/index.php/jrnl/art/nato-cyberwar-russia-and-must-expand-article-5-include-cyberwarfare-or-risk-losing-and <span>NATO Is in a Cyberwar with Russia and Must Expand Article 5 to Include Cyberwarfare or Risk Losing and Diminishment</span> <span><span>Riley.C.Murray</span></span> <span>Fri, 09/24/2021 - 1:59am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Article 5 of NATO’s foundational 1949 North Atlantic Treaty demands that if an “armed attack” is carried out against even just one member state, all other member states “shall” consider that attack (and any armed attack) on a member state “an attack against them all” and “will assist,” up to and “including the use of armed force.”  This bedrock is the centerpiece for over seven decades of the Pax Americana: the U.S.-led global system of military power, alliances, collective defense, and ability to project combined strength anywhere on the planet.  For it to continue in these roles, NATO must adapt to current and future threats by adding cyberwarfare—including information warfare—to Article 5.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/nato-cyberwar-russia-and-must-expand-article-5-include-cyberwarfare-or-risk-losing-and" rel="tag" title="NATO Is in a Cyberwar with Russia and Must Expand Article 5 to Include Cyberwarfare or Risk Losing and Diminishment" hreflang="en">Read more<span class="visually-hidden"> about NATO Is in a Cyberwar with Russia and Must Expand Article 5 to Include Cyberwarfare or Risk Losing and Diminishment</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/nato-cyberwar-russia-and-must-expand-article-5-include-cyberwarfare-or-risk-losing-and#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/834/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1642516451" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Fri, 24 Sep 2021 05:59:38 +0000 Riley.C.Murray 139939 at https://archive.smallwarsjournal.com The Best Natural Defense to Psychological Warfare https://archive.smallwarsjournal.com/index.php/jrnl/art/the-best-natural-defense-to-psychological-warfare <span>The Best Natural Defense to Psychological Warfare</span> <span><span>SWJED</span></span> <span>Sun, 12/25/2016 - 7:48pm</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> As the threat and effect of psychological warfare becomes more pronounced in cyberspace, policymakers must address this burgeoning security threat.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/jrnl/art/the-best-natural-defense-to-psychological-warfare" rel="tag" title="The Best Natural Defense to Psychological Warfare" hreflang="en">Read more<span class="visually-hidden"> about The Best Natural Defense to Psychological Warfare</span></a></li><li class="comment-forbidden"></li><li></li></ul> Mon, 26 Dec 2016 00:48:38 +0000 SWJED 58074 at https://archive.smallwarsjournal.com To Operationalize Cyber, Humanize the Design https://archive.smallwarsjournal.com/index.php/jrnl/art/to-operationalize-cyber-humanize-the-design <span>To Operationalize Cyber, Humanize the Design</span> <span><span>SWJED</span></span> <span>Mon, 11/21/2016 - 4:58am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Operationalizing cyber is not about linear thinking and lines of operation.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/to-operationalize-cyber-humanize-the-design" rel="tag" title="To Operationalize Cyber, Humanize the Design" hreflang="en">Read more<span class="visually-hidden"> about To Operationalize Cyber, Humanize the Design</span></a></li><li class="comment-forbidden"></li><li></li></ul> Mon, 21 Nov 2016 09:58:11 +0000 SWJED 56012 at https://archive.smallwarsjournal.com Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations https://archive.smallwarsjournal.com/index.php/jrnl/art/twilight-zone-conflicts-employing-gray-tactics-in-cyber-operations <span>Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations</span> <span><span>SWJED</span></span> <span>Thu, 10/27/2016 - 4:17pm</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> The emergence of gray tactics in cyber operations, their utility as a political instrument, and reasons that twilight zone conflicts are no longer a mere science fiction fantasy.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/twilight-zone-conflicts-employing-gray-tactics-in-cyber-operations" rel="tag" title="Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations" hreflang="en">Read more<span class="visually-hidden"> about Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations</span></a></li><li class="comment-forbidden"></li><li></li></ul> Thu, 27 Oct 2016 20:17:59 +0000 SWJED 54107 at https://archive.smallwarsjournal.com The Cyber Espionage Predominant Purpose Test https://archive.smallwarsjournal.com/index.php/jrnl/art/the-cyber-espionage-predominant-purpose-test <span>The Cyber Espionage Predominant Purpose Test</span> <span><span>SWJED</span></span> <span>Thu, 10/20/2016 - 10:27am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Can international law meaningfully distinguish between cyberespionage for national security purposes and economic espionage?</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/the-cyber-espionage-predominant-purpose-test" rel="tag" title="The Cyber Espionage Predominant Purpose Test" hreflang="en">Read more<span class="visually-hidden"> about The Cyber Espionage Predominant Purpose Test</span></a></li><li class="comment-forbidden"></li><li></li></ul> Thu, 20 Oct 2016 14:27:23 +0000 SWJED 53586 at https://archive.smallwarsjournal.com Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box? https://archive.smallwarsjournal.com/index.php/jrnl/art/cyber-support-to-corps-and-below-digital-panacea-or-pandora%E2%80%99s-box <span>Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box?</span> <span><span>SWJED</span></span> <span>Wed, 10/19/2016 - 9:09am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> The unrelenting tempo of combat operations at the Corps and below level in the Army creates unique challenges for the execution of Offensive Cyber Operations.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/cyber-support-to-corps-and-below-digital-panacea-or-pandora%E2%80%99s-box" rel="tag" title="Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box?" hreflang="en">Read more<span class="visually-hidden"> about Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box?</span></a></li><li class="comment-forbidden"></li><li></li></ul> Wed, 19 Oct 2016 13:09:32 +0000 SWJED 53527 at https://archive.smallwarsjournal.com Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age https://archive.smallwarsjournal.com/index.php/jrnl/art/winning-the-cyber-gage-intelligence-dominance-in-the-digital-information-age-0 <span>Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age</span> <span><span>SWJED</span></span> <span>Tue, 10/18/2016 - 10:05am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> For naval intelligence to effectively support the Chief of Naval Operation’s new strategy, it must first adapt to the realities of the digital information age.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/winning-the-cyber-gage-intelligence-dominance-in-the-digital-information-age-0" rel="tag" title="Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age" hreflang="en">Read more<span class="visually-hidden"> about Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/winning-the-cyber-gage-intelligence-dominance-in-the-digital-information-age-0#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/834/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1476883017" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Tue, 18 Oct 2016 14:05:30 +0000 SWJED 53478 at https://archive.smallwarsjournal.com Combat Identification in Cyberspace https://archive.smallwarsjournal.com/index.php/jrnl/art/combat-identification-in-cyberspace <span>Combat Identification in Cyberspace</span> <span><span>SWJED</span></span> <span>Sun, 08/25/2013 - 5:59pm</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> "Along with the rest of the U.S. government, the Department of Defense depends on cyberspace to function. It is difficult to overstate this reliance."</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/combat-identification-in-cyberspace" rel="tag" title="Combat Identification in Cyberspace" hreflang="en">Read more<span class="visually-hidden"> about Combat Identification in Cyberspace</span></a></li><li class="comment-forbidden"></li><li></li></ul> Sun, 25 Aug 2013 21:59:43 +0000 SWJED 14494 at https://archive.smallwarsjournal.com Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion https://archive.smallwarsjournal.com/index.php/jrnl/art/bandwidth-cascades-escalation-and-pathogen-models-for-cyber-conflict-diffusion <span>Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion</span> <span><span>Peter J. Munson</span></span> <span>Wed, 06/19/2013 - 3:30am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Conventional and cyber conflict diffusion diverge on two points:  third-party intervention (<em>escalation</em>) and collateral damage (<em>pathogen</em>).  The findings raise questions regarding state neutrality, non-state actors, and authenticating attackers.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/jrnl/art/bandwidth-cascades-escalation-and-pathogen-models-for-cyber-conflict-diffusion" rel="tag" title="Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion" hreflang="en">Read more<span class="visually-hidden"> about Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion</span></a></li><li class="comment-forbidden"></li><li></li></ul> Wed, 19 Jun 2013 07:30:00 +0000 Peter J. Munson 14141 at https://archive.smallwarsjournal.com On the Spectrum of Cyberspace Operations https://archive.smallwarsjournal.com/index.php/jrnl/art/on-the-spectrum-of-cyberspace-operations <span>On the Spectrum of Cyberspace Operations</span> <span><span>Peter J. Munson</span></span> <span>Tue, 12/11/2012 - 5:30am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> <span style="line-height: 18px; ">As cyberspace operations continue to evolve, they raise some unique questions regarding the nature of conflict and how it should be discussed and regulated.</span></p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/on-the-spectrum-of-cyberspace-operations" rel="tag" title="On the Spectrum of Cyberspace Operations" hreflang="en">Read more<span class="visually-hidden"> about On the Spectrum of Cyberspace Operations</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/on-the-spectrum-of-cyberspace-operations#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/834/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1355262108" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Tue, 11 Dec 2012 10:30:00 +0000 Peter J. Munson 13595 at https://archive.smallwarsjournal.com