cyber operations http://archive.smallwarsjournal.com/ en JSOU Quick Look: Cyber Fundamentals for SOF http://archive.smallwarsjournal.com/blog/jsou-quick-look-cyber-fundamentals-sof <article data-history-node-id="139309" role="article" class="blog is-promoted teaser clearfix"> <h2> <a href="/blog/jsou-quick-look-cyber-fundamentals-sof" rel="bookmark"><span>JSOU Quick Look: Cyber Fundamentals for SOF</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=75508" token="H6LBrGYXMcqRqnXmeALZPldAbNx4XlvHlu4E5bPmC5w"></drupal-render-placeholder></article> <div class="author"> <span>Sat, 03/20/2021 - 1:21pm</span> </div> </footer> <div class="content"> <div class="field field--name-field-body field--type-text-with-summary field--label-hidden field--item"><p>Publication: https://jsou.libguides.com/ld.php?content_id=60465000</p> <p> </p> <p>"Cyberspace operations extend the reach, agility, pace and effectiveness of SOF when fully integrated into doc-trine, training, planning and execution. For example, foreign internal defense requires cyber-enabled opera-tion off the grid and detection of adversary activity to enable partner response. In contrast, unconventional warfare needs ways for resistance movements to make its own equipment and that can happen with cyber-en-abled 3-D printing.All SOF core activities can be cyber enabled. However, for each core activity SOF needs different cyber-enabled capabilities to secure these benefits."</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/blog/jsou-quick-look-cyber-fundamentals-sof" rel="tag" title="JSOU Quick Look: Cyber Fundamentals for SOF" hreflang="en">Read more<span class="visually-hidden"> about JSOU Quick Look: Cyber Fundamentals for SOF</span></a></li><li class="comment-forbidden"></li><li></li></ul> </div> </article> Sat, 20 Mar 2021 17:21:21 +0000 Riley.C.Murray 139309 at http://archive.smallwarsjournal.com The Indigenous Appraoch Podcast: Cyber Strategy and Tactical Cyber Integration http://archive.smallwarsjournal.com/blog/indigenous-appraoch-podcast-cyber-strategy-and-tactical-cyber-integration <span>The Indigenous Appraoch Podcast: Cyber Strategy and Tactical Cyber Integration</span> <div class="field field--name-field-body field--type-text-with-summary field--label-hidden field--item"><p as="p" class="_72b584a33b4aad1bec787e057cf07946-scss _8a9c5cc886805907de5073b8ebc3acd8-scss">Spotify: https://open.spotify.com/episode/2OWwyC8qulOAWMJcympfMX</p> <p as="p" class="_72b584a33b4aad1bec787e057cf07946-scss _8a9c5cc886805907de5073b8ebc3acd8-scss">Apple: https://podcasts.apple.com/us/podcast/cyber-strategy-and-tactical-cyber-integration/id1534621849?i=1000511633577</p> <p as="p" class="_72b584a33b4aad1bec787e057cf07946-scss _8a9c5cc886805907de5073b8ebc3acd8-scss">(Also available on most other podcast services) </p> <p as="p" class="_72b584a33b4aad1bec787e057cf07946-scss _8a9c5cc886805907de5073b8ebc3acd8-scss">Col. Eric Kreitz, 1st Special Forces Command (Airborne)'s Director of Information Warfare sits down with Dr. Richard Harknett, one of the world's leading cybersecurity experts, and Maj.Jay Kosturko, an Electronic Warfare Officer assigned to 1st SFC(A) to help frame how we should think about the cyber domain.</p> <p as="p" class="_72b584a33b4aad1bec787e057cf07946-scss _8a9c5cc886805907de5073b8ebc3acd8-scss">Bio's: Col. Eric Kreitz is the Director of Information Warfare at 1st Special Forces Command (Airborne). He has more than 14 years in the PSYOP Regiment and has commanded at the Detachment and Battalion levels. Maj. Jay Kosturko is leading the effort for tactical cyber integration at 1st Special Forces Command (Airborne). Dr. Richard Harknett is a Professor and the Department Head of the Political Science Department at the University of Cincinnati, where he's also the Co-Director of the Ohio Cyber Range Institute and Chair of the University’s Center for Cyber Strategy and Policy. Previously, he served as a Fulbright Scholar in Cyber Studies at Oxford University and as the inaugural Scholar-in-Residence at US Cyber Command and the National Security</p> </div> <span><span>Riley.C.Murray</span></span> <span>Sat, 03/06/2021 - 4:36pm</span> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/blog/indigenous-appraoch-podcast-cyber-strategy-and-tactical-cyber-integration" rel="tag" title="The Indigenous Appraoch Podcast: Cyber Strategy and Tactical Cyber Integration" hreflang="en">Read more<span class="visually-hidden"> about The Indigenous Appraoch Podcast: Cyber Strategy and Tactical Cyber Integration</span></a></li><li class="comment-comments"><a href="/index.php/blog/indigenous-appraoch-podcast-cyber-strategy-and-tactical-cyber-integration#comments" title="Jump to the first comment." hreflang="en">2 comments</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/379/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1619150517" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Sat, 06 Mar 2021 21:36:42 +0000 Riley.C.Murray 139269 at http://archive.smallwarsjournal.com Cyber-States and US National Security: Learning from Covid-19 http://archive.smallwarsjournal.com/jrnl/art/cyber-states-and-us-national-security-learning-covid-19 <span>Cyber-States and US National Security: Learning from Covid-19</span> <span><span>SWJED</span></span> <span>Fri, 03/20/2020 - 11:42am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">What are the current implications for US national security? The first implication is our open market view of cyberspace and the sale of data by private social network companies like Facebook. Our national security is encumbered when private companies can use the data of citizens to sell to any entity who can pay, like the Cambridge Analytica case.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/cyber-states-and-us-national-security-learning-covid-19" rel="tag" title="Cyber-States and US National Security: Learning from Covid-19" hreflang="en">Read more<span class="visually-hidden"> about Cyber-States and US National Security: Learning from Covid-19</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/cyber-states-and-us-national-security-learning-covid-19#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/379/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632478795" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Fri, 20 Mar 2020 15:42:45 +0000 SWJED 136645 at http://archive.smallwarsjournal.com Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States http://archive.smallwarsjournal.com/jrnl/art/cyberwar-kinetic-war-2020-election-and-possibility-cyber-attack-critical-infrastructure <span>Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States</span> <span><span>SWJED</span></span> <span>Wed, 01/29/2020 - 12:26am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">The current possibility of the United States walking into a trap of a kinetic war is exceptionally likely, given the conditions that will be enumerated here, and the historical pattern of the US reacting to surprise attacks with the force of a giant rudely awakened from a deep slumber is not ahistorical. The Election of 2016 was a sure indicator of one phase of election manipulation.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/cyberwar-kinetic-war-2020-election-and-possibility-cyber-attack-critical-infrastructure" rel="tag" title="Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States" hreflang="en">Read more<span class="visually-hidden"> about Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/cyberwar-kinetic-war-2020-election-and-possibility-cyber-attack-critical-infrastructure#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/379/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632483147" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Wed, 29 Jan 2020 05:26:21 +0000 SWJED 132766 at http://archive.smallwarsjournal.com Challenging Snowden: Spycraft, Ethics, and Amendments http://archive.smallwarsjournal.com/jrnl/art/challenging-snowden-spycraft-ethics-and-amendments <span>Challenging Snowden: Spycraft, Ethics, and Amendments</span> <span><span>SWJED</span></span> <span>Thu, 01/23/2020 - 12:32am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Is it ethical for the country’s intelligence agencies to exploit nearly every known wireless communication modality in favor of U.S. policies and interests even though it could potentially involve spying on countless American citizens in violation of the Fourth Amendment? Edward Snowden utilized principles of ethical decision making, but faulty logic resulted in a treasonous act with longstanding damage to U.S. intelligence operations and foreign diplomacy.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/challenging-snowden-spycraft-ethics-and-amendments" rel="tag" title="Challenging Snowden: Spycraft, Ethics, and Amendments" hreflang="en">Read more<span class="visually-hidden"> about Challenging Snowden: Spycraft, Ethics, and Amendments</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/challenging-snowden-spycraft-ethics-and-amendments#comments" title="Jump to the first comment." hreflang="en">3 comments</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/379/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632483459" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Thu, 23 Jan 2020 05:32:14 +0000 SWJED 132179 at http://archive.smallwarsjournal.com Uniting the Cyber Domain Stakeholders http://archive.smallwarsjournal.com/jrnl/art/uniting-cyber-domain-stakeholders <span>Uniting the Cyber Domain Stakeholders</span> <span><span>SWJED</span></span> <span>Tue, 01/21/2020 - 12:11am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">The United States faces an organizational dilemma when it comes to the cyber domain, as the Department of Defense, Department of Homeland Security, Intelligence Community, and the private sector all are stakeholders in the domain and the security. Uniting the stakeholders under one security domain, specifically quantum encryption, would strengthen the United States cyber defense against their adversaries.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/uniting-cyber-domain-stakeholders" rel="tag" title="Uniting the Cyber Domain Stakeholders" hreflang="en">Read more<span class="visually-hidden"> about Uniting the Cyber Domain Stakeholders</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/uniting-cyber-domain-stakeholders#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/379/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632483474" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Tue, 21 Jan 2020 05:11:47 +0000 SWJED 131945 at http://archive.smallwarsjournal.com Would da Vinci Support the Pentagon’s New Cyber Strategy? http://archive.smallwarsjournal.com/jrnl/art/would-da-vinci-support-pentagons-new-cyber-strategy <span>Would da Vinci Support the Pentagon’s New Cyber Strategy?</span> <span><span>SWJED</span></span> <span>Thu, 01/16/2020 - 8:03am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Drawing inspiration from da Vinci’s observations on force, power, and movement – elements in which “all the works of mortals have their beginning and their end” – this article suggests four cyberspace operations principles.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/would-da-vinci-support-pentagons-new-cyber-strategy" rel="tag" title="Would da Vinci Support the Pentagon’s New Cyber Strategy?" hreflang="en">Read more<span class="visually-hidden"> about Would da Vinci Support the Pentagon’s New Cyber Strategy?</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/would-da-vinci-support-pentagons-new-cyber-strategy#comments" title="Jump to the first comment." hreflang="en">3 comments</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/379/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1632483504" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Thu, 16 Jan 2020 13:03:51 +0000 SWJED 131408 at http://archive.smallwarsjournal.com Russia in Ukraine 2013-2016: The Application of New Type Warfare Maximizing the Exploitation of Cyber, IO, and Media http://archive.smallwarsjournal.com/jrnl/art/russia-ukraine-2013-2016-application-new-type-warfare-maximizing-exploitation-cyber-io-and <article data-history-node-id="104495" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/russia-ukraine-2013-2016-application-new-type-warfare-maximizing-exploitation-cyber-io-and" rel="bookmark"><span>Russia in Ukraine 2013-2016: The Application of New Type Warfare Maximizing the Exploitation of Cyber, IO, and Media</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Tue, 09/11/2018 - 12:09am</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">This case study for analysis focuses on Russian operations in Ukraine from 2013-2016. Russian decision-making in Ukraine has demonstrated the ability to use cyber and information warfare to influence operations to support military and political objectives, and continued preparation of the cyber environment to create a range of options for future action.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/russia-ukraine-2013-2016-application-new-type-warfare-maximizing-exploitation-cyber-io-and" rel="tag" title="Russia in Ukraine 2013-2016: The Application of New Type Warfare Maximizing the Exploitation of Cyber, IO, and Media" hreflang="en">Read more<span class="visually-hidden"> about Russia in Ukraine 2013-2016: The Application of New Type Warfare Maximizing the Exploitation of Cyber, IO, and Media</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Tue, 11 Sep 2018 04:09:13 +0000 SWJED 104495 at http://archive.smallwarsjournal.com OODA Loops in Cyberspace: How Cyber Awareness Training Helps Threat Actors http://archive.smallwarsjournal.com/jrnl/art/ooda-loops-cyberspace-how-cyber-awareness-training-helps-threat-actors <span>OODA Loops in Cyberspace: How Cyber Awareness Training Helps Threat Actors</span> <span><span>SWJED</span></span> <span>Wed, 09/05/2018 - 6:45am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Cybersecurity’s human adversarial engagement is often lost in discussions of cybersecurity. We discuss how defenders’ focus on technology unintentionally creates vulnerabilities which can be exploited by threat actors. In particular, we discuss how the convergence of cyber awareness training and defensive technologies is exploited by threat actors with devastating consequences.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/ooda-loops-cyberspace-how-cyber-awareness-training-helps-threat-actors" rel="tag" title="OODA Loops in Cyberspace: How Cyber Awareness Training Helps Threat Actors" hreflang="en">Read more<span class="visually-hidden"> about OODA Loops in Cyberspace: How Cyber Awareness Training Helps Threat Actors</span></a></li><li class="comment-forbidden"></li><li></li></ul> Wed, 05 Sep 2018 10:45:40 +0000 SWJED 103835 at http://archive.smallwarsjournal.com Training Cyberspace Maneuver http://archive.smallwarsjournal.com/jrnl/art/training-cyberspace-maneuver <article data-history-node-id="96430" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/training-cyberspace-maneuver" rel="bookmark"><span>Training Cyberspace Maneuver</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Fri, 06/15/2018 - 6:59am</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Maneuver theory has now evolved to consider the first man-and-machine-made domain, in which cyberspace, as an artificial information domain, overlaps, intersects, and engages with the four other warfighting domains. The unique nature of the cyberspace warfighting domain presents a host of distinct challenges and considerations to maneuver thinking, requiring a change to the approach of training maneuver warfare principles for military cyberspace leaders.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/training-cyberspace-maneuver" rel="tag" title="Training Cyberspace Maneuver" hreflang="en">Read more<span class="visually-hidden"> about Training Cyberspace Maneuver</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Fri, 15 Jun 2018 10:59:57 +0000 SWJED 96430 at http://archive.smallwarsjournal.com