cyberwarfare http://archive.smallwarsjournal.com/ en NATO Is in a Cyberwar with Russia and Must Expand Article 5 to Include Cyberwarfare or Risk Losing and Diminishment http://archive.smallwarsjournal.com/jrnl/art/nato-cyberwar-russia-and-must-expand-article-5-include-cyberwarfare-or-risk-losing-and <span>NATO Is in a Cyberwar with Russia and Must Expand Article 5 to Include Cyberwarfare or Risk Losing and Diminishment</span> <span><span>Riley.C.Murray</span></span> <span>Fri, 09/24/2021 - 1:59am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item">Article 5 of NATO’s foundational 1949 North Atlantic Treaty demands that if an “armed attack” is carried out against even just one member state, all other member states “shall” consider that attack (and any armed attack) on a member state “an attack against them all” and “will assist,” up to and “including the use of armed force.”  This bedrock is the centerpiece for over seven decades of the Pax Americana: the U.S.-led global system of military power, alliances, collective defense, and ability to project combined strength anywhere on the planet.  For it to continue in these roles, NATO must adapt to current and future threats by adding cyberwarfare—including information warfare—to Article 5.</div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/jrnl/art/nato-cyberwar-russia-and-must-expand-article-5-include-cyberwarfare-or-risk-losing-and" rel="tag" title="NATO Is in a Cyberwar with Russia and Must Expand Article 5 to Include Cyberwarfare or Risk Losing and Diminishment" hreflang="en">Read more<span class="visually-hidden"> about NATO Is in a Cyberwar with Russia and Must Expand Article 5 to Include Cyberwarfare or Risk Losing and Diminishment</span></a></li><li class="comment-comments"><a href="/jrnl/art/nato-cyberwar-russia-and-must-expand-article-5-include-cyberwarfare-or-risk-losing-and#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/taxonomy/term/834/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1642516451" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Fri, 24 Sep 2021 05:59:38 +0000 Riley.C.Murray 139939 at http://archive.smallwarsjournal.com The Best Natural Defense to Psychological Warfare http://archive.smallwarsjournal.com/jrnl/art/the-best-natural-defense-to-psychological-warfare <article data-history-node-id="58074" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/the-best-natural-defense-to-psychological-warfare" rel="bookmark"><span>The Best Natural Defense to Psychological Warfare</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Sun, 12/25/2016 - 7:48pm</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> As the threat and effect of psychological warfare becomes more pronounced in cyberspace, policymakers must address this burgeoning security threat.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/the-best-natural-defense-to-psychological-warfare" rel="tag" title="The Best Natural Defense to Psychological Warfare" hreflang="en">Read more<span class="visually-hidden"> about The Best Natural Defense to Psychological Warfare</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Mon, 26 Dec 2016 00:48:38 +0000 SWJED 58074 at http://archive.smallwarsjournal.com To Operationalize Cyber, Humanize the Design http://archive.smallwarsjournal.com/jrnl/art/to-operationalize-cyber-humanize-the-design <article data-history-node-id="56012" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/to-operationalize-cyber-humanize-the-design" rel="bookmark"><span>To Operationalize Cyber, Humanize the Design</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Mon, 11/21/2016 - 4:58am</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Operationalizing cyber is not about linear thinking and lines of operation.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/to-operationalize-cyber-humanize-the-design" rel="tag" title="To Operationalize Cyber, Humanize the Design" hreflang="en">Read more<span class="visually-hidden"> about To Operationalize Cyber, Humanize the Design</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Mon, 21 Nov 2016 09:58:11 +0000 SWJED 56012 at http://archive.smallwarsjournal.com Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations http://archive.smallwarsjournal.com/jrnl/art/twilight-zone-conflicts-employing-gray-tactics-in-cyber-operations <article data-history-node-id="54107" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/twilight-zone-conflicts-employing-gray-tactics-in-cyber-operations" rel="bookmark"><span>Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Thu, 10/27/2016 - 4:17pm</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> The emergence of gray tactics in cyber operations, their utility as a political instrument, and reasons that twilight zone conflicts are no longer a mere science fiction fantasy.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/twilight-zone-conflicts-employing-gray-tactics-in-cyber-operations" rel="tag" title="Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations" hreflang="en">Read more<span class="visually-hidden"> about Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Thu, 27 Oct 2016 20:17:59 +0000 SWJED 54107 at http://archive.smallwarsjournal.com The Cyber Espionage Predominant Purpose Test http://archive.smallwarsjournal.com/jrnl/art/the-cyber-espionage-predominant-purpose-test <article data-history-node-id="53586" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/the-cyber-espionage-predominant-purpose-test" rel="bookmark"><span>The Cyber Espionage Predominant Purpose Test</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Thu, 10/20/2016 - 10:27am</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Can international law meaningfully distinguish between cyberespionage for national security purposes and economic espionage?</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/the-cyber-espionage-predominant-purpose-test" rel="tag" title="The Cyber Espionage Predominant Purpose Test" hreflang="en">Read more<span class="visually-hidden"> about The Cyber Espionage Predominant Purpose Test</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Thu, 20 Oct 2016 14:27:23 +0000 SWJED 53586 at http://archive.smallwarsjournal.com Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box? http://archive.smallwarsjournal.com/jrnl/art/cyber-support-to-corps-and-below-digital-panacea-or-pandora%E2%80%99s-box <article data-history-node-id="53527" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/cyber-support-to-corps-and-below-digital-panacea-or-pandora%E2%80%99s-box" rel="bookmark"><span>Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box?</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Wed, 10/19/2016 - 9:09am</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> The unrelenting tempo of combat operations at the Corps and below level in the Army creates unique challenges for the execution of Offensive Cyber Operations.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/cyber-support-to-corps-and-below-digital-panacea-or-pandora%E2%80%99s-box" rel="tag" title="Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box?" hreflang="en">Read more<span class="visually-hidden"> about Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box?</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Wed, 19 Oct 2016 13:09:32 +0000 SWJED 53527 at http://archive.smallwarsjournal.com Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age http://archive.smallwarsjournal.com/jrnl/art/winning-the-cyber-gage-intelligence-dominance-in-the-digital-information-age-0 <span>Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age</span> <span><span>SWJED</span></span> <span>Tue, 10/18/2016 - 10:05am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> For naval intelligence to effectively support the Chief of Naval Operation’s new strategy, it must first adapt to the realities of the digital information age.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/winning-the-cyber-gage-intelligence-dominance-in-the-digital-information-age-0" rel="tag" title="Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age" hreflang="en">Read more<span class="visually-hidden"> about Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/winning-the-cyber-gage-intelligence-dominance-in-the-digital-information-age-0#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/834/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1476883017" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Tue, 18 Oct 2016 14:05:30 +0000 SWJED 53478 at http://archive.smallwarsjournal.com Combat Identification in Cyberspace http://archive.smallwarsjournal.com/jrnl/art/combat-identification-in-cyberspace <span>Combat Identification in Cyberspace</span> <span><span>SWJED</span></span> <span>Sun, 08/25/2013 - 5:59pm</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> "Along with the rest of the U.S. government, the Department of Defense depends on cyberspace to function. It is difficult to overstate this reliance."</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/combat-identification-in-cyberspace" rel="tag" title="Combat Identification in Cyberspace" hreflang="en">Read more<span class="visually-hidden"> about Combat Identification in Cyberspace</span></a></li><li class="comment-forbidden"></li><li></li></ul> Sun, 25 Aug 2013 21:59:43 +0000 SWJED 14494 at http://archive.smallwarsjournal.com Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion http://archive.smallwarsjournal.com/jrnl/art/bandwidth-cascades-escalation-and-pathogen-models-for-cyber-conflict-diffusion <span>Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion</span> <span><span>Peter J. Munson</span></span> <span>Wed, 06/19/2013 - 3:30am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Conventional and cyber conflict diffusion diverge on two points:  third-party intervention (<em>escalation</em>) and collateral damage (<em>pathogen</em>).  The findings raise questions regarding state neutrality, non-state actors, and authenticating attackers.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/jrnl/art/bandwidth-cascades-escalation-and-pathogen-models-for-cyber-conflict-diffusion" rel="tag" title="Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion" hreflang="en">Read more<span class="visually-hidden"> about Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion</span></a></li><li class="comment-forbidden"></li><li></li></ul> Wed, 19 Jun 2013 07:30:00 +0000 Peter J. Munson 14141 at http://archive.smallwarsjournal.com On the Spectrum of Cyberspace Operations http://archive.smallwarsjournal.com/jrnl/art/on-the-spectrum-of-cyberspace-operations <span>On the Spectrum of Cyberspace Operations</span> <span><span>Peter J. Munson</span></span> <span>Tue, 12/11/2012 - 5:30am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> <span style="line-height: 18px; ">As cyberspace operations continue to evolve, they raise some unique questions regarding the nature of conflict and how it should be discussed and regulated.</span></p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/jrnl/art/on-the-spectrum-of-cyberspace-operations" rel="tag" title="On the Spectrum of Cyberspace Operations" hreflang="en">Read more<span class="visually-hidden"> about On the Spectrum of Cyberspace Operations</span></a></li><li class="comment-comments"><a href="/jrnl/art/on-the-spectrum-of-cyberspace-operations#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/taxonomy/term/834/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1355262108" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Tue, 11 Dec 2012 10:30:00 +0000 Peter J. Munson 13595 at http://archive.smallwarsjournal.com