cyberwar http://archive.smallwarsjournal.com/ en To Operationalize Cyber, Humanize the Design http://archive.smallwarsjournal.com/jrnl/art/to-operationalize-cyber-humanize-the-design <article data-history-node-id="56012" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/to-operationalize-cyber-humanize-the-design" rel="bookmark"><span>To Operationalize Cyber, Humanize the Design</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Mon, 11/21/2016 - 4:58am</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Operationalizing cyber is not about linear thinking and lines of operation.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/to-operationalize-cyber-humanize-the-design" rel="tag" title="To Operationalize Cyber, Humanize the Design" hreflang="en">Read more<span class="visually-hidden"> about To Operationalize Cyber, Humanize the Design</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Mon, 21 Nov 2016 09:58:11 +0000 SWJED 56012 at http://archive.smallwarsjournal.com Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations http://archive.smallwarsjournal.com/jrnl/art/twilight-zone-conflicts-employing-gray-tactics-in-cyber-operations <article data-history-node-id="54107" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/twilight-zone-conflicts-employing-gray-tactics-in-cyber-operations" rel="bookmark"><span>Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Thu, 10/27/2016 - 4:17pm</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> The emergence of gray tactics in cyber operations, their utility as a political instrument, and reasons that twilight zone conflicts are no longer a mere science fiction fantasy.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/twilight-zone-conflicts-employing-gray-tactics-in-cyber-operations" rel="tag" title="Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations" hreflang="en">Read more<span class="visually-hidden"> about Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Thu, 27 Oct 2016 20:17:59 +0000 SWJED 54107 at http://archive.smallwarsjournal.com The Cyber Espionage Predominant Purpose Test http://archive.smallwarsjournal.com/jrnl/art/the-cyber-espionage-predominant-purpose-test <article data-history-node-id="53586" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/the-cyber-espionage-predominant-purpose-test" rel="bookmark"><span>The Cyber Espionage Predominant Purpose Test</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Thu, 10/20/2016 - 10:27am</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Can international law meaningfully distinguish between cyberespionage for national security purposes and economic espionage?</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/the-cyber-espionage-predominant-purpose-test" rel="tag" title="The Cyber Espionage Predominant Purpose Test" hreflang="en">Read more<span class="visually-hidden"> about The Cyber Espionage Predominant Purpose Test</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Thu, 20 Oct 2016 14:27:23 +0000 SWJED 53586 at http://archive.smallwarsjournal.com Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box? http://archive.smallwarsjournal.com/jrnl/art/cyber-support-to-corps-and-below-digital-panacea-or-pandora%E2%80%99s-box <article data-history-node-id="53527" role="article" class="article teaser clearfix"> <h2> <a href="/index.php/jrnl/art/cyber-support-to-corps-and-below-digital-panacea-or-pandora%E2%80%99s-box" rel="bookmark"><span>Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box?</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Wed, 10/19/2016 - 9:09am</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> The unrelenting tempo of combat operations at the Corps and below level in the Army creates unique challenges for the execution of Offensive Cyber Operations.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/cyber-support-to-corps-and-below-digital-panacea-or-pandora%E2%80%99s-box" rel="tag" title="Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box?" hreflang="en">Read more<span class="visually-hidden"> about Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box?</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Wed, 19 Oct 2016 13:09:32 +0000 SWJED 53527 at http://archive.smallwarsjournal.com Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age http://archive.smallwarsjournal.com/jrnl/art/winning-the-cyber-gage-intelligence-dominance-in-the-digital-information-age-0 <span>Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age</span> <span><span>SWJED</span></span> <span>Tue, 10/18/2016 - 10:05am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> For naval intelligence to effectively support the Chief of Naval Operation’s new strategy, it must first adapt to the realities of the digital information age.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/index.php/jrnl/art/winning-the-cyber-gage-intelligence-dominance-in-the-digital-information-age-0" rel="tag" title="Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age" hreflang="en">Read more<span class="visually-hidden"> about Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age</span></a></li><li class="comment-comments"><a href="/index.php/jrnl/art/winning-the-cyber-gage-intelligence-dominance-in-the-digital-information-age-0#comments" title="Jump to the first comment." hreflang="en">1 comment</a></li><li class="comment-new-comments"><a href="/index.php/taxonomy/term/865/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1476883017" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Tue, 18 Oct 2016 14:05:30 +0000 SWJED 53478 at http://archive.smallwarsjournal.com Combat Identification in Cyberspace http://archive.smallwarsjournal.com/jrnl/art/combat-identification-in-cyberspace <article data-history-node-id="14494" role="article" class="article teaser clearfix"> <h2> <a href="/jrnl/art/combat-identification-in-cyberspace" rel="bookmark"><span>Combat Identification in Cyberspace</span> </a> </h2> <footer> <article> <drupal-render-placeholder callback="masquerade.callbacks:renderCacheLink" arguments="0=4" token="2JcDkyvoNdz7AbcUTZXDTgfSvABuLH-TUc0jYOzfCs0"></drupal-render-placeholder></article> <div class="author"> <span>Sun, 08/25/2013 - 5:59pm</span> </div> </footer> <div class="content"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> "Along with the rest of the U.S. government, the Department of Defense depends on cyberspace to function. It is difficult to overstate this reliance."</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/jrnl/art/combat-identification-in-cyberspace" rel="tag" title="Combat Identification in Cyberspace" hreflang="en">Read more<span class="visually-hidden"> about Combat Identification in Cyberspace</span></a></li><li class="comment-forbidden"></li><li></li></ul> <h2>About the Author(s)</h2> <div class="views-element-container form-group"></div> </div> </article> Sun, 25 Aug 2013 21:59:43 +0000 SWJED 14494 at http://archive.smallwarsjournal.com Anonymous vs. Los Zetas: The Revenge of the Hacktivists http://archive.smallwarsjournal.com/jrnl/art/anonymous-vs-los-zetas-the-revenge-of-the-hacktivists <span>Anonymous vs. Los Zetas: The Revenge of the Hacktivists</span> <span><span>Peter J. Munson</span></span> <span>Thu, 06/27/2013 - 3:30am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> The potential for this cyber war in the underworld to expand or to spill out into real world violence is high.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/jrnl/art/anonymous-vs-los-zetas-the-revenge-of-the-hacktivists" rel="tag" title="Anonymous vs. Los Zetas: The Revenge of the Hacktivists" hreflang="en">Read more<span class="visually-hidden"> about Anonymous vs. Los Zetas: The Revenge of the Hacktivists</span></a></li><li class="comment-comments"><a href="/jrnl/art/anonymous-vs-los-zetas-the-revenge-of-the-hacktivists#comments" title="Jump to the first comment." hreflang="en">15 comments</a></li><li class="comment-new-comments"><a href="/taxonomy/term/865/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1666904465" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Thu, 27 Jun 2013 07:30:00 +0000 Peter J. Munson 14188 at http://archive.smallwarsjournal.com Why Your Intuition About Cyber Warfare is Probably Wrong http://archive.smallwarsjournal.com/jrnl/art/why-your-intuition-about-cyber-warfare-is-probably-wrong <span>Why Your Intuition About Cyber Warfare is Probably Wrong</span> <span><span>Peter J. Munson</span></span> <span>Thu, 11/29/2012 - 9:29pm</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> <span style="line-height: 18px; ">Our physical world instincts often fail us when thinking about cyberspace.</span></p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/jrnl/art/why-your-intuition-about-cyber-warfare-is-probably-wrong" rel="tag" title="Why Your Intuition About Cyber Warfare is Probably Wrong" hreflang="en">Read more<span class="visually-hidden"> about Why Your Intuition About Cyber Warfare is Probably Wrong</span></a></li><li class="comment-comments"><a href="/jrnl/art/why-your-intuition-about-cyber-warfare-is-probably-wrong#comments" title="Jump to the first comment." hreflang="en">6 comments</a></li><li class="comment-new-comments"><a href="/taxonomy/term/865/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1355443845" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Fri, 30 Nov 2012 02:29:39 +0000 Peter J. Munson 13573 at http://archive.smallwarsjournal.com Cyber Threat Indications & Warning: Predict, Identify and Counter http://archive.smallwarsjournal.com/jrnl/art/cyber-threat-indications-warning-predict-identify-and-counter <span> Cyber Threat Indications &amp; Warning: Predict, Identify and Counter</span> <span><span>Peter J. Munson</span></span> <span>Thu, 07/26/2012 - 5:59am</span> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Considering an active cyber defense.</p> </div> <ul class="links inline list-inline"><li class="node-readmore"><a href="/jrnl/art/cyber-threat-indications-warning-predict-identify-and-counter" rel="tag" title=" Cyber Threat Indications &amp; Warning: Predict, Identify and Counter" hreflang="en">Read more<span class="visually-hidden"> about Cyber Threat Indications &amp; Warning: Predict, Identify and Counter</span></a></li><li class="comment-comments"><a href="/jrnl/art/cyber-threat-indications-warning-predict-identify-and-counter#comments" title="Jump to the first comment." hreflang="en">4 comments</a></li><li class="comment-new-comments"><a href="/taxonomy/term/865/feed" class="hidden" title="Jump to the first new comment." data-history-node-last-comment-timestamp="1361368121" data-history-node-field-name="comment"></a></li><li class="comment-forbidden"></li><li></li></ul> Thu, 26 Jul 2012 09:59:12 +0000 Peter J. Munson 13018 at http://archive.smallwarsjournal.com