Small Wars Journal

cyber

Evolution of China’s Cyber Threat Riley.C.Murray Thu, 09/23/2021 - 5:21am
In 1989, a team of American analysts presented an argument that the next generation of war would have blurred lines between war and politics, and civilians and combatants. This has become increasingly true as corporations now have major stakes in global conflict and are able to influence outcomes of global politics and war. The Russo-Georgian War further blurred those lines when the Georgian government transferred Internet capabilities that were under attack to TSHost servers in the United States. Private cybersecurity firms and non-state sponsored hackers can influence diplomacy on a global scale due to the deep penetration of the internet into the military, critical infrastructure, and everyday society. This penetration has increased the effectiveness of information warfare and cyber espionage.
JSOU Quick Look: Cyber Fundamentals for SOF

Publication: https://jsou.libguides.com/ld.php?content_id=60465000

 

"Cyberspace operations extend the reach, agility, pace and effectiveness of SOF when fully integrated into doc-trine, training, planning and execution. For example, foreign internal defense requires cyber-enabled opera-tion off the grid and detection of adversary activity to enable partner response. In contrast, unconventional warfare needs ways for resistance movements to make its own equipment and that can happen with cyber-en-abled 3-D printing.All SOF core activities can be cyber enabled. However, for each core activity SOF needs different cyber-enabled capabilities to secure these benefits."

Riley.C.Murray Sat, 03/20/2021 - 1:21pm

The Indigenous Appraoch Podcast: Cyber Strategy and Tactical Cyber Integration

Sat, 03/06/2021 - 4:36pm

Spotify: https://open.spotify.com/episode/2OWwyC8qulOAWMJcympfMX

Apple: https://podcasts.apple.com/us/podcast/cyber-strategy-and-tactical-cyber-integration/id1534621849?i=1000511633577

(Also available on most other podcast services) 

Col. Eric Kreitz, 1st Special Forces Command (Airborne)'s Director of Information Warfare sits down with Dr. Richard Harknett, one of the world's leading cybersecurity experts, and Maj.Jay Kosturko, an Electronic Warfare Officer assigned to 1st SFC(A) to help frame how we should think about the cyber domain.

Bio's: Col. Eric Kreitz is the Director of Information Warfare at 1st Special Forces Command (Airborne). He has more than 14 years in the PSYOP Regiment and has commanded at the Detachment and Battalion levels. Maj. Jay Kosturko is leading the effort for tactical cyber integration at 1st Special Forces Command (Airborne). Dr. Richard Harknett is a Professor and the Department Head of the Political Science Department at the University of Cincinnati, where he's also the Co-Director of the Ohio Cyber Range Institute and Chair of the University’s Center for Cyber Strategy and Policy. Previously, he served as a Fulbright Scholar in Cyber Studies at Oxford University and as the inaugural Scholar-in-Residence at US Cyber Command and the National Security

Cyber-States and US National Security: Learning from Covid-19

Fri, 03/20/2020 - 11:42am
What are the current implications for US national security? The first implication is our open market view of cyberspace and the sale of data by private social network companies like Facebook. Our national security is encumbered when private companies can use the data of citizens to sell to any entity who can pay, like the Cambridge Analytica case.

About the Author(s)

Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States

Wed, 01/29/2020 - 12:26am
The current possibility of the United States walking into a trap of a kinetic war is exceptionally likely, given the conditions that will be enumerated here, and the historical pattern of the US reacting to surprise attacks with the force of a giant rudely awakened from a deep slumber is not ahistorical. The Election of 2016 was a sure indicator of one phase of election manipulation.

About the Author(s)

Uniting the Cyber Domain Stakeholders

Tue, 01/21/2020 - 12:11am
The United States faces an organizational dilemma when it comes to the cyber domain, as the Department of Defense, Department of Homeland Security, Intelligence Community, and the private sector all are stakeholders in the domain and the security. Uniting the stakeholders under one security domain, specifically quantum encryption, would strengthen the United States cyber defense against their adversaries.

About the Author(s)

Controlling Cognitive Domains

Sat, 08/24/2019 - 3:52pm
What is now categorized as the “cognitive domain” includes areas of influence in all sectors of society. Cognitive domain(s) should not be restricted to influence and information operations, social engineering and ‘winning hearts and minds’ approaches, but expanded to include all areas where ideological attacks are possible.

About the Author(s)

Destination Atlanta: Ransomware Lessons for Municipalities and Law Enforcement

Fri, 08/23/2019 - 4:29pm
The rise of ransomware as an attack vector has continued to thrive and appears focused on those municipalities and law enforcement agencies with limited resources and unchecked system vulnerabilities. Of major concern are the evidentiary losses and reduction in consumer confidence within these governmental organizations requiring a new focus and financial expenditures to mitigate these attacks from occurring in the future.

About the Author(s)

Cyber-Realpolitik: US Foreign Policy and a Fragmented International System

Tue, 08/06/2019 - 11:04am
Cyber-realpolitik or cyber-realism is an anarchic international system that is fragmented beyond the multiplicity of a multipolar distribution of state power. Nation-states are increasingly finding governance difficult as technology is propagated into the internet of things (IoT), and innovations in artificial intelligence (AI) and blockchain technology. The power to disrupt and appeal to public impulses are redistributed to tech companies and their executives, developers, coders, technicians, and computer engineers.

About the Author(s)