cyber operations

TRADOC Mad Scientist Project: Besides the physical properties of urban terrain, the density of pervasive, networked sensors creates opportunities and challenges for military operations.

ISIS’s cyber efforts have paid off; the FBI told Congress in July 2016 that “the message of radicalization spreads faster than we imagined just a few years ago.

Modern warfare is founded on networks and tactical cyber and electromagnetic activities (CEMA) provide critical keyholes to unlocking their cognitive spaces.

Journal Article | February 5, 2017 02:01 PM | Comments(3)

The dangers of spear phishing and why it is the most important topic on which an organizational cybersecurity education program should focus.

As the threat and effect of psychological warfare becomes more pronounced in cyberspace, policymakers must address this burgeoning security threat.

Human factors in military operations must become a central consideration in Joint Force campaign planning and execution.

Operationalizing cyber is not about linear thinking and lines of operation.

The emergence of gray tactics in cyber operations, their utility as a political instrument, and reasons that twilight zone conflicts are no longer a mere science fiction fantasy.

Can international law meaningfully distinguish between cyberespionage for national security purposes and economic espionage?

The unrelenting tempo of combat operations at the Corps and below level in the Army creates unique challenges for the execution of Offensive Cyber Operations.

Journal Article | October 18, 2016 09:05 AM | Comments(1)

For naval intelligence to effectively support the Chief of Naval Operation’s new strategy, it must first adapt to the realities of the digital information age.