Drawing inspiration from da Vinci’s observations on force, power, and movement – elements in which “all the works of mortals have their beginning and their end” – this article suggests four cyberspace operations principles.
Cyber-States and US National Security: Learning from Covid-19 SWJED Fri, 03/20/2020 - 11:42am
What are the current implications for US national security? The first implication is our open market view of cyberspace and the sale of data by private social network companies like Facebook. Our national security is encumbered when private companies can use the data of citizens to sell to any entity who can pay, like the Cambridge Analytica case.
Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States SWJED Wed, 01/29/2020 - 12:26am
The current possibility of the United States walking into a trap of a kinetic war is exceptionally likely, given the conditions that will be enumerated here, and the historical pattern of the US reacting to surprise attacks with the force of a giant rudely awakened from a deep slumber is not ahistorical. The Election of 2016 was a sure indicator of one phase of election manipulation.
Uniting the Cyber Domain Stakeholders SWJED Tue, 01/21/2020 - 12:11am
The United States faces an organizational dilemma when it comes to the cyber domain, as the Department of Defense, Department of Homeland Security, Intelligence Community, and the private sector all are stakeholders in the domain and the security. Uniting the stakeholders under one security domain, specifically quantum encryption, would strengthen the United States cyber defense against their adversaries.
Controlling Cognitive Domains SWJED Sat, 08/24/2019 - 3:52pm
What is now categorized as the “cognitive domain” includes areas of influence in all sectors of society. Cognitive domain(s) should not be restricted to influence and information operations, social engineering and ‘winning hearts and minds’ approaches, but expanded to include all areas where ideological attacks are possible.
Destination Atlanta: Ransomware Lessons for Municipalities and Law Enforcement SWJED Fri, 08/23/2019 - 4:29pm
The rise of ransomware as an attack vector has continued to thrive and appears focused on those municipalities and law enforcement agencies with limited resources and unchecked system vulnerabilities. Of major concern are the evidentiary losses and reduction in consumer confidence within these governmental organizations requiring a new focus and financial expenditures to mitigate these attacks from occurring in the future.
Cyber-Realpolitik: US Foreign Policy and a Fragmented International System SWJED Tue, 08/06/2019 - 11:04am
Cyber-realpolitik or cyber-realism is an anarchic international system that is fragmented beyond the multiplicity of a multipolar distribution of state power. Nation-states are increasingly finding governance difficult as technology is propagated into the internet of things (IoT), and innovations in artificial intelligence (AI) and blockchain technology. The power to disrupt and appeal to public impulses are redistributed to tech companies and their executives, developers, coders, technicians, and computer engineers.
SWJ Primer: Chinese Cyber Espionage and Information Warfare SWJED Mon, 04/29/2019 - 5:03am
"There is no doubt that China poses one of the greatest espionage and cyber-attack threats to the United States. The Chinese government has committed to becoming the world’s cyber leader and has made no real attempt to hide that notion. When assessing Chinese cybersecurity, we look at the infrastructure the government has built to address cybersecurity. From creating some of the strictest domestic cyber laws in the world to building a cyber army larger than a standing army of most countries, proves that China is establishing a presence in cyber operations.
Cyber Offensive Operations: Is There a Digital Delta Force? SWJED Mon, 10/08/2018 - 7:04am
As cyber-attacks become more frequent and cause more damage, the US government and the vast majority of private and commercial companies dig deeper into a defensive posture. Offensive cyber operations do not happen, except for maybe a few confidential US military or government (NSA) operations that cannot be confirmed or denied. Over 90 percent of the internet, including the massive amounts of data the travel through it; belong to non-government entities that so far are unable to punch back against their attackers.
Top Threat to Business, National Security and the American Dream: Detailing the New Global Competitive Model Based on Cyber and Asymmetrical Hybrid Warfare