Small Wars Journal

cyber operations

Cyberwar to Kinetic War: 2020 Election and the Possibility of Cyber-Attack on Critical Infrastructure on the United States SWJED Wed, 01/29/2020 - 12:26am
The current possibility of the United States walking into a trap of a kinetic war is exceptionally likely, given the conditions that will be enumerated here, and the historical pattern of the US reacting to surprise attacks with the force of a giant rudely awakened from a deep slumber is not ahistorical. The Election of 2016 was a sure indicator of one phase of election manipulation.

Challenging Snowden: Spycraft, Ethics, and Amendments

Is it ethical for the country’s intelligence agencies to exploit nearly every known wireless communication modality in favor of U.S. policies and interests even though it could potentially involve spying on countless American citizens in violation of the Fourth Amendment? Edward Snowden utilized principles of ethical decision making, but faulty logic resulted in a treasonous act with longstanding damage to U.S. intelligence operations and foreign diplomacy.

About the Author(s)

Uniting the Cyber Domain Stakeholders SWJED Tue, 01/21/2020 - 12:11am
The United States faces an organizational dilemma when it comes to the cyber domain, as the Department of Defense, Department of Homeland Security, Intelligence Community, and the private sector all are stakeholders in the domain and the security. Uniting the stakeholders under one security domain, specifically quantum encryption, would strengthen the United States cyber defense against their adversaries.
Would da Vinci Support the Pentagon’s New Cyber Strategy? SWJED Thu, 01/16/2020 - 8:03am
Drawing inspiration from da Vinci’s observations on force, power, and movement – elements in which “all the works of mortals have their beginning and their end” – this article suggests four cyberspace operations principles.

Russia in Ukraine 2013-2016: The Application of New Type Warfare Maximizing the Exploitation of Cyber, IO, and Media

This case study for analysis focuses on Russian operations in Ukraine from 2013-2016. Russian decision-making in Ukraine has demonstrated the ability to use cyber and information warfare to influence operations to support military and political objectives, and continued preparation of the cyber environment to create a range of options for future action.

About the Author(s)

OODA Loops in Cyberspace: How Cyber Awareness Training Helps Threat Actors

Cybersecurity’s human adversarial engagement is often lost in discussions of cybersecurity. We discuss how defenders’ focus on technology unintentionally creates vulnerabilities which can be exploited by threat actors. In particular, we discuss how the convergence of cyber awareness training and defensive technologies is exploited by threat actors with devastating consequences.

About the Author(s)

Training Cyberspace Maneuver

Maneuver theory has now evolved to consider the first man-and-machine-made domain, in which cyberspace, as an artificial information domain, overlaps, intersects, and engages with the four other warfighting domains. The unique nature of the cyberspace warfighting domain presents a host of distinct challenges and considerations to maneuver thinking, requiring a change to the approach of training maneuver warfare principles for military cyberspace leaders.

About the Author(s)

Multi-Domain Battle's Impact on Civil Infrastructure SWJED Wed, 11/08/2017 - 1:13am

Multi-domain battle has a nexus in the Operational Support Area of cyberspace. Often taken for granted, freedom of maneuver in the cyber domain is not guaranteed.

The Cyber Underground – Resistance to Active Measures and Propaganda: “The Disruptors” - Motto: “Think For Yourself”

A cyber underground, organized around special operations principles can create a nationwide and global network that will seek out, identify, understand, and expose active measures and propaganda.

About the Author(s)