An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

The Cyber Defense Review

Articles

1 ... 8 9 10 11 12 13 14 15 16 17 ... 39

Practical Cyber Risk Management for Tactical Commanders

November 15, 2021 — Risk management in today’s complex threat environment necessitates decision rules that integrate cyber risk control into the overall mission risk profile. This article outlines cyber risk management decision rules that are based on lessons learned from the Expeditionary Signal Battalion-Enhanced (ESB-E) prototype, which adapted Special Operations Forces (SOF) and commercial-off-the-shelf (COTS) capabilities by applying a rapid fielding and feedback approaches within the scope of the Army Futures Command. Focus areas include the use of diverse COTS systems and satellite communications providers to mitigate risk, controlled system maintenance processes, capitalizing on behavioral bias in cybersecurity, integrating enterprise services, and keeping pace with technological innovation trends. Lessons learned are intended to give tactical commanders practical cyber risk management options within the overall scope of mission risk management. MORE

Information Advantage Activities: A Concept for the Application of Capabilities and Operational Art during Multi-Domain Operations

November 15, 2021 — The Multi-Domain Operations (MDO) doctrinal framework is the driving mechanism for transforming the U.S. Army into a dominant information-age military force. To address the informational power aspects associated with MDO, the U.S. Army’s Training and Doctrine Command (TRADOC), in partnership with the Cyber Center of Excellence (CCoE), developed the Information Advantage (IA) and Decision Dominance (DD) doctrinal framework. Within this framework, “commanders seek to achieve DD, a desired state in which a commander can sense, understand, decide, act, and assess faster and more effectively than an adversary by gaining and maintaining positions of relative advantage, including IA.” IA is “a condition when a force holds the initiative in terms of relevant actor behavior, situational understanding, and decision-making using all military capabilities through the conduct of Information Advantage Activities (IAA).” Lastly, IAA is defined as “the employment of capabilities to enable decision-making, protect friendly information, inform and educate domestic audiences, inform and influence international audiences, and conduct information warfare.” MORE

Military Authorizations in a Connected World: DoD’s Role in Cyber Influence Operations

November 15, 2021 — The open nature of the Internet, allowing the unprecedented free flow of information, has given rise to a new type of attack surface. Cyber activities in the gray zone, which falls between diplomatic engagement and military action, includes disinformation campaigns and influence operations. These activities raise questions regarding responsibility and proportionate response. This article examines the distinction between influence operations and more traditional conflict, specifically in a gray zone of blended activity. It also addresses the role and authorities of the Department of Defense (DoD) governing cyberspace activity. Deterring and countering adversary influence operations require a multipronged approach of regulation, education, and government agency action to focus agency authorities and resources where they are needed most. DoD has the technical resources to lead the government’s efforts to counter and deter such operations but is limited by policy and law. This article considers how DoD can effectively operate under its Title 10 and Title 50 authorities in the gray zone and introduces a heuristic construct for the role of influence operations in the continuum of conflict. MORE

Causal Reasoning with Autonomous Systems and Intelligent Machine Applications

November 15, 2021 — In the field of Artificial Intelligence (AI), Machine Learning (ML) techniques and algorithms have been employed in a wide variety of domains and have demonstrated incredible capabilities as well as continued applicability to an ever-expanding number of areas and applications. Image and speech recognition, medical diagnosis, classification and prediction, information extraction (i.e., deep learning), commercial market and customer analysis, robotics, and self-driving vehicles are a few of the many areas where ML has either made possible or had a significant impact. Yet for all this progress, the field of AI has not yet approached what many consider the holy grail of AI: machines with human-like intelligence. Causal analysis is essential for realizing the vision of human-like reasoning: it brings the ability to determine cause-effect relationships and provides a basis for reasoning about interventions (i.e., doing), as well as what might have happened had events occurred differently (i.e., imagining/retrospection) which are fundamental characteristics of human reasoning. Causal analysis has seen widespread use and success in epidemiology, social science, and other fields for decades. Even so, its use in engineering, computer science, and AI has been limited and its potential is just beginning to be widely recognized and applied. MORE

DoD Has Over 3.5 Million Insiders – Now What?

November 15, 2021 — DoD employs about 3.5 million military and civilian direct employees, contractors, and reserve personnel. In addition, over 50,000 contracted entities (e.g., groups and organizations) can connect directly to the DoD Information Network (DoDIN) to collaborate and protect DoD systems and sensitive data. These imperfect users often interact with DoD across multiple classification domains and IT systems. Without focusing on potentially damaging insider activity, DoD will fail to meet the 2018 Cyber Strategy objectives, and adversaries will continue to erode our technical overmatch while imposing excessive remediation costs. This erosion occurs not only through attacks using technical means but also through exploitation of insiders. This article will introduce and urge the implementation of a framework to more effectively address insider threats by providing an empirical measure of each user's risk through their actual behaviors. This model will give the user near-real-time awareness of personal behaviors counter to organizational policy and cybersecurity requirements. This measure will also empower management to target training, remediation, and risk reduction while also allowing decision-makers to determine which user risk-exposed areas, roles, or practices require additional remediation. As a result, all organizational decision levels will be better able to improve cybersecurity resiliency in the face of an ever-evolving insider threat landscape. MORE

Lessons for the DoD when Planning for the Future of S&T

November 15, 2021 — Telling the future is not yet possible, but we have nearly come to expect it, thanks to incredible achievements in technology which presents us with an ever-improving sense of what is probable. This has introduced interesting challenges, for example, when DoD prepares for future states of the world. This was a challenge recently undertaken by researchers at OUSD (R&E), where a glimpse into science and technology out to the year 2045 was explored as part of a Congressionally mandated report included in the 2020 NDAA. A credible team of experts was commissioned for the effort, who additionally organized a complement of technology analysts and writers. A parallel project was conceptualized and nominated by a few researchers who felt it important to investigate the thoughts and perspectives of professionals whose worldview is dominated by such matters: futurists, technology forecasters, and science fiction writers. Thus, the OUSD (R&E) Principal Director for Cyber agreed to launch Project Valence (the namesake being a nod to the gregarious nature of valence electrons); the members of which successfully reached a dozen such luminaries, and recorded nearly 30 hours of unbridled exploration about the world to come. Notably, regardless of whether visions prove to be true, such a world will undoubtedly feature a fighting force charged with the defense of America, comprised of experts many of whom have not yet been born. MORE

The Cyber Defense Review: Ransomware’s Growing Impact

August 7, 2021 — Welcome to the Summer 2021 edition of The Cyber Defense Review (CDR) where you will find a collection of thought-provoking articles in this issue. First, let us start with the elephant in the room: Ransomware. Ransomware has become a household name over the last year, with the frequency and scale of the attacks increasing at an alarming rate. We hear almost weekly of a significant attack affecting multiple organizations, both as primary targets and as downstream collateral targets. The recent Colonial Pipeline shutdown and JBS’s meat processing plant disruptions demonstrated in very real terms the potential impacts of cyberattacks on large portions of the American population. Clearly, the status quo is not working. To address this issue, the Honorable Joe R. Reeder (former Under Secretary of the Army) and United States Military Academy (USMA) Cadet Tommy Hall assess the implications of the Colonial Pipeline event and provide seven key lessons that the Nation must address in their article: “Cybersecurity’s Pearl Harbor Moment: Lessons Learned from the Colonial Pipeline Ransomware Attack.” MORE

Cybersecurity’s Pearl Harbor Moment: Lessons Learned from the Colonial Pipeline Ransomware Attack

August 7, 2021 — In 2014, former NSA Deputy Director Chris Inglis prophetically observed that “if we were to score cyber the way we score soccer, the tally would be 462-456 twenty minutes into the game, i.e., all offense.” Recent events demonstrate that Inglis’ warning is more urgent than ever, because our cyber defenses remain woefully inadequate. The Washington Post titled a feature article on July 11, 2021: “Would the US really answer cyberattacks with nuclear weapons?” Even to broach this question would prompt a follow-up: Has the US undertaken every practicable effort it can make to insulate its assets from cyberattacks? The discussion below explains why the answer is a resounding “No.” MORE

Cybered Competition, Cooperation, and Conflict in a Game of Imperfect Information

August 7, 2021 — This article proposes that “the strategy of conflict,” or game theory, can enhance joint planning processes applied to cybersecurity operations. Game theory could perhaps prove most useful during operational design for understanding actors, tendencies, and potentials actions inherent in cooperation, competition, and conflict situations. A canonical anti-coordination game, Hawk-Dove, is employed to explore equilibrium evolutionary game strategies and deterrence outcomes applicable to cyberspace operations. Tractable extensions to the Hawk-Dove game are introduced to understand mechanisms for signaling, reputation, norms, and ambiguity in deterrence. Game parameters are transferred to a model of Surprise-Attack for comparison. Advantages and disadvantages for incorporating games in the joint planning process are considered. MORE

Technology Adoption in Unconventional Warfare

August 7, 2021 — As US Special Operations Command (USSOCOM) rebalances its primary focus, shifting from Violent Extremist Organizations (VEOs) to competition with Russia and China, there must be a greater emphasis on integrating cyberspace capabilities into the Unconventional Warfare (UW) doctrine. Section 1202 of the National Defense Authorization Act for Fiscal Year (FY) 2018 designates USSOCOM as the lead for irregular warfare, empowering Special Operations Forces (SOF) to leverage select irregular forces, resourced under specific legal authorities to live off the land in support of irregular warfare missions. Combatant Commands retain operational command and control despite this designation. As a recommendation on how the US should employ non-traditional forces, this article shows how nation-states like China, North Korea (DPRK), Iran, and Russia use cyber proxies to conduct combined operations. It then considers how SOF can add an asymmetric technique to unconventional warfare by using cyber-capable irregular forces at the tactical level to serve as force multipliers. Finally, the USSOCOM Resistance Operations Concept (ROC) will be expanded to demonstrate how to better engage cyber proxies within UW. MORE

1 ... 8 9 10 11 12 13 14 15 16 17 ... 39