An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

The Cyber Defense Review

Articles

1 ... 12 13 14 15 16 17 18 19 20 21 ... 38

16th Air Force and Convergence for the Information War

July 27, 2020 — The world has changed, and our approach to warfare must change with it. As traditional organized power structures erode, disorder fills the void. We are moving from successive regional conflicts to a future characterized by continual global competition. This circumstance will reward those who can leverage information for strategic advantage. The 2018 National Defense Strategy (NDS) described this new paradigm by emphasizing the need to compete with adversaries now.[1] The Air Force recognizes that we are already in competition below the threshold of armed conflict. Within the Air Force, the standup of 16th Air Force as an Information Warfare (IW) Numbered Air Force (NAF) in October 2019 represents a direct response to this new reality. In the document directing the standup, the Air Force described IW as “The employment of military capabilities in and through the information environment to deliberately affect adversary human and system behavior.”[2] Our task is to synchronize – Cyberspace; Intelligence, Surveillance, and Reconnaissance (ISR); Electromagnetic Warfare (EW); Information Operations (IO) – across the continuum of cooperation, competition, and conflict, and support the joint force’s ability to compete, deter, and win wars across multiple domains. MORE

Countering Disinformation: Are We Our Own Worst Enemy?

July 27, 2020 — In his 2019 book, Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do About it, Richard Stengel detailed the Department of State’s (DoS) struggles in this burgeoning space. Stengel leaves the reader with a view of the United States Government (USG), where individual departments and agencies resist collaboration and tackle disinformation as individual departments and agencies. The result is a poorly integrated effort with limited awareness of parallel activities, significant challenges to cross-department and inter-agency collaboration, and the inability to evaluate and describe success or failure. Rather than accept Stengel’s description as the only way the USG can function, this article posits counterpoints derived from direct involvement with multiple USG departments and agencies during both the Obama and Trump administrations. The counterargument is an understanding of cross-governmental authorities combined with collaborative implementation leads to greater success in combating disinformation. MORE

Building the Army's Artificial Intelligence Workforce

July 27, 2020 — Artificial intelligence (AI) is a set of algorithmic tools and technologies that enable machines to perform tasks that normally require human intelligence—such as perceiving the world, learning from experience, reasoning through information, representing knowledge, acting, and adapting.[1] Given the multitude of rapid technological advancements in AI, computing, big data analytics and autonomy, the 2018 National Defense Strategy (NDS) emphasized the importance of leveraging the “very technologies that ensure we will be able to fight and win the wars of the future.” The 2018 NDS flags ways to modernize key capabilities in “address[ing] the scope and pace of our competitors’ and adversaries’ ambitions and capabilities,” and the need to “invest broadly in military application of autonomy, AI, and machine learning, including rapid application of commercial breakthroughs, to gain competitive military advantages.” MORE

Truth Dies First: Storyweapons on the InfoOps Battlefield

July 27, 2020 — Storyweapons are adversarial narratives that use algorithms, automation, codespaces, and data to hijack decision-making, and the stories of who we are, what we believe and why it matters. They leverage vulnerabilities and weaknesses against people and populations; they subvert freewill to bend actions to self-sabotage. Storyweapons exploit attack vectors across our new mixed reality of code and cognition, and they move the frontlines into the minds and software connected to any strategic objective. Defending the US against storyweapons requires a reconsideration of battlefields, operational models, and threat actors. MORE

Cyberwar is What States Make of it

July 27, 2020 — None there at the time could forget the vicious cyberattack on Venezuela’s power systems in March 2019. Four days of chaos ensued. Stores and restaurants closed. Card payments systems were down, with customers asked to pay in dollars. Disrupted public transportation left many unable to get to work. Looting ensued. Seventeen people died in hospitals for lack of electricity. MORE

Doctrinal Confusion and Cultural Dysfunction in DoD

July 27, 2020 — The doctrinal history of information operations, cyber operations, and psychological operations within DoD is tangled and confused. Moreover, those military specialties rank lower in the DoD pecking order, and those with such specialties are accorded less respect than those specializing in traditional combat arts. These two realities have led to inconsistent usage of these and related terms within DoD and the larger national security community in government as well as in public discourse and, arguably, a misallocation of resources given the importance of the information environment in military operations. MORE

Understanding and Pursuing Information Advantage

July 27, 2020 — The information environment (IE) and operations in and through the IE are currently a particular point of emphasis within the Department of Defense (DoD). Information is the newest joint function (joining command and control, intelligence, fires, movement and maneuver, protection, and sustainment). The Marine Corps has followed suit and made information a warfighting function, and the Army is considering a similar move. 2016 saw the first DoD Strategy for Operations in the Information Environment, and 2017 saw the development of the Joint Concept for Operating in the Information Environment, signed and released (and the subject of a capabilities-based assessment) in 2018. Senior leaders across the department have repeatedly expounded on the importance of the IE for military operations and declared it a priority. MORE

Information Weapons: Russia's Nonnuclear Strategic Weapons of Choice

July 27, 2020 — For many years now, Russia has defined and even expanded its concept of “information weapons (IWes).”[1] At one point, Russia attempted to get the concept introduced into United Nations resolutions, which at the time helped to guarantee Russian information and national security. This occurred in the 1990s when Russia was at its weakest and unable to compete with other nations in information warfare capabilities. MORE

The Cyber Defense Review: CyCon U.S. 2019 Conference Papers

March 23, 2020 — Welcome to the Spring edition of The Cyber Defense Review (CDR), and the exciting publication of the CyCon U.S. 2019 conference papers. This edition of the CDR will feature 6 policy and 5 technical papers that dramatically provide texture and insight into the complicated Defending Forward strategy. The 11 papers were presented on November 18-20, at the Crystal Gateway Marriott in Alexandria, VA. The CyCon U.S. conference is the premier forum on cyber conflict. It is a collaborative effort between the Army Cyber Institute (ACI) at West Point and the NATO Cooperative Cyber Defence Centre of Excellence and complements the CyCon Conference held every spring in Estonia. MORE

A Framework of Partnership

March 23, 2020 — The persistent engagement strategy in cyberspace requires partnership between the public and private sectors. This whole-of-society approach is greatly needed, as cyber threats are holistic. Partnership can yield a number of good outcomes that all parties seek to achieve. However, having truly productive partnership requires a significant amount of time and effort. There are different partnership methods that ask for different amount of time, effort, and resources. Hence, it is crucial to have a better understanding of the requirements of each partnership method. To this end, this article proposes a framework that incorporates various partnership methods with aims to achieve various goals. It demonstrates that this framework can provide guidance for selecting an appropriate partnership method based on specific conditions, needs, and requirements. MORE

1 ... 12 13 14 15 16 17 18 19 20 21 ... 38