ARTICLES

April 30, 2019

Modelling the Cognitive Work of Cyber Protection Teams

Cyber Protection Teams (CPTs) defend our Nation’s critical military networks. While Cyber Security Service Providers are responsible for the continuous monitoring and vulnerability patching of networks, CPTs perform threat-oriented missions to defeat adversaries within and through cyberspace. The research we report here provides a descriptive workflow of cyber defense in CPTs as well as a prescriptive work model that all CPTs should be capable of executing. This paper describes how these models were developed and used to assess technologies and performance of CPTs. Such models offer a variety of benefits to practitioner and research communities, particularly when the domain of practice is closed to most researchers. This project demonstrates the need for continual curation of CPT work models as well as the need for models of work for the other types of cyber teams (i.e. Mission and Support) in the Cyber Mission Force.

April 30, 2019

Code Girls: The Untold Story of the American Women Code Breakers of World War II

In Code Girls, Liza Mundy explores the previously untold story, and largely unrecognized contributions, of the first women to officially serve as part of World War II US intelligence code-breaking efforts. At approximately 11,000, these women comprised more than fifty percent of the 20,000 workers. Based on voluminous research from the National Cryptologic Museum and the National Archives, Mundy brings to life these civilian and military women’s stories as they decrypted messages from the enemy Axis Powers, thereby significantly advancing the Allied war effort.

April 30, 2019

The Cyber Defense Review: The Importance of Partnerships in the Cyber Domain

Welcome to another provocative edition of the CDR, which explores the importance of partnerships in the cyber environment. Crucial to the success and growth of the Army Cyber Institute (ACI) is the development of impactful partnerships. We are most proud of our special relationship and partnership with the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Tallinn, Estonia. The NATO CCDCOE is a global thought leader in the discussion and advancement of critical cyber issues—technology, strategy, operations, and law. Each year NATO CCDCOE hosts their prestigious International Conference on Cyber Conflict (CyCon) in Tallinn. This year’s CyCon conference theme of “Silent Battle” seeks to foster a conversation on topics such as vulnerabilities, exploitations and patches, threat detection and attribution, and situational awareness to wage this ‘silent battle.’ The ACI will support this magnificent event with speakers, West Point cadet participation, and distribution of the Spring CDR to all attendees. We at the ACI believe that operational success in the cyber domain derives from the development and evolution of strategic partnerships. We are excited that the CDR facilitates impactful partnerships and is at the fulcrum of the global cyber conversation.

Dec. 20, 2018

Disinformation – Дезинформация (Dezinformatsiya)

Disinformation is defined by Merriam-Webster as “false information deliberately and often covertly spread (as by the planting of rumors) in order to influence public opinion or obscure the truth.” [1] The word disinformation did not appear in English dictionaries until the 1980s. Its origins, however, can be traced back as early as the 1920s when Russia began using the word in connection with a special disinformation office whose purpose was to disseminate “false information with the intention to deceive public opinion.” [2]

Dec. 20, 2018

Operationalizing the Information Environment: Lessons Learned from Cyber Integration in the USCENTCOM AOR

From Joint Publication (JP) 3-13, the Information Environment (IE) is defined as “an aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information.” It is within this environment that our adversaries have engaged us persistently below a threshold that could trigger a kinetic response. Within the IE,

Dec. 18, 2018

Book Review: On Cyber: Towards an Operational Art for Cyber Conflict

The core of Conti and Raymond’s On Cyber: Towards an Operational Art for Cyber Conflict is found in the preface under the self-explanatory title, “Why this book?” and embedded in the following sentence: “The lack of an operational art for cyberspace operations is the inspiration for this book.” Conti and Raymond have identified a wide and open gap in the cyber literature, found not in the cyber hinterlands, but in the pivotal question of, “how do you do cyber operations?” We are now about 20 years into cyber – 20 years ago, cyber defense and cyber operations were all but unknown, and had less than a few references in the now-defunct Alta Vista search engine – and, discussions within the cyber community still occur mainly at the strategic and conceptual level, or at the purely tactical level. The larger policy debate is driven by a non-technical community, and the tactical level quickly becomes highly technical as a subset of computer science.

Dec. 18, 2018

Supremacy by Accelerated Warfare through the Comprehension Barrier and Beyond: Reaching the Zero Domain and Cyberspace Singularity

“In The Land Of The Blind, The One-Eyed Man Is King.” Erasmus Of Rotterdam, 16TH Century INTRODUCTION It is questionable and even unlikely that cyber supremacy could be reached by overwhelming capabilities manifested by stacking more technical capacity and adding attack vectors. The alternative is to use time as the vehicle to supremacy by accelerating the engagements’ velocity beyond the enemy’s ability to target and precisely execute and comprehend the events as they unfold. The space created beyond the adversary’s comprehension is called the Zero Domain. Military strategists traditionally see the battle space as land, sea, air, space, and cyber domains. When fighting a battle beyond the adversary’s comprehension, the conflict occurs in the Zero Domain, not in a traditional warfighting domain.

Dec. 18, 2018

Cultivating Technology Innovation for Cyberspace Operations

Pursuit of innovation need not require big bets on uncertain futures….[Organizations] can succeed … by harnessing the past in powerful ways” [1].Our Nation and our allies are fighting a Cyber Cold War against multiple capable adversaries. [2] Like the original Cold War, we have lost ground in the first decade by failing to acknowledge the breadth and sophistication of our adversaries’ actions. While recent hacks of financial and political institutions have drawn significant attention, some of the most disturbing intrusions have been directed at military and nuclear industries.Sadly, these cyber-attacks have been met with general inaction. Widespread Russian cyber-attacks in Ukraine [3] set the conditions for an invasion that was generally described as a separatist movement. [4] The most recent National Security Strategy emphasizes the gravity of China and Russia’s information operations. [5] Unfortunately, disinformations own about and through cyberspace attacks has resulted in domestic squabbling that has limited our ability to govern effectively, let alone mount an effective response.

Dec. 18, 2018

Offensive Digital Countermeasures: Exploring the Implications for Governments

The theft of intellectual property and classified data within the cyber domain poses a threat to the global economy and national security. In this paper, we discuss the concept of digital offensive countermeasures that the United States can use to defend its sensitive data and intellectual property, even after stolen data leaves U.S. Government networks. We analyze the plethora of legal and ethical issues involving the various degrees of invasiveness posed by such defenses against both foreign and domestic targets. The lack of established norms surrounding digital offensive countermeasures presents a unique duality in which such defenses may present a viable cyber deterrent for the United States but may also spark our next conflict.

Dec. 18, 2018

Culture in a Murky World: Hijab Trends in Jihadi Popular Culture

Although at times subtle, the female Muslim community influences and shapes the international security environment and constitutes a rough median of 49 percent over the estimated 1.6 billion global Muslim population. [1], [2] At the nexus of security and culture, themes like hijab trends highlight cultural shifts and social undercurrents impacting women that have powerful effects on the International Community. Across Eurasia, state-actors ban hijab-styles domestically to counter radicalization, while jihadi-extremists target women with hijab-themed content to bolster recruitment. Considering that women are susceptible to extremist recruitment,how can we expand the perspective on issues affecting Eurasian Muslim women by understanding the jihadi popular culture?