April 26, 2024 — The question of a Cyber Military Force is not new, although most studies lack practical solutions. This article explores the requirement to establish a separate U.S. Cyber Military Force, detailing threats, precedent, and current gaps and provides a framework for the DoD to recommend Congress establish a separate U.S. Cyber Military Force. Establishing a separate cyber military force under the Department of the Army is a critical and necessary step in addressing the evolving cyber threats facing the United States. Such a force will enable the U.S. to be better positioned to defend its national interests in the cyber domain, develop advanced capabilities, and maintain a competitive advantage over potential adversaries. MORE
|
April 26, 2024 — The U.S. military describes and understands war within the Clausewitzian frame of physical violence to accomplish a political goal by enforcing will on the military of an opposing state through physical actions. However, the cyber domain and the effect of cyber actions reveal that our understanding of war can no longer be restricted to the Clausewitz paradigm. Cyber effects can cause destruction without kinetic actions and brought the cognitive dimension to the forefront of many military leaders’ and planners' thinking. Cyber activities reveal that while new technology may not have changed war, a theoretical foundation built upon Clausewitz narrowly restricts the understanding of war for the modern era. MORE
|
April 26, 2024 — History shows that advantages are gained by the force who uses new technologies to secure their communications. Quantum computing appears to provide a variety of benefits including new ways to secure communications and the ability to not just bypass a cryptologic system, but potential to attack the system itself. While quantum technology is very promising, history shows the vulnerabilities posed by human factors should be taken into account in the design, engineering and implementation of these technologies. MORE
|
April 26, 2024 — As a result of the unique circumstances created by the collapse of the Soviet Union, Russia has developed disproportionate cyber power relative to its economic stature. Russia is only the world’s eleventh-largest economy by gross domestic product (GDP), and its information technology (IT) sector constituted just under 6% of the country’s GDP before Russia’s 2022 invasion of Ukraine. Despite these limitations, Russia is commonly recognized as an elite cyber power. Importantly, Russia relies heavily on cyber professionals from outside its security agencies, including talent from the private sector and associated with organized criminal groups (OCGs), to conduct offensive cyber operations on the state’s behalf. However, after the Russian invasion of Ukraine, a mass exodus in Russian IT professionals occurred and this presents the West with a unique opportunity to weaken Russia’s power in the cyber domain. MORE
|
April 26, 2024 — Cybersecurity suffers from a “tragedy of the commons” problem, where people and institutions have adopted lax security practices due to a tendency to weigh the perceived costs of adopting sound cybersecurity practices as higher than their expected benefits. For example, despite advancements in cybersecurity measures and extensive investments in tools and strategies to counter cyberattacks, foundational best practices have faltered leading to global cybersecurity challenges. Part of the dilemma stems from the fact that cybersecurity continues to be approached with a limited mindset, which creates a significant threshold of social cohesiveness for combating cyber threats. In the meantime, the cyber threat landscape continues to proliferate and exploit the fragile networks that we all inhabit. This paper provides a community-centered framework for cyber resilience that offers a starting point for addressing the tragedy of the commons problem in cybersecurity. MORE
|
December 5, 2023 — Cyber Persistence Theory provides an important discussion of the structural shift in cyber strategy necessary for taking U.S. cybersecurity to the next level. No other work has made such a convincing case for this structural shift as the au¬thors explain the current gap between cyber theory and observed cyber applica¬tion. This alternative to the cyber deterrence paradigm provides an in-depth, academic analysis of the modern cyberspace environment. The main takeaway of this thesis is that cyberspace activity, especially exploitation, is the primarily form of strategic competi¬tion, and that exploitation should be interpreted as an alternative to war wherein states quickly capitalize on other state’s cyberspace vulnerabilities rather than resorting to compellence. According to the authors, in cyberspace, states operate, at a low-cost, out of a structural need to persist and a strategic incentive to achieve short-term gains, without necessarily triggering an armed attack. MORE
|
December 5, 2023 — Cybersecurity is like the weather on a summer day; you can see out of your win-dow—just like you can see into your network—but you can’t see the storm on the other side of the mountain without a network of stations reporting what they can see. This analogy could be useful in thinking about forecasting for cyberse¬curity. This approach to cybersecurity—developing a “cyber-weather forecaster” —would enable defenders to see, predict and deal with threats in the same way that the National Weather Service (NWS) forecast helps us decide whether to bring an umbrella or leave it at home. As CISA’s Joint Cyber Defense Collaborative (JCDC) matures, developing “cyber weather forecasters” would provide an important improvement in gaining visibility into our networks and conducting predictive analysis. MORE
|
December 5, 2023 — As cybersecurity researchers and scholars of cyber conflict studies turn to think about the impact that artificial intelligence (AI) technologies will have on patterns of digi¬tal insecurity, it is important that they learn from the record of recent technological transformation of the national security enterprise. This research note considers the challenge of forthcoming changes in the dynamics of global cyber conflict brought about by AI. It identifies a tendency in the way commentators frame the intersection of these technological areas with known technical or operational touchstones. Specifical¬ly, commentary along both lines often ignores the question of evolving strategic context in much the same way that early scholars of cyber conflict often did, reducing any con¬clusion about the impact of AI on cyber conflict to a simplistic “bigger, faster, smarter, better” bottom line. In place of these frames, I suggest a simple four-part typology that envisions cyber conflict dynamics in which interaction (1) employs AI, (2) is conducted against AI, (3) is undertaken entirely by AI, and (4) is shaped and attenuated by AI. MORE
|
December 5, 2023 — This study explains the technological context and miscalculations that led to Rus-sia’s invasion of Ukraine and explores how public opinion shaped the technological factors that are helping Ukraine gain and maintain a competitive advantage. NATO overestimated Russia in information technology and did not account for collective hybrid efforts outside of Ukraine, emboldening Russia to push physical and ethical boundaries. However, Ukrainian forces and benefactors have been using informa¬tion technology more efficiently than Russia, among other enablers, to gain a com¬petitive advantage over its seemingly larger and more powerful adversary. Research must be conducted to understand the factors of Russia’s shortfalls, properly inte¬grate corporations using a common language, and establish rules of engagement among civilian and military agencies in the cyber domain. History and case study methodologies were used for this research. Russia’s historical identity and impunity emboldened the Kremlin to invade Ukraine, underestimating the impact technolog¬ical benefactors would have on Ukraine as a formidable competitor under Porter’s five forces model. This conflict exposes implications for industry integration to cyber defense exercises (CDX). This research is significant because it promotes a common language and framework to integrate private organizations in applying collaborative solutions and boundaries in a domain without borders and limited regulation. MORE
|
December 5, 2023 — The expanding use of cyber operations amid broadening geopolitical instability has implications for traditional middle powers, notably Canada, Australia, Nor¬way, and the Netherlands, among others. They occupy privileged positions at the core of the global political economy but have limited ability to shape the geopolitical envi-ronment and few resources to protect and project their national interests. Many of the world’s most influential middle powers are also longstanding U.S. allies, have high levels of digital connectivity, strong knowledge-based economies, leading research institutions, and membership in coveted multilateral groupings and security alliances. Compound¬ed by their hard-power resource constraints, for adversaries, middle powers represent low-risk, high-reward targets for exploitation in cyberspace. Middle powers thus have strong incentives but limited capacity to prevent the cyber-enabled degradation of their sovereignty, stabil¬ity, and economic competitiveness. MORE
|