ARTICLES

Dec. 5, 2023

Civil Cyber Defense – A New Model for Cyber Civic Engagement

In a world of ubiquitous connections, cybersecurity is everyone’s responsibility. Gone are the days when the actions of others had little impact on a person’s day-to-day ac¬tivities. We are now completely digitally interdependent, meaning the actions of one individual can be the vulnerability that allows adversaries to target a soft spot in the United States’ (U.S.) digital infrastructure. We argue a whole-of-society approach to cybersecurity is needed. The involvement of all members of society is required to de¬fend against the scourge of cyber intrusions emanating from Russia, China, North Korea, and Iran. We do not promote individuals or corporations engaging in offensive cyber operations, but instead advocate that the U.S. already has a non-governmental model for citizen involvement in entities like the Civil Air Patrol (CAP), to adopt for cyberspace. We build on Estonia’s Cyber Defense League (CDL) organizational model and the works of others, advocating for establishing a Civil Cyber Defense (CCD) in the U.S. We conclude with specific actions this new entity could take to increase the overall cybersecurity posture of the U.S. and identify potential issues with our CCD concept.

Dec. 5, 2023

The Ukrainian Information and Cyber War

Information and cyber action have been important but ancillary components of the Ukraine war since its outbreak on February 24, 2022. We offer a set of observations: • A form of cyber conflict has emerged in which Russia often attempts to aggres¬sively deny service or purloin information, while Ukraine and its allies often blunt the attacks; • Communications security for Russian forces from the tactical- to theater-level has frequently failed, often with disastrous consequences, as signals intelligence information has been employed to target military command echelons; • Unmanned aircraft have come to occupy a critical intelligence and air support function for Ukraine, although Russia is increasingly able to employ drones as well; • Intelligence support from the West to Ukraine appears highly significant and useful, possibly substantially shaping Ukrainian strategy and tactics; • The infrastructure and technical expertise of large tech firms such as Google, Microsoft, and SpaceX also helped Ukraine stay abreast of the Russian cyber threats; and • Propaganda operations by Ukraine have had tremendous reach in Europe and continue to elicit support, while those of Russia have been largely inward-facing and designed to shore up support for the war among the Russian public. We also consider what cyber tools and effects might be employed as the war continues.

Dec. 5, 2023

Weaponizing Words: Using Technology to Proliferate Information Warfare

The United States risks losing its information advantage over its near-peer compet-itors, specifically China. One reason behind this possibility is that the U.S. lacks a coherent doctrine of information warfare, which has put the U.S. at a disadvantage. Considering the Russian interference in elections of several North Atlantic Treaty Organization (NATO) states and allies, including Ukraine, Germany, and the United States, most stunningly in the 2016 presidential election, this article addresses the question: What is to be done? Before delving into possible solutions, the exact nature of the complex problem must be explored. The purpose of this article is to investigate the ways the U.S. could improve in information warfare, specifically against one of its top near-peer competitors, China. First, this article summarizes how China com¬pares with the U.S. concerning information warfare and influence opera¬tions. Second, it delves into some of the definitional chaos in which the U.S. is mired. Thirdly, the article illustrates the doctrinal and data policies of the U.S. Department of Defense. Finally, it concludes with policy recommendations.

Dec. 5, 2023

Cyber: If you want to go fast, go alone, if you want to go far, go together

When I reflect on the changes over the last decade in the cyber domain, there appears to be a common theme: collaboration and interdisciplinary teamwork. Technology continues to evolve rapidly. However, our ability to employ technology and defend cyberspace suc¬cessfully has increasingly required collaboration and teamwork; hence, we cannot do it all alone. Just as in the post-WWII era other manufacturing economies stood up and be¬gan to compete with American dominance, so too has American dominance in the cyber domain begun to erode as other nations with different skills and technology emerge as global leaders.

Aug. 22, 2023

The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Christian Espinoza

Christian Espinoza’s The Smartest Person in the Room provides a creative approach to understanding and improving company culture. While the book emphasizes improving highly technical employees’ communication and interpersonal skills, it ensures broad applicability through simplistic language and relatable personal anecdotes. The “Secure Methodology” lists in-detail human-centric goals for technical em­ployees who experience challenges communicating with co-workers. Tailoring a technical­ly-oriented methodology to advance social development makes Espinoza’s book a useful, thought-provoking read.

Aug. 22, 2023

Posturing U.S. Cyber Forces to Defend the Homeland

As revision­ist powers seek to disrupt the international order and cyber threats to critical infra­structure persist, the Department of Defense (DoD) must effectively position its cyber forces and capabilities to defend against cyber-attacks before they hit the homeland. An attack against the US power grid could result in multiple failures in life-sustaining infrastructure and significantly impact Joint Force power-projection capabilities. U.S. Northern Command (USNORTHCOM) must work closely with U.S. Cyber Command (USCYBERCOM) to orchestrate federal and non-federal stakeholders’ cyber authori­ties, capabilities, and equities to posture DoD cyber forces to respond with speed and agility. However, the myriad of federal cyber laws, regulations, authorities, and public and private sector stakeholder equities could impede DoD’s response efforts. National cybersecurity is “a team sport,” but players tend to use different playbooks or play by different rules. Tools such as a DoD “Complex Catastrophe Cyber Stakeholders, Communications, Authorities, and Narratives” (C3 SCAN) framework could enable USNORTHCOM and USCYBERCOM to foster collaboration, validate plans and orders, enumerate and prioritize mission-relevant terrain in cyberspace, and ensure readiness for Defense Support to Cyber Incident Response (DSCIR).

Aug. 22, 2023

Synthetic Environments for the Cyber Domain: A Survey on Advances, Gaps, and Opportunities

The need to understand cyber vulnerabilities and information in real time is imperative and often mission-critical in battlefield scenarios. As technologies continue to evolve, a need arises for more time-efficient and effective solutions within the cyber domain. With the growing popularity of synthetic environment technologies such as Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR) in a variety of fields, the question emerges: How can applications of this technology be applied to the field of cyber and what impact can they have? In this article, we survey the body of knowledge, both theoretical and empirical, of existing works exploring AR, VR, and MR technologies as solutions to common cyber challenges, as well as discuss the advances, gaps, and opportunities of this technology within the cyber domain.

Aug. 22, 2023

Expanding the Dyadic Cyber Incident and Campaign Dataset (DCID): Cyber Conflict from 2000 to 2020

This article provides an overview of updates to the Dyadic Cyber Incident and Campaign Dataset (DCID). Whereas most efforts to catalogue cyber incidents focus on curated lists and attack typologies, the DCID uses a standardized set of coding procedures consistent with best practices in social science. As a result, the analysis reveals there is a tendency to exaggerate the use and impact of cyber operations, obscuring their role as an instrument of disruption, espionage, and sabotage, and complements to larger coercive campaigns. The article outlines the construction of version 2.0, which documents rival, state-to-state use of cyber operations as an instrument of power. The expanded dataset introduces additional incidents based on various web-searching methods and human coder cross-validation while also adding new variables for ransomware, supply chain attacks, and connections to ongoing information operations. DCID 2.0 contains 429 incidents representing a critical attempt to scope the domain of conflict among strategic rivals.

Aug. 22, 2023

Killer bots instead of killer robots: Updates to DoD Directive 3000.09 may create legal implications

Whichever country successfully harnesses AI throughout its military first may obtain both a decisive advantage while also changing the character of war for future generations. Therefore, it is vital for the US to be the first to employ autonomous weapons systems in an operational environment. The Cyber Mission Forces have an urgent and operational need to augment its forces with autonomous and semi-autonomous cyberspace capabilities to meet its ever-expanding mission objectives. Exempting autonomous cyberspace capabilities in Department of Defense Directive (DODD) 3000.09 will (1) provide near-term benefits that avoid the path of a hollow Cyber force but (2) may create legal implications that could undermine the directive.

Aug. 22, 2023

Recruit, Train, and Retain DoD Cyber Skills Like Language Skills

How many personnel in the Department of Defense (DoD) can create and use com-puter code? Using what coding languages? How well? These are straightforward questions, but the answers are unknown, particularly to the personnel management system. The answers could also be a critical part of solving one of the DoD’s thorniest problems: filling the ranks of the US military’s cyber forces. In an increasingly cyber-dependent and volatile world with fierce recruitment competition from the private sector, the DoD needs to be more creative in recruiting, training, and retaining cyber talent. To date, the primary focus of the DoD has been attracting cyber talent from outside. However, as the DoD is America’s largest employer with 2.91 million employees, it is essential that it also recruits internally to see if already hired personnel can fulfill DoD cyber talent needs.