An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

The Cyber Defense Review

Articles

1 2 3 4 5 6 7 8 9 10 ... 39

Machine Learning Applications for Cybersecurity

April 7, 2023 — The trope of future cybersecurity as a battle between warring artificial intelligences awaits the development of artificial general intelligence. In the interim, however, machine learning is being applied to several cybersecurity problem sets. This article looks more closely at how machine learning is transforming cybersecurity, considering the examples of authentication and masquerade, spam filtering and spam, antimalware and malware, and intrusion detection and intrusion. Machine learning is adding new capabilities for cyber defense and in most cases is useful in conjunction with other approaches. At present, machine learning applications for cyber offense remain primarily proofs of concept. MORE

Conventional Retaliation and Cyber Attacks

April 7, 2023 — On July 27, 2021, President Joe Biden warned, in a speech at the Office of Director of National Intelligence, that “I think it's more than likely we're going to end up, if we end up in a war - a real shooting war with a major power - it's going to be as a consequence of a cyber breach of great consequence and it's increasing expo-nentially, the capabilities.” Most analysts view the president’s hypothetical scenario as unlikely for two reasons. First, attributing cyberattacks is often challenging, making retaliation difficult, if not im¬possible. Cyberattacks are commonly anonymous, hard to trace, and may be triggered long after they were set up. Moreover, they are often carried out not by states but by criminal entities, hacker groups, or other non-state actors, which sometimes but not always are affiliated with or sponsored by states. The practical and political window for overt retalia¬tion closes if a cyberattack cannot be directly and timely attributed to a state. Second, and importantly, most cyberattacks do not have strategic effects. The preponderance of cyberat¬tacks are either distributed denial-of-service (DDOS) attacks (meant to disrupt, blackmail, or extort), or they are efforts to collect information through a combination of hacking and malware. Even attacks attributable to a state usually fall below the threshold for conven¬tional retaliation. MORE

Gaining Competitive Advantages in Cyberspace

April 7, 2023 — Cyberspace has characteristics that differ from air, land, maritime, and space domains, which affect how the Joint Force operates and defends it. Fast-moving innovations are transforming the character of warfare in cyberspace, requiring novel technology in¬tegration. Effective integration of breakthrough technologies in autonomy, artificial intelligence, and machine learning into cyberspace can enable competitive advantages to be gained that enhance the combat power of joint forces conducting multi-domain operations. These technologies help shorten the sensor-to-shooter pathway to acceler¬ate and optimize decision-making processes. These technologies also permit the en¬hancement of cyber situational understanding from the ingest, fusion, synthesis, anal¬ysis, and visualization of big data from varied cyber data sources to enable decisive, warfighting information advantage via the display of key cyber terrain with relevance in the commander’s area of operations at the tactical edge. These technologies engen¬der actionable information and recommendations to optimize human-machine deci¬sion-making via autonomous active cyber defense to effectively execute command and control while informing resourcing decisions. Competitive advantages gained allow key actions to be taken to generate, preserve, and apply informational power against a relevant actor while also permitting maneuver through the information environment. MORE

Countermeasures as Lightning, not a Lightning Bug: Illuminating the Legal Doctrine

April 7, 2023 — Mark Twain famously observed that the difference between the “right word and the almost right word is the difference between lightning and a lightning bug.” Similarly, here, the term ‘countermeasures’ has a particular textual meaning under international law. It is not an unfettered privilege that can be conjured at any whim—especially in the cyber domain. Definitionally, countermeasures are a limited set of responses available to an injured State responding to an aggressor State’s behavior; further, these responses would otherwise be unlawful but for the aggressor State’s “un¬friendly” and illegal actions. In a previous Cyber Defense Review article, Dr. Nori Katagiri outlined challenges to implementing countermeasures in cyberspace from a perspective of active defense. For purposes of his article, he defined countermeasures as “a set of responses toward verified attackers within a reasonably short period of time.” He also discussed the challenges of implementing an active defense approach from a strategic and political perspective. Yet “countermeasures,” as described by Dr. Katagari (i.e., an active defense cyber strategy, which we will refer to as “active defense perspective” for this paper), are quite different from “countermeasures” as traditionally defined under international law. As a legal matter, countermeasures are responses to unfriendly state actions that would otherwise be un¬lawful but for the responsible State’s misconduct. As articulated in Tallinn Manual 2.0, an “injured State” engages in countermeasures to induce the “responsible State” to cease its wrongful behavior. MORE

Expeditionary Cyberspace Operations

April 7, 2023 — As the pace of change in cyberspace operations and the nature of cyberspace forces continues to increase, the demand for innovative solutions to warfighters’ needs and improved lethality of the joint force shows no signs of slacking, and the concepts and frameworks established just a few years ago to meet these needs have evolved to keep pace. The Cyber Mission Force is tasked to handle national and combatant commander priorities, working from garrison, or deployed when necessary. As the Cyber Mission Force reached full mission capacity, including concomitant changes to their alignment and command and control, additional capability and capacity were required, including, ultimately, calls for additional types of cyberspace forces. In particular, there is a growing need for cyberspace forces that deploy within the physical domains. This article introduces and defines the term Expeditionary Cyber¬space Operations (ECO) to standardize terminology for these tactical maneuver units operating across the competition continuum. MORE

Establishing the Conditions of Engagement with Machines

April 7, 2023 — We begin our discussion of “autonomy” with its Western meaning for the hu¬man individual: “to be autonomous is to govern oneself, to be directed by considerations, desires, conditions, and characteristics that are not simply imposed externally upon one.” Autonomy is “the capacity to impose upon ourselves, by virtue of our practical identities, obligations to act.”1 Similarly, extending au¬tonomy to machines is a partial release from external control that comes with obligations to act. That’s the easy part. Until the last decade, machines with no human in the loop had very limited repertoires of actions they could take, turning on the pump when they detected the water was rising. From that set of inherent constraints came reliability and understandability. As is obvious, we are transiting an inflection point where machines are gaining trained reasoning capac¬ity that can allow problem-solving without a human in the loop. Even the training can be self-administered: the autonomy of self-modification. MORE

Leadership in the Digital World

April 7, 2023 — Welcome to the Spring CDR. We proudly announce that the CDR has a new home with the West Point Press. This reorganization aligns with the vision of the 15th Dean of the Academic Board, BG Shane Reeves, for West Point to be “the intellectual engine of the Army.” At the unveiling of the West Point Press in January 2023, BG Reeves asserted, “Our faculty and cadets are conducting re¬search that impacts some of the Nation’s toughest problems and most pressing issues … producing scholarship [with] major impacts across academia, the Army, and the world.” The CDR will continue its special relationship with the Army Cyber Institute (ACI) at West Point. MORE

The Only Constant is Change…

November 14, 2022 — The ancient Greek philosopher Heraclitus is credited with the quote “The only constant in life is change.” While Heraclitus was certainly not thinking of cyberspace or modern technologies, it occurs to me that he may have been onto something with respect to the larger world of cyber related issues as we have seen continual evolution since the founding of the Army Cyber Institute (ACI) at West Point. This Fall marks ten years since the creation of the ACI by the Secretary of the Army, John McHugh, and the Chief of Staff of the Army, General Raymond Odierno, in 2012 to serve as “a national resource for research, advice, and education in the cyber domain, engaging military, government, academic, and industrial cyber communities in impactful partnerships to build intellectual capital and expand the knowledge base for the purpose of enabling effective Army cyber defense and cyber operations.” MORE

Better Anticipating and Managing Today’s Growing Cyber Risks

November 14, 2022 — We live in an increasing cyber enabled world where more of our lives are monitored, assessed, and controlled by forces and decisions that function largely in the background and with little appreciation for the risks that we assume as a result. Absent fundamental rethinking as to how we incorporate Information Age technologies into the fabric of our daily lives, we will increasingly find ourselves reaching a point of no return as more complex technologies such as AI and greater ubiquity of cyber technologies inherent in the Internet of Things (IoT) continue to proliferate in cyberspace. To manage these technologies, we still rely on organizations and processes rooted in the 18th century to confront threats that move across the globe in milliseconds. It is no wonder that we find ourselves in a defensive battle and in a position of great disadvantage. MORE

Russian Cyber Operations in the Invasion of Ukraine

November 14, 2022 — In March 2021, Russia began to deploy large numbers of troops and armaments near the Russia-Ukraine border in what Western observers believed posed an invasion threat to Ukraine, which Russia strongly denied. An intense debate in the West ensued over whether the troops were being deployed to pressure Ukraine into making political concessions or to conduct an actual invasion. Noting previous Russian offensive cyber operations against Ukraine starting as early as 2014, many cyber analysts and scholars predicted that an invasion would be accompanied by significant cyberattacks on Ukraine and possibly on Western nations supporting Ukraine, including particularly the US. For example, Maggie Miller wrote in Politico that “in a full-scale cyber assault [on Ukraine], Russia could take down the power grid, turn the heat off in the middle of winter and shut down Ukraine’s military command centers and cellular communications systems.”1 Samuel Charap of the RAND Corporation thought the most likely Russian response to Western economic sanctions would be a cyber operation that temporarily shut down some major Western banks. MORE

1 2 3 4 5 6 7 8 9 10 ... 39