ARTICLES

April 7, 2023

Establishing the Conditions of Engagement with Machines

We begin our discussion of “autonomy” with its Western meaning for the hu¬man individual: “to be autonomous is to govern oneself, to be directed by considerations, desires, conditions, and characteristics that are not simply imposed externally upon one.” Autonomy is “the capacity to impose upon ourselves, by virtue of our practical identities, obligations to act.”1 Similarly, extending au¬tonomy to machines is a partial release from external control that comes with obligations to act. That’s the easy part. Until the last decade, machines with no human in the loop had very limited repertoires of actions they could take, turning on the pump when they detected the water was rising. From that set of inherent constraints came reliability and understandability. As is obvious, we are transiting an inflection point where machines are gaining trained reasoning capac¬ity that can allow problem-solving without a human in the loop. Even the training can be self-administered: the autonomy of self-modification.

April 7, 2023

Leadership in the Digital World

Welcome to the Spring CDR. We proudly announce that the CDR has a new home with the West Point Press. This reorganization aligns with the vision of the 15th Dean of the Academic Board, BG Shane Reeves, for West Point to be “the intellectual engine of the Army.” At the unveiling of the West Point Press in January 2023, BG Reeves asserted, “Our faculty and cadets are conducting re¬search that impacts some of the Nation’s toughest problems and most pressing issues … producing scholarship [with] major impacts across academia, the Army, and the world.” The CDR will continue its special relationship with the Army Cyber Institute (ACI) at West Point.

Nov. 14, 2022

The Only Constant is Change…

The ancient Greek philosopher Heraclitus is credited with the quote “The only constant in life is change.” While Heraclitus was certainly not thinking of cyberspace or modern technologies, it occurs to me that he may have been onto something with respect to the larger world of cyber related issues as we have seen continual evolution since the founding of the Army Cyber Institute (ACI) at West Point. This Fall marks ten years since the creation of the ACI by the Secretary of the Army, John McHugh, and the Chief of Staff of the Army, General Raymond Odierno, in 2012 to serve as “a national resource for research, advice, and education in the cyber domain, engaging military, government, academic, and industrial cyber communities in impactful partnerships to build intellectual capital and expand the knowledge base for the purpose of enabling effective Army cyber defense and cyber operations.”

Nov. 14, 2022

Better Anticipating and Managing Today’s Growing Cyber Risks

We live in an increasing cyber enabled world where more of our lives are monitored, assessed, and controlled by forces and decisions that function largely in the background and with little appreciation for the risks that we assume as a result. Absent fundamental rethinking as to how we incorporate Information Age technologies into the fabric of our daily lives, we will increasingly find ourselves reaching a point of no return as more complex technologies such as AI and greater ubiquity of cyber technologies inherent in the Internet of Things (IoT) continue to proliferate in cyberspace. To manage these technologies, we still rely on organizations and processes rooted in the 18th century to confront threats that move across the globe in milliseconds. It is no wonder that we find ourselves in a defensive battle and in a position of great disadvantage.

Nov. 14, 2022

Russian Cyber Operations in the Invasion of Ukraine

In March 2021, Russia began to deploy large numbers of troops and armaments near the Russia-Ukraine border in what Western observers believed posed an invasion threat to Ukraine, which Russia strongly denied. An intense debate in the West ensued over whether the troops were being deployed to pressure Ukraine into making political concessions or to conduct an actual invasion. Noting previous Russian offensive cyber operations against Ukraine starting as early as 2014, many cyber analysts and scholars predicted that an invasion would be accompanied by significant cyberattacks on Ukraine and possibly on Western nations supporting Ukraine, including particularly the US. For example, Maggie Miller wrote in Politico that “in a full-scale cyber assault [on Ukraine], Russia could take down the power grid, turn the heat off in the middle of winter and shut down Ukraine’s military command centers and cellular communications systems.”1 Samuel Charap of the RAND Corporation thought the most likely Russian response to Western economic sanctions would be a cyber operation that temporarily shut down some major Western banks.

Nov. 14, 2022

Tactics and Technicalities Undermining Strategy: Cyber Security is Distracting National Security Communities

National security communities cannot protect all their information. Yet the exigencies of cyber security and identified network vulnerabilities are trumping more strategic consideration of information protection, and national security communities have found it difficult to adhere to clear and defensible information protection principles. A more strategic approach would focus on identifying and prioritizing the most important organizational information; a defense that aligns information security resources to the most important information, with a clear view of the actions needed to protect against the intelligence capabilities of strategic competitors; and, established mechanisms for situations when preventive security measures will so often fall short, which include standing deception plans and well-coordinated reparative measures. Without defensible principles, the immense cyber security investments being made will not have the desired information security effect.

Nov. 14, 2022

Cyber-Physical Coordinated Attacks: The Emerging Complexity of Crisis Management

It is conceivable and probable that today’s adversaries have contemplated and recruited for event scenarios in which a physical crisis is pre-ignited by a series of more carefully orchestrated cyber incidents. As extremist groups grow bolder and attract younger more technology-astute prospects, there will be a convergence where both logical and physical attacks methods are used in concert towards a singular goal. These will be much more complex and targeted than the typical diversionary tactics we are prepared for today. This new breed of threat is multi-modal; it takes advantage of the operational silos between organizations, whether those are departments within a corporation, supply chains or competitors across an industry, regional government agencies across a nation, or multiple governing nations across a global coalition. Planning such complex executions requires extremely intimate knowledge of the disparate targets and their relationships.

Nov. 14, 2022

The Impending Data Literacy Crisis Among Military Leaders

You would be hard pressed to find a room full of office typists in any present-day corporate setting. Office typists (who reached an apex in the mid-20th century) employed fast typing skills, a mastery of language and grammar, and the ability to take real-time dictation through shorthand.1 However, with the advent of personal computers and email, the speed of business required leaders to improve their own typing and communication skills. Those that embraced these skills quickly outperformed those that failed to adapt. Today, office typists are obsolete; their skills are now integral to everyone in an organization. Similarly, today’s business leaders rely on teams of data scientists to manage, analyze, and model large amounts of data to inform decisions. Will data scientists one day sustain a fate similar to office typists? It may be too early to make such a prediction. Nonetheless, to compete in the near-future global market, leaders–military and civilian alike–will need to adapt these skills and become data literate with deep knowledge of data capabilities.

Nov. 14, 2022

Contract AI Risk Engine (CARE) to Reduce Cyber Contracting Risk

The Fiscal Year 2019 National Defense Authorization Act (NDAA) established the National Security Commission on Artificial Intelligence (NSCAI) to consider the methods and means necessary to advance development of artificial intelligence (AI), machine learning (ML), and other associated technologies to address America’s national security concerns. NSCAI’s final report to the President and Congress identified areas of weakness that the federal government must address to elevate data security as a national security priority. NSCAI recommended the federal government implement a security development lifecycle approach for AI systems, prioritize data privacy and security considerations as part of larger efforts to strengthen foreign investment screening and supply chain intelligence and risk management, and integrate national security considerations into efforts to legislate and regulate data protection and privacy.

Nov. 14, 2022

Leveraging the Ontology of the Operational Cyber Mission Stack (OCMS)

This article aims to identify and clarify a hierarchical construct used by defensive cyberspace planners and operators to aid in mission decomposition, assurance, and terrain mapping. The model enables the visualization of complex relationships and equities between cyberspace assets, resources, and warfighting missions. At a time when so many Department of Defense mission-essential tasks and functions are cyber enabled, it is more critical now than ever that we strive to model the highly complex cyberspace operational environment in an understandable and useful way. Modeling is a practical means to take logical components of cyberspace, tether them to physical assets, and illuminate how they ultimately support missions. We can then prioritize mission-critical systems and capabilities, organize the defense of those cyberspace elements, and gain confidence we are defending the right things at the right time. While this model is conceptual, it represents a first step toward automating cyberspace terrain mapping that will enable defensive cyber planners and DODIN Cyberspace Forces to respond to the dynamic, man-made terrain that makes up the cyber operational environment.