An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

The Cyber Defense Review

Articles

1 ... 4 5 6 7 8 9 10 11 12 13 ... 39

Three Conditions for Cyber Countermeasures

August 16, 2022 — This article explores a variety of opportunities and challenges with the use of cyberspace countermeasures. It critically assesses a set of conditions under which countermeasures can be an appropriate means of offensive cyber: limited aim of defense and deterrence, protection of critical infrastructure, and compliance with rules of behavior. Here, the article shows that countermeasures must be taken for the purpose of active defense and deterrence. Second, they can be appropriate as a means of defending critical infrastructure. Finally, they should be executed by state actors who comply with existing principles of cyberspace behavior. While cyberspace countermeasures can become a socially accepted, legitimate means of active defense and deterrence, the article shows that there are several challenges connected with each of these conditions. For one, there are various degrees of feasibility about what conditions are appropriate for countermeasures. The article also discusses inherent problems in the application of international law, from which rules of engagement are drawn, to cyberspace. The challenges are hard to solve, which may explain why it has been so difficult for the international community to produce a set of agreeable criteria for active defense measures. MORE

The Future of Cyber Conflict Studies: Cyber Subcultures and The Road to Interdisciplinarity

August 16, 2022 — This article has two aims: first, to examine the future of cyber conflict studies and how the study of cyber security can develop in a more interdisciplinary way; second, to assess the meaning of “offensive” and “defensive” cyber security from the perspective of a variety of different academic disciplines. The article argues that a more holistic and nuanced understanding of cyber offence and defence can be achieved if some of the intellectual silos and disagreements that have characterised the debate so far can be deconstructed and overcome. The article is in three parts. The first section briefly outlines some of the definitional fog that has plagued the cyber security discipline, including over what constitutes cyber offense and defence. The paper then summarises four different subcultures of cyber conflict studies that understand and study cyber security in different ways: International Relations (IR), Political Psychology, International Law, and Computer Science. The concluding section discusses how the cyber conflict studies discipline can move forward, be made more rigorous, and less prone to pathology and dead ends, including through the formation of a cohesive but heterogenous epistemic community. MORE

The Failure of Offense/Defense Balance in Cyber Security

August 16, 2022 — The idea of offensive advantage dominates the cyber security field, a framework originating from research on the offense/defense balance in conventional warfare. The basic theory is that the balance of offensive and defensive forces determines what kind of strategy will be most effective. The field of cyber security consistently tries to build on offense/defense balance frameworks with little awareness of the inherent problems of the theory. If the offense is dominant, then the defense would supposedly never win against an aggressive adversary due to the compounding nature of failure. The only solution would be going on the offensive in return. This article identifies three core problems with applying the offensive/defensive balance to cyberspace: (1) the inability to distinguish between the two frames, (2) the failure to understand the impact of perceptions, and (3) the inaccuracy of measurement. The pathology of offensive advantage and being under siege as a defender can only continue to lead to strategic malaise and constant attacks as the defender fails to shore up vulnerabilities due to the mistaken belief in the ascendancy of the offense. MORE

Winning Future Wars: Russian Offensive Cyber and Its Vital Importance

August 16, 2022 — This article highlights the importance of offensive cyber as an instrument for Russia to generate strategic effect against NATO and its core states. It focuses on the use of offensive cyber by the Russian military at the strategic level. This military is perceived to be the lead actor in the operationalization of offensive cyber by Moscow. Because the Russian military sees itself at an overall disadvantage vis-à-vis NATO’s conventional capabilities, it is offensive cyber that it is looking to provide a means of fundamentally redressing this imbalance. Offensive cyber is a vital tool for the Russian armed forces. It is indeed viewed as being the only available instrument that can, short of the use of nuclear weapons, bring about the neutralization of core NATO states; that is, to defeat them. This neutralization can be engendered, according to Russian military logic, in two ways: either through cyber-psychological or cyber-technical attacks. This article unpacks these terms and indicates how both can theoretically generate the degree of impact that could lead to the neutralization of core NATO states. Finally, there will be a review of the Russian use of offensive cyber in the Ukraine conflict. MORE

The Cyber Defense Review: So…Anything Interesting Going On?

May 17, 2022 —

As I read through the Spring CDR, I found that the war in Ukraine was on my mind and that I analyzed the articles through that lens. During my reading of each article, I kept asking myself the following:

  • How does this relate to the current and evolving situation in Ukraine?
  • Is Ukraine validating many of our assumptions of modern, multi-domain operations?
  • Or is it a return to more traditional/conventional warfare?
  • Finally, how are other adversaries, such as China, leveraging the situation to their own benefit?

While not written with Ukraine in mind, I think you’ll find many relevant articles in this issue that highlight the need for continued thought leadership in cyberspace, which plays a crucial role in current and future competition and conflicts.

MORE

Cyber Crime and Geostrategic Clash Over the Internet

May 17, 2022 — Over the past two decades, global society has shifted significant portions of its social and economic activities online. In the US alone, Internet Association experts estimate that Internet-based commerce accounted for about $2.1 trillion, or 10% of GDP, in 2019. With this rise in economic and social activity, the world has witnessed a dramatic rise in cyber-attacks, mostly by criminal actors seeking to steal assets, defraud victims, and ransom decryption keys. One expert projects that by 2025, worldwide cyber-crime losses will reach a staggering $10.5 trillion, making cyber-crime—were it a country—the world’s third largest economy. For victims, the harm includes not only the cost of cleanup, but the loss of tangible assets such as stolen funds and fraudulent credit card charges, as well as harder-to-quantify figures for businesses that shut down operations or lose valuable intellectual property that finds its way into competitors’ hands. Thus, the consequences for business owners and everyday citizens are severe. Yet progress in stemming the flow of cyber-attacks in the US seems stymied. The White House’s 30-nation meeting on ransomware in October 2021 was a promising initiative, but lacked any mention of private-sector active defense measures. As noted in the 2016 "Into the Gray Zone" report co-authored by ADM Dennis Blair, one of this article’s authors, the US must take active steps not only to protect networks, but also to hunt down threat actors. Doing this at scale will require robust private sector participation. This article suggests one way to achieve this. MORE

Conceptualizing Cyberspace Security Diplomacy

May 17, 2022 — At a time when crippling ransomware incidents have drawn awareness to the risks of cyberattack as perhaps never before—and in which cyber criminals often enjoy toleration and a symbiotic relationship with the government in safe haven jurisdictions such as Russia—cybersecurity and cyber defense are topics of critical importance. In response to these threats, government officials and private cybersecurity experts alike seek effective responses, which increasingly involves cybersecurity-focused diplomatic engagement. This article offers a tentative framework for conceptualizing this challenge and developing more systematic approaches for cybersecurity policy interventions that will support and facilitate cyber diplomacy. MORE

America’s Cyber Auxiliary: Building Capacity and Future Operators

May 17, 2022 —

As the proliferation of cyber threats continues and the complexity and number of online systems grows, the need for updated cyber defenses to appropriately combat the threat will continue to expand into the future. The public and private sectors both heavily rely on accessing and using secure networks. The requirements for defense already outstrip the current capacity the US government has and needs reinforcement.

A cyber auxiliary can provide several ways to augment our cyber defense capacity. Education programs can equip the population with skills and awareness to serve as a solid front-line defense. A cadet program could enhance the educational approach and expose a larger population to in-depth knowledge of cyber defense and network operations, building a cadre for the future. Adult auxiliary members can add capacity to current cyber-defense organizations and be critical actors in aiding civil defense and even DoD. Much like the change in warfare observed during and after World War I, cyberspace is changing and growing. It is time to recognize both the environmental shifts and the opportunities available to the nation to get ahead of the coming cyber tsunami.

MORE

AI, Super Intelligence, and the Fear of Machines In Control

May 17, 2022 —

The advent of Big Data is decades old, and the citadels built atop its resources have redefined the landscape, shifting the power balance away from governments and into the gray area between the public and private sectors. Regulatory systems have yet to keep pace. Power has come not so much from the collection, ownership, or acquisition of data, but more from the ability to direct them into strategic assets. The combinations of what you know and who knows what will become the next decade’s most valuable commodities, with those resting on fractured and ineffective decision-making systems losing the competitive battle.

However, it’s important to avoid the superstition of superintelligence, waiting for - or fearing - the day that the machines awaken and take control. The ultimate battle will not be between humans and machines. The battle will be hybrid means and those harnessing the power of true human·machine collaboration will come out on top, thereby achieving true organizational intelligence. This article addresses the foundations of organizational intelligence, and how to navigate the shifting sands and strengthen one’s financial and reputational position within global power dynamics.

MORE

Information as Power: Evolving US Military Information Operations

May 17, 2022 —

The 2016 Presidential election that brought Donald Trump to the White House was a turning point in US policies and attitudes toward Internet governance. The discovery of organized Russian influence operations combined with the unexpected election result, led to a fundamental reappraisal of the security implications of the content flowing over global social media. Once seen as a realm of civil society subject to communications or technology policy, social media exchanges are now perceived by many as an arena of geopolitical conflict. The US, many claimed, was engaged in information warfare in a way that implicated national security. This article explores the consequences of the changing perception of Internet content for US military doctrine regarding Information Operations (IO) and the US approach to Internet governance. The article seeks to answer the following two research questions (RQ):

RQ1: What changes in US military organization, policy, doctrine, and practice regarding IO took place after 2016?

RQ2: Are the post-2016 US military organizational structures, doctrines, policies, and practices eroding the distinction between liberal-democratic and authoritarian political systems regarding free expression on the Internet?

MORE

1 ... 4 5 6 7 8 9 10 11 12 13 ... 39