Cyber ThisCyber That So What.docx

上传人:b****8 文档编号:11462613 上传时间:2023-03-01 格式:DOCX 页数:18 大小:69.72KB
下载 相关 举报
Cyber ThisCyber That So What.docx_第1页
第1页 / 共18页
Cyber ThisCyber That So What.docx_第2页
第2页 / 共18页
Cyber ThisCyber That So What.docx_第3页
第3页 / 共18页
Cyber ThisCyber That So What.docx_第4页
第4页 / 共18页
Cyber ThisCyber That So What.docx_第5页
第5页 / 共18页
点击查看更多>>
下载资源
资源描述

Cyber ThisCyber That So What.docx

《Cyber ThisCyber That So What.docx》由会员分享,可在线阅读,更多相关《Cyber ThisCyber That So What.docx(18页珍藏版)》请在冰豆网上搜索。

Cyber ThisCyber That So What.docx

CyberThisCyberThatSoWhat

DISTRIBUTIONA:

Approvedforpublicrelease;distributionisunlimited.

Published:

1March2010

Air&SpacePowerJournal-Spring2010

CyberThis,CyberThat...SoWhat?

MajEricD.Trias,PhD,USAF

CaptBryanM.Bell,USAF

 

Youhavetoknowthepasttounderstandthepresent.—CarlSagan

Revolutionsinwarfarerarelytakeplaceinone’slifetime.Rather,anevolutionbasedontheinnovativeuseofavailabletechnologyandhumaningenuitysteadilyoccurs.1Istheubiquityofcyberspaceoperationsandtechnologysucharevolution?

Perhaps.However,anyrevolutionshouldnotcompelustoleavebehindlessonslearnedfromtheagebeforecyberspace.Assiduousstudentsofwarfarewillstillfindthatbooksonmilitaryhistory,theoriesofwar,doctrines,andpublicationsonpastconflictsareinvaluable.CyberspacedoesnotchangetheprinciplesofwarorthetenetsofairpowerfromtheAirman’sperspective.Atanevenmoregranularlevel,onlyminorchangesarerequiredtotheUSAirForce’sairandspace(andcyberspace)functions.

WhenthechiefofstaffandsecretaryoftheAirForceaddedcyberspacetotheservice’smissionstatementinDecember2005,itbecamepowerfullyclearthattheAirForcewasseriousaboutitsroleinprovidingcapabilitiesincyberspaceoperationstothejointfight.2Asaresult,theAirForcecommunity,alongwithitscounterpartsinotherservices,hasbeenbusydevelopingsupportingdocumentsandguidancetodefineandfocuswhatthefledglingmissionareameanstotheforce.Cyberspaceiseverywhereweturn;itisanessentialpartofourdailymissionandactivities.However,wemustrememberthatourfundamentalfunctionsasanAirForcehavenotchanged.

Thisarticleendorsestheideathatcyberoperationsmaybeconductedinallwar-fightingdomains:

air,space,cyberspace,land,andsea.Inaddition,despitetheimmaturityofcyberspaceoperationaldoctrines,thedoctrinesfromairandspaceremainrelevantandapplicabletothecyberspacedomain.Cyberoperationsarejustanothersetoftoolsinthecommander’stoolbox.Althoughcyberoperationshavedistinctwaysofachievingeffects,fromanAirForceperspectivetheyaresimilartootherairandspaceoperationsthatsupportairandspace(andcyberspace)functions.Knownandestablishedcyberoperationsprovidewarfighterswithviableoptionstokineticmeans.Thisarticlehighlightstheroleofcyberoperationsinsupportingtheairandspacefunctions.

Lastly,weaddanewfunction,countercyberspace,tothe17AirForcefunctions(seetable).PastAirForcedoctrinehasuseddifferentnomenclaturebuthasnotmadetheimportanceofcountercyberspacecompletelyclearuntilrecently.Forthisreason,thenewfunctionnecessitatesadjustmentstotheexistinginformationoperations(IO)functiontoaccountforduplication.Byshowingthatcyberoperationsarejustanothersetoftools,wecanintegratepreviouslydefinedsupportingoperationsinaninitialdevelopmentofcyberspaceoperationsdoctrine.Eventually,amoreconcreteAirForcecyberspacedoctrinewillevolveasprescribedbylessonsfromhistoryandfutureevents.

Doctrineisanintegratedcollectionoflessonslearnedfromexperiments,exercises,andpastengagementsthatweacceptasthebestpracticesforconductingwarfare.3Stillintheirinfancy,cyberspaceoperationsconsequentlylackthehistoryofexperiencevitalforestablishingsounddoctrinalstatements.Dr.DavidLonsdaleremarkedthat“newordevelopingmethodsofwarfarerequiredoctrinalandtheoreticaldevelopment[that]shouldbegroundedin,andinformedby,experience,historicalknowledge,andtheworkoftheuniversaltheorists,mostespeciallyCarlvonClausewitzandSunTzu.”4AirForcestrategistsarestrugglingtocreatedoctrinalprinciplesforcyberwarfareintheformofAirForceDoctrineDocument(AFDD)2-11,“CyberspaceOperations,”nowseveralyearsindraft.However,wemustbecarefultoderivecyberdoctrineandstrategyfromtheprovenmethodsofpreviousdocumentsandmustexaminehowwecanemploycyberspaceoperationsinsupportofAirForcefunctions.

TheAirForcefunctionsdefinedinAFDD1,AirForceBasicDoctrine,arethosespecificresponsibilitiesthatenabletheservicetofulfillitslegallyestablishedrolesasnotedinTitle10,UnitedStatesCode,section8013.Theoperationalfunctionslistedinthetablearethe“broad,fundamental,andcontinuingactivities”ofair,space,andcyberspacepower.5“TheyarenotnecessarilyuniquetotheAirForce...buttogethertheydorepresent”howtheservicefulfillsitsassignedmissions.6Thefollowingsectionsaddresseachoftheairandspacefunctions,discussinghowcyberspaceoperationscanprovidethesameeffectsandserveastheappropriatefoundationforcyberspacedoctrine.

Table.AirForceair,space,andcyberspacefunctions

Function

GeneralDefinition

AirandSpaceExample

CyberTasks

StrategicAttack

Systematicapplicationofforceagainstenemycentersofgravity

Destroyingleadership,power,andcommunicationhubs

AttackonsupervisorycontrolanddataacquisitionandInternettraffic

Counterair,Counterspace,Counterland,Countersea

Operationsconductedtoattainandmaintainadesireddegreeofsuperioritywithinadomainwhiledenyinganadversaryuseofthatsamedomain

Airinterdiction,closeairsupport,suppressionofenemyairdefenses,jammingsatelliteup/downlinkfrequencies

Manipulatingdatabases,images,power/controlsofaweaponsystem

InformationOperations

Actionstosupportcommanders’abilitytoassesstheoperationalenvironmentandenhancetheirobserve-orient-decide-actloop

Influenceoperations,electronicwarfare,militarydeception,counterintelligence

ManipulationofWebcontent,e-mail“leaflets”

Airlift,AirRefueling,Spacelift

Activitiesthatextendthereachofpersonnelandmaterielinordertoproviderapid,functional,flexible,timely,andresponsiveoptions

Intratheaterairlift,operationalsupportairlift,deploymentlaunch

Messaginge-mail,Webpages,remotenetworkadministration

Intelligence,SurveillanceandReconnaissance

Activitiesthatcontributetothecreationoftheintelligencepreparationofthebattlespaceinordertoprovidecommandersdetailedknowledgethathelpsthembetterunderstandandknowtheenemy

U-2s,remotelypilotedaircraft,nationalassets,humanintelligence

Searchengines,networkenumeration,honeypots,packetsniffing

SpecialOperations

Operationsthatusemobilityindeniedterritory,surgicalfirepower,andspecialtacticstoconductlow-visibility,covert,orclandestinemilitaryactions

Specialreconnaissance,psychologicaloperations,counterterrorism

Addressmasking,Internetcafes,botnets

CombatSupport,CommandandControl,CombatSearchandRescue,NavigationandPositioning,WeatherServices

Actionsthatenablethewarfightertofocusonandsuccessfullycarryoutthoseoperationsrelatedtotheabovefunctions

Aircraftmaintenance,airandspaceoperationscenter,globalpositioningsystemsatellites,NationalOceanicandAtmosphericAdministrationsatellites

Net-centricoperations,commandandcontrol,andnetworkterrainpackets

Countercyberspace

Operationsconductedtoattainandmaintainadesireddegreeofcyberspacesuperioritybydestroying,degrading,denying,deceiving,disrupting,orexploitingtheenemy’scyberspacecapability

Bombingserverbuildings

Softwareexploits

DerivedfromAirForceDoctrineDocument1,AirForceBasicDoctrine,17November2003,39–58,http:

//www.dtic.mil/doctrine/jel/service_pubs/afdd1.pdf(accessed8December2009).

StrategicAttack

Thegoalofstrategicattackistoapplyforcesystematicallyagainstenemycentersofgravityinordertoproducethegreatesteffectfortheleastcostindollarsandlives.7AsillustratedbyColJohnWarden’sfivestrategicrings,thesecentersmaybematerial(infrastructure)ornonmaterial(populacesupport)innature.Hefurtheradvocatesattackingthethreeelementsofcommand—informationgathering,decisionmaking,andcommunication(e.g.,bombingIraq’scommunicationsinfrastructureduringOperationDesertStorm,asshownonCableNewsNetwork).8

Thecyberspacedomainprovidesadversariesanewenvironmenttoconductoffensiveanddefensiveoperations.Inaddition,cyberoperationsofferthemeanstoexpediteotheroperationalfunctionspreviouslyconductedthroughotherdomains.“Intheefforttoinfluence—whetherfocusedonanindividual,anorganization,oranentiresociety—cyberspaceisakeyoperationalmediumviawhich‘strategicinfluence’isconducted.”9However,consideringmodernorganizations’andnations’dependenceontheworld’scyberspaceinfrastructure,newsourcesofvulnerabilitiesaretemptingtargetsforstrategicattack,especiallyfromanasymmetricformofwarfare.

Overthepastfewyears,theabilitytousecyberoperationsasanavenueforstrategicattackhasbecomeevident.In2007theIdahoNationalLaboratoryfortheDepartmentofHomelandSecuritysimulatedacyberattackonatestpowerstation.ThesimulationdemonstratedanexploitationofasoftwarevulnerabilityinSupervisoryControlandDataAcquisition(SCADA)systems,thecomputersystemsthatcontrolelectric,water,andchemicalplantsthroughouttheUnitedStates.Designedwithminimalsecurityprotection,manyofthesesystemsremainvulnerabletocyberattacks.EventerroristorganizationsareinterestedinthevulnerabilitiesofstrategicsystemslikeSCADA.10ExamplesincludethevirtualshutdownoftheEstoniangovernmentviaitsInternetinfrastructureandtheRussian/Georgianconflictof2008,duringwhichRussianmilitaryforcesorchestratedawaveofcyber-relatedoperationsagainstGeorgiapriortoaninvasion.Coordinatedthrough

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 法律文书 > 起诉状

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1