8. Warfare Paper

462 Homework Assignment Week 12

Traditional warfare has always been fought in a particular area using conventional weapons such as soldiers, guns, planes, ships, etc. Rules are in place, though sometimes ignored, on how traditional warfare is to be fought and the conduct of the armies on how they are to behave in war. We fight for a reason and once that reason is completed the war is over.

Cyber warfare conducted in Cyber space is not done at a particular location that can be physically entered but is an attack on an enemy through space and the Internet. Cyber technologies are used to attack enemies or other countries by use of the Internet. Cyber warfare can be used to send commands to use physical weapons to destroy an enemy or it can be used to invade another country’s IT networks to plant virus or commands that can destroy their cyber capabilities or to steal information that we find useful in defending our resources. Sciarrone, 2007, describes cyber warfare as “using digital means to attack an opponent”.

There are many unknowns in a cyber operation. In a cyber operation there are 4 major components: Cyber situational awareness, cyber network operations, cyberwarfare, and Cyber support. These components can build on each other or work independently as needed. Situational awareness means that we have become aware of something through our intelligence gathering that needs to be watched or sometimes addressed. The information gathered here is disseminated so that those in top level positions can make decisions on desired outcomes. We need to gather enough information so we can determine if a threat is developing or is imminent. We also must ensure the information we gather is reliable or our reaction to these threats may be disastrous. Verification may be difficult as it is internet based but if we don’t have accurate information, we can make a deadly mistake.

Cyber network operation is the development, installation, maintenance and defend and protect of our network systems. Making sure that we have all the hardware, software and personnel to install and administer the network is vital. We have to have something to input the information that we have gathered to base decisions on.

Cyberwarfare is when we use our power to “detect, deter, deny, and defeat adversaries” (Ch. 12, PLE). All the intelligence gathering determines our responses to any threats that have been determined and then we act on those responses.

Cyber support supports the other components with “specialized coordination, synchronization, and integration” (Ch 12, PLE). Support helps to plug in the gaps as needed to keep the operations going.

Each of these components has a corresponding component in traditional warfare but the difference in each of these components has to do with how its administered. Traditional warfare usually requires people to carry weapons, drive tanks, fly airplanes to drop bombs or ships to fire missiles. Traditional warfare also requires intelligence gathering but that usually means you are observing operations or talking to people to know what’s going. The key is that it requires bodies, people to accomplish every step and to be in harm’s way. Cyber warfare is fought through the air and the operators are usually far from where the action is so the physical side of war is avoided. However, I think either way, the civilian population still is harmed and subject to the consequences of both.

References:

Mark Pomerleau, Top official says cyber operations are not just about the systems. October 20, 2021. Available at 
https://www.defensenews.com/cyber/2021/10/20/top-official-says-cyber-operations-are-not-just-about-the-systems/

Bush Center. Cyber Warfare: The New Front. Issue 6, Spring 2007. Available at: 
https://www.bushcenter.org/catalyst/modern-military/sciarrone-cyber-warfware.html

Cybercon 2021. Defense Dept. official on factoring in the human element of cyber operations. Available at:
https://www.armytimes.com/video/2021/11/15/defense-dept-official-on-factoring-in-the-human-element-of-cyber-operations-cybercon-2021/

PLE Cybersecurity Fundamentals: Ch. 12.