In the sixth week of CIS610 – Information Warfare, we continued looking at the policies, governance, and operation of nation state information and cyber warfare. Since week five and six were combined I had already completed the readings which were required for week five and six. Along with this in week five I also completed the discussion board post and the rough draft for the major assignment. Last week in my journal I discussed the discussion board post which I created and the reading assignment and chose to leave the major assignment out of my week five journal so I would have something to discuss in week six. The week five and six major assignment was one of the most involved assignment which we have done so far in CIS610 – Information Warfare. This assignment required the student to take all of the reading and information which throughout the past six week and create a 2000 word paper which compares and contrast the policies, guidance, and operations of the United States, Russia, and China in their quest for information dominance. I started this assignment by gathering the information sources which I was going to use for the paper. When …show more content…
The book “Conquest in Cyberspace” went in depth on the United States’, Russia’s, and China’s views on information warfare and cyber warfare. It also discussed the areas where their policies, guidance, and operations differ and are the same. One of the most interesting things which I noticed in the completion of this assignment is how the United States has the most well defined and in depth policies and governances regulating their information warfare and cyber warfare operations and how both China and Russia has taking the policies and governances created by the United States and mimicked them in the creation of their own policies and governances for information
The most recents detections of how cyber warfare is inevitably coming was the accusations of Russia hacking the the Democratic National Committee and former Secretary of State Hillary Clinton’s email’s releasing damaging evidence against them which ultimately lead to Donald Trump being named the President of The United States (Diamond, 2016). The effects of cyber warfare have leaked over in to televise series, forming shows such as CSI cyber, and the gaming world, Call Of Duty Infinite Warfare. Neglect regarding cyber security can: undermine the reputation of both the government and elected officials; force unacceptable expenditures associated with the cost of cleaning up after security breaches; cripple governments' abilities to respond to a wide variety of homeland security emergency situations or recover from natural or man-made threats; and disable elected officials' ability to govern (Lohrmann, 2010). Classified information such as overseas operators and attacks, missile locations, response plans and weaknesses, and much more cripples America’s ability to defend itself from enemies both foreign and domestic. To combat cyber terrorism is the Cybersecurity Information Sharing Act, or CISA. In an article titled “Why Cybersecurity Information Sharing Is A Positive Step for Online Security” it is discussed that under CISA, the Department of Homeland security will have more responsibility for domestic cybersecurity. CISA’s fundamental purpose is to better enable cybersecurity information to be shared between the private and public sectors (2016). The sharing of threat information between public and private sectors can give the the United States a head start by allowing them to share information rapidly and more often to combat enemy threats while still providing safety for privacy and civil
P.W. Singer and August Cole’s 2015 novel, Ghost Fleet, demonstrates how the American military’s trending dependence on high-tech, networked warfighting may be vulnerable to foreign near-peer and hybrid threats. Merging expertise from Washington-based foreign policy think tanks and defense technology sectors, the authors weave a fictional, yet plausible depiction of a near-future war featuring the United States, China, and Russia.
One of the most prevalent and effective systems used within the Marine Corps is the human resources system known as Marine Online (MOL). MOL was created to track Marines annual training, allow special requests such as leave, liberty, temporary duty assignments, personal time away from duty. MOL also gives Marines the ability to track carrier progression through annual reporting and rewards that are posted. The system includes promotion tracking and allows one to calculate physical training scores such as physical fitness training scores and combat fitness-training scores. The system allows Marines to track pay and leave in incremental amounts allowing one to view
Primarily, cyber security of the armed forces must be a priority of the United States. As the world becomes increasingly digital, the military must also adapt its ways. A new form of combat, hybrid warfare, has been effective in attaining political objectives without the conventional use of military power (Limnell). Hybrid warfare includes
In a documentary by Admiral Vern (2002), “the events of September 11, 2001 tragically illustrated that the promise of peace and security in the 21st Century is fraught with profound dangers”. The US foreign policies and interest in key geographic regions of the world sparks controversies resulting in state funded cyber attacks, cyber espionage and terrorism against the United States and its allied nations. When several attempts to cripple the United States and its allied nations through negotiations failed, enemy states and nefarious groups have shifted their focus to cyber attacks and cyber espionage. According to Gady (2016), “China continues cyber espionage against the United States”. Drezner (2014), “Washington and Beijing hardly agree on everything, but they agree on the big things, like maintaining an open global economy, reducing the likelihood of a military confrontation, and tackling climate change”.
The hawk perspective laid out by Colonel Jayson Spade in China’s Cyber Power and America’s National Security, focuses on American conventional military supremacy. Colonel Spade paints cyber tactics as tools to extend American military
General Clapper, the United States Director of National Intelligence, recently briefed the Senate Armed Services Committee on the worldwide threat assessment. His brief addressed the implications of technology on national security, and characteristics of the nation’s leading threat actors that include China, Russia, Iran, North Korea, as well as non-state actors. The entirety of the briefing demonstrates that the United States will face numerous increasingly complex national security challenges into the foreseeable future.
Today however, a new type of warfare has emerged and occurs when outside entities conduct an attack on a power grid, network, or both with the intent of causing damage. This type of warfare is called cyber warfare. In the United States computers control everything. It is no secret that hostile countries and terrorist organizations are cognizant and they know our economy, security, and infrastructure can be crippled by a successful cyber-attack. Examples of potential targets for cyber terrorists include military bases, water systems, banking facilities, air traffic control centers and power plants. Even the Commander in Chief, President Obama has stated the threat of a cyber war is real and we must prepare for it and increase our security measures. First, this paper will discuss cyberterrorism and cyber-attacks as they pose a direct threat to national security and the economy. Then, we will review cyber-attacks against the U.S. from China, Iran, and Russia along with the impact and possible ramifications from those attacks. Finally, this paper discusses U.S. strategies to minimize the impact of cyber-attacks.
Pfleeger, S. Pfleeger, and Margulies (2015) outline possible examples of cyber warfare between Canada and China (p. 844). According to Pfleeger, S. Pfleeger, and Margulies (2015), “the Canadian government revealed that several of its national departments had been victims of a cyber attack…” (p. 844). Eventually, the attack was unofficially traced to a computer in China (p. 844). Cyber warfare can be used negatively and positively. It is evident that China was seeking to gain protected information form Canada. Although a purpose of cyber warfare, it is not a conventional way of obtaining information. Additionally, cyber warfare can be used to collect intelligence on an enemy. Anyone seeking to gather intelligence on another individual or group can launch a cyber attack that gains access to protected files. This could be used to help future militant operations or expose critical information. Lastly, cyber warfare can be used to test systems internally. Acting with no malicious intent, “insiders” can utilizing cyber warfare tactics to attack their own cyber security barriers in order to test the strength of their systems. Seeking to expose the vulnerabilities in a system that contains important assets without actually harming the assets provides the system a diagnosis of what needs to be strengths and fixed. Identifying the problem or threats before an actual attack can ultimately save the protected
On October 31, 2010, The United States Cyber Command (USCYBERCOM) achieved Full Operational Capability becoming a sub-unified command under the United States Strategic Command. As a newly formed armed forces command, USCYBERCOM was given the mission for centralizing cyberspace operations, organizing existing cyber resources and synchronizing the defense of military networks. In order to achieve this mission, prior Secretary of Defense, Robert M. Gates, directed the USCYBERCOM to focus on developing cyber capability and capacity via the DoD’s Cyber Strategy. The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen the United States cyber defense and cyber deterrence posture while building cyber capabilities
It was the dawn of a new day. Several weeks had passed following the onset of what used to be the Cold War. Even now it was difficult to grasp the fact it had only been a decade ago in which the world celebrated as a whole to the end of the Second World War.It was ironic once innocuous proxy war could escalate far beyond its initial magnitude, with potential to cause carnage and destruction on a gargantuan scale. Nobody would have expected an espionage war unrecoverable repercussions
Anti -access/area denial assets are expanding at a rapid rate as other countries and groups seek to prevent United States power projection globally. In previous conflicts, especially during the Cold War, the way for the U.S. to win was to utilize better technology and employ it to prevent the enemy’s maneuverability. During the cold war, the US had the advantage over the Soviet Union due to power projection of weapons; they developed a better strategy and understanding of the most likely avenues of combat on the battlefield, and intelligence technology that allowed better capabilities to determine the enemy’s capabilities. After the collapse of the Soviet Union, conventional means of intelligence collection was hindered by the drawdown of US military forces, mainly in Europe and other countries in Asia, and allowed US adversaries to obtain advanced technology. “This reduction of US military power projection in those regions has led to equaling the battlefield against future operations and puts the US at a disadvantage as the loss of major intelligence capabilities crippled its oversight in those particular regions .” It also weakens future intelligence gathering networks, possibly future operations, and impacts policymakers’ foreign policy decisions.
The nature of terrorist threat combined with technologies that facilitate globalization resulted in both the necessity as well as the capacity to wage war and conduct intelligence operations in a new
For thousands of years warfare remained relatively unchanged. While the tactics and weapons have changed as new methods of combat evolved, men and women or their weapons still had to meet at the same time and place in order to attack, defend, surrender or conquer. However, the advent of the of the internet has created a new realm of combat in which armies can remotely conduct surveillance, reconnaissance, espionage, and attacks from an ambiguous and space-less digital environment. Both state and non-state actors have already embraced this new realm and utilized both legal and illegal means to further facilitate their interests. What complicates cyber security further is as states attempt to protect themselves from cyber-warfare, private
The branches of the military, for a couple generations, have always been the Army, Navy, Air force, Marine Corps, and the Coast Guard; however, in an ever evolving digital world, the notion that outer space would be the next military front is being rapidly replaced by the idea that cyber space will be the next arms race. The United States has been defending attacks on their infrastructure day after day, night after night, when one hacker on one side of the world sleeps, another takes their place to attempt to compromise the US government. The motives may range from a political ‘hacktivist’ trying to prove a point, to an economic spy, trying to gain a competitive edge on its more upstart rivals, to an attempt to control the United States