不要忘记人类_走向21世纪的进攻性网络战略

ID:54238

阅读量:0

大小:0.28 MB

页数:15页

时间:2023-04-09

金币:10

上传者:战必胜
Global Security Studies, Spring 2014, Volume 5, Issue 2
Don’t Forget the Humans: Toward a 21st Century Offensive Cyber Strategy
Mr. Josh M. Cartin
U.S. Army War College, DDE Class of 2014
U.S. Department of State
4170 AIT Taipei Place
Dulles, VA 20189
+886-933-192-451
josh@desertdragon.com
Abstract
As military competitors and allies alike explore military applications of cyberspace of increasing
scope and complexity, a debate rages in national security circles about cyber war: what might it
look like, whether one is imminent, and whether such a phenomenon is even possible, have
become topics of debate given characteristics that distinguish cyberspace from other warfighting
domains. This paper proposes two types of offensive cyber operation, instrumental and strategic,
and argues that strategic offensive cyber operations are a form of information warfare that aim
primarily to act upon adversary perceptions, which are fundamental to warfare as viewed as a
contest of wills. A close examination of recent cyber campaigns attributed to China yields a
nuanced understanding of from whence cyber operations derive their strategic potential. Such an
understanding will be critical if the United States is to leverage its current technological
advantage and imagine offensive cyber operations to maintain the initiative against able
adversaries whose own strategic traditions condition them for warfare that transcends the
physical into the information domain.
Key Terms: Information Operations, Warfare, China, Technology, Deterrence, Deception
Introduction
Recent public allegations of Chinese government sponsorship of intrusions into U.S.-
based government, military, and commercial information systems have prompted a flurry of
commentary, diplomatic activity, Congressional hearings, and at least one Presidential Executive
Order. (Obama, 2013) Discussion has settled on the realization that hostile actors have the
capability and motivation to erode U.S. military and commercial advantages by exploiting
American society’s ubiquitous reliance on cyberspace. The conclusion is that all segments of
society need to work together to reduce the vulnerabilities that make hostile exploitation
possible. (Wallace, 2013) With few exceptions, commentary has focused on defense and
resilience of information systems, necessary and worthy investments whether the malicious
actors are hostile states, criminal networks, “hacktivists,” or bored teenagers in a basement. The
concept of offensive cyber operations has been absent from most public discussion, with the
notable exception of presumed United States involvement in the 2009-10 Stuxnet worm attack
on Iran’s nuclear program. (Gross, 2011)
That the main perpetrator in recently revealed cyber attacks is China, the only perceptible
potential spoiler of U.S. global dominance, has however revived a debate that has been
simmering in national security circles for over a decade regarding the concept of “cyber war”:
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭