. Military Space News .
Training A New Generation Of Cyber Strategic Leaders Part Four

Although decentralized, cyberspace remains dependent on the physical network of computer servers, fiber-optic cables and the immense system of cables that have been laid across the world's oceans.
by James Carafano | Eric Sayers
Washington (UPI) Feb 23, 2009
The U.S. government and armed forces need to develop the knowledge, skills and attributes required for cyber-strategic leaders. And that next generation of leaders needs to understand the cyber environment.

Beginning in 1988 with the infamous "Morris Worm" attack, cybersecurity has grown in importance along with the degree of reliability the United States and other nations have placed on the cyber domain.

The effectiveness of cyber warfare stems from its dynamic characteristics. In addition to low costs to entry, making it more attractive to terrorists and other non-state actors inclined to pursue low-end asymmetric strategies, the historical boundaries of warfare do not apply to the cyber realm.

Although decentralized, cyberspace remains dependent on the physical network of computer servers, fiber-optic cables and the immense system of cables that have been laid across the world's oceans. A familiarity with the physical aspects of cyberspace forms the foundation of a larger education on the topic.

The complexities of cyberspace begin with the distinction between its two existing theaters. First, the commercial Internet. Reserved for the day-to-day activities of the public and traditionally the target of non-state actors, the vulnerability of this theater has been magnified in the wake of the Estonia and Georgia cyberattacks that occurred in April and May 2007 and August 2008, respectively. Second, the military network.

Over the past two decades, as the military has attempted to enhance its war-fighting capabilities through network-centric warfare, an increased reliability on information technology has had the cumulative effect of ensuring a growing liability should the network fall under attack. Rebecca Grant has documented this development in her study "Victory in Cyberspace," published by the Air Force Association, October 2007, at http://www.afa.org/media/reports/victorycyberspace.pdf.

There are various types of actors who may pose a threat to the commercial and military cyber networks. First are the individuals acting on their own to exploit security gaps or commit cyber crimes, such as identify theft. These hackers are commonly referred to as "Black Hats."

Second, cyber terrorists attempt to manipulate the cyber environment to advance political or social objectives, as documented by James Jay Carafano and Richard Weitz in their paper "Combating Enemies Online: State-Sponsored and Terrorist Use of the Internet," Heritage Foundation Backgrounder No. 2105, Feb. 8, 2008, pp. 3-4, at http://www.heritage.org/Research/nationalSecurity/bg2105.cfm.

(Part 5: How Islamist hackers take advantage of the Internet to wage asymmetrical warfare against the West)

(James Jay Carafano, Ph.D., is assistant director of the Kathryn and Shelby Cullom Davis Institute for International Studies and senior research fellow for national security and homeland security in the Douglas and Sarah Allison Center for Foreign Policy Studies, a division of the Davis Institute, at the Heritage Foundation. Eric Sayers is a research assistant in the Allison Center for Foreign Policy Studies at the Heritage Foundation.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Resilience In The Face Of Sustained Cyber Attack Part Three
Washington (UPI) Feb 19, 2009
Efforts to safeguard the U.S. homeland tend to focus solely on the unrealistic task of protecting infrastructure. However, the politically charged "failure is not an option" approach to classify all infrastructure as "critical" is detrimental to prioritizing national security missions.







  • Analysis: NATO's limits in foreign affairs
  • Walker's World: Beijing and Obama
  • France in NATO: What would de Gaulle say?
  • Clinton wraps Asia trip by asking China to buy US debt

  • Top US lawmaker urges Italy's help on Iran
  • Japan, SKorea leaders vow to cooperate with US on NKorea
  • NKorea deploys missiles, bolsters troops: SKorea
  • Iran offered nuclear deal to stop Iraq troop attacks: BBC

  • NKorea could be ready to test fire missile in days: analysts
  • Boeing SLAM ER Scores Direct Hit In Land-Based Moving Target Test
  • Kremlin Intrigue And The Closure Of Kyrgyzstan Air Base
  • Iranian defence minister in Russia on missile quest

  • BMD Focus: Biden dances in Munich
  • BMD Watch: LM wins Aegis upgrade contract
  • Obama team urges Polish patience on shield
  • Does Missile Defense Discourage Nuclear Proliferation Part 14

  • Major airlines call for climate deal to include aviation
  • Swiss aircraft firm to cut jobs in Ireland
  • Bank of China extends massive credit to state aircraft maker
  • Shanghai Airlines seeks capital injection

  • MoD Police Try Out UAV
  • US drones are based in Pakistan: senator
  • AeroVironment Launches Production Of Its New Digital Data Link
  • Commentary: 'Wired for War'

  • Analysis: U.S. closing bases in Iraq
  • Obama decision on Iraq troops soon: US military
  • Military Matters: Election woes -- Part 1
  • Analysis: Boredom now U.S. troops' enemy

  • Taliban bombs made with British electronics: report
  • Further Interest In Australian Made Bushmaster
  • When Pigs Fly...With Ospreys
  • Raytheon Awarded Contract For Marine Corps Enhanced Thermal Imaging Program

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement