Strategic A2/AD in Cyberspace

Strategic A2/AD in Cyberspace

Author: Alison Lawlor Russell

Publisher: Cambridge University Press

Published: 2017-02

Total Pages: 111

ISBN-13: 1107176484

DOWNLOAD EBOOK

This book examines how exclusion from cyberspace is possible and explores ways that states can respond to this threat.


Strategic A2/AD in Cyberspace

Strategic A2/AD in Cyberspace

Author: Alison Lawlor Russell

Publisher: Cambridge University Press

Published: 2017-02-01

Total Pages: 111

ISBN-13: 1316820262

DOWNLOAD EBOOK

Strategic A2/AD in Cyberspace focuses on exclusion from cyberspace, or the ability of a state to be cut off entirely from cyberspace. Strategic anti-access and area denial (A2/AD) operations are common in other domains, but, before now, they have not been examined for their relevance to cyberspace. This book examines how strategic A2/AD operations can cut off states from cyberspace through attacks at either the physical or logic layers of cyberspace. The result of strategic cyber A2/AD operations could be catastrophic for modern economies, governments, military forces, and societies, yet there has been surprisingly little study of these threats to states' access to cyberspace. This book examines the implications of strategic cyber A2/AD operations for deterrence strategy and proposes a new view of how exclusion from cyberspace can be used as a coercive tool in diplomacy.


Bytes, Bombs, and Spies

Bytes, Bombs, and Spies

Author: Herbert Lin

Publisher: Brookings Institution Press

Published: 2019-01-15

Total Pages: 440

ISBN-13: 0815735480

DOWNLOAD EBOOK

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country’s attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called “digital combat power” and how the United States should incorporate that power into its national security strategy.


Cyber Operations and International Law

Cyber Operations and International Law

Author: François Delerue

Publisher: Cambridge University Press

Published: 2020-03-19

Total Pages: 545

ISBN-13: 1108490271

DOWNLOAD EBOOK

This book offers a comprehensive overview of the international law applicable to cyber operations. It is grounded in international law, but is also of interest for non-legal researchers, notably in political science and computer science. Outside academia, it will appeal to legal advisors, policymakers, and military organisations.


Joint Operational Access Concept (JOAC)

Joint Operational Access Concept (JOAC)

Author: U. S. Military

Publisher:

Published: 2018-03-28

Total Pages: 79

ISBN-13: 9781980685548

DOWNLOAD EBOOK

This is a reproduction of an important Department of Defense (DOD) strategy document describing in broad terms how joint forces will operate in response to emerging antiaccess and area-denial security challenges. From the foreword by Martin Dempsey: Due to three major trends - the growth of antiaccess and area-denial capabilities around the globe, the changing U.S. overseas defense posture, and the emergence of space and cyberspace as contested domains - future enemies, both states and nonstates, see the adoption of antiaccess/area-denial strategies against the United States as a favorable course of action for them. The JOAC describes how future joint forces will achieve operational access in the face of such strategies. Its central thesis is Cross-Domain Synergy-the complementary vice merely additive employment of capabilities in different domains such that each enhances the effectiveness and compensates for the vulnerabilities of the others-to establish superiority in some combination of domains that will provide the freedom of action required by the mission. The JOAC envisions a greater degree of integration across domains and at lower echelons than ever before. Embracing cross-domain synergy at increasingly lower levels will be essential to generating the tempo that is often critical to exploiting fleeting local opportunities for disrupting the enemy system. The JOAC also envisions a greater degree and more flexible integration of space and cyberspace operations into the traditional air-sea-land battlespace than ever before. Each Service has an important role in ensuring Joint Operational Access. The JOAC was developed by representatives from each of the Services and the Joint Staff in coordination with the combatant commands, multinational partners, and other stakeholders. The JOAC development was supported by an experimentation campaign including a multi-scenario wargame, multiple Service-sponsored events, and other concept development venues. The strategic challenge is clear: the Joint Force must maintain the freedom of action to accomplish any assigned mission. The Joint Operational Access Concept is a critical first step in ensuring the joint force has the requisite capabilities to do so. This paper proposes a concept for how joint forces will achieve operational access in the face of armed opposition by a variety of potential enemies and under a variety of conditions, as part of a broader national approach. Operational access is the ability to project military force into an operational area with sufficient freedom of action to accomplish the mission. Operational access does not exist for its own sake, but rather serves our broader strategic goals, whether to ensure access to commerce, demonstrate U.S. resolve by positioning forces overseas to manage crisis and prevent war, or defeat an enemy in war. Operational access is the joint force contribution to assured access, the unhindered national use of the global commons and select sovereign territory, waters, airspace and cyberspace. Enduring requirement for force projection. Distinction between antiaccess and area-denial. Importance of preconditions.


Conventional Prompt Global Strike (PGS) and Long-Range Ballistic Missiles (BM)

Conventional Prompt Global Strike (PGS) and Long-Range Ballistic Missiles (BM)

Author: Amy F. Woolf

Publisher: DIANE Publishing

Published: 2011-08

Total Pages: 40

ISBN-13: 143794258X

DOWNLOAD EBOOK

Contents: (1) Intro.; (2) Background: Rationale for the PGS Mission; PGS and the U.S. Strategic Command; Potential Targets for the PGS Mission; Conventional BM and the PGS Mission; (3) Plans and Programs: Navy Programs: Reentry Vehicle Research; Conventional Trident Modification; Sub.-Launched Intermediate-Range BM; Air Force Programs: The FALCON Study; Reentry Vehicle Research and Warhead Options; Missile Options; Defense-Wide Conventional PGS: The Conventional Strike Missile; Hypersonic Test Vehicle; Army Advanced Hypersonic Weapon; ArcLight; (4) Issues for Congress: Assessing the Rationale for CPGS; Reviewing the Alternatives; Arms Control Issues. A print on demand report.


Thinking about Deterrence

Thinking about Deterrence

Author: Air Univeristy Press

Publisher: Military Bookshop

Published: 2014-09-01

Total Pages: 344

ISBN-13: 9781782667100

DOWNLOAD EBOOK

With many scholars and analysts questioning the relevance of deterrence as a valid strategic concept, this volume moves beyond Cold War nuclear deterrence to show the many ways in which deterrence is applicable to contemporary security. It examines the possibility of applying deterrence theory and practice to space, to cyberspace, and against non-state actors. It also examines the role of nuclear deterrence in the twenty-first century and reaches surprising conclusions.


Operationalising Deterrence in the Indo-Pacific

Operationalising Deterrence in the Indo-Pacific

Author: Ashley Townshend

Publisher: United States Studies Centre at the University of Sydney and Pacific Forum

Published: 2020-04-02

Total Pages: 28

ISBN-13: 1742104924

DOWNLOAD EBOOK

In an increasingly contested Indo-Pacific, the United States, Australia and their regional allies and partners face a myriad of strategic challenges that cut across every level of the competitive space. Driven by China’s use of multidimensional coercion in pursuit of its aim to displace the United States as the region’s dominant power, a new era of strategic competition is unfolding. At stake is the stability and character of the Indo-Pacific order, hitherto founded on American power and longstanding rules and norms, all of which are increasingly uncertain. The challenges that Beijing poses the region operate over multiple domains and are prosecuted by the Chinese Communist Party through a whole-of-nation strategy. In the grey zone between peace and war, tactics like economic coercion, foreign interference, the use of civil militias and other forms of political warfare have become Beijing’s tools of choice for pursuing incremental shifts to the geostrategic status quo. These efforts are compounded by China’s rapidly growing conventional military power and expanding footprint in the Western Pacific, which is raising the spectre of a limited war that America would find it difficult to deter or win. All of this is taking place under the lengthening shadow of Beijing’s nuclear modernisation and its bid for new competitive advantages in emerging strategic technologies. Strengthening regional deterrence and counter-coercion in light of these challenges will require the United States and Australia — working independently, together and with their likeminded partners — to develop more integrated strategies for the Indo-Pacific region and novel ways to operationalise the alliance in support of deterrence objectives. There is widespread support for this agenda in both Washington and Canberra. As the Trump administration’s 2018 National Defense Strategy makes clear, allies provide an “asymmetric advantage” for helping the United States deter aggression and uphold favourable balances of power around the world. Australia’s Minister for Defence Linda Reynolds mirrored this sentiment in a major speech in Washington last November, observing that “deterrence is a joint responsibility for a shared purpose — one that no country, not even the United States, can undertake alone.” Forging greater coordination on deterrence strategy within the US-Australia alliance, however, is no easy task, particularly when this undertaking is focussed on China’s coercive behaviour in the Indo-Pacific. Although Canberra and Washington have overlapping strategic objectives, their interests and threat perceptions regarding China are by no means symmetrical. Each has very different capabilities, policy priorities and tolerance for accepting costs and risks. Efforts to operationalise deterrence must therefore proceed incrementally and on the basis of robust alliance dialogue. To advance this process of bilateral strategic policy debate, the United States Studies Centre and Pacific Forum hosted the second round of the Annual Track 1.5 US-Australia Deterrence Dialogue in Washington in November 2019, bringing together US and Australian experts from government and non-government organisations. The theme for this meeting was “Operationalising Deterrence in the Indo-Pacific,” with a focus on exploring tangible obstacles and opportunities for improving the alliance’s collective capacity to deter coercive changes to the regional order. Both institutions would like to thank the Australian Department of Defence Strategic Policy Grants Program and the US Defense Threat Reduction Agency for their generous support of this engagement. The following analytical summary reflects the authors’ accounts of the dialogue’s proceedings and does not necessarily represent their own views. It endeavours to capture, examine and contextualise a wide range of perspectives and debates from the discussion; but does not purport to offer a comprehensive record. Nothing in the following pages represents the views of the Australian Department of Defence, the US Defense Threat Reduction Agency or any of the other officials or organisations that took part in the dialogue.


Silent Wars: Espionage, Sabotage, and the Covert Battles in Cyberspace

Silent Wars: Espionage, Sabotage, and the Covert Battles in Cyberspace

Author: Josh Luberisse

Publisher: Fortis Novum Mundum

Published: 2023-03-25

Total Pages: 154

ISBN-13:

DOWNLOAD EBOOK

Silent Wars: Espionage, Sabotage, and the Covert Battles in Cyberspace delves into the shadowy world of covert cyber conflict, that unfold beyond the public eye. Scrutinizing the intricate balance between espionage and assault, the author, Josh, disentangles the convoluted web of digital warfare, where the line between intelligence-gathering and outright attack blurs. Silent Wars navigates the intricate landscape of covert cyber operations, examining a multitude of cases that shed light on the diverse tactics and strategies employed by nations in this modern arena of intangible warfare. Through a meticulous analysis of case studies, military doctrines, and technical underpinnings, Josh unveils the striking reality that contemporary cyber operations, while seemingly groundbreaking, still embody the age-old essence of conflict waged through non-physical domains such as information space and the electromagnetic spectrum. Silent Wars breaks down the multifaceted nature of offensive cyber operations, emphasizing the stark contrasts between various forms of cyberattacks. From the painstakingly slow and calculated infiltrations that demand unwavering discipline and patience, to the fleeting strikes designed to momentarily disrupt the adversary's tactics, Silent Wars scrutinizes the full spectrum of digital offensives. Venturing into the clandestine strategies of prominent state actors such as the United States, Russia, China, and Iran, Josh's examination of their distinct approaches, strengths, and challenges reveals the complexities of leveraging cyber operations for strategic advantage. Silent Wars unravels the veiled intricacies of this evolving domain, exposing the concealed dynamics that shape the future of covert cyber warfare.