87
Data subject to restrictions on cover and notice page.
8.0 SOUTHERN UNIVERSITY
FINAL REPORT
8.1 Summary
8.1.1 Motivation
To address the increasing threats to national security coming from the cyber domain, military intelligence corps have recognized the need for officers trained in cyberspace
88
Data subject to restrictions on cover and notice page. counterterrorism techniques, technologies, and methods. These officers direct and conduct integrated electronic warfare, information technology, and cyberspace operations, as authorized or directed, to ensure freedom of action in and through cyberspace and the information environment, and to deny the same to our nation 's adversaries.
In support of the requirement for officers trained in cyber warfare techniques and technologies, the ROTC Cyber Research program provides cadets with opportunities to research and solve real world problems in cyber security and cyber counter-terrorism.
This first year pilot program research effort focused on the design and deployment of a covert communications network that can operate at the enemy 's operational base and gather intelligence on enemy communications and activities. This effort is in support of the Year 1 Challenge Problem of the Cyber-Spectrum Research and Technology Development Virtual Environment (CSpec-DVE).
The covert communications system design is optimal with regard to detection avoidance, information gathering and transmission, and power requirements. Covert methodologies
With cyber war, nations are able to skip the battlefield. Gone are the days where troops line up across from each other hoping to do damage to the other. Clarke explains that people, industries, governments, companies and organizations can be possible targets and are vulnerable to these attacks. Keeping that in mind should help these targets become defensive minded and shield off attacks before they happen. As we all know, the prevention is better than the
He dedicated over 120 hours to train fourteen analysts on operations planning, execution, and project-specific tasks. This training has resonated throughout CNO and can be seen through the continued success of operations conducted by the NSA in support of Geographic Combatant Commands and the Intelligence Community. Sergeant Willins also dedicated his personal time to further educating himself in computer network based concepts. He was recognized on the University of Maryland Dean's List during the Fall of 2016, Spring of 2017, and Spring of 2018 semesters while managing a full-time undergraduate course load in cyber security. This off-duty education served to supplement US Cyber Command pipeline training and institutionalized industry standards, which greatly enhanced his operational proficiency. As a result, he is among the top performing and most influential Exploitation Analysts in the
A way to increase the effectiveness of these types of operations for the Combatant Commander or Joint Forces Commander is to establish a “new lead department or agency for cybersecurity”. (Gerstell, p.9) The purpose of this organization would be to do exactly what you are outlining so that cyberspace operations can be carried out by
In order to properly answer the question posed we must first define what cyber-war and cyber-terrorism are. The Oxford Dictionaries defines cyber-war as “The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of communication systems by another state or organization:” Although there is no dictionary definition of cyber-terrorism, The Center for Strategic and International Studies (CSIS) has defined it as “the use of computer network tools to shut down critical national infrastructures (e.g., energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” The author defines cyber terror as “the intimidation of civilian enterprise through the use of high technology to bring about political, religious, or ideological aims, actions that result in disabling or deleting critical infrastructure data or information.”
Today's war zones rise above national outskirts. The internet adds an altogether new measurement to military operations, and the omnipresent reliance on information technology in both the legislature and business areas increments the open doors exponentially for foes and additionally the potential repercussion of threats.
Various aspects influence the efficacy of counterterrorism. With these aspects arises a series of limitations and implementation issues, ranging from funding and personnel shortages, out of date technology for some agencies, insufficient and inefficient data collection and sharing methods, and concerns regarding personnel receiving appropriate clearance.
The past 15 years the U.S. has been in a C.O.I.N. fight that has brought its own unique challenges and with our attention gathered wholly for this undertaking a new threat immerged virtually unnoticed. Cyber threats have been gaining more traction in the media as of late with several countries linked to these type of attacks, with China leading the forefront.
Cyber operations entail getting behind the most serious aspects of cyber terrorism and leading to the capture of those perpetrating cyber crimes.
United States Cyber Command is less than four years old. The merger and stand down of the Joint Functional Component Command for Network Warfare (JFCC-NW) and the Joint task Force for Global Network Operations (JTF-GNO) formed the bulk of the new organization. 9 This new construct integrated offensive and defensive cyber capabilities in one organization resulting in efficient and effective planning and execution of cyberspace operations. United States Cyber Command is tasked with operations to defend DOD information networks and to conduct full spectrum military cyberspace operations across all domains. 10 United States Cyber Command is also tasked with ensuring US freedom of action in cyberspace and denying freedom of actions to our
For thousands of years warfare remained relatively unchanged. While the tactics and weapons have changed as new methods of combat evolved, men and women or their weapons still had to meet at the same time and place in order to attack, defend, surrender or conquer. However, the advent of the of the internet has created a new realm of combat in which armies can remotely conduct surveillance, reconnaissance, espionage, and attacks from an ambiguous and space-less digital environment. Both state and non-state actors have already embraced this new realm and utilized both legal and illegal means to further facilitate their interests. What complicates cyber security further is as states attempt to protect themselves from cyber-warfare, private
The branches of the military, for a couple generations, have always been the Army, Navy, Air force, Marine Corps, and the Coast Guard; however, in an ever evolving digital world, the notion that outer space would be the next military front is being rapidly replaced by the idea that cyber space will be the next arms race. The United States has been defending attacks on their infrastructure day after day, night after night, when one hacker on one side of the world sleeps, another takes their place to attempt to compromise the US government. The motives may range from a political ‘hacktivist’ trying to prove a point, to an economic spy, trying to gain a competitive edge on its more upstart rivals, to an attempt to control the United States
To begin with, the first issue which arises is “regarding the precise legal parametres of cyberwarfare. ” In advising the department, counsel advises the department to utilize the following definition cited by Schaap as the bedrock upon its understanding of cyber warfare rests;
Computers today control much of the military and the civilian cyber infrastructure. The U.S. alone uses over two million computers and has over ten thousand cyber networks. According to some reports, over 95% of all the Military?s telecommunications travel through public networks and a significant amount
The Cyber Spectrum Research & Technology Development Virtual Environment (CSpec-DVE) program enables Reserve Officer Training Corps (ROTC) cadets to contribute technically to Cyber, Signals Intelligence (SIGINT), and electronic warfare (EW) technology domains through a rigorous, product-oriented research-and-development (R&D) program. ROTC cadets, mentored by faculty or subject matter experts at their university, engage in academic
Cyber warfare is a major concern for the global society. The introduction, development and operation of information and communication technologies have been accompanied by an increase in criminal accomplishments. With regard to cyberspace, the Internet is increasely been used as a tool and medium by organized crime. In order to commit cybercrime, cyber weapon are needed.