08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

that computers are affecting our industries, our social setting, and even the way<br />

our brains process information. Cybersecurity is a focus for these institutions<br />

and the government. For example, in February 2003, President George W. Bush<br />

issued a “National Strategy to Secure Cyberspace” which outlined five<br />

cyberspace-security priorities. The Department of Homeland Security has also<br />

tried to strengthen cyberspace security with a number of steps. These include<br />

building cybersecurity operations with a National Cyber Security Division;<br />

establishing a Cyber Security Readiness and Response System; sponsoring<br />

cybersecurity education and training; creating a Government Forum of Incident<br />

Response and Security Teams (GFIRST); partnering with the Multi-State<br />

Information Sharing and Analysis Center; implementing a process to maintain a<br />

Common Vulnerability and Exposure, Common Malware Enumerator, and<br />

Open Vulnerability Assessment Language; establishing International<br />

Information Sharing Conference calls; and initiating an Internet Infrastructure<br />

Security Program. 37 The military, on the other hand, talks of information<br />

operations and information security.<br />

The US military focuses on “information” as it relates to several wellestablished<br />

military capabilities (deception, psychological war, electronic war,<br />

and operational security) and one new item, computer network operations,<br />

which is limited primarily to attack and defend operations. The military pays<br />

almost no attention to cyber processes. A quick check of the military’s<br />

dictionary, Joint Publication 1-02 (as amended through 30 November 2004),<br />

supports and demonstrates this. Only two cyber-related terms were listed, cyber<br />

counterintelligence and cyberspace, while there were thirteen informationrelated<br />

entries including a definition for the term “information.” The new draft<br />

of Joint Publication 3-13, Information Operations, even eliminated cyber<br />

counterintelligence leaving cyberspace as the only cyber-related term. A social<br />

transformation is happening, and the subjective nature of warfare is changing<br />

yet the military is having trouble adapting fast enough. It appears stuck in old<br />

prisms and paradigms.<br />

There are reasons for this. Modern military theorists have long held the<br />

view that warfare, if it were ever to occur in contemporary times, would be a<br />

struggle between nations in possession of precision-guided weapons that<br />

utilized computer chips to guide weapons and troops with accuracy, speed, and<br />

efficiency. It would be a system-against-system struggle. Fortunately, such a<br />

confrontation has never occurred. When the US has fought in conflicts around<br />

the globe, the confrontation has been one-sided. The US has not fought another<br />

high-technology force on the battlefield of equal or greater status than itself. To<br />

37 Press Release Fact Sheet, printed in Information Operations Newsletter, Mr. Jeff<br />

Harley editor, Vol. 5, No. 10, 8-18 February 2005.<br />

22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!