14.02.2016 Views

SCHOOL THESIS

?view&did=788526

?view&did=788526

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

B. SCOPE AND METHODOLOGY<br />

This thesis specifically focuses on the military cyberspace enterprise, and how<br />

NORAD and the individual military organizations of both the U.S. and Canada might<br />

jointly conduct military cyber attack warning. Therefore, no review was conducted of<br />

civilian cyberspace-related policies or strategies published by either by the U.S.<br />

Department of Homeland Security (DHS) or Department of Justice (DOJ), or by<br />

Canada’s Public Safety (PS) Canada.<br />

This problem statement also does not propose having NORAD assume the<br />

technical cyberspace defensive/offensive functions performed by USCYBERCOM. The<br />

thesis simply asks, “What is NORAD’s role when assessing whether the U.S.’ and/or<br />

Canada’s military are under a military-related cyber attack?”<br />

The question of whether NORAD should play a role in cyber attack warning does<br />

not seem to have been investigated previously. A literature review identifying the<br />

significant national cyberspace policies for both the U.S. and Canada has been<br />

accomplished, as well as a review of the key military strategies for cyberspace published<br />

by both countries. Literature outlining strategic cyberspace policies and general strategies<br />

of both the U.S. and Canada are well defined and unclassified. Military doctrine<br />

regarding cyberspace operations is also available, but details become classified as<br />

discussions become more technically oriented.<br />

Every five years, NORAD conducts an internal self-assessment to determine if the<br />

Command is accomplishing the right missions, using the right approaches. Recently the<br />

headquarters staff began its investigation regarding NORAD’s role in cyberspace<br />

defense, and expressed great interest and willingness to support this research. This thesis<br />

used existing documentation as well as dialogue with Headquarters NORAD and<br />

USNORTHCOM, USCYBERCOM, and Canadian military cyberspace practitioners.<br />

2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!