SCHOOL THESIS
?view&did=788526
?view&did=788526
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
B. SCOPE AND METHODOLOGY<br />
This thesis specifically focuses on the military cyberspace enterprise, and how<br />
NORAD and the individual military organizations of both the U.S. and Canada might<br />
jointly conduct military cyber attack warning. Therefore, no review was conducted of<br />
civilian cyberspace-related policies or strategies published by either by the U.S.<br />
Department of Homeland Security (DHS) or Department of Justice (DOJ), or by<br />
Canada’s Public Safety (PS) Canada.<br />
This problem statement also does not propose having NORAD assume the<br />
technical cyberspace defensive/offensive functions performed by USCYBERCOM. The<br />
thesis simply asks, “What is NORAD’s role when assessing whether the U.S.’ and/or<br />
Canada’s military are under a military-related cyber attack?”<br />
The question of whether NORAD should play a role in cyber attack warning does<br />
not seem to have been investigated previously. A literature review identifying the<br />
significant national cyberspace policies for both the U.S. and Canada has been<br />
accomplished, as well as a review of the key military strategies for cyberspace published<br />
by both countries. Literature outlining strategic cyberspace policies and general strategies<br />
of both the U.S. and Canada are well defined and unclassified. Military doctrine<br />
regarding cyberspace operations is also available, but details become classified as<br />
discussions become more technically oriented.<br />
Every five years, NORAD conducts an internal self-assessment to determine if the<br />
Command is accomplishing the right missions, using the right approaches. Recently the<br />
headquarters staff began its investigation regarding NORAD’s role in cyberspace<br />
defense, and expressed great interest and willingness to support this research. This thesis<br />
used existing documentation as well as dialogue with Headquarters NORAD and<br />
USNORTHCOM, USCYBERCOM, and Canadian military cyberspace practitioners.<br />
2