14.02.2016 Views

SCHOOL THESIS

?view&did=788526

?view&did=788526

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

VI.<br />

FINDINGS AND RECOMMENDATIONS<br />

A. FINDINGS<br />

This thesis began with an examination of NORAD’s history of evolving to meet<br />

new military defense challenges. It also examined cyber warfare components and<br />

evolving definitions, key U.S. and Canadian military cyber organizations, and current<br />

cyberspace national event conferences. With the dramatic increase in world-wide<br />

cyberspace events, it was noted NORAD has begun examining its own potential role in<br />

this new operational domain.<br />

This thesis then examined current NORAD, U.S. and Canadian strategic guidance<br />

relating to cyberspace operations. Both the NORAD Agreement clearly reflect both<br />

Nation’s desire that NORAD be able to adapt and defend against newly evolving military<br />

threats which each nation may jointly face. Likewise, numerous U.S. government<br />

strategies recommend working with international organizations to develop watch-andwarning<br />

networks in order to detect and prevent cyber attacks. Further, U.S. military<br />

cyberspace policies identify the need to integrate coalition partners early into planning<br />

processes and thus increase the overall success of combined operations. Finally, from a<br />

Canadian perspective, both their civilian and military strategies mirror these same themes<br />

of working with international organizations to develop international watch-and-warning<br />

networks in order to detect and prevent cyber attacks. In summary, both U.S. and Canada<br />

strategic cyberspace guidance propose a closer working arrangement between each<br />

country as a means of dealing with growing cyberspace threats. These documents<br />

significantly inform the discussion regarding NORAD potential new role in cyberspace<br />

threat information and attack assessment.<br />

With this policy background in mind, three courses of action (COAs) were<br />

eventually developed regarding possible roles NORAD might play in future military<br />

cyber attack warning situations. Each proposed COA was initially analyzed to ensure it<br />

met specific validity criteria. They were then examined for specific advantages,<br />

disadvantages, and possible solutions (each generally weighted for implementation).<br />

75

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!