Cyber Primer
AEWhbF
AEWhbF
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Integrating cyber operations<br />
Chapter 4 – Integrating cyber<br />
operations<br />
<strong>Cyber</strong> is vital to our national security, playing an integral role in protecting the UK<br />
against external and internal threats. For this reason it is essential that cyber is<br />
considered an integral aspect of military operations. This chapter also provides<br />
details on cyber command and control and how it is coordinated, synchronised<br />
and integrated within Defence and across government.<br />
Integrating cyber effects<br />
4.1. Military cyber operations must be coordinated, synchronised and<br />
integrated across the strategic, operational and tactical levels of operations<br />
with all other military capabilities. These activities are part of Defence’s<br />
approach to full spectrum targeting processes. It recognises that other<br />
nations or actors, both friendly and adversary, may use cyber capabilities to<br />
enhance their own ability to achieve a degree of local, regional and/or<br />
international influence, which may otherwise be limited through other<br />
means.<br />
4.2. Strategic effects. <strong>Cyber</strong>’s virtual and flexible properties mean that we<br />
can potentially create a variety of effects in terms of complexity and severity,<br />
and at a tuneable scale. <strong>Cyber</strong> is not affected by physical geography in the<br />
same way as other conventionally-derived effects and may offer options<br />
to hold strategic target sets at risk that otherwise would be unreachable.<br />
The 2008 Stuxnet attack against the Iranian nuclear programme is a good<br />
example of cyber enabling operations for strategic effect. 46<br />
4.3. Operational effects. Integrating cyber capability into operational<br />
level planning is a new and evolving process. We need a high degree of<br />
integration and cooperation with units and organisations that routinely<br />
operate at the strategic level to successfully create cyber effects within a<br />
campaign. It is entirely possible that cyber operations will have been taking<br />
place for some time, possibly years, before conventional forces are deployed.<br />
46 More details of this case study can be found at Annex 4A on pages 76-77.<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition) 67