Cyber Primer
AEWhbF
AEWhbF
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Integrating cyber operations<br />
As these operations may be dependent on infrastructure and networks<br />
associated with, or even located within, physical target sets, we need to<br />
de-conflict and thoroughly understand the gain/loss balance to avoid<br />
fratricide and the compromise of ‘equity’. It may be possible to create the<br />
required effect using relatively low equity or open-source (or modified<br />
open-source) tools that can provide agile and flexible response options.<br />
Integrating cyber into operational planning is achieved through joint action 47<br />
which is a framework for considering the integration, coordination and<br />
synchronisation of all military activity within the battlespace. Joint action is<br />
implemented through the orchestration of:<br />
• information activities;<br />
• fires;<br />
• outreach; and<br />
• manoeuvre.<br />
4.4. Tactical effects. At the tactical level, the time required to develop<br />
access and invest in capability may mean that creating high-end cyber<br />
effects is reserved for early or important actions that have a high<br />
pay-off. However, lower-level attacks (such as locally interfering with a single<br />
building’s network access and subsequently employing a low-end common<br />
payload) may increasingly be seen on operations. The Israeli integration of<br />
cyber operations into the conventional bombing of a Syrian nuclear research<br />
institute is a good example of the operational/tactical use of cyber. 48<br />
4.5. Time. <strong>Cyber</strong> accesses often take years to develop. Knowledge of<br />
specific accesses and capabilities will be tightly controlled and held at<br />
the highest classification levels. Conversely, while this preparatory phase<br />
can take years, the execution phase may only take seconds. Similarly,<br />
in defensive terms, it may take far more people, time and resource to<br />
successfully protect and defend our own networks than for an adversary to<br />
launch a credible attack against them.<br />
47 Joint action is defined as: the deliberate use and orchestration of military capabilities<br />
and activities to affect an actor’s will, understanding and capability, and the cohesion<br />
between them to achieve influence. Joint Doctrine Publication (JDP) 3-00, Campaign<br />
Execution (3rd Edition, Change 1).<br />
48 More details on this case study can be found at Annex 4A on pages 78-79.<br />
68<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)