29.07.2016 Views

Cyber Primer

AEWhbF

AEWhbF

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Integrating cyber operations<br />

As these operations may be dependent on infrastructure and networks<br />

associated with, or even located within, physical target sets, we need to<br />

de-conflict and thoroughly understand the gain/loss balance to avoid<br />

fratricide and the compromise of ‘equity’. It may be possible to create the<br />

required effect using relatively low equity or open-source (or modified<br />

open-source) tools that can provide agile and flexible response options.<br />

Integrating cyber into operational planning is achieved through joint action 47<br />

which is a framework for considering the integration, coordination and<br />

synchronisation of all military activity within the battlespace. Joint action is<br />

implemented through the orchestration of:<br />

• information activities;<br />

• fires;<br />

• outreach; and<br />

• manoeuvre.<br />

4.4. Tactical effects. At the tactical level, the time required to develop<br />

access and invest in capability may mean that creating high-end cyber<br />

effects is reserved for early or important actions that have a high<br />

pay-off. However, lower-level attacks (such as locally interfering with a single<br />

building’s network access and subsequently employing a low-end common<br />

payload) may increasingly be seen on operations. The Israeli integration of<br />

cyber operations into the conventional bombing of a Syrian nuclear research<br />

institute is a good example of the operational/tactical use of cyber. 48<br />

4.5. Time. <strong>Cyber</strong> accesses often take years to develop. Knowledge of<br />

specific accesses and capabilities will be tightly controlled and held at<br />

the highest classification levels. Conversely, while this preparatory phase<br />

can take years, the execution phase may only take seconds. Similarly,<br />

in defensive terms, it may take far more people, time and resource to<br />

successfully protect and defend our own networks than for an adversary to<br />

launch a credible attack against them.<br />

47 Joint action is defined as: the deliberate use and orchestration of military capabilities<br />

and activities to affect an actor’s will, understanding and capability, and the cohesion<br />

between them to achieve influence. Joint Doctrine Publication (JDP) 3-00, Campaign<br />

Execution (3rd Edition, Change 1).<br />

48 More details on this case study can be found at Annex 4A on pages 78-79.<br />

68<br />

<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!