Matches in SemOpenAlex for { <https://semopenalex.org/work/W1531924972> ?p ?o ?g. }
Showing items 1 to 81 of
81
with 100 items per page.
- W1531924972 startingPage "88" @default.
- W1531924972 abstract "When this article was originally written, DOD policy and military regulations significantly restricted the use of the Internet for strategic communication purposes in favor of security. On 25 February 2010, DOD published a policy embracing a balanced approach in this regard, thus supporting the original thesis of this article. The author has updated the article accordingly to provide a deeper explanation of the policy decision and as a call to embrace its tenets. UNITED STATES MILITARY history is replete with examples of preparing for the next by studying the last (or current) one. Consequently, we often engage in warfare with doctrine and processes that lag behind current reality. The result can be a prolonged effort at great cost to national treasure, both fiscal and human. The harried development and implementation of counterinsurgency doctrine, resulting in the so-called surge in the midst of the campaign in Iraq, is but one example. (1) The Army's introspective consideration of future warfare in the late 1970s and early 1980s, however, is an exception. Using the 1973 Arab-Israeli as a harbinger of warfare where precision weaponry and technological advances showed the importance of maneuver, the Army shifted from a doctrine of Active to Battle. However, this was not universally accepted. In a 2006 Landpower essay, Brigadier General Huba Wass de Czege remininisced: In what developed into a healthy exchange, [young officers] saw defensive tactics as a fall-back by ranks approach that confused delay and defense, and would lead commanders to avoid decisive engagement ... They saw it as reactive, surrendering the initiative and resulting in a risky method of defense. (2) The history of the 1991 Gulf describes the shift to Airland doctrine as a prescient decision that was the basis of that dramatic victory for the U.S. military. (3) So what will the next look like? No one has a flawless crystal ball to predict the future, but even a cursory consideration of potential future adversaries reveals the importance placed on information as a strategic asymmetric means to conduct warfare. The Chinese military has reportedly hacked into Pentagon military networks. (4) The Russian government allegedly conducted a major cyber attack on Estonian infrastructure. (5) Yet even while attacks on information systems are proving to be a threat, reliance on the Internet to fight the war of ideas is increasing. Consider the so-called 2nd Lebanon War between Israel and Hezbollah in the summer of 2006. Hezbollah used information to affect perceptions as a means to achieve strategic victory, even going so far as to place billboards on the rubble of buildings in southern Lebanon that said Made in the USA (in English). (6) [ILLUSTRATION OMITTED] The U.S. military certainly recognizes this threat, as the move to establish a U.S. Cyber Command demonstrates. However, until recently, doctrine was lagging. Past policies favored active defense over maneuver in cyberspace. And while a recent policy change points to a potentially significant shift in that equation, the question arises whether the military will embrace the organizational change necessary to balance the need to protect networks while going on the ideological offensive its adversaries have embraced. In the end, leaders must weigh the risks involved to achieve a balance to compete in the information battlespace. Will they develop an Battle equivalent for cyberspace, or will they wait until the next to strike the balance at potentially great cost to our Nation? Defining the Problem Keeping up with the definition of cyberspace can be a full-time job. Since 2004, the U.S. government has presented four different official definitions. The Department of Defense (DOD) currently defines cyberspace as-- a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. …" @default.
- W1531924972 created "2016-06-24" @default.
- W1531924972 creator A5048452115 @default.
- W1531924972 date "2010-05-01" @default.
- W1531924972 modified "2023-09-23" @default.
- W1531924972 title "Attack or Defend? Leveraging Information and Balancing Risk in Cyberspace" @default.
- W1531924972 hasPublicationYear "2010" @default.
- W1531924972 type Work @default.
- W1531924972 sameAs 1531924972 @default.
- W1531924972 citedByCount "1" @default.
- W1531924972 countsByYear W15319249722013 @default.
- W1531924972 crossrefType "journal-article" @default.
- W1531924972 hasAuthorship W1531924972A5048452115 @default.
- W1531924972 hasConcept C110875604 @default.
- W1531924972 hasConcept C118813454 @default.
- W1531924972 hasConcept C136764020 @default.
- W1531924972 hasConcept C166957645 @default.
- W1531924972 hasConcept C17744445 @default.
- W1531924972 hasConcept C189326492 @default.
- W1531924972 hasConcept C199539241 @default.
- W1531924972 hasConcept C2776084483 @default.
- W1531924972 hasConcept C2776211767 @default.
- W1531924972 hasConcept C2778007780 @default.
- W1531924972 hasConcept C2778627824 @default.
- W1531924972 hasConcept C2781241145 @default.
- W1531924972 hasConcept C2781349506 @default.
- W1531924972 hasConcept C38652104 @default.
- W1531924972 hasConcept C39549134 @default.
- W1531924972 hasConcept C41008148 @default.
- W1531924972 hasConcept C451841 @default.
- W1531924972 hasConcept C528167355 @default.
- W1531924972 hasConcept C95457728 @default.
- W1531924972 hasConceptScore W1531924972C110875604 @default.
- W1531924972 hasConceptScore W1531924972C118813454 @default.
- W1531924972 hasConceptScore W1531924972C136764020 @default.
- W1531924972 hasConceptScore W1531924972C166957645 @default.
- W1531924972 hasConceptScore W1531924972C17744445 @default.
- W1531924972 hasConceptScore W1531924972C189326492 @default.
- W1531924972 hasConceptScore W1531924972C199539241 @default.
- W1531924972 hasConceptScore W1531924972C2776084483 @default.
- W1531924972 hasConceptScore W1531924972C2776211767 @default.
- W1531924972 hasConceptScore W1531924972C2778007780 @default.
- W1531924972 hasConceptScore W1531924972C2778627824 @default.
- W1531924972 hasConceptScore W1531924972C2781241145 @default.
- W1531924972 hasConceptScore W1531924972C2781349506 @default.
- W1531924972 hasConceptScore W1531924972C38652104 @default.
- W1531924972 hasConceptScore W1531924972C39549134 @default.
- W1531924972 hasConceptScore W1531924972C41008148 @default.
- W1531924972 hasConceptScore W1531924972C451841 @default.
- W1531924972 hasConceptScore W1531924972C528167355 @default.
- W1531924972 hasConceptScore W1531924972C95457728 @default.
- W1531924972 hasIssue "3" @default.
- W1531924972 hasLocation W15319249721 @default.
- W1531924972 hasOpenAccess W1531924972 @default.
- W1531924972 hasPrimaryLocation W15319249721 @default.
- W1531924972 hasRelatedWork W128841750 @default.
- W1531924972 hasRelatedWork W1498653869 @default.
- W1531924972 hasRelatedWork W1522582473 @default.
- W1531924972 hasRelatedWork W2183226994 @default.
- W1531924972 hasRelatedWork W2213739848 @default.
- W1531924972 hasRelatedWork W228020046 @default.
- W1531924972 hasRelatedWork W2407521864 @default.
- W1531924972 hasRelatedWork W2503942005 @default.
- W1531924972 hasRelatedWork W281838507 @default.
- W1531924972 hasRelatedWork W289176250 @default.
- W1531924972 hasRelatedWork W2913437159 @default.
- W1531924972 hasRelatedWork W2921335625 @default.
- W1531924972 hasRelatedWork W302300645 @default.
- W1531924972 hasRelatedWork W3183056 @default.
- W1531924972 hasRelatedWork W322036845 @default.
- W1531924972 hasRelatedWork W324898598 @default.
- W1531924972 hasRelatedWork W40587695 @default.
- W1531924972 hasRelatedWork W82556711 @default.
- W1531924972 hasRelatedWork W294813793 @default.
- W1531924972 hasRelatedWork W339995304 @default.
- W1531924972 hasVolume "90" @default.
- W1531924972 isParatext "false" @default.
- W1531924972 isRetracted "false" @default.
- W1531924972 magId "1531924972" @default.
- W1531924972 workType "article" @default.