•  
  •  
 

Publication Date

7-1-2015

Abstract

For much of the past two decades, when US military officials discussed “cyber” warfare they seemed to focus almost exclusively on how “networks” enabled command and control (C2) over forces operating across the traditional warfighting domains (i.e., air, surface, subsurface, land, and even space). More recently, emphasis has shifted to a discussion about the need to ensure government and commercial networks are adequately “defended” against nearly continuous “attacks” from government sponsored entities as well as private hackers seeking to utilize the internet to accomplish a wide array of objectives. However, the holy grail of cyber for the US military has always been the ability to conduct offensive cyber operations (OCO). Indeed, we have reached a point where many people are beginning to associate “non-kinetic effects” almost exclusively with OCO as opposed to Information Operations or Electronic Warfare, each of which have long histories as methods of warfare. This paper explains how offensive cyber operations should be integrated into Operation Level Warfare Planning.

This site displays abstracts of MOC Warfighter articles. Department of Defense CAC-authenticated users may download full copies of the articles at this site.

Share

COinS
 

Accessibility Request

Some items in this repository were created or digitized prior to implementation of the accessibility standards under the Rehabilitation Act of 1973 and are preserved in their original, unmodified state for research, reference, or historical recordkeeping. In accordance with the ADA Title II Final Rule, the College provides accessible versions of archival materials upon request. To request a version of a file or resource, please submit an Accessible File Request Form.