Theorist BriefingUNCLASSIFIED1 Cyber CYBER THEORIST BRIEFING MAJ Kyle Spade 12 August 2015.

Slides:



Advertisements
Similar presentations
1 The Systems Engineering Research Center UARC Dr. Dinesh Verma Executive Director January 13,
Advertisements

Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
International Relations Theory
Saudi War Course End of Course Capstone Exercise UNCLASSIFIED THIS DOCUMENT IS FOR WARGAME AND EDUCATIONAL USE ONLY AND DOES NOT REFLECT REAL WORLD OPERATIONS.
Cultural Studies. Cultural studies as a theoretical perspective focuses on how culture is influenced by powerful, dominant groups. Cultural studies does.
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
The Language of the Military Profession
Educating Leaders Since 1884
MIT-Harvard Conference Cyber International Relations (ECIR)
1 MIT-Harvard Conference Explorations in Cyber International Relations (ECIR) Introduction to the ECIR Initiative Nazli Choucri Professor of Political.
ADP 1 The Army.
AMEDD C&S CAPTAINS CAREER COURSE. OUTLINE  General Reimer Concept  TRADOC Concept  US Army War College Concept  Iraq Crucible Concept  Agile Leader.
KM enhances mission command, facilitates the exchange of knowledge, supports doctrine development, fosters leaders’ development, supports lessons learned,
United States Army Combined Arms Center
Advocacy.
Diversified Regional Security Threats ——The Necessity for Transformation in Military Education Maj. Gen. Ren Haiquan NDU, PLA China October 2007.
 Young children view the world very differently from adults.  E.g. no unusual for a child to think the sun follows them.  Field of cognitive psychology.
© South-Western Publishing Slide 1 DEVELOPMENT OF U.S. BANKING Creation of a National Currency Banking Before Banking in the.
National Law Enforcement and Corrections Technology Center - West Combating Terrorism: Intelligence Preparation for Operations Matt Begert
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
“Cyberdéfense” A French view on cyberwarfare S. TAILLAT CREC-ST CYR
The NEH Digital Humanities Initiative April 23-25, 2007.
Technology and National Security PGMs RMA Cyber war? Robotics?
Chapter 11.2 The Mass Media. Types of Media  The mass media influence politics and gov’t. They also form a link between the people and elected officials.
 He was born on Friday November 17, 1896 in the city of Orsha, Rusia.  Lev Semenovich Vygotsky ( ) studied at the University of Moscow to become.
Hard Date Change in Master 1 TRADOC: Where Tomorrow’s Victories Begin Adaptive Leaders Methodology (ALM) 18 February 2009 Mr. Donald Vandergriff Leader.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
The Western Way of War Mr. Odren. 1. Superior Technology 2. Discipline 3. Military Tradition 4. Change and Response 5. Financial Dominance.
Connect2Complete Theory of Change Development for Colleges and State Offices November 10, 2011 OMG Center for Collaborative Learning.
Roger Trinquier and Modern Warfare 17 AUGUST 2015 MAJ William B Pittman.
TOA Theorist Briefing: USMC Warfighting
Maurice de Saxe Mes Rêveries Maj Barry Rockx, Seminar 6 AMSP July 2015 It is not big armies that win battles, it is the good ones.
Evaluation Criteria and Measures of Effectiveness MAJ Eric Evans Seminar 6.
Winning the Next War 1 Winning the Next War: Institutionalizing Lessons Learned from Today’s Regional Conflicts The American Institute of Engineers Conference.
Military Power: Explaining Victory and Defeat in Modern Battle Stephen Biddle.
Putting the World into World-Class Education Presentation by Michele Anciaux Aoki, Ph.D. World Languages Day University of Washington, Seattle March 3,
Tennessee Valley Chapter SPACE AND MISSILE DEFENSE WORKING GROUP 18 July 2016.
Theorist COL (R) John Warden United States Air Force
Current Event Brief!.
Agricultural Communications
What is Cyber Security Cyber War Cyber Power?
Why KM is Important KM enhances mission command, facilitates the exchange of knowledge, supports doctrine development, fosters leaders’ development, supports.
[ 5.4 ] The President's Foreign Affairs Powers
Categories of APTs Dr. Dania Bilal IS 530 Fall 2005.
Technology and National Security
OSEP Leadership Conference July 28, 2015 Margaret Heritage, WestEd
Understanding the Threats of and Defenses Against Cyber Warfare
Research Translation: Lessons from Dissemination and Implementation Research for Interventions Promoting Walking and Walkability August 18, am Pacific,
Technology and National Security
PSY 250 STUDY Imagine Your Future /psy250study.com
Partnering to support early career researchers
Scientific Research in Computing
المجموعة التدريبية الرابعة
Culture & Communication (Part II)
The Roles of the President
A review of ontology editor evaluation Presenter: Yujie Cao
Developing Cultural Competencies in Spiritual Care
GOVERNANCE.
a multicultural challenge
Chapter 19 Transnational actors and international organizations in global politics Name: MA XINYUE Student No.:ID02403 Student No.:ID02403.
LREC Management Office (LRECMO)
The Roles of the President
Reading 19 Cognitively skilled organizational decision making:
NS4960 Spring 2018 Geo-economics
NS3040 Fall 2016 Geo-economics Europa brazil economy.
James Moffat, Dstl Note: This is joint work with Walter Perry, RAND.
NS4960 Summer 2019 Geo-economics
The Global Evaluation Agenda
Cultural Competency 101 Leng Leng Chancey.
Presentation transcript:

Theorist BriefingUNCLASSIFIED1 Cyber CYBER THEORIST BRIEFING MAJ Kyle Spade 12 August 2015

Theorist BriefingUNCLASSIFIED2 Cyber (U) AGENDA MAJ KYLE SPADE CAO: 10 AUGUST 2015 (U) Importance of Cyber (U) Common Language in Cyber (U) Theory of Cyber War (U) Theory of Cyber Warfare (U) Bibliography (U) Questions

Theorist BriefingUNCLASSIFIED3 Cyber (U) IMPORTANCE OF CYBER MAJ KYLE SPADE CAO: 10 AUGUST 2015 (U) Cyber is a medium to expedite the sharing of information and knowledge. “War is a violent clash of competing interests between or among organized groups each attempting to impose their will on the opposition.” - Strategic Landpower White Paper: Winning the Clash of Wills (2013)

Theorist BriefingUNCLASSIFIED4 Cyber (U) COMMON LANGUAGE MAJ KYLE SPADE CAO: 10 AUGUST 2015 (U) Cyberspace (Environment): “A consensual hallucination…A graphic representation of data.” - William Gibson (1984) Bottom line: Cyberspace is an environment where is information is shared amongst networks. (U) Cyber Domain: Key features of a domain: It can be described physically. Military operations can be conducted in and through the domain.

Theorist BriefingUNCLASSIFIED5 Cyber (U) COMMON LANGUAGE MAJ KYLE SPADE CAO: 10 AUGUST 2015 (U) Cyber power (Cognitive Dimension): “The ability to use cyberspace to create advantages and influence events in all the operational environments and across the instruments of power.” - Daniel Kuehl (2014) “War is a violent clash of competing interests between or among organized groups each attempting to impose their will on the opposition.” - Strategic Landpower White Paper: Winning the Clash of Wills (2013)

Theorist BriefingUNCLASSIFIED6 Cyber (U) THEORY OF CYBER WAR MAJ KYLE SPADE CAO: 10 AUGUST 2015 (U) The Cyberspace (or rather environment) is a man-made geography for social interaction. Benign and malignant actors share the geography. Network organizations appear more adept at operating in this geography than hierarchical organizations. (U) Cyber power is a weapon. Information and knowledge utilized to incite organizations. SO WHAT? KEY TAKEAWAY (U) Cyber is an information tool. (U) “Weapons do not win and lose wars; people and their societies do.”

Theorist BriefingUNCLASSIFIED7 Cyber (U) THEORY OF CYBER WARFARE MAJ KYLE SPADE CAO: 10 AUGUST 2015 (U) Cyber power will serve useful as an enabler of joint military operations. Cyber is not Douhetian. It cannot achieve strategic victory on its own. (U) Cyber offense is swift, but it is not likely to be deadly, and it should not work twice. Remember it is a man-made geography. (U) Cyber power is only information. Information and knowledge cannot be held wholly responsible for strategic success or failure. (U) Be respectful and adapt but do not panic in the face of technology.

Theorist BriefingUNCLASSIFIED8 Cyber (U) BIBLIOGRAPHY MAJ KYLE SPADE CAO: 10 AUGUST 2015 Arquilla, John, and David Ronfeldt, editors. Networks and Netwars: The Future of Terror, Crime, and Militancy. Washington, DC: National Defense Research Institute, Accessed July 24, Field Manual (FM) 3-13, Inform and Influence Activities (Washington, DC: Government Printing Office, 2013). Gray, Colin S. “Making Strategic Sense of Cyber Power: Why the Sky Is Not Falling.” Strategic Studies Institute Monograph. Carlisle, PA: USAWC Press, Accessed July 24, Joint Publication (JP) 3-0, Joint Operations (Washington, DC: Government Printing Office, 2011).

Theorist BriefingUNCLASSIFIED9 Cyber (U) BIBLIOGRAPHY MAJ KYLE SPADE CAO: 10 AUGUST 2015 Liang, Qiao and Wang Xiangsui. Unrestricted Warfare. Translated by the Foreign Broadcast Information Service. Beijing: PLA Literature and Arts Publishing House, Accessed July 30, Office of the Secretary of Defense. Strategic Landpower: Winning the Clash of Wills White Paper (Washington, DC: Government Printing Office, 2013). Starr, Stuart H. Towards an Evolving Theory of Cyberpower. Washington, DC: National Defense University Press, Accessed July 24,

Theorist BriefingUNCLASSIFIED10 Cyber MAJ KYLE SPADE CAO: 10 AUGUST 2015 QUESTIONS?