Critical Infrastructure Protection Patricia Ladnier

Total Page:16

File Type:pdf, Size:1020Kb

Critical Infrastructure Protection Patricia Ladnier Critical Infrastructure Protection Patricia Ladnier Fostering Interagency Collaboration for Upstream Counterproliferation Matthew D. Rautio Nuclear Terrorism – Imminent Threat? Brendan G. Melley A Clear Deterrence Strategy Required for Cyber Terrence S. Allen Interagency Leadership Duane M. Blackburn The End of Operational Phases at Last Gustav A. Otto A Call for Synchronization of Civil Information Management Michael L. Jones What Were You Thinking? Biases and Rational Decision Making Ted Thomas and Robert J. Rielly Covert Action and Unintended Consequences John G. Breen The Journal of The Simons Center Vol. 8, Issue 3 (2017) Arthur D. Simons Center for Interagency Cooperation, Fort Leavenworth, Kansas FEATURES | 1 About The Simons Center The Arthur D. Simons Center for Interagency Cooperation is a major program of the Command and General Staff College Foundation, Inc. The Simons Center is committed to the development of military leaders with interagency operational skills and an interagency body of knowledge that facilitates broader and more effective cooperation and policy implementation. About the CGSC Foundation The Command and General Staff College Foundation, Inc., was established on December 28, 2005 as a tax-exempt, non-profit educational foundation that provides resources and support to the U.S. Army Command and General Staff College in the development of tomorrow’s military leaders. The CGSC Foundation helps to advance the profession of military art and science by promoting the welfare and enhancing the prestigious educational programs of the CGSC. The CGSC Foundation supports the College’s many areas of focus by providing financial and research support for major programs such as the Simons Center, symposia, conferences, and lectures, as well as funding and organizing community outreach activities that help connect the American public to their Army. All Simons Center works are published by the “CGSC Foundation Press.” The CGSC Foundation is an equal opportunity provider. InterAgency Journal Vol. 8, Issue 3 (2017) FEATURES Arthur D. Simons Center Critical Infrastructure Protection for Interagency Cooperation 5 Patricia Ladnier The Lewis and Clark Center 100 Stimson Ave., Suite 1149 Fort Leavenworth, Kansas 66027 Ph: 913-682-7244 • Fax: 913-682-7247 35 Fostering Interagency Collaboration Email: [email protected] for Upstream Counterproliferation www.TheSimonsCenter.org Matthew D. Rautio EDITOR-IN-CHIEF Roderick M. Cox 52 Nuclear Terrorism – Imminent Threat? Brendan G. Melley MANAGING EDITOR Elizabeth Hill 62 A Clear Deterrence Strategy Required for Cyber EDITOR Terrence S. Allen Valerie Tystad CONTRIBUTING EDITORS 69 Interagency Leadership John Mark Mattox Duane M. Blackburn Paige J. Cox 78 The End of Operational Phases at Last DESIGN/PRODUCTION Mark H. Wiggins Gustav A. Otto MHW Public Relations and Communications A Call for Synchronization of PRINTING 87 Allen Press, Inc. Civil Information Management Lawrence, Kansas Michael L. Jones What Were You Thinking? Biases and ADVISORY COUNCIL 98 Rational Decision Making David A. Anderson, DBA Professor of Strategic Studies Ted Thomas and Robert J. Rielly U.S. Army Command and General Staff College Ambassador (Ret.) David F. Lambertson Covert Action and Unintended Consequences Former U.S. Ambassador to Thailand 106 John G. Breen Wilburn E. “Bud” Meador, Jr. Assistant Professor U.S. Army Command and General Staff College James P. Pottorff, Jr., J.D., L.L.M. General Council, University of Kansas 124 WORTH NOTING 128 BOOK REVIEW Copyright 2017, CGSC Foundation, Inc. All rights reserved. No part of this journal may be reproduced, stored in a retrieval system, or transmitted by any means without the written permission of the CGSC Foundation, Inc. SIMONS CENTER EDITORIAL BOARD David A. Anderson, DBA Professor, U.S. Army Command and General Staff College Maj. Gen. Allen W. Batschelet, U.S. Army, Ret. Col. Adrian T. Bogart III, U.S. Army Jacob Bucher, Ph.D. Founding Dean, College of Applied Sciences, Dominican University G. Michael Denning Director, Kansas University Graduate Military Programs William G. Eckhardt Teaching Professor Emeritus, University of Missouri-Kansas City School of Law Ralph M. Erwin Senior Geospatial Intelligence Officer, National Geospatial Agency Liaison to U.S. Army Training and Doctrine Command Gary R. Hobin Assistant Professor, U.S. Army Command and General Staff College Col. Bart Howard, U.S. Army, Ret. Lt. Col. George Kristopher Hughes, U.S. Army U.S. Army Command and General Staff College Gene Kamena Chair, Department of Leadership and Warfighting, U.S. Air Force Air War College Jack D. Kem, Ph.D. Supervisory Professor, U.S. Army Command and General Staff College Brig. Gen. Wendell C. King, Ph.D., U.S Army, Ret. Brig. Gen. Eugene J. LeBoeuf, U.S. Army, Ph.D. Executive Vice Provost for Academic Affairs, Army University James B. Martin, Ph.D. Dean of Academics, U.S. Army Command and General Staff College Wilburn E. Meador, Jr. Assistant Professor, U.S. Army Command and General Staff College Gustav A. Otto Defense Intelligence Agency Representative to U.S. Army Combined Arms Center and Army University William T. Pugh Assistant Professor, U.S. Army Command and General Staff College James H. Willbanks, Ph.D. George C. Marshall Chair of Military History, U.S. Army Command and General Staff College Mark R. Wilcox Assistant Professor, U.S. Army Command and General Staff College Donald P. Wright, Ph.D. Deputy Director, Army Press From the Editor-in-Chief This issue of the InterAgency Journal offers a variety of topics I hope you find interesting and informative. Our lead article is the 2017 Simons Center Interagency Writing Award winner from the School of Advanced Military Studies at the U.S. Army Command and General Staff College. Patricia Ladnier puts forth that a strategic review is needed to inform the realignment of federal statutory law to allow the Department of Homeland Security to implement various recommendations to achieve its national security goal of critical infrastructure protection. Our world continues to be a dangerous place. The next three articles explore what might be done to address some of our challenges. Matthew Rautio argues that the key to successful counterproliferation is fostering interagency collaboration before a crisis emerges. He informs this conclusion with data from a formal collaboration process undertaken at a U.S. Embassy. Brendan Melley discusses the threat of nuclear terrorism. He offers that our best chance to stop nuclear terrorism is a combination of focused policies to restrict the materials needed to build nuclear bombs along with continuous efforts to deny potential terrorists the time and space to gather and assemble weapons. And Terrance Allen argues that the United States needs to take the lead for the international community and develop a treaty for international norms which set limits on offensive cyberspace operations. He also calls for the U.S. to develop and articulate a clear deterrence strategy for the cyber domain. While the “whole-of-government” approach is often necessary to address the complex problems of national security, our system does not have a professional development path for interagency leaders. Rather, we develop folks inside our own organizations and when interagency leadership opportunities arise we often are not prepared for the challenge. Duane Blackburn shares his perspective and offers informed insight on successful interagency leadership garnered from years of service at the highest levels of the federal government. The next two articles address shortcomings. Gus Otto takes to task the Department of Defense’s use of operational phases in their planning process and decries how their misuse has negatively affected other departments of the federal government. Michael Jones points out that the U.S. government faces many challenges when conducting civil information management around the world. And unfortunately one of them is an unnecessarily self-imposed problem – various departments use different information platforms which are not compatible or are redundant. He argues that our government must synchronize information systems to better facilitate information sharing. Leaders make decisions. But do we take into account the biases and psychological traps that affect our decision making? Ted Thomas and Robert Rielly use a historical case study to illustrate the traps that await if one is not aware of their own psychological baggage. And finally, John Breen provides a historical look at covert CIA actions to examine if they actually can be deemed as successful in advancing U.S. foreign policy goals. Thank you for reading this issue of the InterAgency Journal. Our readership has crested over 11,000 and I thank you for helping us meet our mission of developing interagency leaders and adding to the body of interagency knowledge. I invite you to become an author and share your interagency observations and experiences. And as always, your feedback is most welcome. – RMC Critical Infrastructure Protection by Patricia Ladnier oth the Department of Homeland Security (DHS) and the Department of Defense (DoD) work to secure and defend the U.S., including protecting and securing key resources and critical infrastructure (referred to collectively as critical infrastructure). The Constitution Band federal statutory law establish national security goals. The Critical Infrastructures Protection Act of 2001 (CIPA) articulates as a national security goal the protection of critical infrastructure
Recommended publications
  • Report Criminal Law in the Face of Cyberattacks
    APRIL 2021 REPORT CRIMINAL LAW IN THE FACE OF CYBERATTACKS Working group chaired by Bernard Spitz, President of the International and Europe Division of MEDEF, former President of the French Insurance Federation (FFA) General secretary: Valérie Lafarge-Sarkozy, Lawyer, Partner with the law firm Altana ON I SS I AD HOC COMM CRIMINAL LAW IN THE FACE OF CYBERATTACKS CRIMINAL LAW IN THE FACE OF CYBERATTACKS CLUB DES JURISTES REPORT Ad hoc commission APRIL 2021 4, rue de la Planche 75007 Paris Phone : 01 53 63 40 04 www.leclubdesjuristes.com FIND US ON 2 PREFACE n the shadow of the global health crisis that has held the world in its grip since 2020, episodes of cyberattacks have multiplied. We should be careful not to see this as mere coincidence, an unexpected combination of calamities that unleash themselves in Ia relentless series bearing no relation to one another. On the contrary, the major disruptions or transitions caused in our societies by the Covid-19 pandemic have been conducive to the growth of offences which, though to varying degrees rooted in digital, are also symptoms of contemporary vulnerabilities. The vulnerability of some will have been the psychological breeding ground for digital offences committed during the health crisis. In August 2020, the Secretary-General of Interpol warned of the increase in cyberattacks that had occurred a few months before, attacks “exploiting the fear and uncertainty caused by the unstable economic and social situation brought about by Covid-19”. People anxious about the disease, undermined by loneliness, made vulnerable by their distress – victims of a particular vulnerability, those recurrent figures in contemporary criminal law – are the chosen victims of those who excel at taking advantage of the credulity of others.
    [Show full text]
  • Boredom As Disruption and Resistance in David Foster Wallace's the Pale
    ‘Only the bored are free’: boredom as disruption and resistance in David Foster Wallace’s The Pale King. MA Thesis Adrià Puértolas Pérez Supervisor: Aylin Kuryel Academic year: 2019-2020 Faculty of Humanities Universiteit van Amsterdam A.Puértolas INDEX 1. Introduction 3 2. ‘Only the bored are free: boredom as resistance in The Pale King 8 3. ‘Awakening’: Embracing boredom against the cultural logic of late capitalism in The Pale King 21 4. Boredom, metamodernism and narratives of reconstruction in The Pale King 36 5. Conclusion 48 6. Bibliography 54 2 A.Puértolas 1. Introduction In the movie Spring Breakers (2012), by Harmony Korine, a group of young college girls travel to Florida to participate to the Spring Break, the well-known mass party. It is an escape from the monotony of university, classes, routine and the world they’ve always known: “I’m tired of seeing always the same things”, they complain as a justification for the trip. During the break, their quest for adrenaline and limit experiences quickly escalates: once the excitement of the party ceases, they end up robbing a store at gun point and getting involved with an obscure drug dealer that leads them into a full-scale shooting against a rival criminal organization. The movie seems to suggest that even the most extreme and limit experiences, as exciting and powerful as they can be, are not able to provide a steady, authentic life, some substance to hold on to, just intense chaos and violence. It is tempting to read the film as a growing realization of the limits the rebellious- Dionysian1 escape, one that seems central in the cultural logic of late capitalism; that it may have become an exhausted or sterile path towards emancipation —what the characters of the movie ultimately seek—and that, perhaps, a comeback, an acceptance of an authentic, solid and monotonous existence is desirable.
    [Show full text]
  • Creating a Total Army Cyber Force: How to Integrate the Reserve Component Into the Cyber Fight
    No. 103W SEPTEMBER 2014 Creating a Total Army Cyber Force: How to Integrate the Reserve Component into the Cyber Fight Christopher R. Quick Creating a Total Army Cyber Force: How to Integrate the Reserve Component into the Cyber Fight by Christopher R. Quick The Institute of Land Warfare ASSOCIATION OF THE UNITED STATES ARMY AN INSTITUTE OF LAND WARFARE PAPER The purpose of the Institute of Land Warfare is to extend the educational work of AUSA by sponsoring scholarly publications, to include books, monographs and essays on key defense issues, as well as workshops and symposia. A work selected for publication as a Land Warfare Paper represents research by the author which, in the opinion of ILW’s editorial board, will contribute to a better understanding of a particular defense or national security issue. Publication as an Institute of Land Warfare Paper does not indicate that the Association of the United States Army agrees with everything in the paper but does suggest that the Association believes the paper will stimulate the thinking of AUSA members and others concerned about important defense issues. LAND WARFARE PAPER NO. 103W, September 2014 Creating a Total Army Cyber Force: How to Integrate the Reserve Component into the Cyber Fight by Christopher R. Quick Lieutenant Colonel Christopher R. Quick is currently the J39 Information Operations Branch Chief for Special Operations Command Forward–West Africa in Kelly Barracks, Stuttgart, Germany. He previously served as the Information Operations Branch Chief and Director of Communication Synchronization for U.S. Army Cyber Command/Second Army at Fort Belvoir, Virginia.
    [Show full text]
  • Cyber Mission Analysis
    UNCLASSIFIED//FOR OFFICIAL USE ONLY Cyber Mission Analysis Mission Analysis for Cyber Operations of Department of Defense Submitted in compliance with the reporting requirement contained in the Fiscal Year 2014 National Defense Authorization Act section 933(d), Public Law 113-66 Preparation of this study/report cost the Department of Defense approximately $587,000 for the 2014 Fiscal Year. This includes $15,000 in expenses and $572,000 in DoD labor Generated on 2014 August 21 RefID: E-0CD45F6 1 UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY Table of Contents I. Executive Summary ............................................................................................................... 4 II. Current State .......................................................................................................................... 6 Threat Landscape ............................................................................................................. 6 Policies, Oversight, and Relationships ............................................................................. 6 Cyber Missions ................................................................................................................ 8 Operational Command & Control (C2) ......................................................................... 10 Resilience, Mission Assurance, and Continuity of Operations...................................... 10 Recruitment, Retention, Management, Equipping, and Training the Force .................. 10 III. Current
    [Show full text]
  • Perspectives on Building a Cyber Force Structure
    Permission to make digital or hard copies of all or parts of 163 this work for internal use within NATO and for personal or Conference on Cyber Conflict educational use not done for profit or commercial purpose Proceedings 2010 is granted providing that copies bear this notice and a full C. Czosseck and K. Podins (Eds.) citation on the first page. Any other reproduction or trans- CCD COE Publications, 2010, Tallinn, Estonia. mission requires prior written permission. PERSPECTIVES ON BUILDING A CYBER FORCE STRUCTURE Stuart STARRa,1, Daniel KUEHLb,2, Terry PUDASc,3 aCenter for Technology and National Security Policy (CTNSP), Washington, DC, USA biCollege of the NDU. Washington, DC, USA cCTNSP, NDU, Washington, DC, USA Abstract: This paper explores the US’s cyber force structure with special em- phasis on the cyber workforce. To achieve that goal, this paper addresses several issues: it characterizes the nature of the cyber security problem; it draws on insights from senior decision-makers to identify cyber force struc- ture needs; it characterizes current capabilities by summarizing the key ini- tiatives that are being pursued by the US Services and key joint activities; and it identifies a spectrum of actions to mitigate shortfalls in the existing cyber forces structure (i.e. education; higher education and recruitment; cer- tification, retention, professional development, and workforce management; exercises; and security clearance requirements). The paper concludes by iden- tifying actions that NATO might pursue to improve its cyber force structure (e.g. conduct realistic, stressful exercises) and by identifying residual issues to address (e.g. career progression; value of employing “patriotic hackers”).
    [Show full text]
  • Crisis on Impact: Responding to Cyber Attacks on Critical Information Infrastructures, 30 J
    The John Marshall Journal of Information Technology & Privacy Law Volume 30 Issue 1 2013 Article 3 2013 Crisis on Impact: Responding to Cyber Attacks on Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013) Eugenia Georgiades William Caelli Sharon Christensen W.D. Duncan Follow this and additional works at: https://repository.law.uic.edu/jitpl Part of the Computer Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Eugenia Georgiades, William Caelli, Sharon Christensen & W.D. Duncan, Crisis on Impact: Responding to Cyber Attacks on Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013) https://repository.law.uic.edu/jitpl/vol30/iss1/3 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in The John Marshall Journal of Information Technology & Privacy Law by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. CRISIS ON IMPACT: RESPONDING TO CYBER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURES EUGENIA GEORGIADES, WILLIAM J. CAELLI, SHARON CHRISTENSEN, & W.D. DUNCAN* ABSTRACT In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack.
    [Show full text]
  • Author Biography Toni Morrison Discussion Guide
    TONI MORRISON DISCUSSION GUIDE (630) 232-0780 [email protected] AUTHOR BIOGRAPHY The second of the four children of George and Ramah (Willis) Wofford, Toni Morrison was born Chloe Anthony Wofford in Lorain, Ohio, a steel town twenty-five miles west of Cleveland. During the worst years of the Great Depression, her father worked as a car washer, a welder in a local steel mill, and road-construction worker, while her mother, a feisty, determined woman, dealt with callous landlords and impertinent social workers. "When an eviction notice was put on our house, she tore it off," Morrison remembered, as quoted in People. "If there were maggots in our flour, she wrote a letter to [President] Franklin Roosevelt. My mother believed something should be done about inhuman situations." In an article for the New York Times Magazine, Morrison discussed her parents' contrasting attitudes toward white society and the effect of those conflicting views on her own perception of the quality of black life in America. Ramah Wofford believed that, in time, race relations would improve; George Wofford distrusted "every word and every gesture of every white man on Earth." Both parents were convinced, however, that "all succor and aid came from themselves and their neighborhood." Consequently, Morrison, although she attended a multiracial school, was raised in "a basically racist household" and grew up "with more than a child's contempt for white people." After graduating with honors from high school in 1949, Toni Morrison enrolled at Howard University in Washington, DC. Morrison devoted most of her free time to the Howard University Players, a campus theater company she described as "a place where hard work, thought, and talent" were praised and "merit was the only rank." She often appeared in campus productions, and in the summers she traveled throughout the South with a repertory troupe made up of faculty members and students.
    [Show full text]
  • Bringing the Page to the Stage
    aid n P US Postage Houston TX Houston Non-Profit Org Non-Profit Permit No. 1002 No. Permit OW r B t s e a s o n t i c k e ts $175 OO The purchase of season tickets, a portion of which is tax-deductible, helps make this series possible. series s e a s o n t i c k e t b e n e f i ts i n c lu d e bringing the page to the stage G • Seating in the reserved section for each of the eight readings ain arett r seats H eld U ntil 7:25 P m m CHimamanda nGOZi adiCHie rint G • Signed copy of Jhumpa Lahiri’s new novel The Lowland P daniel alarCón n exas 77006 exas availaBle fO r P iCK UP On tH e eveninG Of H er readinG i t rOBert BO sWell • Access to the first-served “Season Subscriber” 1520 West 1520 West anne CarsOn book-signing line mOHsin Hamid • Two reserved-section guest passes Houston, Houston, tO Be U sed dUrinG tH e 2013/2014 seas On KHaled HO sseini rint mar JHUmPa laHiri • Free parking at the Alley Theatre P fOr tWO Of tH e eiGHt readinG s James mcBride in readin • Recognition as a “Season Subscriber” in each reading program COlUm mcCann GeOrGe saUnders eliZaBetH s trOUt To purchase season tickets on-line or for more details on season subscriber benefits, visit 2013–2014 season tickets on sale! inprinthouston.org To pay by check, fill out the form on the back of this flap.
    [Show full text]
  • Michael Cunningham Marlon James Cristina Henrí K N E a T V R O Presented in Association with N Y S I N Y Y a Z N O Y E U Bis L Quez S N O G N T L
    MICHAEL CUNNINGHAM PAID US Postage 2014 TX Houston ------ Non-Profit Org Non-Profit 2015 INPRINT 1002 No. Permit GEOFF DYER MARGARETT ROOT BROWN DEBORAH EISENBERG READING SERIES CRISTINA HENRÍQUEZ SEASON TICKETS MARGARETT ROOT BROWN $175 KAZUO ISHIGURO The purchase of season tickets, a portion of which is tax-deductible, helps make this series possible. INPRINT MARLON JAMES SEASON TICKET BENEFITS INCLUDE: ŝ Seating in the reserved section for each of the Main 1520 West eight readings. Seats held until 7:25 pm ŝ Signed copy of David Mitchell’s new novel The 77006 Houston, Texas INPRINT READING SERIES READING Bone Clocks available for pick up on the evening of his reading ŝ Access to the first-served “Season Subscriber” book-signing line DAVID MITCHELL ŝ Two reserved-section guest passes to be used ------ 2014 2015 during the 2014/2015 season ŝ Four free parking passes for the January–April ANTONYA NELSON 2015 readings for the Alley Theatre garage, across the street from the Wortham Center. ŝ Recognition as a “Season Subscriber” in each reading program KAREN RUSSELL 2014/2015 season tickets on sale! tickets season 2014/2015 To purchase season tickets on-line or for more MARY S ZYBIST details on season subscriber benefits, visit inprinthouston.org To pay by check, fill out the form on the back of this flap. KEVIN YOUNG PRESENTED IN ASSOCIATION WITH t h i s i s a b o o k m a r k BRAZOS BOOKSTORE AND UNIVERSITY OF HOUSTON CREATIVE WRITING PROGRAM ZIP The Inprint Margarett Root Brown Reading Series, now CITY in its 34th DEARseason, is made possible by the support of The Brown Foundation, Inc., Weatherford International, the NationalFRIENDS Endowment for the Arts: Art Works, and our season subscribers.
    [Show full text]
  • Differentiating Kinetic and Cyber Weapons to Improve Integrated
    Aviation electronics technician 3rd class conducts maintenance on aircraft targeting systems in aircraft intermediate maintenance department maintenance shop on USS Ronald Reagan, Philippine Sea, July 25, 2020 (U.S. Navy/Jason Tarleton) principles for shows of force, deter- Differentiating rence, proportionality, and rules for warfare that rely on predictable and repeatable characteristics of the physical weapons employed. The advent of cyber Kinetic and Cyber warfare in the modern era, however, has illustrated that the assumptions used for the employment of kinetic weapons Weapons to Improve do not necessarily apply to the employ- ment of cyber capabilities. For example, unlike a physical missile or bomb, it is Integrated Combat difficult to predict the precise effects, measure the resulting proportionality, or estimate the collateral effects atten- By Josiah Dykstra, Chris Inglis, and Thomas S. Walcott dant to the use of a computer virus. As we discuss, the differences between kinetic weapons and cyber weapons arfare, with a history as old are discernible, manageable, and have as humanity itself, has been far-reaching implications for strate- Dr. Josiah Dykstra is a Technical Fellow in the predominantly conducted gic military doctrine, planning, and Cybersecurity Collaboration Center at the National W Security Agency. Chris Inglis is the Robert and through the application of physical operational employment in both power Mary M. Looker Professor in Cyber Security Studies force to disrupt, degrade, or destroy projection and defense. at the U.S. Naval Academy. Thomas S. Walcott is the Technical Director in the Cyber National physical assets. That long history has In order to wage and win modern Mission Force at U.S.
    [Show full text]
  • Refocusing Cyber Warfare Thought Maj Sean C
    Cyber Focus Feature Refocusing Cyber Warfare Thought Maj Sean C. Butler, USAF n September 2007, more than 65 subject matter experts from around the Air Force gathered at the US Air Force Academy to dis- cuss the way ahead for institutionalizing cyber training and force I 1 development. This occasion followed the establishment of a provi- sional Air Force Cyber Command (AFCYBER) (a major command) in November 2006, which itself followed the Air Force’s incorporation of cyberspace into its mission statement less than a year prior. Cyber power advocates of the decade leading up to this point were finally building momentum for establishing cyberspace as a fully recognized war-fighting domain. Unfortunately, these victories came at a cost—a fact that started to become evident at the 2007 conference.2 Conference organizers showed participants the definition of cyber- space adopted by the Department of Defense (DOD) in its National Military Strategy for Cyberspace Operations, published in 2006: “A domain January–February 2013 Air & Space Power Journal | 44 Cyber Focus Feature Butler Refocusing Cyber Warfare Thought characterized by the use of electronics and the electromagnetic spec- trum to store, modify, and exchange data via networked systems and associated physical infrastructures.”3 They also described the outline of the Air Force’s plan for structuring the cyber career field, with two primary cyber “shredouts” for computer network operators and combat systems (electronic warfare [EW]) officers.4 Almost immediately, this revelation led to some uncomfortable questions and awkward implica- tions. Why had the service placed two vastly different career fields into a single training pipeline? Does radar jamming belong to the same class of warfare as computer network “hacking”? Does this mean we should consider the airborne laser part of cyber warfare since it uti- lizes the electromagnetic spectrum (EMS)? The participants, experi- enced Airmen who hailed from both sides of the divide, asked these and other questions, leaving them largely unanswered.
    [Show full text]
  • Negative Reviews of Falling Man
    Schweighauser and Schneck 1 Do not cite. Schweighauser, Philipp and Peter Schneck. "Introduction: The American and the European DeLillo." Terrorism, Media, and the Ethics of Fiction: Transatlantic Perspectives on Don DeLillo. Ed. Schneck and Schweighauser. New York: Continuum, 2010. 1-15. The published version of this essay is available here: http://www.bloomsbury.com/us/terrorism-media-and-the-ethics-of-fiction- 9781441139931/ Prof. Dr. Philipp Schweighauser Assistant Professor and Head of American and General Literatures Department of English University of Basel Nadelberg 6 4051 Basel Switzerland Phone Office: +41 61 267 27 84 Phone Secretary: +41 61 267 27 90 Fax: +41 61 267 27 80 Email: [email protected] Schweighauser and Schneck 2 Prof. Dr. Peter Schneck Director of the Institute for English and American Studies University of Osnabrück Neuer Graben 40 Room 123 D-49069 Osnabrück Germany Phone: +49 541 969 44 12 or +49 541 969 60 42 Fax: +49 541 969 42 56 Email: [email protected] Introduction: The American and the European DeLillo Philipp Schweighauser and Peter Schneck In Mao II (1991), Don DeLillo lets his protagonist, the novelist Bill Gray, speak words that have been read as eerily prophetic in the aftermath of 9/11: "Years ago [...] I used to think it was possible for a novelist to alter the inner life of the culture. Now bomb-makers and gunmen have taken that territory. They make raids on human consciousness" (41). While the collective imagination of the past was guided, DeLillo seems to suggest, by the creative order and ethos of narrative fictions told by novelists, our contemporary fantasies and anxieties are completely controlled by the endless narratives of war and terror constantly relayed by the mass media.
    [Show full text]