Cyber Warfare and US National Security by Ari Basen

Total Page:16

File Type:pdf, Size:1020Kb

Cyber Warfare and US National Security by Ari Basen Cyber Warfare and US National Security By Ari Basen ! USAF Network Operations Command Center at Lackland Air Force Base, Texas ! ! Senior Capstone Advisor: Prof Boaz Atzili School of International Service University Honors in International Studies ! Spring 2014 ! ! ! ! ! ! ! Table of Contents! ! Acknowledgements i! ! Abstract ii! ! Introduction 2! ! Scope and Purpose 5 ! ! Research Design 6! ! Literature of Cyber Warfare 7! ! Clausewitz and Cyber War 12! ! Deterrence and Cyber Warfare 17 ! ! Compellence and Cyber Warfare 20! ! Cyber as a Strategic Weapon 24! ! Cyber as a Component to Electronic Warfare 29! ! Virtual Warfare 35! ! Principles of Cyber Warfare 41! ! Conclusions 48 ! ! Further Reading 49 ! ! Glossary of Selected Terms 50 ! ! !Works Cited 52! Acknowledgements! ! ! I would like to thank Professor Davy Banks for his numerous hours of advice and counsel during this project and without whom this Capstone would be far cry from it is today.! ! !I would also like to thank Emma Humphreys for her boundless patience in dealing with me through all the long nights as I worked on this project and who also tolerated going through all 24,000 words of this Capstone in order to make sure it was !proofread before submission. ! !I want to thank and apologize to Professor Boaz Atzili who certainly did not fully comprehend what he was signing up for when he took on the position as Capstone Advisor. I apologize in advance because this piece is double the length required for a Master’s thesis and nearly 25% of the way towards the length of Doctoral dissertation. I implore you not to hold this against me as you! grade this monster of a paper. ! ! i ! Abstract! !Talk of cyber attack and cyber warfare abound within the public discourse. Cases such as Russia’s cyber attacks on Estonia Georgia, the American/Israeli Stuxnet operation, and China’s incessant breaches of US networks are held up as examples of the ongoing ‘war’ within cyberspace. Senior policy makers from the Departments of Defense and Homeland Security have made dire warnings of a imminent “cyber Pearl Harbor” or “cyber 9/11” yet to date there has yet to be a cyber attack which has killed anyone.1 The purpose of this Capstone is to cut through the bellicose rhetoric and to examine the emergent phenomenon known as “cyber warfare.” This piece uses established strategic thought and military doctrine as a foundation to analyze the place of cyber operations within the broader spectrum of military operations. This piece applies a diverse set of military theories from deterrence to strategic airpower to electronic warfare doctrine in order to establish a theoretic understanding of cyber warfare. This Capstone concludes with a set of Principles of Cyberwarfare which summarizes the observations made and should serve to ground future discussions of the topic. " 1 Rid ii Introduction! ! ! War has been a function of humanity since its inception as a sentient species. Warfare has long served as a catalyst for technological development and a driver of societal change. With every new domain discovered, we have invented new tools to capitalize on this discovery and spread our conquering spirit. From stones and spears to UAVs and ICBMs, humanity has sought to extend the distance of its lethal reach. The technology may have matured exponentially but the primal impulse to use violence to !propagate our will has remained eternal. ! !What we know today as the Internet was originally conceived by the scientists of the Defense Advanced Researched Project Agency as an open source, self organizing means to build and maintain the military command and control network in the event of a Soviet nuclear attack. This ARPANet or Advanced Research Projects Agency Network, was developed in the early 1970s to connect and process the tremendous amount of data gathered from the hundreds of radar stations spread across the North American continent. This early network fed data into a primary processing and early warning center buried into the Cheyenne Mountain in Colorado Springs, which would become !the headquarters of NORAD and today’s US Strategic Command.2 ! !Computer scientists at various institutions began to apply this networking concept to their own work as a means to automatically connect, process, and share their research with other academics spread across the country. This network of academic institutions would evolve in the 1980s into a system maintained by the National Science Foundation known as the NSFNET.3 Outside of this academic environment, the first real commercial application of computer networks was to link together the various banks across the country in order to automate the processing of bank checks.4 These two networks would evolve and grow internationally over the course of the next decade to become the commercial Internet of today, which was not released publicly until 1995.5 The public commercial Internet would go onto grow over the next 20 years to become an integral fixture in lives of 2.5 billion people and it is actively growing still and at an accelerating rate.6 Today, there are roughly 10 billion networked devices in the world and it is projected that by mid-century this number will grow to 50 billion devices, !marshaling in an age known as the “Internet of Everything.”7 ! 2 “Public Key Cryptography: What is it?” 3 "The Internet - The Launch of NSFNET." 4 “Public Key Cryptography: What is it?” 5 "The Internet - The Launch of NSFNET." 6 "World Internet Users Statistics Usage and World Population Stats." 7 "The Computer Guy", Eli. #2 !The first malicious act launched against the Internet was committed by Robert Morris, a student of Cornell University, in 1988. This worm was originally designed as a test intended to map the Internet. However, as an untended side effect, as it propagated across the numerous machines connected to the Internet, it drained their computing resources to the point they crashed and became unusable.8 This worm would be the first of billions to have an adverse effect usability of a networked system and the people who !use them. ! !As banks, merchants, and entrepreneurs flocked to the open pastures of the Internet, the wolves of the population soon followed. These hackers sought to prey upon a naive public to steal financial information, intellectual property, and even state secrets for their own gain. As individuals, companies, and even nations outsourced their operations and infrastructure to computer networks, it created a strategic vulnerability which could be exploited by any adversary with sufficient knowledge of computer systems. Thus The original floppy disk which the Morris Worm was launched from the field of cyber security evolved in order to ensure the MIT, Circa. 1988. On Display at the confidentially, integrity, and availability of data and the systems which use it.9 However, this exceptionally broad field comprises everything from a bored teenager defacing some websites to a rival nation-state compromising the integrity US government’s Joint Worldwide Information Communications System (JWICS) which forms the digital backbone for all classified US !government communications rated Top Secret and above.10 ! ! The US military, and the militaries of any developed country, rely on data networks for everything from command and control to target acquisition for guided munitions. An attack which compromised the US military’s NIPRNet which controls the bulk of the DoD’s logistical routing could significantly degrade the DoD’s operational effectiveness worldwide.11 A scheming adversary could use an attack against the NIPRNet to upend the supply chain to a warzone, sending toothbrushes to troops instead of ammunition.12 Penetrating the SIPRNet which is used to carry classified information like operational orders would allow an adversary to eavesdrop on troop 8 Keyhoe. 9 See Glossary for the meaning and a discussion of these terms. ! Singer, p. 35 10 Priest. (Kindle Edition) Location 4609. 11 NIPRNet=Non-Secure Internet Protocol Routing Network. See:"NIPRNet Definition from PC Magazine Encyclopedia." 12 Singer p. 131 #3 movements and even potentially issue erroneous orders.13 This type of attack on the integrity and confidentiality of these networks would shake the trust of the users reliant on them. Even after the malware has been removed the system, the commanding officer may decide that he cannot rely on this system and scrap it entirely in favor of “old school” communications methods such as infrared light pulses in morse code or even all the way back to message couriers.! !! !The United States and its NATO allies are not alone in their reliance on computer networks for the continuity of their operations. China, Russia, Iran, and other potential nation-state adversaries all use TCP/IP based networks for their communications and operations as this represents the primary set of rules by which digital information is sent and received across the globe.14 Non-state threat actors from al Qaeda, the Sinaloa Cartel of Mexico, and the Russian Business Network15 all use the Internet to enhance of their operations: be it spreading propaganda, synchronizing the shipments of cocaine, or distributing malware which steals credit card information. The open, free, and ad hoc design of the Internet allows anyone, regardless of their intent or affiliation, to gain access to this domain in order to advance their respective agenda. This creates a constellation of potential adversaries across an incredibly diverse spectrum of intentions !and capabilities. ! ! ! ! ! ! ! ! ! ! ! ! ! 13 SIPRNet= Secret Internet Protocol Routing Network. See: "NIPRNet Definition from PC Magazine Encyclopedia." 14 TCP/IP stands for Transmission Control Protocol and Internet Protocol. It describes a suite of protocols for how packets of information are routed across the globe from the MacBook Pro this paper was written on all the way up to the massive server farms employed by the tech giants of Apple, Google, and Microsoft.
Recommended publications
  • Analysis of Cyberwarfare Ethics As It Pertains to Civilian Computer Networks/Infrastructures
    Analysis of Cyberwarfare Ethics as It Pertains to Civilian Computer Networks/Infrastructures Vanessa Paradine Terms of Reference and Scope The Department of Defense (DoD) currently operates more than fifteen thousand different computer networks across four thousand military installations around the world, with as many as seven million DoD computers and telecommunications tools in use in eighty-eight countries.1 These networks experience over six million unauthorized probes per day.2 Due to the close integration of DoD and commercial networks, an attack within the cyber domain may significantly impact critical civilian infrastructures and networks. For the purpose of this article, the following definitions are pro­ vided: • Cyberspace, as defined by the National Security Presidential Di­ rective 541H0meland Security Presidential Directive 23, is "the interdependent network of information technology infrastruc­ tures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries."3 • Cyberspace operations is defined as "the employment of cy­ berspace capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace."4 • Cyberwarfare/cyberattack has not been defined by the Depart­ ment of the Defense (DoD); however, according to Deputy Defense Secretary William J. Lynn III, it can include a range of things-"from exploitation and exfiltration of data to degrada­ tion of networks to destruction of networks or even physical equipment, physical property."5 • Cyber Threats6 o Virtual-nonkinetic threats to DoD information networks that are just as real and damaging as physical threats. 34 Internatianal Journal of Intelligence Ethics, Vol. 4, No. 1 / Spring/Summer 2013 Analysis of Cyberwarfare Ethics 35 o Physical-kinetic threats mixed with nonkinetic threats; can severely impact the effectiveness of military joint operations.
    [Show full text]
  • Political Performance and the War on Terror
    The Shock and Awe of the Real: Political Performance and the War on Terror by Matthew Jones A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Centre for Drama, Theatre and Performance Studies University of Toronto © Copyright by Matt Jones 2020 The Shock and Awe of the Real: Political Performance and the War on Terror Matt Jones Doctor of Philosophy Centre for Drama, Theatre and Performance Studies University of Toronto 2020 Abstract This dissertation offers a transnational study of theatre and performance that responded to the recent conflicts in Iraq, Afghanistan, Syria, and beyond. Looking at work by artists primarily from Arab and Middle Eastern diasporas working in the US, UK, Canada, and Europe, the study examines how modes of performance in live art, documentary theatre, and participatory performance respond to and comment on the power imbalances, racial formations, and political injustices of these conflicts. Many of these performances are characterized by a deliberate blurring of the distinctions between performance and reality. This has meant that playwrights crafted scripts from the real words of soldiers instead of writing plays; performance artists harmed their real bodies, replicating the violence of war; actors performed in public space; and media artists used new technology to connect audiences to real warzones. This embrace of the real contrasts with postmodern suspicion of hyper-reality—which characterized much political performance in the 1990s—and marks a shift in understandings of the relationship between performance and the real. These strategies allowed artists to contend with the way that war today is also a multimedia attack on the way that reality is constructed and perceived.
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • The Security Lexicon from Westphalia to the Present a Cautionary Tale
    THE SECURITY LEXICON FROM WESTPHALIA TO THE PRESENT A CAUTIONARY TALE MAX G. MANWARING, PH.D. A new and dangerous dynamic is at work around the world today. That new dynamic involves the migration of some of the monopoly of political power (i.e., the authoritative allocation of values in a society) from the traditional nation-state to unconventional actors such as the Islamic State (ISIS), transnational criminal organizations, Leninist-Maoist insurgents, tribal militias, pri- vate armies, enforcer gangs and other modern mercenaries. These actors conduct their own political-psychological type of war against various state and other non-state adversaries. These violent politicized non-state actors are being ignored; or, alternatively, are being considered too hard to deal with. That misunderstanding must inevitably result in an epochal transition from traditional Western nation-state systems and their liberal democratic values to something else dependent on the values—good, bad, or non-existent—of the winner.1 To help civilian and military leaders, policy-makers, opinion-makers, and anyone else who might have the responsibility for dealing with modern conflict come to grips analytically with the security dilemma and other realities of the 21st century political-psychological environment, this paper seeks to do three things. In Part One, we outline a bit of essential history that takes us from the Westphalian Peace Treaty of 1648 to the present. In that context, we briefly consider a con- temporary example of the traditional military-centric approach to national and international security that is still alive and well. That is, Chinese military activity in the South China Sea.
    [Show full text]
  • Operation Iraqi Freedom
    Operation Iraqi Freedom: A First-Blush Assessment Andrew F. Krepinevich 1730 Rhode Island Avenue, NW, Suite 912 Washington, DC 20036 Operation Iraqi Freedom: A First-Blush Assessment by Andrew F. Krepinevich Center for Strategic and Budgetary Assessments 2003 ABOUT THE CENTER FOR STRATEGIC AND BUDGETARY ASSESSMENTS The Center for Strategic and Budgetary Assessments is an independent public policy research institute established to promote innovative thinking about defense planning and investment strategies for the 21st century. CSBA’s analytic-based research makes clear the inextricable link between defense strategies and budgets in fostering a more effective and efficient defense, and the need to transform the US military in light of the emerging military revolution. CSBA is directed by Dr. Andrew F. Krepinevich and funded by foundation, corporate and individual grants and contributions, and government contracts. 1730 Rhode Island Ave., NW Suite 912 Washington, DC 20036 (202) 331-7990 http://www.csbaonline.org ACKNOWLEDGMENTS The author would like to thank Steven Kosiak, Robert Martinage, Michael Vickers and Barry Watts, who reviewed several drafts of this report. Their comments and suggestions proved invaluable. Critical research assistance was provided by Todd Lowery. His support in chasing down numerous sources and confirming critical facts proved indispensable. Alane Kochems did a fine job editing and proofing the final report draft, while Alise Frye graciously helped craft the report’s executive summary. I am most grateful for their encouragement and support. Naturally, however, the opinions, conclusions and recommendations in this report are the sole responsibility of the author. CONTENTS EXECUTIVE SUMMARY .......................................................................................................... I I. INTRODUCTION ........................................................................................................ 1 II. STRATEGIC IMPLICATIONS ........................................................................................
    [Show full text]
  • National Security and Constitutional Rights in Korea
    National Security and Constitutional Rights in Korea - National Security Law, Past and Present Park Won Soon, Human Rights Lawyer Chair, Executive Committee, PSPD Director, Beautiful Foundation As of 25 August, of the 99 political prisoners in detention, 54 were detained on charges under the National Security Law. Of these, the majority were arrested under Article 7, which punishes membership of organizations deemed to "benefit the enemy", improving relations with North Korea prompted debate on reform of the National Security Law. President Kim Dae-Jung apparently encouraged by his award of the Nobel Peace Prize, announced his support for revisions to the National Security Law, but opposition to reform in the National Assembly from both the GNP and the ULD prevented significant revisions. (Amnesty International Report 2001) 1. Introduction De Facto Constitution - The National Security Law The National Security Law (NSL) in Korea has been called as a de facto constitution. It meas the NSL was under no other laws including the Constitution. Even though it is inferior to the Constitution namely, no legal enforcement agencies and the court could not challenge unconstitutionality of the law in reality. Korean peninsula has been one of the powder magazine where small incident could lead to big armed conflict. As a matter of fact, in 1950, there broke out Korean war in which over 3 million people were killed. Since then, national security has been regarded as the most important and senstive agenda among Korean people. Basic freedom and human rights enshrined in the Constitution has been sacrificed in the name of national security.
    [Show full text]
  • Check out Our Job Listing in the Classifieds Or Go to Careers
    Saturday, January 16, 2016 TV TIME SATURDAY East Oregonian Page 5C Television > This week’s movies Television > Today’s highlights Saturday MAX “The Sixth Sense” +++ (‘99, Thril) (‘14, Bio) (2h) 5:40 p.m. The Kitchen (1h50) HBO3 “Titanic” +++ (‘97, Dra) (3h20) 7:15 p.m. FOOD 11:00 a.m. 4:00 p.m. 10:30 p.m. FREEFORM 6:20 p.m. KPTV +++ “Harry Potter and the Half- The cooking experts share tips “The Usual Suspects” (‘95, AMC “U.S. Marshals” +++ (‘98, Act) Blood Prince” +++ (‘09, Adv) (3h45) MAX “Mimic” +++ (‘97, Hor) (1h50) Cri) (2h) on how to save money in the (3h) TCM “The Pride of the Yankees” ++++ 7:00 p.m. 4:55 p.m. 10:55 p.m. (‘42, Bio) (2h15) TCM “Sense and Sensibility” +++ (‘95, kitchen in this new episode. HBO3 “Milk” ++++ (‘08, Bio) (2h10) MPLEX “The Secret of My Success” 7:25 p.m. Rom) (2h30) Learn which foods can be frozen 5:00 p.m. +++ (‘87, Com) (1h55) MPLEX +++ CMT “Only You” (‘94, Com) 7:15 p.m. and which should be used up “Gran Torino” +++ (‘08, Dra) (3h) 11:00 p.m. (1h35) MPLEX “Little Monsters” +++ (‘89, SYFY “Final Destination” +++ (‘00, STARZ “Mars Attacks!” +++ (‘96, Com) Fam) (1h45) quickly. Katie Lee and Marcela Susp) (2h) 8:00 p.m. (1h50) DISN Valladolid show viewers how to TCM “The Ghost and Mrs. Muir” ++++ “High School Musical 2” +++ (‘07, 7:20 p.m. 11:20 p.m. Fam) (1h55) FREEFORM “Back to the Future II” +++ make two affordable weeknight (‘47, Com) (2h) HBO “The Departed” +++ (‘06, Thril) (‘89, Sci-Fi) (2h40) 9:30 p.m.
    [Show full text]
  • Asymmetric War: a Conceptual Understanding
    Asymmetric War: A Conceptual Understanding M R Sudhir The conventional army loses if it does not win. The guerrilla wins if he does not lose. - Henry Kissinger, 1969 The term asymmetric war is a product of the revolution in military affairs (RMA). It can be taken as fresh jargon to distinguish the modern variant from traditional partisan and guerrilla war conducted by irregular bands using unconventional methods. In short, it is nothing new; only the cosmopolitan veneer is so. Since the Indian Army has vast experience dating to the pre- independence period in combating this form of warfare, there is no major cause for concern in being confronted with yet another outbreak of asymmetric warfare within the country or a new Americanism from military schools and think-tanks of a perplexed superpower. While understanding the term asymmetric war, an attempt is made here to see it in the Indian context, and to recommend measures to combat the same. Understanding Asymmetric War Definition The definition of ‘asymmetric warfare’ is best borrowed from the US from where the term has originated. The 1999 Joint Strategy Review specifically defines “asymmetry as something done to military forces to undermine their conventional military strength.” Asymmetric approaches are attempts to circumvent or undermine military strength while exploiting their weaknesses, using methods that differ significantly from the expected method of operations. Colonel M R Sudhir is Commanding Officer of an Engineer Regiment. 58 CLAWS Journal z Summer 2008 ASYMMETRIC WAR: A CONCEPTUAL UNDERSTANDING Such approaches generally seek a major psychological impact, such as shock or confusion that affects an opponent’s initiative, freedom of action, or will.
    [Show full text]
  • Cognitive Warfare.Pdf
    1 Table of Contents Executive Summary 3 Introduction 5 Evolution of Non-Kinetic Warfare 6 Origins 6 Psychological Warfare (PsyOps) 7 Electronic Warfare (EW) 7 Cyberwarfare 8 Information Warfare 8 Cognitive Warfare 9 Goals of Cognitive Warfare 11 Destabilization 12 Case 1: Destabilization through Confusion 13 Case 2: Destabilization by Sowing Division 15 Case 3: Destabilization as a Means to Influence 17 Influence 20 Case 1: Influencing to Recruit 21 Case 2: Influencing Policy Enactment 22 Case 3: Influencing as a Means to Destabilize 23 Future Threats 27 Looking Ahead 27 Threat 1: Ease of Selection and Virality 29 Threat 2: A New Age of Truth 30 Threat 3: Cyber-induced Institutional Discomfort and Distrust 31 Threat 4: Biological and Therapeutic Emotional Manipulation 32 Threat 5: Enhanced Recruitment of Agents 33 Strategy Recommendations 35 Threat Recognition Framework and Criteria 35 Risk Assessment 36 Organizational Implementations 37 Offensive Considerations 39 Closing Thoughts 40 Bibliography 41 2 Executive Summary Warfare has shifted dramatically over the past several decades, moving away from the physical threats of conventional warfare. War now moves towards the social and ideological threats brought about by mass media and advances in technology. The advent of this new type of warfare is different from anything we have seen before. Although it takes elements from previous types of hybrid warfare, the reach and level of impact it possesses make it far more dangerous than its predecessors. We have dubbed this new way of war cognitive warfare. ​ ​ Cognitive warfare, although sharing various similarities to other non-conventional and non-kinetic types of warfare/operations, is ultimately unique in its execution and purpose.
    [Show full text]
  • On Strategy: a Primer Edited by Nathan K. Finney
    Cover design by Dale E. Cordes, Army University Press On Strategy: A Primer Edited by Nathan K. Finney Combat Studies Institute Press Fort Leavenworth, Kansas An imprint of The Army University Press Library of Congress Cataloging-in-Publication Data Names: Finney, Nathan K., editor. | U.S. Army Combined Arms Cen- ter, issuing body. Title: On strategy : a primer / edited by Nathan K. Finney. Other titles: On strategy (U.S. Army Combined Arms Center) Description: Fort Leavenworth, Kansas : Combat Studies Institute Press, US Army Combined Arms Center, 2020. | “An imprint of The Army University Press.” | Includes bibliographical references. Identifiers: LCCN 2020020512 (print) | LCCN 2020020513 (ebook) | ISBN 9781940804811 (paperback) | ISBN 9781940804811 (Adobe PDF) Subjects: LCSH: Strategy. | Strategy--History. Classification: LCC U162 .O5 2020 (print) | LCC U162 (ebook) | DDC 355.02--dc23 | SUDOC D 110.2:ST 8. LC record available at https://lccn.loc.gov/2020020512. LC ebook record available at https://lccn.loc.gov/2020020513. 2020 Combat Studies Institute Press publications cover a wide variety of military topics. The views ex- pressed in this CSI Press publication are those of the author(s) and not necessarily those of the Depart- ment of the Army or the Department of Defense. A full list of digital CSI Press publications is available at https://www.armyu- press.army.mil/Books/combat-studies-institute. The seal of the Combat Studies Institute authenticates this document as an of- ficial publication of the CSI Press. It is prohibited to use the CSI’s official seal on any republication without the express written permission of the director. Editors Diane R.
    [Show full text]
  • Cyber Warfare a “Nuclear Option”?
    CYBER WARFARE A “NUCLEAR OPTION”? ANDREW F. KREPINEVICH CYBER WARFARE: A “NUCLEAR OPTION”? BY ANDREW KREPINEVICH 2012 © 2012 Center for Strategic and Budgetary Assessments. All rights reserved. About the Center for Strategic and Budgetary Assessments The Center for Strategic and Budgetary Assessments (CSBA) is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s goal is to enable policymakers to make informed decisions on matters of strategy, secu- rity policy and resource allocation. CSBA provides timely, impartial, and insight- ful analyses to senior decision makers in the executive and legislative branches, as well as to the media and the broader national security community. CSBA encour- ages thoughtful participation in the development of national security strategy and policy, and in the allocation of scarce human and capital resources. CSBA’s analysis and outreach focus on key questions related to existing and emerging threats to US national security. Meeting these challenges will require transforming the national security establishment, and we are devoted to helping achieve this end. About the Author Dr. Andrew F. Krepinevich, Jr. is the President of the Center for Strategic and Budgetary Assessments, which he joined following a 21-year career in the U.S. Army. He has served in the Department of Defense’s Office of Net Assessment, on the personal staff of three secretaries of defense, the National Defense Panel, the Defense Science Board Task Force on Joint Experimentation, and the Defense Policy Board. He is the author of 7 Deadly Scenarios: A Military Futurist Explores War in the 21st Century and The Army and Vietnam.
    [Show full text]
  • The Citadel, MA in Military History, CAAL, 05/15/2018 – Page 1 CAAL 05/15/2018 Agenda Item 5K
    CAAL 05/15/2018 Agenda Item 5k New Program Proposal Master of Arts in Military History The Citadel Executive Summary The Citadel requests approval to offer a program leading to the Master of Arts in Military History, to be implemented in Fall 2019. The proposed program is to be offered through online instruction. The chart below outlines the stages of approval for the proposed program. The Advisory Committee on Academic Programs (ACAP) voted to recommend approval of the proposal. The full program proposal is attached. Stages of Date Comments Consideration Program Proposal 2/1/18 Not Applicable Received ACAP Consideration 3/29/18 The Citadel representatives discussed the need for the program, explaining that the program is combined with leadership theory and targets military officers. The College of Charleston representative noted The Citadel and the College of Charleston offer a joint master’s degree in History and the proposed program is separate from that program. Members also commented on the financial support chart and inquired whether it accurately presents the costs and sources of financing of the program. The Citadel representative agreed to revise the chart. Following remaining discussion about the proposal, ACAP members voted to recommend the program proposal. Staff transmitted remaining questions for additional clarity. Comments, questions, 4/3/18 Staff requested revisions to address the following questions as and suggestions from discussed at ACAP or transmitted afterward: CHE staff sent to the • Explain why CIP Code 290201
    [Show full text]