War in the Third Domain the Maneuver Space Is the Electromagnetic Spectrum, Where Forces Range Globally at the Speed of Light

War in the Third Domain the Maneuver Space Is the Electromagnetic Spectrum, Where Forces Range Globally at the Speed of Light

War in the Third Domain The maneuver space is the electromagnetic spectrum, where forces range globally at the speed of light. By Hampton Stephens hen the Air Force Nearly a quarter of a century later, already is providing combat capabilities formed Air Force Space though, it’s deja vu all over again. The in cyberspace to the unified US Strategic Command in 1982, it Air Force has come to recognize cyber- Command and combatant commanders, Wmarked formal recognition that space space, like “regular” space, as an arena according to Air Force officials. was a distinct operating arena. The first of human activity—including armed Cyber Command has in place systems commander, Gen. James V. Hartinger, activity. It is, to reprise Hartinger, a and capabilities for integrating cyber op- said, “Space is a place. ... It is a theater theater of operations. erations into other Air Force global strike of operations, and it was just a matter of The Air Force took a first big organi- options. All that is lacking, according to time until we treated it as such.” zational step along those lines last fall. one top official, are the “organizational Meanwhile, around that same time, Air Force Secretary Michael W. Wynne and operational constructs” to integrate sci-fi author William Gibson published and Gen. T. Michael Moseley, Chief of cyber ops with those of air and space a novel entitled Neuromancer, a work Staff, announced a plan to form a new operations. that gave the world a strange new Cyber Command to be established by The Air Force believes it must be able term—“cyberspace.” The book didn’t Lt. Gen. Robert J. Elder Jr., head of 8th to control cyberspace, when need be, as call cyberspace “a place” but a “con- Air Force. Its purpose: Organize, train, it at times controls the air. The goal is sensual hallucination” of billions of and equip forces for cyber-war. to make cyberspace capabilities fully humans. Few military men gave it much Though Cyber Command has not yet available to commanders. thought. reached full major command status, it “Almost everything I do is either on 58 AIR FORCE Magazine / April 2007 ics and the electromagnetic spectrum Why is the Air Force only now to store, modify, and exchange data demarcating and defining cyberspace via networked systems and associated as an operational domain? In the past physical infrastructures.” several years, it has been made critically Thus, said Kass, the virtual world important by the emergence of two inter- is “like air, space, land, and sea”—all related factors. The confluence of these places in which US forces operate. The developments has created a worrisome, whole electromagnetic spectrum consti- if not explosive, situation. tutes the maneuver space, where forces Rise of the cyber badlands. Simply range globally at the speed of light. put, cyberspace has become major bad-guy This is a startlingly expansive con- territory. Air Force officials say it never cept. Moseley, in fact, has quipped that has been easier for adversaries—whether cyberspace today includes everything terrorists, criminals, or nation-states—to “from DC to daylight”—that is, direct operate with cunning and sophistication current to visible light waves. in the cyber domain. Kass said there is “recognition by our We Fight There leadership that ... cyberspace is a domain Kass added that the cyber world in which our enemies are operating, and comprises not just computer networks operating extremely effectively because but also any physical system using any they’re operating unconstrained.” of various kinds of electromagnetic When it comes to cost and skill, the energy—“infrared waves, radio waves, barriers to entry are indeed low. “You microwave, gamma rays,” she said, “and don’t have to be a rocket scientist,” rays we have not thought about.” said Kass. The ubiquity of low-cost By this definition, someone who uses off-the-shelf cyber technology means a computer to crash a Web site used by would-be cyber-warriors don’t need terrorists has carried out a cyber opera- governmental financing or even backing tion. The same can be said of someone of a well-organized criminal or terrorist who jams local cell phone traffic to keep network. the enemy from detonating a remotely “One has to have concern about a controlled bomb. Using a space-based range of potential adversaries, includ- satellite to collect infrared imagery? ing other nation-states, including terror That, too, is a cyber operation. networks and ... transnational criminal “You could actually say that opera- enterprises,” says John Arquilla, author tions in cyberspace preceded operations of Networks and Netwars and a profes- in the air,” Kass maintained. After all, sor at the Naval Postgraduate School in the telegraph—“the Victorian Inter- Monterey, Calif. Staff illustration by Zaur Eylanbekov net”—ran on electricity and was a tool Arquilla also worries about a “wild- of military operations. It was a cyber card” threat: “individual hackers of very an Internet, an intranet, or some type weapon, she said. great skill.” of network—terrestrial, airborne, or The Air Force’s goal is plain: to be He believes 21st century warfare is spaceborne,” said Gen. Ronald E. Keys, able to operate in and, if necessary, a new animal, one in which nonstate head of Air Combat Command, Langley dominate this nebulous, artificial “place” actors have more prominence than ever AFB, Va. “We’re already at war in cy- in which humans interact over networks before. The cyber domain is tailor-made berspace—have been for many years.” without regard to physical geography. It for this new kind of warfare, he added, The creation of Cyber Command is USAF’s third domain of combat. and traditional militaries neglect it at the received not only lots of attention but Wynne and Moseley on Dec. 7, 2005 peril of the states they are defending. also produced lots of confusion. What, published a new mission statement for “As opposed to traditional physical actually, does its establishment mean for the service. In it, cyberspace joined “air” warfare where you tend to focus on the the Air Force? For the US military? and “space” in the catalog of Air Force major militaries of the time, here you In answering the questions, definitions domains. They said that the Air Force, have to give equal attention to a great are surprisingly important. Lani Kass, from now on, would “fly and fight in nation as well as to a particular network,” special assistant to the Chief of Staff air, space, and cyberspace.” said Arquilla. “And of course there may and director of the Chief’s Cyberspace Kass and her colleagues on the Cyber- be ties between nations and networks, Task Force, is at pains to declare that space Task Force see this development like the link between a Hezbollah and cyberspace is not a mission, not an as a historic step. In Kass’ office hangs an Iran.” operational method or technique, and a painting that depicts two World War Growth of US vulnerability. Cyber- not just about computers. I biplanes—one American, one Ger- space has become a potentially great US “Cyberspace is a warfighting domain,” man—in a swirling dogfight. Kass said military Achilles heel. The Air Force Kass said flatly. it reminds her that today’s airpower, so has never been so heavily dependent The National Military Strategy for supremely advanced and sophisticated, on cyberspace as a medium supporting Cyberspace Operations, adopted in had humble origins and that cyber critical systems. 2006, defines cyberspace as “a domain power stands at a comparable stage in “Military activities in all domains— characterized by the use of electron- its development. air, land, sea, space—and our way of AIR FORCE Magazine / April 2007 59 life increasingly depend on our ability Al Qaeda has focused heavily on using in 1999. Later, the then-Chairman of to operate in the cyber domain,” Kass the Internet for recruiting, fund-raising, the Joint Chiefs of Staff, Army Gen. noted. and propaganda-spreading. However, Henry H. Shelton, said, “We only used It follows that the loss or compromise it also has trained its operatives “in our capability to a very limited degree,” of these systems would bring catastro- computer network attack techniques,” but with apparent success. phe. American adversaries cannot con- Arquilla said. USAF’s dive into the cyber world front the world’s most powerful military As for nations, China and Russia brings not only gains but also certain head on, so they look to exploit chinks generally are viewed as the greatest risks. in the US armor. Cyberspace contains potential threats. For civil libertarians, cyber opera- many such chinks because the nation’s “China is one of the more active tions cause jitters, which Kass insisted military power is more dependent than countries in thinking through the whole are overblown and are, in any event, ever on systems based on the electro- business of cyberspace-based opera- offset by the benefits of US power in magnetic spectrum. tions,” said Arquilla. Beijing’s cyber- this area. space thrust comports with the Chinese What’s Important military’s well-documented practice Early Cases “The Air Force in particular has some of using asymmetric tactics against its Keys, for his part, noted the potential very highly automated systems upon superpower military rival. for confusion in defining which service which it’s reliant,” said Arquilla. He Evidence of Chinese interest comes entity does what. “There’s more to noted, for example, the development in the form of statements of Chinese cyber than just computers. I mean, it’s of an air tasking order, or ATO. Today, officials, as well as past incidents.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us