GPS News  
Training A New Generation Of Cyber Strategic Leaders Part Four

Although decentralized, cyberspace remains dependent on the physical network of computer servers, fiber-optic cables and the immense system of cables that have been laid across the world's oceans.
by James Carafano | Eric Sayers
Washington (UPI) Feb 23, 2009
The U.S. government and armed forces need to develop the knowledge, skills and attributes required for cyber-strategic leaders. And that next generation of leaders needs to understand the cyber environment.

Beginning in 1988 with the infamous "Morris Worm" attack, cybersecurity has grown in importance along with the degree of reliability the United States and other nations have placed on the cyber domain.

The effectiveness of cyber warfare stems from its dynamic characteristics. In addition to low costs to entry, making it more attractive to terrorists and other non-state actors inclined to pursue low-end asymmetric strategies, the historical boundaries of warfare do not apply to the cyber realm.

Although decentralized, cyberspace remains dependent on the physical network of computer servers, fiber-optic cables and the immense system of cables that have been laid across the world's oceans. A familiarity with the physical aspects of cyberspace forms the foundation of a larger education on the topic.

The complexities of cyberspace begin with the distinction between its two existing theaters. First, the commercial Internet. Reserved for the day-to-day activities of the public and traditionally the target of non-state actors, the vulnerability of this theater has been magnified in the wake of the Estonia and Georgia cyberattacks that occurred in April and May 2007 and August 2008, respectively. Second, the military network.

Over the past two decades, as the military has attempted to enhance its war-fighting capabilities through network-centric warfare, an increased reliability on information technology has had the cumulative effect of ensuring a growing liability should the network fall under attack. Rebecca Grant has documented this development in her study "Victory in Cyberspace," published by the Air Force Association, October 2007, at http://www.afa.org/media/reports/victorycyberspace.pdf.

There are various types of actors who may pose a threat to the commercial and military cyber networks. First are the individuals acting on their own to exploit security gaps or commit cyber crimes, such as identify theft. These hackers are commonly referred to as "Black Hats."

Second, cyber terrorists attempt to manipulate the cyber environment to advance political or social objectives, as documented by James Jay Carafano and Richard Weitz in their paper "Combating Enemies Online: State-Sponsored and Terrorist Use of the Internet," Heritage Foundation Backgrounder No. 2105, Feb. 8, 2008, pp. 3-4, at http://www.heritage.org/Research/nationalSecurity/bg2105.cfm.

(Part 5: How Islamist hackers take advantage of the Internet to wage asymmetrical warfare against the West)

(James Jay Carafano, Ph.D., is assistant director of the Kathryn and Shelby Cullom Davis Institute for International Studies and senior research fellow for national security and homeland security in the Douglas and Sarah Allison Center for Foreign Policy Studies, a division of the Davis Institute, at the Heritage Foundation. Eric Sayers is a research assistant in the Allison Center for Foreign Policy Studies at the Heritage Foundation.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Resilience In The Face Of Sustained Cyber Attack Part Three
Washington (UPI) Feb 19, 2009
Efforts to safeguard the U.S. homeland tend to focus solely on the unrealistic task of protecting infrastructure. However, the politically charged "failure is not an option" approach to classify all infrastructure as "critical" is detrimental to prioritizing national security missions.







  • Swiss aircraft firm to cut jobs in Ireland
  • Major airlines call for climate deal to include aviation
  • Bank of China extends massive credit to state aircraft maker
  • Shanghai Airlines seeks capital injection

  • China's Chery Auto unveils electric car: company
  • Electric car charging stations power-up in San Francisco
  • Chinese auto maker plans to take on giants with electric cars
  • Nearly 1,500 more cars in Beijing daily: state media

  • Boeing Delivers First Communications Payload To MUOS Prime Contractor
  • Raytheon Delivers Final Sentinel R Mk 1 Aircraft For UK ASTOR System
  • USAF Awards LockMart Team Contract To Extend TSAT Risk Reduction/System Definition Phase
  • Major Test Of Second Advanced EHF MilComms Satellite Underway

  • BMD Watch: LM wins Aegis upgrade contract
  • BMD Focus: Biden dances in Munich
  • Obama team urges Polish patience on shield
  • Does Missile Defense Discourage Nuclear Proliferation Part 14

  • New study points to GM contamination of Mexican corn
  • Aerosols - Their Part In Our Rainfall
  • Mass Media Often Failing In Its Coverage Of Global Warming
  • Biologist Discusses Sacred Nature Of Sustainability

  • One killed in Romanian military lab explosion
  • Rudd says Australia will rise from 'ashes of despair'
  • China quake victims clash with police: rights group
  • Australian wildfire death toll rises to 208: police

  • Eight Years In Orbit For Swedish Research Satellite
  • Satellite Collision Debris May Hamper Space Launches
  • Impact Specialist To Discuss Catastrophic Collisions In Space
  • Satellite Collision Triggers Calls For Space Traffic Regulations

  • U.S., Chinese scientists build nanorobot
  • NASA And Caltech Test Steep-Terrain Rover
  • NASA And Caltech Test Steep-Terrain Rover
  • ASI Chaos Small Robot To Participate In Series Of Exercises

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement