5 Cyberspace Characteristics
Cyberspace superiority
The degree of advantage possessed by one force over another that permits the conduct of ops in cyberspace without prohibitive interference by the opposing force
Counter-cyber
Integrates offensive and defensive operations to maintain superiority
Offensive Counter Cyber (OCC)
Offensive operations to deny , degrade, etc an adversary’s ability to use cyberspace
Defensive Counter Cyber (DCC)
Defensive measures designed to detect, identify, etc enemy forces attempting to penetrate attack through cyberspace
Title 18
Law enforcement
Title 50
Intelligence
Title 10
Wartime
Cyberspace Control
Construct defining measures:
Cross-Domain Operations
Capabilities to leverage achieve effects in other domains:
Supervisory Control and Data Acquisition (SCADA)
Employed to control, manage large complex systems such as industrial systems
Operational Considerations
Cyberspace objectives
3 key strategic objectives:
Joint Publication 3-13
Defines Information Operations (IO) as the integrated employment of Electronic Warfare, etc
JP 1-02
Defines Information Assurance (IA) shields and preserves information and information systems
Air Force Doctrine Document (AFDD) 2-5
Defines Network Warfare Operations (NW Ops) as the integrated planning, etc of military capabilities to achieve the desired effects
Defense Information Systems Agency (DISA)
Lead agency in developing and implementing the GIG
Global Information Grid (GIG)
Includes all owned and leased communications and computing systems and services to achieve information superiority
GIG Components (7)
National Security Strategies
National Security Strategy (NSS) - id’s national security concerns
National Defense Strategy (NDS) - derived from NSS and the baseline document for the NMS
National Military Strategy (NMS) - define strategic guidance for preparing for and conducting ops
C2 Relationships