Title :
Fighting power, targeting and cyber operations
Author :
Ducheine, Paul ; van Haaster, Jelle
Author_Institution :
Netherlands Defence Acad., Univ. of Amsterdam, Amsterdam, Netherlands
Abstract :
This article contributes to the operationalisation of military cyber operations in general, and for targeting purposes, either in defence or offence, in particular. The role of cyber operations in military doctrine will be clarified, its contribution to fighting power conceptualised, and the ramifications on targeting processes discussed. Cyberspace poses unique challenges and opportunities; we distinguish new elements that may be used for targeting inter alia for active defence purposes, namely cyber objects and cyber identities. Constructive or disruptive cyber operations aimed at these non-physical elements provide new ways of attaining effects. Assessing the outcome of these cyber operations is, however, challenging for planners. Intertwined network infrastructure and the global nature of cyberspace add to the complexity, but these difficulties can be overcome. In principle, the targeting cycle is suitable for cyber operations, yet, with an eye to (a) the effectiveness of offensive and defensive operations, and (b) legal obligations, special attention will be required regarding effects in general, and collateral damage assessment in particular.
Keywords :
law; military computing; collateral damage assessment; constructive cyber operation; cyber identities; cyber objects; cyberspace; defensive operation; disruptive cyber operation; fighting power; legal obligations; military cyber operations; military doctrine; offensive operation; targeting cycle; targeting purpose; Cyberspace; Educational institutions; Ethics; Instruments; Law; US Department of Defense; cyber operations; cyberspace; doctrine; fighting power; operations; targeting;
Conference_Titel :
Cyber Conflict (CyCon 2014), 2014 6th International Conference On
Conference_Location :
Tallinn
Print_ISBN :
978-9949-9544-0-7
DOI :
10.1109/CYCON.2014.6916410