Ver Suplemento Temático...


Seguridad de la Información y Protección de Datos.
Seguridad Colectiva y Defensa Nacional.

 

 Expertos

RAND Corporation


("Research and development") is an American nonprofit global policy think tank originally formed by Douglas Aircraft Company to offer research and analysis to the United States Armed Forces

Tactical Cyber: Building a Strategy for Cyber Support to Corps and Below


 
Preface

This report documents research conducted as part of the Project
“Building a Strategy for Cyber Support to Corps and Below.” R AND Arroyo Center was asked by U.S. Army Cyber Command’s G35 office to develop and document an Army strategy for providing cyber support to corps and below (CSCB) units that describes how the Army should use its available resources to achieve mission objectives. CSCB is synonymous with tactical cyber operations: Both refer to actions in and through the cyberspace domain in support of tactical operations. CSCB is of increasing importance as the Army and other services develop strategies to seamlessly incorporate actions in the cyberspace
domain with activities in the traditional warfighting domains (land, air, maritime, and space).
 
This document proposes a strategy for tactical Army cyber operations. We enumerate overarching goals, objectives, and associated activities. As part of this strategy, we describe what the Army, as an institution, needs to do to realize a vision for tactical cyber operations. In addition, this report discusses the incorporation and use of offensive cyber operations, specifically at the tactical level. Three instructive case studies and lessons from these case studies are presented in this report.

This research should be of interest to those involved in developing
strategies for Army cyberspace operations, including U.S. Army Cyber Command, U.S. Army Forces Command, U.S. Army Intelligence and Security Command, and First Information Operations Command.
 
This research was sponsored by U.S. Army Cyber Command and conducted within R AND Arroyo Center’s Forces and Logistics Program. R AND Arroyo Center, part of the R AND Corporation, is a federally funded research and development center sponsored by the U.S. Army.

The Project Unique Identification Code (PUIC) for the Project that produced this document is HQD156898.

Future U.S. Army cyber operations will need to be conducted jointly
and at all echelons and must include both defensive and offensive components. The Army is now developing doctrine, concepts, and capabilities to conduct and support tactical cyber operations. We propose the following vision statement:
 
The Army will be able to employ organic cyber capabilities at the tactical echelon with dedicated personnel in support of tactical units while operating with existing authorities; build trust and operate with joint, interagency, intergovernmental, and multinational (JIIM) partners; and prepare to operate with authorities it might gain in the future to enhance current capabilities.
 
Based in part on observations from cyber pilot exercises with embedded cyber personnel, tactical units will need to:

defend tactical assets and key cyber terrain (critical systems, services, and key nodes), including mission command systems, weapon systems, and vehicles

enable effects through tactical cyber operations.

Implementation Approach

Three case studies help identify guidelines for implementing this visión and the corresponding goals, especially with regard to tactical cyber operations. These case studies are
 
1. the experiences of the Joint Interagency Task Force–South (JIATF-S) organization

2. the U.S. Marine Corps’ use of signals intelligence (SIGINT) capability at tactical echelons

3. the use of armed drones during Operation Enduring Freedom. These case studies demonstrate the following best practices toward implementing a strategy for operationalizing tactical cyber operations.

4. Respect constraints. Plan to coordinate with higher echelons.

5. Be patient. Accept the need to acquire independence, cooperation, access, and other benefits incrementally.

6. Operate/learn by doing. Reap the benefits of “doing” at exercises, with JIIM partners and at home station (when brigade combat teams or elements at other tactical levels are not
deployed).

7.
Seek win-win. Have all partners understand “what’s in it for me?”

8.
Be there. Establish and maintain a relationship between personnel who will conduct tactical offensive cyber operations and the partner agencies and organizations with which they will fre-quently interact.
 

Suplemento Temático: Ciberguerra y Ciberterrorismo

 


Fuente: RAND Corporation
Fecha: 2017

   Mas artículos de RAND Corporation        Otros Expertos   

Este experto ha sido visto por 78 personas.