Controlling Your Own Battlespace
Cyberspace as Battlespace - by Kenneth Geers
Cyberspace as Battlespace - White Paper - by Kenneth Geers
Cyber espionage has existed for more than a generation, and to some degree, it was a natural evolution of spycraft. More recently, however, militaries have begun to use cyber strategies and tactics as a new dimension of warfare, with serious consequences for the civilian world. A computer hack is a versatile weapon – information technology is ubiquitous, interconnected, and used to manage not only frontline troops but also national critical infrastructures. In preparation for future wars, military hackers must compromise computer networks around the world in advance, turning them into de facto occupied ground – in peacetime. Can network security, law enforcement, and counterintelligence answer this threat? Anonymity, plausible deniability, and national sovereignty can provide attackers with a safe haven. Strategic cyber defense will require technical know-how, traditional military might, and allies.