cyberwar · Information operations · Information Warfare

IO Topics In JFQ 2nd Quarter 2019


Joint Force Quarterly 93

(2nd Quarter, April 2019)

Tactics in the Cyber Domain

  • Warrior Women
  • Unity of Command and Military Justice

Source: https://ndupress.ndu.edu/JFQ/Joint-Force-Quarterly-93.aspx


Tactical Maneuver in the Cyber Domain: Dominating the Enemy

By Jennifer Leigh Phillips

Imagine the possibilities if tactical teams could plan a raid that integrated air and ground support, and on-call fires in the cyber domain. This article argues that our national defense organizations invest in capabilities, tactics and training to successfully conduct tactical maneuver in the cyber domain. The Joint Force must be able to visualize and integrate the cyber domain with other domains to achieve strategic military and national objectives. The ability to dominate the enemy in cyberspace as part of combined arms all-domain operations, says the author, is an essential requirement for the Joint Force.


From DOPMA to Google: Cyber as a Case Study in Talent Management

By David Blair, Jason Hughes, and Thomas Mashuda

How should we manage cyber talent in the information age? How do we use the military’s existing systems of talent management to optimize recruitment, employment and retention of the cyber force? Although we live in an age of increasing availability of information and integration of artificial intelligence, cyber warfare remains a human endeavor. To ensure the U.S. maintains its qualitative edge in the cyber domain, the Joint Force must attract, develop and retain the right people. This means borrowing good ideas from the private sector, say the authors, encouraging creativity, allowing flexibility and developing future leaders who understand their craft.


Covert Action as an Intelligence Subcomponent of the Information Instrument

By Charles Pasquale and Laura Johnson

Covert Action consists of methods to influence political, economic and military conditions abroad where the government’s role is neither readily apparent nor publicly acknowledged. Because oversight of Covert Action is the responsibility of congressional intelligence committees and because the fundamental purpose is to manipulate information (and conceal knowledge about the actors involved) these methods belong to the information instrument of the DIME typology of diplomatic, information, military and economic instruments of power. Strategists and educators should keep this in mind in order to balance the costs, risks and benefits in support of national security and foreign policy objectives.


 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.