Home

Warfare

General

Air Land Battle

Asymmetric Warfare

Effect Based Operations (EBO)

Fourth Generation Warfare(4GW)

Future Warfare

Gray Zone Warfare

Hybrid Warfare

Information Warfare

Irregular Warfare

All Domain Operations

Multi Domain Operations (MDO)

Maneuver Warfare

Mountain Warfare

NBC/WMD

New Generation Warfare (NGW)

Network Centric Warfare (NCW)

Peace Keeping Operations

Small War

Space Warfare

Special Forces

Water Warfare

Net Assessment

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
NEXT
Cyber Warfare
AMERICAS CYBER FUTURE SECURITY AND PROSPERITY IN THE INFORMATION AGE : VOLUME I  

Cyber threats imperil America, now and for the foreseeable future. They endanger the enormous economic, social and military advances enabled by cyberspace, not only for the United States but also for the ...Read more >

64 Pages
3.49 MB
AMERICAS CYBER FUTURE SECURITY AND PROSPERITY IN THE INFORMATION AGE : VOLUME II  

The cyber domain is a new and a volatile manmade environment. The characteristics of cyberspace often reduce power differentials among actors, and thus provide a good example of the diffusion of power that typifies global politics in this ...Read more >

232 Pages
4.16 MB
CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE  By HEADQUARTERS, DEPARTMENT OF THE ARMY

FM 3-12 provides Army doctrine on using cyberspace electromagnetic activities to integrate and synchronize cyberspace operations and electromagnetic warfare into operations while managing assigned portions of the electromagnetic spectrum in support of unified land operations. FM 3-12 defines and provides an understanding of Army cyberspace operations, electromagnetic warfare, statutory and title authorities, roles, relationships, responsibilities, and capabilities to support Army and joint ...Read more >

162 Pages
9.61 MB
IMPLICATIONS OF SERVICE CYBERSPACE COMPONENT COMMANDS FOR ARMY CYBERSPACE OPERATIONS  By Jeffrey L. Caton

A fundamental tenet of the 2015 DoD Cyber Strategy is to achieve and maintain cybersecurity by a joint team effort across the whole-of-government. Some of the key Department of Defense (DoD) members of this cyberspace team are the service component cyber commands that report to U.S. Cyber Command (USCYBERCOM). U.S. Army Cyber Command (ARCYBER) conducts cyberspace-related missions of which some are common to the other service component and others are unique. To perform efficiently and ...Read more >

142 Pages
2.21 MB
JOINT PUBLICATION 3-12: CYBERSPACE OPERATIONS  

Most aspects of joint operations rely in part on cyberspace, which is the domain within the information environment that consists of the interdependent network of information technology (IT) infrastructures and resident data. It includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Cyberspace operations (CO) is the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace. ...Read more >

104 Pages
1.78 MB
MANEUVER AND MANIPULATION: ON THE MILITARY STRATEGY OF ONLINE INFORMATION WARFARE  By Tim Hwang

Ongoing discussion around the Russian development of hybrid warfare and the revelations about meddling in the 2016 U.S. Presidential election have focused the public’s attention on the threats posed by coordinated campaigns of propaganda and disinformation. These recent events have also raised concerns around the broader challenge posed by the emergence of a “post-fact society,” the notion that the weakening ability for civil society and the public to analyze truth and falsity is ...Read more >

95 Pages
1.04 MB
THE PLA’S DEVELOPING CYBER WARFARE CAPABILITIES AND INDIA S OPTIONS  By Maj Gen P K Mallick, VSM (Retd)

Chinese President Xi Jinping has made it clear that his objective for China is to emerge as a ‘cyber superpower’. China wants to be the world’s largest nation in cyberspace and also one of the most powerful. The information technology revolution has produced both momentous opportunities and likely vulnerabilities for china. China is home of largest number of ‘netizens’ in the world. It also hosts some of the world’s most vibrant and successful technology companies. It also ...Read more >

18 Pages
1.11 MB
TACTICAL CYBER: BUILDING A STRATEGY FOR CYBER SUPPORT TO CORPS AND BELOW  By Isaac R. Porche III et al.

The severity and sophistication of cyber threats to U.S. interests, including Department of Defense (DoD) networks, information, and systems, are increasing.1 Potential enemies are developing offensive cyber capabilities, such as disruptive and destructive malware and antisatellite weapons, designed to interfere with U.S. military communications and computational technologies and freedom of ...Read more >

111 Pages
2.11 MB
STRATEGIC CYBERSPACE OPERATIONS GUIDE  By United States Army War College

This guide follows the operational design methodology and the joint planning process (JPP) and applies these principles to the cyberspace domain. Cyberspace is a global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Cyberspace operations (CO) are the employment of cyberspace ...Read more >

164 Pages
2.64 MB
THE ARMY ROLE IN ACHIEVING DETERRENCE IN CYBERSPACE  By Jeffrey L. Caton

Strategic deterrence has been a significant issue for the Department of Defense (DoD) for over 70 years, but many limit this concept to the use of nuclear weapons. The 2015 DoD Cyber Strategy explicitly calls for a comprehensive strategy to provide credible deterrence in cyberspace against threats from key state and nonstate actors. To be effective, such activities must be coordinated with ongoing deterrence efforts in the physical realm, especially those of near-peers impacting critical ...Read more >

85 Pages
2.68 MB
THE LAND, SPACE, AND CYBERSPACE NEXUS: EVOLUTION OF THE OLDEST MILITARY OPERATIONS IN THE NEWEST MILITARY DOMAINS  By Jeffrey L. Caton

Over the last century, the domains of air, space, and cyberspace have joined the traditional warfighting domains of land and sea. While the doctrine for land operations is relatively mature, the doctrine for space and cyberspace continue to evolve, often in an unstructured manner. This monograph examines the relationships among these domains and how they apply to U.S. Army and joint warfighting. It concentrates on the central ...Read more >

117 Pages
5.30 MB
FIELD MANUAL NO. 3-12: CYBERSPACE AND ELECTRONIC WARFARE OPERATIONS  By Headquarters Department of the Army

Appendix B highlights the location of cyberspace operations information in operations orders and appendix 12 to Annex C. This appendix includes an example of Appendix 12 to Annex C with a description of the types of information included in this appendix and various sections. Appendix C includes procedures for processing cyberspace effects requests at echelons corps and below, echelons above corps, and the cyber effects request format (CERF) fields and information. A blank copy of the CERF ...Read more >

108 Pages
11.69 MB
CYBERSPACE AND NATIONAL SECURITY  By Gabi Siboni

The impact of computer and communications systems in recent decades has not bypassed the national security of states in general, and the State of Israel in particular. Most systems in developed societies rely on computer and information infrastructures, and this growing dependence on information and communication technologies means that a blow to computers and information flow processes is liable to disrupt, paralyze, and sometimes even ...Read more >

144 Pages
898.51 KB
THE PLA’S CYBER WARFARE CAPABILITIES AND INDIA’S OPTIONS  By Maj Gen PK Mallick, VSM (Retd)

China’s People’s Liberation Army (PLA) has understood that dominance in the information domain is the priority in modern conflict. Through the reorganisation of the PLA and the establishment of the Strategic Support Force, China has brought space, cyber, electronic warfare and psychological warfare under one umbrella to use these capabilities in a more efficient and effective manner. No other country, including the US, has done this. China has no threat from land. Presently, its main aim ...Read more >

9 Pages
787.79 KB
TEN YEARS IN : IMPLEMENTING STRATEGIC APPROACHES TO CYBERSPACE  By Jacquelyn G Schneider, Emily O. Goldman, and Michael Warner

Harvard’s Samuel Huntington, then just 27, asked the U.S. Navy in 1954, “What function do you perform which obligates society to assume responsibility for your maintenance?” His seminal article in the U.S. Naval Institute’s Proceedings argued that the basis of a military Service—or any military element—is its purpose or role in implementing national policy. Huntington called this a Service’s “strategic concept,” which justifies public support by explaining ...Read more >

207 Pages
10.70 MB
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
NEXT