Discussion about this post

User's avatar
cfrog's avatar

I am about 51% there with you. Cyber Command needs to determine what they are and how they pursue mission accomplishment

"This could involve pre-authorized rules of engagement for specific scenarios, allowing teams to launch countermeasures without awaiting high-level approval."

Is this for real and widespread in Cybercom? How do they function? A 1950's NORAD air defense station would have been ringing the phone to both inform the Chain of Command while activating the appropriate response. Conceptually, the on duty operator is already forward deployed, just like the radar operator was forward deployed to the edge of his radar envelope. Sometimes, I think the problem is less an 'era' style of management and more, negative aspects of human behavior, amplified at scale. Saw this in my own experiences with 3rd and 4th Gen ( I like to tease the discussion by insisting I am working on 6th Gen Warfare....why should 6th Gen Fighters have all the fun?)

"Just as the U.S. Army adapted to counterinsurgency in Iraq and Afghanistan by embracing flexibility and cultural awareness, Cyber Command can learn to navigate the complexities of 4GW" We need to be careful; this is not the broad compelling example it may seem. Especially when we look at it from a long term strategic and policy perspective. I understand what you are getting at; I lived it. However, this is no panacea, as HKIA educates us. Also, in cyber, this good intention can quickly open up up vectors for threats. Beware the pendulum swing, lest it swing too far.

Thanks for the article.

the long warred's avatar

REC / Radio Electronic Combat; Russian Federation.

and IEW / Intelligence and Electronic Warfare… US/NATO.

… otherwise this is a Sc@m. For awhile.

Good luck

2 more comments...

No posts

Ready for more?