blog




  • Essay / Cyber ​​Operations - 1621

    The information age has made an almost infinite amount of data available to all but the most deprived. Today, technologists are searching for ways and means to transform these oceans of information into actionable situational insights, knowledge, and understanding. America's military commanders are also reliant and reliant on the powerful, real-time situational awareness that has been made available to every soldier on the battlefield. Capability Set 13 provides the Rifleman Radio and Nett Warrior System, which provides mission command at all echelons via smartphone-like devices, exposing all Soldiers to the cyber domain of warfare. The contested cyber domain delivers this powerful stimulus across the complex and interconnected physical, logical, and social layers. However, complexity and dependence breed fragility. For top brass, computer technology is both a blessing and a curse. The bombs are guided by GPS satellites, drones piloted remotely from around the world; fighter planes and warships are now huge data processing centers; even the simple infantryman is put under pressure. Yet growing connectivity over an insecure Internet increases opportunities for electronic attacks; and the growing dependence on computers increases the damage they can cause. Cyber-Electromagnetic Activities (CEMA) will continue to expand its effects on Brigade Combat Team operations and below through the following four tasks of the Unified Ground Operation: Build, Operate, and Defend the Network. ; attack and exploit adversary systems; gain an understanding of the situation through CEMA; and protect individuals and platforms. Gen. Keith B. Alexander, commander of U.S. Cyber ​​Command, explained during his U.S. Senate confirmation hearing...... middle of paper ......sha Loder and Benjamin Sutherland. “Disharmony in the Spheres.” In Modern Warfare, Intelligence, and Deterrence: The Technologies That Transform Them, edited by Benjamin Sutherland, 101-102. London: Economist Newspaper Ltd., 2011. Miles, James, Anton La Guardia, Natasha Loder and Benjamin Sutherland. “Space invaders: China admits to shooting down a satellite.” In Modern Warfare, Intelligence, and Deterrence: The Technologies That Transform Them, edited by Benjamin Sutherland, 101-102. London: Economist Newspaper Ltd., 2011. Sutherland, Benjamin. “The IT factor.” In Modern Warfare, Intelligence and Deterrence: The technologies that are transforming them, edited by Benjamin Sutherland, 118. London: Economist Newspaper Ltd, 2011. US Army. FM 3-38 Cyber-electromagnetic activities final version. Washington DC: Headquarters, Department of the Army, 2013.