Prioritizing Strategic Cyberspace Lethality

Andrew J. Schoka
{"title":"Prioritizing Strategic Cyberspace Lethality","authors":"Andrew J. Schoka","doi":"10.5038/2378-0789.4.1.1049","DOIUrl":null,"url":null,"abstract":"The primary concern of United States national security policy, as detailed in the 2018 National Defense Strategy, has shifted from asymmetrical counter-insurgency operations to countering inter-state strategic competition by rogue regimes and revisionist powers. This doctrinal shift has prompted an increased emphasis on military lethality, particularly in strategic-level cyberspace operations intended to counter open challenges to the global security environment and United States preeminence. Drawing from the theory of constraints in industrial engineering and Bayesian search theory in operations research, this paper identifies the key organizational constraints that hinder the lethality of the Department of Defense’s strategic-level cyberspace operations units in light of a continued struggle for available cyberspace personnel. Current force structure paradigms and command and control policies are identified as the key limiting factors of military lethality in cyberspace. This paper argues for ruthlessly prioritizing the elimination and improvement of these constraints in order to align Department of Defense policies with efforts to project strategic power in and through cyberspace.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Military Cyber Affairs","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5038/2378-0789.4.1.1049","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The primary concern of United States national security policy, as detailed in the 2018 National Defense Strategy, has shifted from asymmetrical counter-insurgency operations to countering inter-state strategic competition by rogue regimes and revisionist powers. This doctrinal shift has prompted an increased emphasis on military lethality, particularly in strategic-level cyberspace operations intended to counter open challenges to the global security environment and United States preeminence. Drawing from the theory of constraints in industrial engineering and Bayesian search theory in operations research, this paper identifies the key organizational constraints that hinder the lethality of the Department of Defense’s strategic-level cyberspace operations units in light of a continued struggle for available cyberspace personnel. Current force structure paradigms and command and control policies are identified as the key limiting factors of military lethality in cyberspace. This paper argues for ruthlessly prioritizing the elimination and improvement of these constraints in order to align Department of Defense policies with efforts to project strategic power in and through cyberspace.
优先考虑网络空间战略杀伤力
正如2018年《国防战略》所详述的那样,美国国家安全政策的主要关注点已经从不对称的反叛乱行动转向对抗流氓政权和修正主义大国的国家间战略竞争。这一理论转变促使美国更加强调军事杀伤力,特别是在战略层面的网络空间行动中,旨在应对对全球安全环境和美国优势地位的公开挑战。根据工业工程中的约束理论和运筹学中的贝叶斯搜索理论,本文确定了在对可用网络空间人员的持续争夺中,阻碍国防部战略级网络空间作战单位杀伤力的关键组织约束。目前的部队结构范例和指挥控制政策被认为是网络空间军事杀伤力的关键限制因素。本文主张毫不留情地优先消除和改善这些限制,以便使国防部的政策与在网络空间及其通过网络空间投射战略力量的努力保持一致。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信