Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems

Rock Stevens
{"title":"Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems","authors":"Rock Stevens","doi":"10.1109/CYCONUS.2017.8167505","DOIUrl":null,"url":null,"abstract":"Since the 1970s, the United States has integrated technology into combat platforms to maintain its military superiority. Modern digital vulnerabilities within these platforms place U.S. capabilities and military forces at risk for cyber attack. This paper discusses the impact of digital vulnerabilities for operational commanders through the lens of joint functions and operational factors. The undisciplined pursuit of a technological advantage within its weapons systems stands to revert U.S. military capabilities back to the World War I era. A cursory analysis of these implications yields two policy recommendations that will mitigate risk if adopted. Primarily, the United States needs to extend existing vulnerability disclosure programs to classified capabilities and programs. Secondly, the DoD must implement unscripted attack scenarios within combat readiness exercises that allow commanders to experience the brunt of a cyber attack before lives are at stake in a real-world scenario.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"13 20","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Cyber Conflict (CyCon U.S.)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYCONUS.2017.8167505","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Since the 1970s, the United States has integrated technology into combat platforms to maintain its military superiority. Modern digital vulnerabilities within these platforms place U.S. capabilities and military forces at risk for cyber attack. This paper discusses the impact of digital vulnerabilities for operational commanders through the lens of joint functions and operational factors. The undisciplined pursuit of a technological advantage within its weapons systems stands to revert U.S. military capabilities back to the World War I era. A cursory analysis of these implications yields two policy recommendations that will mitigate risk if adopted. Primarily, the United States needs to extend existing vulnerability disclosure programs to classified capabilities and programs. Secondly, the DoD must implement unscripted attack scenarios within combat readiness exercises that allow commanders to experience the brunt of a cyber attack before lives are at stake in a real-world scenario.
识别自身造成的漏洞:美国作战系统中技术的操作含义
自20世纪70年代以来,美国将技术整合到作战平台中,以保持其军事优势。这些平台中的现代数字漏洞使美国的能力和军事力量面临网络攻击的风险。本文从联合职能和作战因素的角度讨论了数字脆弱性对作战指挥官的影响。对武器系统技术优势的无节制追求,将使美国的军事能力倒退到第一次世界大战时代。对这些影响的粗略分析得出两项政策建议,如果被采纳,将会降低风险。首先,美国需要将现有的漏洞披露项目扩展到机密能力和项目。其次,国防部必须在战备演习中实施无脚本攻击场景,使指挥官能够在现实场景中生命受到威胁之前体验网络攻击的冲击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信