Information as a Military Asset
Key Concepts:
  • What cyberwarfare is
  • How warfare has evolved over the course of history
  • The role of information in warfare
  • The role of cyber in the domains of warfare
  • The categories of information operations in the cyber domain
  • The techniques of information operations
At the end of this lesson, you should be able to:
  • Describe the relationship between cyberwarfare, information warfare, and information operations
  • Explain the role that information has played in armed conflict over the course of military history
  • Describe the concept of cyberwarfare and how it relates to the traditional domains of armed conflict
  • Describe the techniques used to effectively fight in the cyber domain
In this lesson, you will learn the fundamentals of cyberwarfare and how information is a military asset. You will learn that cyberwarfare includes a wide range of activities that use information systems as weapons against an opposing force and that cyberwarfare is the latest step in the evolution of warfare.
DISCOVER
APPLY
CREATE
CONCEPTS
OBJECTIVES
CONTEXT
TECHNOLOGY
UNDERSTANDING
DEMO LAB
HANDS-ON LAB
CHALLENGE
CONTRIBUTING FACTORS
COURSE OF ACTION

In this section, you will examine a number of topics related to cyberwarfare. You will learn about how cyberwarfare is waged and the means used for combating cyberwarfare.

Concepts: Military leaders have always realized that information is a critical part of conducting warfare. It is not surprising that cyberwarfare is simply a natural extension of traditional warfare in the digital realm (or landscape).

Objectives: The objectives of cyberwarfare are similar to those of conventional warfare—to protect one’s own private information and attempt to intercept and decipher the information of one’s adversaries.

Context: Our world has experienced momentous changes over the past few decades. You need to know how these changes have led to today’s real-world challenges in order to have a context for how cyberwarfare is conducted and combated.

Technology: Cyberwarfare involves the use of the latest developments in technology. The evolution of technology, and the technology of war, has revolutionized the way information is gathered, protected—and attacked.

Understanding: Cyberspace has become mankind’s latest battlefield. You will come away from this course with a firm understanding of the techniques used in both offensive and defensive information warfare as well as how cyberwarfare shapes military policy.

What is Cyberwarfare?
Throughout the history of warfare, information has played a crucial role in shaping the way that war is waged. Military leaders seek information about opposing forces and attempt to spread misinformation about their own plans and objectives. Information is, and always has been, a critical military asset. Because information is a military asset, it is also a military target. Advances in information technology (IT) have changed the way people do business—and the way nations fight wars.

Click on each of the following items to learn more. Next, click the ACTIVITY button to complete a brief exercise.
  • What is cyberwarfare?
  • The likelihood of cyberwar
The Role of Information in Armed Conflict
Throughout the history of armed conflict, militaries and military leaders have understood the importance of protecting sensitive information. They have also gone to great lengths to obtain the sensitive information of others that may be of strategic or tactical value. Today, with large amounts of information stored in computer systems, it is only natural that militaries would seek to infiltrate those systems and gain access to enemy secrets.

Click on each of the following items to learn more.
  • Ancient warfare
  • World wars
  • Cold war
  • Iraq War and weapons of mass destruction
Domains of Warfare
Military planners have traditionally divided war-fighting capabilities into four domains that are used to develop strategies and tactics as well as to organize forces. Only recently has the cyber domain been recognized as a fifth domain that complements the other four.

Click on each item to learn more. Next, click the ACTIVITY button to complete a brief exercise.
  • The four traditional
    domains of warfare
  • The early stages of
    cyberwarfare
  • The U.S. Cyber Command
    (USCYBERCOM)
Exploring the Cyber Domain
As the newest domain of warfare, the cyber domain is the least understood. Military planners specializing in land and sea operations have millennia of military history to draw upon when developing plans and strategies. Air and space have shorter histories as war-fighting domains but have still existed for more than half a century. The cyber domain is much newer and military plans have not adapted fully to this new way of fighting.

Click on each of the two major categories of information operations to learn more.
  • Offensive information operations
  • Defensive information operations
Information Operations Techniques
Information operations are more than cyberwarfare. They include any activity undertaken to attack or protect information and information systems.

In 2003, the Department of Defense organized information operations into seven categories and made specific recommendations about how the military might better organize, train, and equip to wage information operations in the future.

The figure illustrates the relationship between the seven techniques of information operations, cyberwarfare, and information operations. In the figure, notice that:
  • Computer network defense and computer network attacks fall within the realm of cyberwarfare.
  • Some intelligence-gathering activities fall within the cyber domain: specifically those that use cyberespionage techniques.
  • While all intelligence gathering fits within the domain of information operations, not all intelligence operations are cyberwarfare.
Click on each of the seven categories of information operations techniques to learn more about each one. Next, click the ACTIVITY button to complete a brief exercise.
  • Computer network attack
  • Computer network defense
  • Intelligence gathering
  • Electronic warfare
  • Psychological operations
  • Military deception
  • Operations security

In this section, you will have an opportunity to practice the concepts and processes that you have explored in this lesson.

The Demo Lab provided in this lesson guides you through the steps needed to perform tasks related to cyberwarfare. You may review these guided interactions as many times as needed.

The Hands-On Lab provides you with an engaging learning experience that is diagnostic and flexible. Follow the instructions provided in the Lab Manual.

In this section, you will have an opportunity to apply what you have learned in this lesson. A scenario is provided here that depicts the challenges often faced by professionals in the workplace.

You will explore the scenario, review related critical information, research a topic, and present your findings. Complete your work by submitting the graded assignment.

You work for General Technology Security, Inc. (GTSI). GTSI is a military contractor specializing in information systems security.

The organization is responding to a request for proposal (RFP) from the U.S. Cyber Command. The proposal will detail how and why your firm should be contracted to provide information systems security services to USCYBERCOM.

You have just attended a meeting in your firm’s conference room that discussed the RFP.

Click on your papers to read the brief of your role in preparing the RFP.

This RFP is important to our firm. I am asking each of you to be involved in our proposal.

Your particular assignment will be to research USCYBERCOM to find out more about the organization—its mission, its role in protecting our nation, and the details regarding a few of the commands that are part of USCYBERCOM (NETCOM, 1st IO Command, and INSCOM).

Thank you in advance for your effort.

Lt. Colonel Findlay, U.S. Army, retired
President and Chief Executive Officer
General Technology Security, Inc.

In this lesson, you learned that information is a military asset. You learned some of the basics of cyberwarfare and that cyberwarfare includes a wide range of activities that use information systems as weapons against an opposing force.

Research USCYBERCOM. Then write a paper that describes the organization, including its mission, its role in protecting our nation, and the role of NETCOM, 1st IO Command, and INSCOM.

For a checklist of action items, navigate to Course of Action on the right panel of the screen.

Use the following checklist as a guide to complete this assignment. Note that the tasks you have completed are already checked on the list.

  • Read the verbiage of the brief from your company president.
  • Consider all the factors that contribute to the challenge.
  • Research USCYBERCOM.
  • Write a paper that:
  • Describes USCYBERCOM’s mission
  • Discusses USCYBERCOM’s role in protecting our nation
  • Describes the role of NETCOM, 1st IO Command, and INSCOM