Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success

2017 ◽  
Vol 7 (4) ◽  
pp. 1-13
Author(s):  
David Ormrod ◽  
Benjamin Turnbull

Modern military forces rely heavily on cyber-enabled systems; for logistics, communication, and control. Modern military platforms are heavily integrated with computing capability. This integration and reliance will only increase over time. Modern military operations require the support of flexible, responsive and resilient cyber-capabilities. Current information system security models and information assurance constructs seek to achieve information assurance, a high degree of certainty in the confidentiality, integrity and availability of cyber-systems supporting combat operations. However, this approach assumes that an information assurance approach is a complete and comprehensive defense. History though, has proven otherwise. This work argues that the information assurance approach, whilst a worthy goal, is not reflective of the lessons of history or warfare. Specifically, this work outlines the need for, and introduces The Military Cyber-Maturity Model, a pragmatic model that assumes a technically capable and intelligent adversary. This model assumes the possibility of an adversary utilizing an unknown vulnerability to attack the system, and expends resources to minimise the impact of the successful attack rather than relying entirely on an impregnable defense. This approach extends beyond the assumption that a cyber-attack immediately causes mission failure, by recognizing that each cyber-attack has different requirements and outcomes and will affect different assets and processes. The Military Cyber-Maturity Model seeks to model business continuity through a high degree of cultural change, embedded work practices that parallel analogue and digital work practices with deceptive counterintelligence behavior. The Military Cyber-Maturity Model incorporates the concepts of behavioral defense and mission assurance to provide agility and increase the likelihood of success in combat. Information deception provides a behavioral defense, creating uncertainty and doubt in the adversary's mind and reducing the degree of trust they have in the information available. This paper introduces the model, outlines its aims, components and justifications. This work also outlines the need for simulation and testing to validate the model's effectiveness, and introduces a number of potential use-cases.

2020 ◽  
pp. 151-164
Author(s):  
David Ormrod ◽  
Benjamin Turnbull

Modern military forces rely heavily on cyber-enabled systems; for logistics, communication, and control. Modern military platforms are heavily integrated with computing capability. This integration and reliance will only increase over time. Modern military operations require the support of flexible, responsive and resilient cyber-capabilities. Current information system security models and information assurance constructs seek to achieve information assurance, a high degree of certainty in the confidentiality, integrity and availability of cyber-systems supporting combat operations. However, this approach assumes that an information assurance approach is a complete and comprehensive defense. History though, has proven otherwise. This work argues that the information assurance approach, whilst a worthy goal, is not reflective of the lessons of history or warfare. Specifically, this work outlines the need for, and introduces The Military Cyber-Maturity Model, a pragmatic model that assumes a technically capable and intelligent adversary. This model assumes the possibility of an adversary utilizing an unknown vulnerability to attack the system, and expends resources to minimise the impact of the successful attack rather than relying entirely on an impregnable defense. This approach extends beyond the assumption that a cyber-attack immediately causes mission failure, by recognizing that each cyber-attack has different requirements and outcomes and will affect different assets and processes. The Military Cyber-Maturity Model seeks to model business continuity through a high degree of cultural change, embedded work practices that parallel analogue and digital work practices with deceptive counterintelligence behavior. The Military Cyber-Maturity Model incorporates the concepts of behavioral defense and mission assurance to provide agility and increase the likelihood of success in combat. Information deception provides a behavioral defense, creating uncertainty and doubt in the adversary's mind and reducing the degree of trust they have in the information available. This paper introduces the model, outlines its aims, components and justifications. This work also outlines the need for simulation and testing to validate the model's effectiveness, and introduces a number of potential use-cases.


2021 ◽  
Vol 6 (2) ◽  
pp. 78-83
Author(s):  
Serhiy Orel ◽  
◽  
Vadim Durach ◽  
Bohdan Sjoma ◽  
◽  
...  

Military impact on the environment can be defined as two components: 1) impact on the environment in time of daily activities during the training of troops and 2) impact on the environment during the combat operation. In the Armed Forces of Ukraine, to some extent, environmental security measures are implemented only during daily operations in peacetime. As for taking into account the impact of fighting on the environment in time of planning combat operations, this issue is usually not even raised in their preparation. On the other hand, NATO member states understand that military operations can be inherently destructive to human health and the environment. Therefore, this study was conducted to determine the educational requirements for commanders, especially for officers who provide environmental protection in the Armed Forces of Ukraine, based on NATO regulations and the experience of Allies. The article considers how environmental issues are integrated into the military operation at each stage: planning, pre-deployment, deployment (execution and force rotation), redeployment, and post-deployment. The main tasks of environmental officers at each stage of the operation are defined. Based on the tasks solved by officers, the requirements for their education are formed, the subjects studied by US environmental officers are considered.


2021 ◽  
Vol VI (IV) ◽  
pp. 1-8
Author(s):  
Rubab Musarrat ◽  
Muniba Fatima Zahra ◽  
Amna Ashraf

This study targets to investigate the impact of Inter-Services of Public Relations (ISPR) production, broadcasted during the war against terrorism, on Pakistani youth. It is hypothesized that ISPR productions have helped in inflating the motivation level of Pakistani youth, thus helping in promoting the nationalism and positive image of Pakistan. Furthermore, the role of ISPR productions in motivating youth to join Pakistan's Army is also explored. A cross-sectional survey research design was used. The sample of this study was comprised of youth aged between 18 to 24 years, selected through the non-probability purposive sample. The measures comprised of a self-constructed indigenous questionnaire assessing the impact of ISPR productions during a military operation in image building, promotion of nationalism and motivation to join the army. The data analyzed through SPSS Version 22.00 yielded insightful findings. The finding revealed that watching ISPR productions helped in instilling a fervent attitude of Pakistani youth towards nationalism and the Pakistani military. There had been a clearer inclination of youth to aspire for joining the military for upholding the nationalism beliefs, and this finding appears promising, keeping in mind the relative declining opinion that has been observed in youth from the past decade pertaining to nationalism and military operations.


2020 ◽  
Vol 19 (3) ◽  
pp. 23-36
Author(s):  
József Padányi ◽  
József Ondrék

A global health crisis can have long lasting effects on many areas of life, and the military is not exempt of its effects either. This article aims to highlight the possible usage of the military in various forms of emergency situations, especially in the case of the current coronavirus pandemic, particularly focusing on cooperation based on partnerships, while also highlighting the effects the Covid-19 epidemic had on the military. Civil-military cooperation (CIMIC) is a cornerstone of military operations these days, and its positive effects on military operations, especially in the struggle against the pandemic are also detailed. This study is based on the events and experiences of the first seven months since the outbreak of the Covid pandemic.


1978 ◽  
Vol 72 (2) ◽  
pp. 452-468 ◽  
Author(s):  
David W. Moore ◽  
B. Thomas Trout

This article examines the dynamics of military promotion and explores its consequences both for individual officers and for military organization. The central argument is that performance, while a necessary standard for acceptability into a rather large pool of officers from which the elite will emerge, is nonetheless a minor influence on promotion and becomes even less discriminating as an officer's career progresses, whereas visibility–the extent to which an individual has developed contacts with peers and superiors who can influence his movement in the organization–begins moderately and eventually becomes the dominant influence. To present this argument, the article first examines the prevailing concepts of performance and seniority and outlines an expanded model of the promotion process. The component variables of that model are applied to three separate military career levels–junior, middle-grade and senior officers–and are traced longitudinally through the entire officer career pattern. Finally, the impact of contextual factors on the model, particularly the differences between wartime and peacetime, is discussed and illustrated with data from general officer promotion in the army. The implications of this theory are significant for civil control of the military. Through the control of access to the elite nucleus represented by the promotion system, especially with the emphasis on visibility, the military is able to sustain a high degree of autonomy. By the time Congress or other civilian actors are able to exercise selection of the military elite, the promotion system has already preselected those individuals who most highly represent military values held by preceding leaders.


Author(s):  
Evi Psarrou ◽  

The aim of the present study is to discuss one of the first episodes of the Greek War of Independence that took place in the Aegean Sea in 1822, which ended at the devastation of Chios Island and the defeat of its inhabitants. In this framework the organization of the campaign is examined, the course of the military operations and the final outcome. The importance of the study lies in the fact that it examines the events not in the light of the local history of Chios island but in the broader context of the Greek Revolution and the impact the events had on European public opinion.


2020 ◽  
Vol 13 (2) ◽  
pp. 155
Author(s):  
Sulistianawati Sulistianawati

ABSTRAKPribumi subaltern menjadi subjek nyata adanya gejolak penindasan oleh serdadu pemerintah dan gerakan bawah tanah dalam situasi Aceh yang telah beralih menjadi Daerah Operasi Mililiter. Tujuan penelitian ini mendeskripsikan penyalahgunaan tahta tertinggi, adanya pemberontakan gerakan bawah tanah sebagai bentuk perlawanan, dampaknya bagi kaum subaltern seperti pelecehan seksual, mentalitas down, dan dimiskinkan. Data diperoleh dengan teknik pustaka dari sumber tertulis berupa kata dan kalimat dalam novel kemudian dianalisis dengan metode analisa deskriptif. Hasil penelitian menunjukan dominasi kekuasaan penguasa superior yang menduduki tahta tertinggi, dua bentuk perlawanan berupa caci maki serta aksi pemberontakan, dan dampaknya bagi subaltern begitu signifikan memunculkan keterpurukan, semakin merajalela pelecehan seksual, mentalitas down akhirnya termiskinkan. Pada akhirnya subaltern semakin lemah, ketakutan dan tak berdaya. Adanya persekutuan pemberontak sebagai akibat mentalitas era kolonial yang masih menjarah pemikiran masyarakat. Pada dasarnya penjajahlah yang menjadi cikal bakal adanya teroris dan pemberontakan. Penelitian ini diharapkan memberikan sumbangsih untuk mendukung kebijakan pemerintah mendisiplinkan politik agar tidak mengalami carut-marut. Serta menjadi pengingat bagi masyarakat akan masih adanya gerakan bawah tanah dalam bentuk apapun yang mengancam keberlangsungan hidup masyarakat lain, dalam menghadapi kolonialisme yang masih berkembang hingga saat ini.Kata kunci: subaltern, poskolonial, perlawanan, pemberontakABSTRACTSubaltern natives are the real subject of the turmoil of oppression by government troops and underground movements in the Aceh situation which has turned into the Military Operations Area. The purpose of this study is to describe the abuse of the highest throne, the existence of an underground movement rebellion as a form of resistance, the impact on the subalterns such as sexual harassment, down mentality, and impoverished. Data obtained by library techniques from written sources in the form of words and sentences in the novel and then analyzed by descriptive analysis method. The results showed the dominance of the power of superior rulers who occupied the highest throne, two forms of resistance there are in the form of insults and acts of rebellion, and the impact on subalterns was so significant that it leds to adversity, increasingly rampant sexual harassment, the down mentality finally impoverished. In the end the subaltern is getting weaker, frightened and helpless. The existence of the rebel alliance is as a result of the mentality of the colonial era which still plundered the minds of the people. Basically, invaders are the embryo of terrorists and rebellion. This research is expected to contribute to support government policy to discipline politics. Therefore, it does not experience chaos. As well as a reminder to the public of the existence of underground movements in any form that threatens the survival of other communities, in the face of colonialism that is still developing today.Keyword: subaltern, postcolonial, resistance, rebel


2021 ◽  
Vol 7 (2) ◽  
pp. 22-39
Author(s):  
Konrad Dobija

Over the last two decades, China and Russia have been developing Anti-Access/Area-Denial (A2/AD) systems mainly based on long-range Air Defense, ballistic and cruise missiles, supported by Electronic Warfare and cyber-attack capabilities. Initially, these systems were used for defense purposes, but over time. it was recognized they could be also applied for imposing military situation in the specific regions and create effective response to NATO countries and their concept of conducting military operations. The main aim of the article is to asses and present the impact of  Chinese and Russian Anti-Access/Area-Denial (A2/AD) systems on changes in global political relations and balance of military power. In the course of this study, the author used numerous analyzes, synthesis, comparisons and case studies methods mainly concentrated on presently operating A2/AD systems. This article undertakes the analysis of the Chinese bases located in the South China Sea and Djibouti, Russian A2/AD systems within Russia's borders with particular emphasis on Kaliningrad Oblast, and A2/AD systems in Crimea and Syria created as part of Russian military operations. This research allowed us to conclude that some of the A2/AD systems serve to defend borders, while the rest are created to influence the geopolitical and military situation or to gain an advantage in the area of military operations. It can be also evaluate that the use of these systems allow dominate future conflicts because they enable to establish a full control zones which are completely closed for opponents forces operations.


2014 ◽  
Vol 47 (1) ◽  
pp. 85-104 ◽  
Author(s):  
Laurie R Blank

The recent proliferation of external investigations into military operations raises important questions for the conduct of military operations and the interpretation and implementation of international law. The impact of such investigations and their reports, however, extends beyond how they influence the military and the implementation of the law of armed conflict. As countries and societies embroiled in lengthy conflicts begin to explore the value and effectiveness of undertaking transitional justice efforts during conflict, rather than only after conflict, investigations into military operations and specific incidents can play an important – and perhaps unexpected – role. This article focuses specifically on the inter-relationship between investigations and transitional justice efforts. As investigations into military operations become a common tool in the international and national arsenal, understanding how they interact with and affect broader transitional justice efforts and goals becomes important, both for the conceptualisation of investigations and the development of transitional justice mechanisms. This article addresses the relationship between investigations and the truth-telling aspect of transitional justice mechanisms, as well as the impact of the use of law and legal analysis on the legitimacy of the investigations and on potential transitional justice mechanisms.


Sign in / Sign up

Export Citation Format

Share Document