Accession Number:

AD1019386

Title:

Centralized Offense, Decentralized Defense: Command and Control of Cyberspace

Descriptive Note:

Technical Report

Corporate Author:

AIR UNIV MAXWELL AFB AL MAXWELL AFB United States

Personal Author(s):

Report Date:

2012-06-01

Pagination or Media Count:

111.0

Abstract:

Shortly after World War II, the same group of individuals that created an end-of-the-world weapon developed another technology that created the beginning of a new world. This new world technology was the computer, and the new domain of cyberspace soon followed. The transfer of information by electronic means is not new. Cyberspace has proven to be another giant leap forward in command technology. Attack in cyberspace is often over exaggerated, more commonly resembling vandalism, voyeurism, spying, or petty theft. But with the nations and the militarys reliance on this domain growing, the strategic implications of cyberspace cannot be ignored. Commanders must operate in this environment with the control and authorities necessary to shield themselves from attacks, stop the attackers, repair their networks, and continue to fight while all this occurs. This capability should be provided to Joint Force Commanders JFCs by means of an Area Cyber Defense Commander ACDC whose responsibilities will include developing and executing an area of responsibilitys AORs cyber defense plan. The offensive use of cyber travels beyond ones own network. This unique situation requires a global command center that can provide cyber situational awareness SA and command and control C2 of long-range cyber fires. This model should be established under Cyber Command CYBERCOM and provide JFCs and ACDCs with the guidance necessary if cyber-attack is needed. The Strategic Area Cyber Center SACC will allow for the centralized C2 of offensive cyber. Commanders should have inherent authorities and capacities to stop these attacks from happening and, they should do this all the while understanding that action beyond their own networks will occur in an environment that requires strict rules and specific controls often held by a single strategic cyber commander.

Subject Categories:

  • Computer Systems Management and Standards
  • Military Operations, Strategy and Tactics
  • Military Forces and Organizations

Distribution Statement:

APPROVED FOR PUBLIC RELEASE