NO AIR: Cyber Dependency and the Doctrine Gap
NAVAL WAR COLL NEWPORT RI JOINT MILITARY OPERATIONS DEPT
Pagination or Media Count:
Despite concerted efforts to defend them, military cyber networks remain vulnerable to attack. For the U.S. military to maintain operational agility, operational doctrine should expand to include methods designed to ensure unhindered operations in a degraded cyber environment. The need for expansion in cyber doctrine stems from four areas the nature of the cyberspace domain, the militarys growing dependency on it, the threat environment, and doctrinal gaps. At the operational level, shortcomings in doctrine affect training, planning, and the U.S. militarys ability to seize and maintain the initiative. Because of current inabilities to protect much of its cyber network from attack, U.S. military dependency on the cyber domain becomes a critical vulnerability for an enemy to exploit. By training like it expects to fight, ensuring operational planning assumptions are accurate, and emphasizing decentralized execution of commanders intent, the U.S. military can better operate in a challenged or austere cyber network environment.
- Administration and Management
- Military Forces and Organizations
- Military Operations, Strategy and Tactics
- Unconventional Warfare