Accession Number:

ADA622234

Title:

Determining Hostile Intent in Cyberspace

Descriptive Note:

Journal article

Corporate Author:

NATIONAL DEFENSE UNIV FORT MCNAIR DC

Personal Author(s):

Report Date:

2014-01-01

Pagination or Media Count:

9.0

Abstract:

Okay, bogies have jinked back at me again for the fifth time. They re on my nose now. Inside of 20 miles. This was the report made by Commander Steven Collins, USN, Radar Intercept Officer RIO of Gypsy 207, prior to arming his F-14 s radar-guided missiles. Two Libyan MiG-23 Floggers were inbound to the John F. Kennedy Carrier Strike Group. Two F-14 Tomcats of VF-32 were assigned to intercept. The Tomcats flew low, lost in the radar clutter kicked up by the sea s surface, maneuvering several times to stay out of the Libyan fighters engagement envelope. The Americans maintained a constant fire control lock on their opponents. The MiGs matched each American maneuver unerringly, ignoring the radar lock warnings growling in their cockpits. Because the radar on the MiG fighters could not detect the Americans through the clutter, the Libyans relied on guidance from shore-based radar stations for a ground-controlled intercept. The MiGs kept their noses pointed toward the Americans, hoping their radar would burn through the clutter and give them a chance to shoot first. It was clear the Libyans wanted a fight. It was clear they had hostile intent. 13 miles. Fox 1 Fox 1 the RIO shouted as the missiles left the rails of the Tomcat, initiating an engagement that would end with two MiGs destroyed and two Libyan pilots lost at sea paraphrased from Splash Two MiGs, an account of the 1989 Gulf of Sidra Incident. According to the Joint Chiefs of Staff, hostile intent is defined as the threat of imminent use of force against the United States, U.S. forces, or other designated persons or property. It is the indication, the belief, a commander has that an adversary is about to attack. That belief provides the groundwork for anticipatory self-defense, an American legal concept that allows a commander to attack before being attacked.

Subject Categories:

  • Military Operations, Strategy and Tactics

Distribution Statement:

APPROVED FOR PUBLIC RELEASE