Thoughts on hybrid warfare---that is, the highly integrated use of a diverse range of military and non-military measures in pursuit of an overarching strategic objective.
Latest in Cybersecurity: LOAC-Military
A better understanding of Russian doctrine about hybrid conflict could provide useful insights into how a nation using offensive cyber operations (many of which can be denied) might be able to achieve its goals.
A conference at the Pentagon this week explored the legal implications of the military's new gloss on wars around the world.
Yesterday, Chairman of the Joint Chiefs of Staff General Martin Dempsey unveiled the the Pentagon's new 2015 National Military Strategy. Revising the 2011 National Military Strategy, General Dempsey indicated that the security landscape the United States faces is dramatically different than four years ago.
This past week, the NATO Cooperative Cyber Defense Center of Excellence put on its annual Cyber Conflict conference in Tallinn, Estonia. The conference boasted a number of experienced cyber-hands, including Adm. Mike Rodgers, DefCon founder Jeff Moss, and law of armed conflict expert Mike Schmitt. One of the most interesting sessions, which included a presentation by Mike, focused on aspects of the Tallinn Manual versions 1.0 and 2.0. Version 1.0, produced by an independent group of experts, came out in 2013.
Earlier this month, the government of the Netherlands hosted a Global Conference on Cyberspace, which was, apparently, fairly well received, as the Chair's Statement suggests.
Today, Secretary of Defense Ashton Carter unveiled the Pentagon's new cybersecurity strategy at Stanford University in a speech entitled "Rewiring the Pentagon: Charting a New Path on Innovation and Cybersecurity."
The New York Times has an editorial today, calling for an arms control effort in cyberspace. The Times effort is, honestly, a bit simplistic, as is its conclusion:
Jacob Appelbaum, Laura Poitras and others have another NSA aticle with an enormous Snowden document dump on Der Spiegel, giving details on a variety of offensive NSA cyberoperations to infiltrate and exploit networks around the world. There's a lot here: 199 pages. (Here it is in one compressed archive.)