Space Travel News  
Training A New Generation Of Cyber Strategic Leaders Part Four

Although decentralized, cyberspace remains dependent on the physical network of computer servers, fiber-optic cables and the immense system of cables that have been laid across the world's oceans.
by James Carafano | Eric Sayers
Washington (UPI) Feb 23, 2009
The U.S. government and armed forces need to develop the knowledge, skills and attributes required for cyber-strategic leaders. And that next generation of leaders needs to understand the cyber environment.

Beginning in 1988 with the infamous "Morris Worm" attack, cybersecurity has grown in importance along with the degree of reliability the United States and other nations have placed on the cyber domain.

The effectiveness of cyber warfare stems from its dynamic characteristics. In addition to low costs to entry, making it more attractive to terrorists and other non-state actors inclined to pursue low-end asymmetric strategies, the historical boundaries of warfare do not apply to the cyber realm.

Although decentralized, cyberspace remains dependent on the physical network of computer servers, fiber-optic cables and the immense system of cables that have been laid across the world's oceans. A familiarity with the physical aspects of cyberspace forms the foundation of a larger education on the topic.

The complexities of cyberspace begin with the distinction between its two existing theaters. First, the commercial Internet. Reserved for the day-to-day activities of the public and traditionally the target of non-state actors, the vulnerability of this theater has been magnified in the wake of the Estonia and Georgia cyberattacks that occurred in April and May 2007 and August 2008, respectively. Second, the military network.

Over the past two decades, as the military has attempted to enhance its war-fighting capabilities through network-centric warfare, an increased reliability on information technology has had the cumulative effect of ensuring a growing liability should the network fall under attack. Rebecca Grant has documented this development in her study "Victory in Cyberspace," published by the Air Force Association, October 2007, at http://www.afa.org/media/reports/victorycyberspace.pdf.

There are various types of actors who may pose a threat to the commercial and military cyber networks. First are the individuals acting on their own to exploit security gaps or commit cyber crimes, such as identify theft. These hackers are commonly referred to as "Black Hats."

Second, cyber terrorists attempt to manipulate the cyber environment to advance political or social objectives, as documented by James Jay Carafano and Richard Weitz in their paper "Combating Enemies Online: State-Sponsored and Terrorist Use of the Internet," Heritage Foundation Backgrounder No. 2105, Feb. 8, 2008, pp. 3-4, at http://www.heritage.org/Research/nationalSecurity/bg2105.cfm.

(Part 5: How Islamist hackers take advantage of the Internet to wage asymmetrical warfare against the West)

(James Jay Carafano, Ph.D., is assistant director of the Kathryn and Shelby Cullom Davis Institute for International Studies and senior research fellow for national security and homeland security in the Douglas and Sarah Allison Center for Foreign Policy Studies, a division of the Davis Institute, at the Heritage Foundation. Eric Sayers is a research assistant in the Allison Center for Foreign Policy Studies at the Heritage Foundation.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Resilience In The Face Of Sustained Cyber Attack Part Three
Washington (UPI) Feb 19, 2009
Efforts to safeguard the U.S. homeland tend to focus solely on the unrealistic task of protecting infrastructure. However, the politically charged "failure is not an option" approach to classify all infrastructure as "critical" is detrimental to prioritizing national security missions.







  • Segment Of Ares I-X Test Rocket Arrives At Kennedy
  • Boeing Submits Proposals For Ares V Rocket Design Support
  • Japan Unveils New Rocket
  • Experts Select Future REXUS/BEXUS Experiments

  • New Developments Across Arianespace's Family Of Commercial Launch Vehicles
  • Perfection Is And Always Will Be The Standard At Patrick AFB
  • Taurus XL Rocket Fully Assembled At Launch Site
  • Kepler Is Ready To Be Moved To The Launch Pad Today

  • NASA Defers Setting Next Shuttle Launch Date
  • Shuttle Flight Readiness Review Still On Track For Feb 20
  • NASA again postpones Discovery launch
  • Discovery Facing More Delays

  • Second ATV Named After Johannes Kepler
  • Russian supply craft arrives at space station: agency
  • Satellite collision poses 'small' risk to ISS: NASA
  • Happy Birthday, Columbus!

  • Sweet Potato Takes A Ride On Space Shuttle
  • Mosquito Survives In Outer Space
  • Climbing Into Space By The Rope
  • MDA Plays Significant Role In Planning Future Global Space Explorations

  • China Plans To Launch Third Ocean Survey Satellite In 2010
  • Satellite Collision Not To Delay China's Space Program
  • China plans own satellite navigation system by 2015: state media
  • Fengyun-3A Weather Satellite Begins Weather Monitoring

  • U.S., Chinese scientists build nanorobot
  • NASA And Caltech Test Steep-Terrain Rover
  • NASA And Caltech Test Steep-Terrain Rover
  • ASI Chaos Small Robot To Participate In Series Of Exercises

  • Phoenix Mars Lander Team Wins 2009 Swigert Award
  • Dawn Spacecraft View Of Mars
  • As Dawn Approaches Mars, PSI Scientists Gear Up For GRaND Tests
  • NASA Spacecraft Falling For Mars

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement