Abstract
The blueprint for engaging in cyberspace has largely been designed and implemented by the military due to the nature of its roles and responsibilities. On the global stage, safety, security, prevention, and resolution of conflicts generally fall squarely within the purview of the military. Conflicts and challenges in the traditional domains of engagement (air, space, land, and maritime) can usually be viewed in and approached from an apples-to-apples context by the military. However, the cyberspace domain because of its inherent asymmetry and low requirements for entry requires that the public and private sectors be viewed as viable participants and combatants. In addition, unfortunately, these two sectors also provide an incredibly rich target space. The military culture has viewed cyberspace primarily from a defensive and reactive posture. However, cyberspace dictates that a much broader position is taken because the public and private sectors require and provide different context and scales that fall outside of the military’s normal scope and obligations. Offensive cyber operations are spoken of only in very select circles and most likely in retaliation and secondary to mission and business priorities and objectives. In this effort, I will provide a “new” perspective on cyber offensive operations and how they can be used to better address mission and business priorities. The case studies utilized in this effort show that mission and business priorities can not only be addressed proactively but also yield significant benefits to organizations, agencies, and communities if offense is viewed through a different “lens.”
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ansari, A. (2008). Right to information and its relationship to good governance and development. http://www.nfici.org/attachments/article/163/IC-MA-LectureAtUNESCO-04122008.pdf. Accessed 10 February 2017.
Beath, C., Becerra-Fernandez, I., Ross, J., & Short, J. (2012). Finding value in the information explosion. MIT Sloan Management Review, 17–21.
Berners-Lee, T. (2017). History of the web. Retrieved from World Wide Web Foundation: http://webfoundation.org/about/vision/history-of-the-web/. Accessed 10 February 2017.
Challenges for the Intelligence Community. (2011). In B. Fischoff, H. Arkes, B. Buendo de Misquita and T. Fingar, Intelligence Analysis for Tomorrow: Advances from the Behavioral and Social Sciences (pp 5–21). Washington, DC: National Academies Press.
Critical Infrastructure. (2017). Retrieved from Department of Homeland Security: https://search.dhs.gov/search?query=critical+infrastructure&op=Search&affiliate=dhs. Accessed 10 Feb 2017.
Critical Infrastructure Protection: DHS list of priority assets needs to be validate and reported to congress. (2013).Washington, DC: GAO-13-296. Accessed 10 Feb 2017.
Critical Infrastructure Sectors. (2016) Retrieved from Homeland Security: https://www.dhs.gov/critical-infrastructure-sectors. Accessed Feb 10 2017.
Cyberspace Operations. (2013). Retrieved from Joint Publication 3–12 (R): http://www.dtic.mil/doctrine/new_pubs/jp3_12R.pdf.
Defensive Operations. (2017). Retrieved from GlobalSecurity.org: http://www.globalsecurity.org/military/library/policy/army/fm/3-0/ch8.htm
Driving Federal Performance. (2017). Retrieved from Performance.gov: https://www.performance.gov. Accessed 10 Feb 2017.
Gibson, W. (1984). Neuromancer. New York: Ace Books.
Gilmour, J. (2007). Implementing OMB’s program assessment rating tool (PART): Meeting the challenges of integrating budget and performance. OECD Journal on Budgeting, 1–40.
Goldsmith, S. (2013). How Louisville, Ky is using a stat program to transform the culture of government. Retrieved from Governing: http://www.governing.com/blogs/bfc/col-efficiency-louisville-louiestat-performance-metrics-improvement-transform-government-culture.html. Accessed 10 Feb 2017.
H.R.3162: Uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism. (2001). Retrieved from Congress.gov: https://www.congress.gov/bill/107th-congress/house-bill/03162. Accessed 10 Feb 2017.
How to Keep Your Personal Information Secure. (2017). Retrieved from Consumer Information: https://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure. Accessed 10 Feb 2017.
Jacklic, J., Popovic, A., & Coelho, P. (2011). The impact of quality information provided by business intelligence systems on the use of information in business processes (pp. 158–167). Berlin/Heidelberg: Springer.
JFODS4: The Joint Forces Operations & Doctrine SMARTbook. (2015). In N. Wade (Ed.), About the instruments of national power (a whole of government approach). Totowa: The Lightning Press.
JP 1: Doctrine for the Armed Forces of the United States. (2013 ). Retrieved from Lightning Press: http://www.dtic.mil/doctrine/new_pubs/jp1.pdf. Accessed 10 Feb 2017.
Kelkar, M., Viechnicki, P., Conlin, S., Frey, R., & Strickland, F. (2016). Mission analytics: Data-driven decision making in the government. New York City: Deloitte.
Kelleher, K. (2013). Mobile growth is about to be staggering. Washington, DC: Fortune.
Kelly, E. (2015). Introduction: Business ecosystems come of age. New York: Deloitte University Press.
Kott, A., Buchler, N., & Schaefer, K. (2017). Kinetic and cyber. Retrieved from Arxiv.org: https://arxiv.org/ftp/arxiv/papers/1511/1511.03531.pdf. Accessed 10 Feb 2017.
Kuehl, D. (2009). From cyberspace to cyberpower: Defining the problem. In F. Kramer, S. Starr, & L. Wentz (Eds.), Cyberpower and national security (pp. 37–40). Washington, DC: National Defense University Press.
Leiner, B. M., Cerf, V. G., Clark, D., Kahn, R. E., Kleinrock, L., Lynch, D., . . . & Wolf, S. (2017). The brief history of the Internet. Retrieved from Internet Society: https://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet. Accessed 10 Feb 2017.
Libicki, M. (2009). Military cyberpower. In F. Kramer, S. Starr, & L. Wentz (Eds.), Cyberpower and national security (pp. 275–284). Washington, DC: National Defense University Press.
Libicki, M. (2012). Cyberspace is not a warfighting domain. I/S: A Journal of Law and Policy for the Information Society, 321–336.
Military power potential. (2017). Retrieved from Encyclopedia.com: http://www.encyclopedia.com/social-sciences/applied-and-social-sciences-magazines/military-power-potential#C. Accessed 10 Feb 2017.
Moore, N. (1997). The information society. Paris: UNESCO.
Nichiporuk, B. (2002). U.S. military opportunities: Information warfare concepts of operation. In Z. Khalilzad & J. Shapiro (Eds.), Strategic appraisal: U.S. air and space power in the 21st century (pp. 187–223). Arlington: Rand. Retrieved from https://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1314/MR1314.ch6.pdf. Accessed 10 Feb 2017.
Offensive operations. (2017b). Retrieved from GlobalSecurity.org: http://www.globalsecurity.org/military/library/policy/army/fm/3-0/ch7.htm#par8. Accessed 10 Feb 2017.
Performance measurement strategies and challenges. (2013). Retrieved from Office of Management and Budget: https://www.whitehouse.gov/sites/default/files/omb/part/challenges_strategies.pdf. Accessed 10 Feb 2017.
Power. (2017). Retrieved from Dictionary.com: http://www.dictionary.com/browse/power. Accessed 10 Feb 2017.
Presidential Policy Directive (PPD) 21: Critical infrastructure security and resilience. (2013). Retrieved from Office of the White House: https://fas.org/irp/offdocs/ppd/ppd-21.pdf. Accessed 10 Feb 2017.
Quick, C. (2014). Cyberspace as a weapons system. Arlington: Landpower Publication.
Raynor, M., & Cotteleer, M. (2015). The more things change:Value creation, value capture, and the internet of things. Deloitte Review, 1–17.
Shareholders. (2017). Retrieved from Reference for Business: http://www.referenceforbusiness.com/index.html. Accessed 10 February 2017.
Weapons. (2017). Retrieved from Miltary.com: http://www.military.com/equipment/weapons. Accessed 10 Feb 2017.
Whitehead, Y. (1999). Information as a weapons: Reality vs Promises. Retrieved from Iwar.org: http://7.iwar.org.uk/iwar/resources/usaf/maxwell/students/1997/whitehead-update.pdf. Accessed 10 Feb 2017.
Wladawsky-Berger, I. (2017). Reflections on the transition to an information society. Retrieved from Irving Wladawsky-Berger: http://blog.irvingwb.com/blog/2011/05/reflections-on-the-transition-to-an-information-based-society.html. Accessed 10 Feb 2017.
WSIS+10: WSIS Review Process. (2005). Retrieved from World Summit on the Information Society: https://www.itu.int/net/wsis/review/2003-2005.html. Accessed 10 Feb 2017.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this entry
Cite this entry
Hurley, J.S. (2018). Focusing on Mission and Business Objectives Through a Different Lens: The New Cyber Offensive. In: Carayannis, E., Campbell, D., Efthymiopoulos, M. (eds) Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, Cham. https://doi.org/10.1007/978-3-319-09069-6_46
Download citation
DOI: https://doi.org/10.1007/978-3-319-09069-6_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09068-9
Online ISBN: 978-3-319-09069-6
eBook Packages: Economics and FinanceReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences