THE DECISION TO ATTACK
STUDIES IN SECURITY AND INTERNATIONAL AFFAIRS
SERIES EDITORS
William W. Keller Professor of International Affairs, Center for International Trade and Security, University of Georgia | Scott A. Jones Director of Export Control Programs, Center for International Trade and Security, University of Georgia |
SERIES ADVISORY BOARD
Pauline H. Baker The Fund for Peace Eliot Cohen Paul H. Nitze School of Advanced International Studies, Johns Hopkins University Eric Einhorn Center for Public Policy and Administration, University of Massachusetts, Amherst John J. Hamre The Center for Strategic and International Studies Josef Joffe Hoover Institution, Institute for International Studies, Stanford University Lawrence J. Korb Center for American Progress | William J. Long Sam Nunn School of International Affairs, Georgia Institute of Technology Jessica Tuchman Mathews Carnegie Endowment for International Peace Scott D. Sagan Center for International Security and Cooperation, Stanford University Lawrence Scheinman Monterey Institute of International Studies, CNS-WDC David Shambaugh The Elliott School of International Affairs, George Washington University Jessica Stern FXB Center, Harvard School of Public Health |
The Decision to Attack
Military and Intelligence Cyber Decision-Making
Aaron Franklin Brantly
2016 by the University of Georgia Press
Athens, Georgia 30602
www.ugapress.org
All rights reserved
Designed by
Set in 10/13 Minion Pro by Graphic Composition, Inc., Bogart, Georgia
Printed and bound by
The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources.
Most University of Georgia Press titles are available from popular e-book vendors.
Printed in the United States of America
20 19 18 17 16 C 5 4 3 2 1
Library of Congress Cataloging-in-Publication Data
Names: Brantly, Aaron Franklin, author.
Title: The decision to attack : military and intelligence cyber decision-making / Aaron Franklin Brantly.
Other titles: Military and intelligence cyber decision-making
Description: Athens, GA : University of Georgia Press, [2016] | Series: Studies in security and international affairs | Includes bibliographical references and index.
Identifiers: LCCN 2015032334 | ISBN 9780820349206 (hbk. : alk. paper) | ISBN 9780820349190 (ebook)
Subjects: LCSH: CyberspaceSecurity measuresGovernment policyUnited States. | United StatesMilitary policyDecision making. | Offensive (Military science)
Classification: LCC U163 .B69 2016 | DDC 355.4/1dc23 LC record available at http://lccn.loc.gov/2015032334
I dedicate this book to my wife and best friend, Nataliya. She has stood by me and waited for more than five years while I finished my formal academic education and now as I have taken on the challenge of studying Cyber at the United States Military Academys Army Cyber Institute. She has read, commented on, and reread more of my words than anyone. It is her patient and enduring support that has enabled me to make it as far as I have.
CONTENTS
ILLUSTRATIONS
TABLES
FIGURES AND CHARTS
ACKNOWLEDGMENTS
This book would not have been possible without the support and dedication of the diverse cadre of individuals standing behind me and pushing me forward. In particular, I would like to thank Dr. Loch K. Johnson for his constant feedback and assistance in helping me develop the ideas presented in this book. Dr. Johnson has inspired me both as a professor and as a mentor. I would also like to thank Dr. Jeffrey Berejikian, Dr. Han S. Park, Dr. Michael Warner, and Dr. Christopher Bronk, each of whom have given enormous amounts of time to help me with my academic and professional pursuits. Lastly, I would like to thank the team at the United States Army Cyber Institute and the Combating Terrorism Center at the United States Military Academy for providing me the opportunity to engage in research in line with my interests.
The views expressed here are those of the author and do not reflect the official policy or position of the Department of the Army, Department of Defense, or the U.S. government.
ABBREVIATIONS
CENTCOM | Central Command |
CA | cyber attack |
CD | cyber defense |
CE | cyber exploitation |
CERT | computer emergency response team |
CINC | Composite Index of National Capabilities |
CLT | construal level theory |
CO | cyber operations |
COW | Correlates of War project |
CSIS | Center for Strategic and International Studies |
C2W | command and control warfare |
CWC | cyber warfare capability |
CWS | cyber weapons system |
CYBERINT | cyber intelligence |
DBA | dominant battlespace awareness |
DBK | dominant battlespace knowledge |
DCO | defensive cyber operations |
DCO-IDM | defensive cyber operationsinternal defense measures |
DCO-RA | defensive cyber operationsresponse actions |
DDoS | distributed denial of service |
DoD | Department of Defense |
DoDIN Ops | Department of Defense information networks operations |
DoS | denial of service |
EIU | Economist intelligence unit |
ESC | economic and social context |
GEOINT | Geospatial intelligence |
HUMINT | human intelligence |
IA | industrial application |
IAEA | International Atomic Energy Agency |
ICE-A | intelligence on the cyber environment of the adversary |
ICE-D | intelligence on the cyber environment for defense |
ICS | industrial control systems |
ICT | information communications technology |
INTs | intelligence collection categories |
IPB | intelligence preparation of the battlefield |
ISP | Internet service provider |
Next page