Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/350837997

INTEGRATION OF CYBER DEFENSE INTO THE OPERATIONAL PLANNING


PROCESS

Conference Paper · October 2015

CITATIONS READS

0 3

1 author:

Stefan-Antonio Dan-Suteu
National Defence University "Carol I"
16 PUBLICATIONS   1 CITATION   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

IISMA - Integrated information system for management of activities View project

POSDRU/187/1.5/S/155385 with the title “Integrated/educational network for the formation, counseling and orientation of doctoral students for a research career in
security, defense, public order and national security domains - SECNETEDU View project

All content following this page was uploaded by Stefan-Antonio Dan-Suteu on 13 April 2021.

The user has requested enhancement of the downloaded file.


INTEGRATION OF CYBER DEFENSE INTO THE OPERATIONAL
PLANNING PROCESS

Ştefan-Antonio DAN-ŞUTEU

LTC, Senior instructor PhD candidate, Command and Staff Faculty


“Carol I” National Defence University
dan.antonio@gmail.com

Abstract: The emergence of the cyber operational environment and its associated issues raise several challenges
across the military operational planning process. This new paradigm should be acknowledged and taken into
account by commanders and military planners in order to ensure the success of their operations. Any future
military exercise and operation must contain a cyber component, in terms of specialized personnel, specific
activities, procedures and injections, which should ensure the necessary conditions for the availability,
protection and dissemination of information required by our own forces as well as the appropriate means to
deny, degrade or disrupt the use of the adversary command and control systems or other cyber capabilities.
Keywords: operational environment, operational planning, cyber defense, command and control.

The current context in which the become critical to the success of military
planning of military operations is actions.
conducted is significantly influenced by In extent, the large scale
the implementation of technologies, implementation of information and
applications and systems pertaining to the communication technologies
field of information and communication. and their increasing importance in the
The increased network connectivity contemporary human and institutional
ensures military planners with quick access relationships determines the attribution of
to significant data, accelerates the a growing importance to the management
processing and dissemination of of the cyber and electromagnetic
information analysis products, contributes environment. It is necessary that this new
to an accurate common operational picture reality, marked by the emergence of these
and accelerates the preparations and two new operational environments, to be
transmission of orders for military acknowledged and taken into account by
operation. By judicious exploitation of commanders and military planners in order
these above-mentioned benefits our own to ensure the success of their operations.
decision cycle can be shortened, We believe that any military operation
overtaking the opponent's decision cycle must contain a cyber component (in terms
and ensuring the necessary conditions for of specialized personnel and specific
gaining or maintaining the initiative and activities), which should ensure the
the success of own forces planned provision for the availability, protection
operations. and dissemination of information required
Thus, in line with modern high-tech by own forces as well as the appropriate
battleground characteristics, populated means to deny, degrade or disrupt the use
with increasingly complex command and of the adversary command and control
control systems, sensor networks, system and other cyber capabilities.
communication and information systems, Some modern armed forces have
drones and interconnected battle platforms taken a leap forward on the way to
there is an obvious growing importance integration of cyber defense into the
that should be attributed to the cyber and operational planning. A good example is
electromagnetic environments as they the US provisional doctrine for unified
Proiect cofinanţat din Fondul Social European prin Programul Operaţional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 „Investeşte în OAMENI”

54
land operations which stipulates that staffs and influence activities, signals
and military commanders plan, conduct intelligence, and network operations.”2
and carry out operations in the cyber and At implementation level the US
electromagnetic environments, defined as doctrinal provisions are reflected in an
"activities leveraged to seize, retain, and approach which aims the integration in the
exploit an advantage over adversaries and operational planning and synchronization,
enemies in both cyberspace and the along three lines of effort, of the activities

Figure 1. Operational view4


electromagnetic spectrum, while to be conducted in the cyber and
simultaneously denying and degrading electromagnetic environment, respectively
adversary and enemy use of the same and cyber operations, electronic warfare
protecting the mission command system".1 operations and electromagnetic spectrum
Also the mission command management operations.3
doctrine stipulates that, in order to ensure From this perspective the figure 1
the success of operations, the commanders depicts the cyber electromagnetic activities
supported by their staff, must integrate, as operational view.
part of the operations process, the In order to integrate and
cyberspace operations, electromagnetic synchronize4the elements from these three
spectrum operations and electronic areas of interest, this approach involves, in
warfare. “These activities must be
synchronized across all command echelons 2
ADRP 6-0, Mission Command, Department of the
and warfighting functions, enabling inform Army, Washington, DC, 17 May 2012;
3
FM 3-38, Cyber Electromagnetic Activities,
Department of the Army, Washington, DC, 12
1
ADRP 3-0, Unified Land Operations, Department February 2014;
4
of the Army, Washington, DC, 16 May 2012; Ibidem;
Proiect cofinanţat din Fondul Social European prin Programul Operaţional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 „Investeşte în OAMENI”

55
addition to establishing a common inter-relational and interdependent.
operational language, the justification and Starting from this joint feature of the cyber
definition of roles and responsibilities and electromagnetic operations, the
associated with the commanders, military planners must determine, plan and
subordinate staff and troops. design in a joint manner the specific
The rational and efficient operations, ensuring their integration and
exploitation of cyberspace, in conjunction synchronization with the classical physical
with the electromagnetic environment, operations, kinetic by nature.
ensure the achievement of communication Within each military unit
requirements, processing and sharing of establishment should exist a cyber staff
information and the integration and element responsible for the planning,
synchronization of military operations preparation, conduct and assessment of
along the entire chain of command and cyber related activities and operations,
along all the warfighting functions. both defensive and offensive. This staff
However, due to their specific element should ensure the achievement of
characteristics, the cyberspace and the multiple and complex tasks as follows:
electromagnetic environment provides also • Develop and integrate cyber
to the potential adversaries opportunities elements and actions into exercises and
for exploitation, ion terms of planning, operation plans;
conducting and executing of cyber and/or • Support cyber policies and ensure
electronic attacks against our own compliance of cyber activities with
communication and information networks applicable policy laws and regulations;
and weapons systems. Therefore a • Plan, prepare, execute, and assess
fundamental requirement needed to be met cyber operations;
for the successful execution of our planned • Identify and coordinate cyber
operations is to ensure the security and intelligence support requirements;
defense of the cyber and electromagnetic • Integrate intelligence preparation
environment simultaneously denying their of the cyber environment into the
use by the adversary. operations process;
This goal can be achieved through • Evaluate offensive and defensive
the implementation of necessary measures requirements for cyber capabilities;
to integrate and synchronize operations • Maintain available cyber
within cyberspace and the electromagnetic resources;
spectrum, resulting in an improved • Identify and propose targets
common knowledge of the operational within cyberspace to superior echelon for
environment, a shortening of decision- assessment and approval;
making cycle, an increased efficiency of • Plan, coordinate, and evaluate
leadership at all command levels and friendly cyber operations;
increased defense possibilities against • Implement friendly electronic and
enemy attacks. network security measures;
Taking into account the fact that • Identify civilian/commercial
the activities in the cyber environment cyber related infrastructure capabilities
depends increasingly on wireless within the unit assigned area of operations.
technologies it is obvious that operations Cyber operations should be
conducted in this environment must be de- integrated into plans and orders through
conflicted and synchronized with the the military decision making process. The
specific electronic warfare operations and staff element responsible for cyber
spectrum management, as they concurred operations should be actively involved in
on the same natural resource. All three all the steps of the operational planning
types of operations should be perceived as process (receipt of mission, mission
Proiect cofinanţat din Fondul Social European prin Programul Operaţional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 „Investeşte în OAMENI”

56
analysis, course of action-COA collateral losses of lives and civilian
development, analysis, comparison and property. In antithesis, cyber operations
approval, orders production, dissemination have a more subtle feature, they are mostly
and transition) as well as in preparation, non-lethal and, once started, takes place
execution and assessment of the operation virtually at the speed of information
phases. It should ensure also the transmission.
integration of cyber specific elements into In order to ensure the unity of
the intelligence preparation of the effort in achieving the objective of creating
battlefield, targeting process, risk an operational cyber capability an
management, and continuing activities important role should be played by the
processes. specific cyber doctrine requirements. Also
Taking into account the complexity organizational and infrastructure
and the very dynamic nature of cyber- requirements should be aligned with the
related activities, the cyber staff element selection, training and skills development
need to be directly connected and work of cyber operations leaders and specialists.
closely with the information staff element, This can be achieved through advanced
operations staff element as well as with the programs of study and training, mainly
communication and information systems with practical emphasis, which must
element, in order to achieve efficient include, in an integrative manner,
awareness and prompt reaction to the disciplines which although related are
changing operational environment. traditionally studied separately, disciplines
It is important to emphasize that a covering the fields of reconnaissance,
modern armed force must possess the intelligence, information, communications,
necessary capabilities to conduct cyber computer networks and electronic warfare.
operations while maintaining efficiency in The cyber operations can have a
the use of advantages offered by an defensive or offensive feature. The
electromagnetic spectrum which becomes defensive operations can be easily
more and more congested. This approach integrated in the operational planning as
has the potential to provide tactical, they are passive in nature and network
operational and strategic advantages, protection is already implemented.
which traditionally have been achieved However, the offensive cyber operations
only through violent means and physical are directly linked to the available so
destruction. called cyber weapons.
However, we must be keeping in The potential for integrating the
mind that cyber operations may involve a cyber weapons in the war game requires
number of problems and challenges that further justification and experimentation.
require reflection. Thus, the associated Apparently, due to the typology and nature
judicial-legal issues may negatively of these new types of military means there
influence the duration of decision making is no a significant difference between their
and approval cycles for the courses of deployment and use at tactical, operational
action. Also, due to the increased or strategic level. The interconnected
interconnectivity of current information structure of modern computer and
networks, cyber operations may cause communications networks may prevent the
undesired effects, difficult to predict, limitation of a cyber-attack, whose effects
effects which may spread beyond the can propagates beyond expectations and
classic battlefield geographical limits. may cause negative consequences of
Although a permanent solution and different magnitudes, inducing a
thoroughly tested throughout history, the significant potential risk even at political
use of kinetic means and methods presents level.
the major disadvantage of direct and
Proiect cofinanţat din Fondul Social European prin Programul Operaţional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 „Investeşte în OAMENI”

57
It is necessary that the armed forces development of cyber capabilities at the
determine ways to use the new information component nation’s level and also due to
technologies and applications in order to national strategies, policies and laws in the
identify the attackers before a cyber attack field of cyber security.
can occur, or at least during its on-going “The precondition for an effective
timeframe, and not in a post-factum use of the defense planning process in
manner, as the majority of cyber attacks cyber defense is not only information
are currently assessed. about existing capabilities, but also
Due to the specific characteristics differing national policy, legislative and
of cyber environment the offensive and doctrinal approaches. Since the
defensive actions deployed in this overarching goal of the defense planning
environment are not easy to be separated, process is to bring together the civilian and
the differences between them having a military aspects of Allied defense, there is
high degree of uncertainty and been no reason to rule out its application to
characterized by the fact that it is not cyber capability development”.6
possible to be defined with clarity and also In accordance with the NATO
by the fact that they cannot be conducted Cyber Defense Policy endorsed at the
in isolation mode. Even though, the Wales summit, the cyber-attacks can be
majority of cyber experts agreed on the treated as harmful as conventional attacks
fact that, regardless an exact definition, the and cyber defense is now considered a part
cyber environment favors the attacker. of NATO’s core task – collective defense.
These considerations emphasize the The ambiguity however remains as to what
potential role that offensive cyber degree of intensity under what kind of
operations may play in the future military circumstances would warrant the Article 5
confrontations. As a general said, through response since the decision ultimately rests
an analogy with a medieval kinetic with the North Atlantic Council that
confrontation "Catching arrows is not all decides on a case-by-case basis. There is
that much fun. At some point, it's also vast discrepancy between NATO
preferable to go kill the archer."5 members’ cyber capabilities.
Initiatives for integration of cyber Currently only about half of NATO
defense into the operational planning exist member nations dispose of some type of
also at NATO level. The adopted Smart cyber defense capability within their armed
Defense concept aims an innovative forces but national cyber capability targets
approach to support the development of the are to be elaborated within the NATO’s
Alliance's military capabilities, including Defense Planning Process by 2016 giving
cyber capabilities, through improved rise to calls for future establishment of a
cooperation between the military, joint cyber command under the SACEUR
academia and industry and through and development of NATO cyber warfare
encouraging national and multinational doctrine.7
initiatives in the field of cyber defense. Annually NATO plans and
However, the use of defense conducts specialized cyber defense
planning process of the Alliance in the exercises and also aims to incorporate
cyber realm is facing serious challenges, cyber defense elements in all its military
mainly due to the large variation in
equipment and training, to the degree of 6
Krause H., NATO on its way towards a comfort
zone in cyber defence, NATO CCD CoE, Tallin,
5
Maj. Gen. Brett Williams, article Offense and Estonia, 2014;
7
defense not clearly separable in cyberspace, at Kufčák J., NATO after the Wales Summit:
http://www.fiercegovernmentit.com/story/offense- Readying the Alliance for the Future, Octomber
and-defense-not-clearly-separable-cyberspace-says- 2014, at http://www.amo.cz/editor/image/
cybercom-general/2013-02-25 produkty1_soubory/amocz_pp-2014-6.pdf
Proiect cofinanţat din Fondul Social European prin Programul Operaţional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 „Investeşte în OAMENI”

58
exercises, both in the planning and the 2. ADRP 6-0, Mission Command,
execution stage. Despite the current trend Department of the Army, Washington,
in decreasing defense budgets, the DC, 17 May 2012;
challenges NATO must address are 3. FM 3-38, Cyber Electromagnetic
increasingly complex and diversified, Activities, Department of the Army,
prompting the need to find innovative Washington, DC, 12 February 2014;
solutions to ensure the success of Alliance 4. Krause H., NATO on its way towards a
operations not only in traditional comfort zone in cyber defence, NATO
environments but also in the cyberspace. CCD CoE, Tallin, Estonia, 2014;
Taking into account all the above- 5. Maj. Gen. Brett Williams, article
mentioned considerations I can conclude Offense and defense not clearly
that determining how to address the separable in cyberspace, at
challenges and opportunities that http://www.fiercegovernmentit.com/sto
cyberspace offers will remain an open ry/offense-and-defense-not-clearly-
issue in an evolving process. separable-cyberspace-says-cybercom-
A lot of variables, as political general/2013-02-25, accessed on 10th
direction, legal and doctrinal provisions, of September 2015;
resources at disposal, available technology, 6. Kufčák J., policy paper NATO after the
time capital, specialized workforce, etc. Wales Summit: Readying the Alliance
will determine the manner in how the for the Future, Octomber 2014, at
armed forces develop feasible solutions to http://www.amo.cz/editor/image/produ
the cyber issue. However, I believe that the kty1_soubory/amocz_pp-2014-6.pdf,
requirement to operate within this part of accessed on 11th of September 2015.
the operational environment will remain,
regardless of the various constraints, This work was possible with the financial
because, in the near future, to obtain and support of the Sectorial Operational
maintain an advantage in the cyberspace Programme for Human Resources
will be crucial to a successful military Development 2007-2013, co-financed by
operation. the European Social Fund, under the
project number POSDRU/187/1.5/S/155385
Bibliography with the title “Integrated/educational
network for the formation, counseling
1. ADRP 3-0, Unified Land Operations, and orientation of doctoral students for a
Department of the Army, Washington, research career in security, defense,
DC, 16 May 2012; public order and national security
domains - SECNETEDU.

Proiect cofinanţat din Fondul Social European prin Programul Operaţional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 „Investeşte în OAMENI”

59
View publication stats

You might also like