Model

Validating a Framework for Offensive Cyberspace Operations

Abstract:

The Ambidextrous Framework for Offensive Cyberspace Operations is validated using a simulated cyber conflict emulating a cyber operation against critical infrastructure of a fictitious country. The purpose is to assess how well the framework supports planning and execution of cyber operations. Data collection is done through self-reporting by a team in the cyber range training facility, supported by a follow-up unstructured interview. The results show that the framework works well in supporting planning, preparation, and order giving to execute offensive cyberspace operations. However, the framework is less suited to supporting operator actions during ongoing offensive operations, due to its current lack of capability to utilise real-time data from battle stations.

Intelligence, Surveillance, and Reconnaissance and Electromagnetic Warfare Methods for Cyber Signature Production: A Conceptual Model

Abstract:

The purpose of this paper is to offer a methodology using the already mature signature production capabilities offered within the intelligence and electromagnetic warfare fields to develop a similar capability for cyber operators. Not only will the tools and TTPs assist in target and signature production, but they will also make attribution much easier by capturing the common location, profile, and parametric data necessary to identify and to verify adversary identities. In the information related capability (IRC) disciplines of intelligence, surveillance, and reconnaissance (ISR) and electromagnetic warfare (EW), signature production based on parametric data, adversary tactics, techniques, procedures (TTPs), and methodologies have long been the operational answer to the attribution and targeting malaise. 

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com