2 discussions and 1 case study and weekly Summary Discussion 2.1 Define and compare Kinetic and non-Kinetic war? Discussion 2.2 What laws apply to

2 discussions and 1 case study and weekly Summary
Discussion 2.1

Define and compare Kinetic and non-Kinetic war?

Don't use plagiarized sources. Get Your Custom Assignment on
2 discussions and 1 case study and weekly Summary Discussion 2.1 Define and compare Kinetic and non-Kinetic war? Discussion 2.2 What laws apply to
From as Little as $13/Page

Discussion 2.2

What laws apply to Cyberwarfare?

Case Study 2.1

The Intelligence Operations Process.
Writing Requirements

34 pages in length (excluding cover page, abstract, and reference list)
At least 3-4 peer-reviewed sources that are properly cited and referenced
APA format, Use the APA template located in theStudent Resource Centerto complete the assignment.
Please use the Case Study Guide as a reference point for writing your case study.

Weekly Summary 2.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.
Writing Requirements

Use the APA template located in theStudent Resource Centerto complete the assignment.

2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Cyberwarfare: Information

Operations in a Connected World

Lesson 2

Cyberwarfare, Law, Ethics, and

Intelligence Operations

Page 2Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Learning Objective(s)

Explain the role of law and ethics in

cyberwarfare.

Describe intelligence operations in

cyberwarfare.

Page 3Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Key Concepts

Kinetic warfare

Laws and ethics in cyberwarfare

Intelligence gathering processes, disciplines, and

techniques

The types of support intelligence can provide to

offensive and defensive cyberwarfare

How countries have gathered intelligence in a

connected world

Page 4Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

DISCOVER: CONCEPTS

Page 5Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Kinetic and Nonkinetic Warfare

Traditional type of
military conflict

Kinetic
warfare

High-technology
cyberwarfare

Nonkinetic
warfare

Page 6Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

International Law and Kinetic

Warfare

Categories of the laws of warfare

Jus ad bellum, Latin for the right to war

Jus in bello, Latin for the law of war

Legal review and legality of actions

Legal authority to determine what is/is not legal

according to international law resides with

international courts like International Court of

Justice (ICJ)

– Primary judicial branch of the United Nations

Page 7Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Civilian, Military, and Shared Use

of Infrastructure

Page 8Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Cyberwarfare Law

Cyberwarfare in a kinetic warfare context

Example: Stuxnet aimed at Irans uranium

enrichment facilities

Kinetic warfare law in a cyber context

Kinetic warfare crosses over into cyberwar when

combatants respond to or preempt cyberattacks

using traditional means of warfare

Page 9Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Ethics and Cyberwarfare

Ethical standards in existing international law

Self-defense

Proportionality

Limitations on targets

Common concepts in codes of ethics

Appropriate use of skills and capabilities

Professionalism

Adherence to existing laws and standards

Respect for privacy and confidentiality

Integrity in actions and access to systems and

data

Page 10Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

DISCOVER: OBJECTIVES

Page 11Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

The Tallinn Manual

An in-depth review and analysis that provides

nonbinding advice based on existing

international body of law around armed conflict

and related topics

Is a response to:

Focus on cyberattacks by nation-states and

nonstate actors

The challenges those attacks provide when

nation-states attempt to determine if their

activities or those of their attackers are covered

by international law

Page 12Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Tallinn Manual

Sovereignty, jurisdiction, and control

Responsibility

The use of force

Self-defense

Page 13Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Identification of Mercenary Actors in

Warfare

Page 14Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Determination of Use of Force By Nation-

State

Page 15Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Tallinn Manual

Civilians and infrastructure

Espionage, treachery, and ruses

Neutrality

Page 16Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Shared Use of Infrastructure in

the Cyberworld

Page 17Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

DISCOVER: CONTEXT

Page 18Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Overview of Intelligence

Operations

Intelligence: The collection, analysis, and

dissemination of information about the

capabilities, plans, intentions, and operations of

an adversary

May take place at behest of nations or nonstate

actors seeking to gain an advantage over a

military, political, criminal, or business

adversary

Page 19Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Overview of Intelligence

Operations (Cont.)

Using repeatable, organized approach to

intelligence collection and analysis ensures that

nations can:

Prioritize use of intelligence resources

Gather information needed by decision makers

at policymaking, strategic, and tactical levels

Page 20Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Intelligence Operations: Intelligence

Cycle

Page 21Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Data Processing During Intelligence

Cycle

Page 22Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

DISCOVER: TECHNOLOGY

Page 23Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Intelligence Disciplines

Human intelligence (HUMINT)

Signals intelligence (SIGINT)

Open source intelligence (OSINT)

Geospatial intelligence (GEOINT)

Measurement and signature intelligence

(MASINT)

Page 24Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Prioritization Chart for Ranking Potential

HUMINT Sources

Page 25Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

RC-135 Rivet Joint Aircraft Used for

SIGINT Collection Missions
C

o
u
rte

s
y
o

f th
e
U

. S
. A

ir F
o
rc

e

Page 26Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

U-2 Dragon Lady Aircraft Used for IMINT

Collection Missions
C

o
u
rte

s
y
o

f th
e
A

irm
a
n
1

s
t C

la
s
s
B

o
b
b
y
C

u
m

m
in

g
s
/U

. S
. A

ir F
o
rc

e

Page 27Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Slide from Colin Powells Presentation to

United Nations Security Council
C

o
u
rte

s
y
o

f th
e
W

h
ite

H
o
u
s
e
A

rc
h
iv

e
s

Page 28Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

DISCOVER: UNDERSTANDING

Page 29Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Supporting Offensive

Cyberwarfare

Providing information about potential targets

Collecting information about cyberwar

capabilities of third parties and using

information to frame a third party as the

source of an attack

Page 30Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Supporting Defensive

Cyberwarfare

Gathering information about adversaries

through intelligence

May leverage HUMINT, SIGINT, and other

traditional methods

Page 31Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Supporting Defensive

Cyberwarfare (Cont.)

Intelligence operations attempt to answer:

Who are potential adversaries?

What are adversaries technical capabilities?

What are cyberwarfare opponents plans and

intentions?

What signs warn of impending attack?

How will adversary make decisions about using

cyberwarfare techniques?

How will adversary communicate orders to engage

in cyberwarfare?

Page 32Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Case Studies: Media Reporting

on Intelligence Activities

Echelon

Telephone metadata

Muscular

Follow the Money

Quantum

Page 33Cyberwarfare: Information Operations in a Connected World
2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Summary

Kinetic warfare

Laws and ethics in cyberwarfare

Intelligence gathering processes, disciplines, and

techniques

The types of support intelligence can provide to

offensive and defensive cyberwarfare

How countries have gathered intelligence in a

connected world

Leave a Comment

Your email address will not be published. Required fields are marked *