SlideShare a Scribd company logo
1 of 3
Download to read offline
19/10/2016
CLAS generaals 30-10-2015 1
Integrating Cyber
Capabilities into
Full Spectrum
Operations
BGen prof Paul Ducheine
NLD Defence Academy
University of Amsterdam
@PaulDucheine
Ministry of Defence
2
Content
• The Scene
• National Power (DIME)
• Cyberspace
• Military operations
• Full Spectrum Operations?
• Moral component
• Conceptual component
• Physical component
• Close
The scene: National Power (DIME)
Ministry of Defence
4
The scene: Cyberspace
‘all entities … digitally … connected’
• Persons
• Virtual identities (Cyber persona)
• Virtual objects (Cyber objects)
• Protocols,
Firmware, (Software)
Operating Systems,
Applications
• Data (Data content)
• Objects (Hardware)
• Geographical locations
}
The scene: Military operations
Ministry of Defence
6
Content
• The Scene
• National Power (DIME)
• Cyberspace
• Military operations
• Full Spectrum Operations?
• Moral component
• Conceptual component
• Physical component
• Close
19/10/2016
CLAS generaals 30-10-2015 2
Full Spectrum Operations: Physical Component
Issues?
• Testing means & methods
• Approval means & methods
• Training & Exercises
Personnel
• High tech & Low tech
• Hard Cyber & Soft Cyber
• Cyber Infrastructure
• Targeting packages
• Content for Soft Cyber Ops
Full Spectrum Operations: Conceptual Component
• Hard & Soft Cyber Ops
• Understand Cyberspace
• Understand cognitive &
informational processes
• Offensive or defensive?
• Effects!!
• Disruptive & constructive
• Typecasting
• Strategic & Tactical assets/use
• Organizing within Government
• Organizing within MoD
• Weapon release authority
• Manoeuvring
• Synchronizing Full Spectrum
Ops
• Synchronize Tech & Ops
Main effort?
9
“In military terms,
for Al Qaida the
‘main effort’ is
information;
…
for us, information is a
‘supporting effect’.”
Full Spectrum Operations: Moral Component
Culture:
• Kinetic preoccupation
• High tech focus
• Soft Cyber (InfoOps) focus?
• Enemy centric
• Departmentalism
• Doctrinal rigidness
• Risk avoidance
• Centralisation
• Intelligence approach vs.
Manoeuvrist approach
Ministry of Defence
11
Content
• The Scene
• National Power (DIME)
• Cyberspace
• Military operations
• Full Spectrum Operations?
• Moral component
• Conceptual component
• Physical component
• Close
Integrating Cyber
Capabilities into
Full Spectrum
Operations
Start
Manoeuvring in
all environments
Able, capable,
willing
19/10/2016
CLAS generaals 30-10-2015 3
Full Spectrum Operations
‘Unrestricted Warfare’
“One hacker + one
modem causes an
enemy damage and
losses almost equal to
those of a war.”
Q. Liang & W. Xiangsui,
Unrestricted Warfare
(org. 1999)
17
DCC/TECH
Execution
Preparation
Order
Reconnaissance
Operational
Planning
Activity
Effect
Purpose
End-
state
Planning
Decision
Decision
Design
DCC/OPS
Decision
Transport
Intrusion
Control
Action
Maintenance
Exfiltration
Accountability

More Related Content

Similar to Brigadier General Professor Paul Ducheine

Cyber Resilience Tips and Techniques For Protection & Response
Cyber ResilienceTips and Techniques For Protection & Response Cyber ResilienceTips and Techniques For Protection & Response
Cyber Resilience Tips and Techniques For Protection & Response Continuity and Resilience
 
Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Heather-Fiona Egan
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and FutureJohn Gilligan
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Crew
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and FutureJohn Gilligan
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To PrepareResilient Systems
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018Pukhraj Singh
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingGovCloud Network
 
33rd TWNIC IP OPM: Practical Incident Response & Threat Intelligence
33rd TWNIC IP OPM: Practical Incident Response & Threat Intelligence33rd TWNIC IP OPM: Practical Incident Response & Threat Intelligence
33rd TWNIC IP OPM: Practical Incident Response & Threat IntelligenceAPNIC
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the businessCisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the businessCisco Canada
 
IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15Benjamin D. Brooks, CISSP
 
SafeGov Cloud and Law Enforcement event - 31Jan13
SafeGov Cloud and Law Enforcement event - 31Jan13SafeGov Cloud and Law Enforcement event - 31Jan13
SafeGov Cloud and Law Enforcement event - 31Jan13Rick Holgate
 

Similar to Brigadier General Professor Paul Ducheine (20)

Cyber Resilience Tips and Techniques For Protection & Response
Cyber ResilienceTips and Techniques For Protection & Response Cyber ResilienceTips and Techniques For Protection & Response
Cyber Resilience Tips and Techniques For Protection & Response
 
Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best Practice
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
 
Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To Prepare
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
 
33rd TWNIC IP OPM: Practical Incident Response & Threat Intelligence
33rd TWNIC IP OPM: Practical Incident Response & Threat Intelligence33rd TWNIC IP OPM: Practical Incident Response & Threat Intelligence
33rd TWNIC IP OPM: Practical Incident Response & Threat Intelligence
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Cim 4.0 putting things in perspective
Cim 4.0   putting things in perspectiveCim 4.0   putting things in perspective
Cim 4.0 putting things in perspective
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the businessCisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
 
DHS HQ Day 2018 - Barry West
DHS HQ Day 2018 - Barry WestDHS HQ Day 2018 - Barry West
DHS HQ Day 2018 - Barry West
 
IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15
 
Mr John Taylor - The ICT Transformation Challenge for a Transformed MOD
Mr John Taylor - The ICT Transformation Challenge for a Transformed MODMr John Taylor - The ICT Transformation Challenge for a Transformed MOD
Mr John Taylor - The ICT Transformation Challenge for a Transformed MOD
 
SafeGov Cloud and Law Enforcement event - 31Jan13
SafeGov Cloud and Law Enforcement event - 31Jan13SafeGov Cloud and Law Enforcement event - 31Jan13
SafeGov Cloud and Law Enforcement event - 31Jan13
 

More from Royal United Services Institute for Defence and Security Studies (7)

RUSI Urban Warfare Conference Session 1 - Professor Peter Mansoor
RUSI Urban Warfare Conference Session 1 - Professor Peter MansoorRUSI Urban Warfare Conference Session 1 - Professor Peter Mansoor
RUSI Urban Warfare Conference Session 1 - Professor Peter Mansoor
 
RUSI Urban Warfare Conference Session 3 - David Kilcullen
RUSI Urban Warfare Conference Session 3 - David KilcullenRUSI Urban Warfare Conference Session 3 - David Kilcullen
RUSI Urban Warfare Conference Session 3 - David Kilcullen
 
Major General Uzi Moscovici - A brief study at Cyber strategy foundations
Major General Uzi Moscovici - A brief study at Cyber strategy foundationsMajor General Uzi Moscovici - A brief study at Cyber strategy foundations
Major General Uzi Moscovici - A brief study at Cyber strategy foundations
 
Graham Fairclough - Dragons, Bears and Snakes: Learning from Others
Graham Fairclough - Dragons, Bears and Snakes: Learning from OthersGraham Fairclough - Dragons, Bears and Snakes: Learning from Others
Graham Fairclough - Dragons, Bears and Snakes: Learning from Others
 
Col Ian Hargreaves - Conceptual and Doctrinal “Challenges”
Col Ian Hargreaves - Conceptual and Doctrinal “Challenges”Col Ian Hargreaves - Conceptual and Doctrinal “Challenges”
Col Ian Hargreaves - Conceptual and Doctrinal “Challenges”
 
Vice Admiral (Retd) Yoji Koda - Potential Crisis Management Roles for Europe
Vice Admiral (Retd) Yoji Koda - Potential Crisis Management Roles for EuropeVice Admiral (Retd) Yoji Koda - Potential Crisis Management Roles for Europe
Vice Admiral (Retd) Yoji Koda - Potential Crisis Management Roles for Europe
 
A Net Assessment of Chinese Naval Power - Vice Admiral Umio Otsuka
A Net Assessment of Chinese Naval Power - Vice Admiral Umio OtsukaA Net Assessment of Chinese Naval Power - Vice Admiral Umio Otsuka
A Net Assessment of Chinese Naval Power - Vice Admiral Umio Otsuka
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Brigadier General Professor Paul Ducheine

  • 1. 19/10/2016 CLAS generaals 30-10-2015 1 Integrating Cyber Capabilities into Full Spectrum Operations BGen prof Paul Ducheine NLD Defence Academy University of Amsterdam @PaulDucheine Ministry of Defence 2 Content • The Scene • National Power (DIME) • Cyberspace • Military operations • Full Spectrum Operations? • Moral component • Conceptual component • Physical component • Close The scene: National Power (DIME) Ministry of Defence 4 The scene: Cyberspace ‘all entities … digitally … connected’ • Persons • Virtual identities (Cyber persona) • Virtual objects (Cyber objects) • Protocols, Firmware, (Software) Operating Systems, Applications • Data (Data content) • Objects (Hardware) • Geographical locations } The scene: Military operations Ministry of Defence 6 Content • The Scene • National Power (DIME) • Cyberspace • Military operations • Full Spectrum Operations? • Moral component • Conceptual component • Physical component • Close
  • 2. 19/10/2016 CLAS generaals 30-10-2015 2 Full Spectrum Operations: Physical Component Issues? • Testing means & methods • Approval means & methods • Training & Exercises Personnel • High tech & Low tech • Hard Cyber & Soft Cyber • Cyber Infrastructure • Targeting packages • Content for Soft Cyber Ops Full Spectrum Operations: Conceptual Component • Hard & Soft Cyber Ops • Understand Cyberspace • Understand cognitive & informational processes • Offensive or defensive? • Effects!! • Disruptive & constructive • Typecasting • Strategic & Tactical assets/use • Organizing within Government • Organizing within MoD • Weapon release authority • Manoeuvring • Synchronizing Full Spectrum Ops • Synchronize Tech & Ops Main effort? 9 “In military terms, for Al Qaida the ‘main effort’ is information; … for us, information is a ‘supporting effect’.” Full Spectrum Operations: Moral Component Culture: • Kinetic preoccupation • High tech focus • Soft Cyber (InfoOps) focus? • Enemy centric • Departmentalism • Doctrinal rigidness • Risk avoidance • Centralisation • Intelligence approach vs. Manoeuvrist approach Ministry of Defence 11 Content • The Scene • National Power (DIME) • Cyberspace • Military operations • Full Spectrum Operations? • Moral component • Conceptual component • Physical component • Close Integrating Cyber Capabilities into Full Spectrum Operations Start Manoeuvring in all environments Able, capable, willing
  • 3. 19/10/2016 CLAS generaals 30-10-2015 3 Full Spectrum Operations ‘Unrestricted Warfare’ “One hacker + one modem causes an enemy damage and losses almost equal to those of a war.” Q. Liang & W. Xiangsui, Unrestricted Warfare (org. 1999) 17 DCC/TECH Execution Preparation Order Reconnaissance Operational Planning Activity Effect Purpose End- state Planning Decision Decision Design DCC/OPS Decision Transport Intrusion Control Action Maintenance Exfiltration Accountability