Ⅰ Introduction Ⅱ Positioning of cyber domain in cross-domain operation. Ⅲ Cyber domain seen in China's strategy. Ⅳ Approach to Cyber Domain in Japan

Similar documents
LAB4-W12: Nation Under Attack: Live Cyber- Exercise

Global Vigilance, Global Reach, Global Power for America

Intelligence Preparation of the Information and Communications Environment

Course Assistants and staff

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF

China U.S. Strategic Stability

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,

Author s Presentation

Author s Presentation

CHINA S WHITE PAPER ON MILITARY STRATEGY

International and Regional Threats Posed by the LAWS: Russian Perspective

CHINA TURKEY MISSILE DEFENCE COOPERATION

On 21 November, Ukraine

Air-Sea Battle & Technology Development

The Marine Corps Operating Concept How an Expeditionary Force Operates in the 21 st Century

FOREWORD USASMDC/ARSTRAT COMMANDER S VISION

GOOD MORNING I D LIKE TO UNDERSCORE THREE OF ITS KEY POINTS:

Fiscal Year 2017 President s Budget Request for the DoD Science & Technology Program April 12, 2016

THE UNITED STATES NAVAL WAR COLLEGE

Electronic Warfare and Satellites Challenges in Assuring Space Capabilities

To be prepared for war is one of the most effectual means of preserving peace.

Air-Sea Battle: Concept and Implementation

We Produce the Future

SUMMARY OF NATIONAL DEFENSE PROGRAM GUIDELINES. for FY 2011 and beyond

Army Space An Operational Perspective

North Korean Cyber Support to Combat Operations

Roberto Preatoni. Modern Threats and Cyber War Lessons Learned? Maybe Not

Air Force intelligence, surveillance, and reconnaissance (ISR)

The Cold War Conflicts

CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM

THE UNITED STATES STRATEGIC BOMBING SURVEYS

Recall y all Random 5. What are five random statements that you can make about the beginning of WWI?

Assessing Technologies using Campaign Analysis and War Gaming: The Warfare Innovation Continuum at NPS

GLOBAL STRIKE THE INDISPENSABLE CAPABILITY FOR THE 21 ST CENTURY

Chapter 1. Introduction

Logbook Navy Perspective on Joint Force Interdependence Navigating Rough Seas Forging a Global Network of Navies

Logbook Adm. Greenert and Gen. Amos: A New Naval Era Adm. Greenert and Gen. Welsh: Breaking the Kill Chain

Introduction. General Bernard W. Rogers, Follow-On Forces Attack: Myths lnd Realities, NATO Review, No. 6, December 1984, pp. 1-9.

Chapter 17: Foreign Policy and National Defense Section 3

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

like during World War I?

Game Changer Cyber Security in the Naval Domain. Ralph D. Thiele

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy

THE UNITED STATES NAVAL WAR COLLEGE OPERATIONAL ART PRIMER

Space as a War-fighting Domain

Why Japan Should Support No First Use

Stopping the Reinvasion of the Baltic States. The Objectives

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

UNCLASSIFIED/ AFCEA Alamo Chapter. MG Garrett S. Yee. Acting Cybersecurity Director Army Chief Information Officer/G-6. June 2017 UNCLASSIFIED

Innovation in Military Organizations Fall 2005

AIR FORCE CYBER COMMAND STRATEGIC VISION

2. Deterring the use of nuclear. 4. Maintaining information superiority. 5. Anticipating intelligent systems

NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION

UNCLASSIFIED. Unclassified

FORWARD, READY, NOW!

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

navy strategy For AChIevIng InFormAtIon dominance navy strategy For AChIevIng InFormAtIon dominance Foreword

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.

SMALL ROBOTS WITH STRATEGIC EFFECTS

StratCom in Context: The Hidden Architecture of U.S. Militarism

Modern Arms Control Challenges

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DISTINCTIVE FUNCTIONS OF THE UNITED STATES AIR FORCE IN THE CYBERSPACE DOMAIN

I. The Pacific Front Introduction Read the following introductory passage and answer the questions that follow.

SHARPENING THE SPEAR

1 Create an episode map on the Civil Rights Movement in the U.S.A.

Chinese military on rise in Latin America Linking with mafia, terrorists to present threat in backyard of U.S.

Executing our Maritime Strategy

AUSA Army Artificial Intelligence and Autonomy Symposium and Exposition November 2018 Cobo Center, Detroit, MI. Panel Topic Descriptions

Ch 25-4 The Korean War

A Call to the Future

America s Airmen are amazing. Even after more than two decades of nonstop. A Call to the Future. The New Air Force Strategic Framework

A FUTURE MARITIME CONFLICT

Cybersecurity United States National Security Strategy President Barack Obama

National Defense University. Institute for National Strategic Studies

AFCEA Mission Command Industry Engagement Symposium

CURRICULUM OUTLINE OF INSTRUCTION SURFACE WARFARE OFFICER DEPARTMENT HEAD COURSE CIN: A-4H-0107 CDP: 9545 VER: 2.0 CHANGE: 3

Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017

U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST

The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects

Amphibious Landings in the 21 st Century

Information Operations

U.S. Air Force Electronic Systems Center

WHAT IS JOPPA? INPUTS: Policy, Doctrine, Strategy JFC Mission, Intent, and Objectives Commander s Estimate

NATIONAL DEFENSE PROGRAM GUIDELINES, FY 2005-

Throughout the course of 2016, Spirit of America s all-veteran field team designed and implemented 94 projects in 34 countries.

Serving as specialists in cyber communications CRYPTOLOGY TECHNICIAN

Denied, Degraded and Disrupted

INTRODUCTION. Chapter One

Dynamic Training Environments of the Future

24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace

Chapter 17: Foreign Policy and National Defense Section 2

... from the air, land, and sea and in every clime and place!

Go Tactical to Succeed By Capt. Ryan Stephenson

Expeditionary Maneuver Warfare & Combating Terrorism S&T Department

Montessori Model United Nations. Distr.: Middle School Twelfth Session XX March First Committee Disarmament and International Security

Role and Modernization Trends of China s Second Artillery

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

1 Nuclear Weapons. Chapter 1 Issues in the International Community. Part I Security Environment Surrounding Japan

Transcription:

1

DISCLAIMER The views, opinions, and proposals provided in this presentation are solely of the briefer s own and thus shall not be construed as official positions of either the Stimson Center or the Government of Japan. 2

CONTENTS Ⅰ Introduction Ⅱ Positioning of cyber domain in cross-domain operation Ⅲ Cyber domain seen in China's strategy Ⅳ Approach to Cyber Domain in Japan Ⅴ The Implication on Cyber Operation in the Western Pacific and Japan-US Alliance 3

Ⅰ Introduction Comprehensive Cyber Warfare Abilities(Richard Clarke Cyber War, 2010) Country Cyber Attack Dependence on cyber(*1) Cyber Defense Total (*2) USA 8 2 1 11 Russia 7 5 4 16 China 5 4 6 15 Iran 4 5 3 12 North Korea 2 9 7 18 *1 The higher the reliance on the cyber domain of society is, the lower the score. *2 The more points are stronger, the less the score is weak. 4

Ⅱ Positioning of cyber domain in cross-domain operation Cross-Domain Operation seen in US military strategy Having a strong Air Force no longer guarantees control of the air, and having a strong Navy no longer guarantees control of the seas. Our respective war-fighting domains have become intertwined such that the ability to control and exploit one increasingly depends on control in the others. (The American Interest, Feb 2012) 5

Ⅱ Positioning of cyber domain in cross-domain operation Case of cyber warfare(2007~2013) Estonia, Georgia Operation Orchard Estonia(2007) Government system is down due to large DDosattack Syria(2007) During the air strikes of Israel, cyber attack against Syrian air defense network South Korea Georgia(2008) Large DDos attack with Russian invasion of Georgia South Korea(2013,2014) Banks and other systems all down due to virus infection Japan(2011) M.H.I. computer leaked internal information due to virus infection Iran(2010) Nuclear fuel facilities temporarily out of control by Stuxnet United States(2013) Sony PictureEntertainment was hacked. FBI asserts as North Korean crime Mandiantreported attacks by Chinese Cyber Units Sony Entertainment Pictures Attacks by Chinese Cyber troops Mitsubishi Heavy Industry

Ⅱ Positioning of cyber domain in cross-domain operation Case of cyber warfare(2014~) 2014 Ukrainian conflict 2016 Cyber warfare against each election in the West

Ⅱ Positioning of cyber domain in cross-domain operation Similarities between Air and Cyber Domains at the beginning Similarity Air Domain Cyber Domain Connection with other Domains Strategic Highlands Not affected by the distance of the theater The overwhelming advantage of the attacker Connected to land, sea, and space Operations in other domains can not be completed without the control of the air or air superiority It became possible to obtain more information than seeing enemies from above a high hill It is possible to give a direct attack on the C.O.G of the enemy without being influenced by the front line in the land and maritime Air power with the overwhelming advantage of attack Domain connected across domains The superiority in the cyber domain is extremely important in carrying out integrated operations in the A2AD environment Cyber and the space area are New Highlands" and in China they are referred to as Strategic high points" It takes few seconds to attack intentionally anywhere in the world where you are connected via the Internet In addition, attackers have the Essential advantage of attack" that they can choose when, where, and how Derive implication of incorporating strategies in the Air domain that has many 8 similarities with the cyber domain and that precedes decades

Ⅱ Positioning of cyber domain in cross-domain operation Transition of Air Strategy (Strategic Air Attack) From the situation of World War I, which was total warfare,the importance of the strategic air attack,in which cities are attacked by air power, is proposed by Giulio Douhet (The Command of the Air) Giulio Douhet (1869~1930) Common point The main point the state s C.O.G. as a military target is a national decisionmaking organization John A. Warden Ⅲ (1943~) John A. Warden s air strategy is a strategy attack that causes strategic paralysis in the whole state by attacking enemy nation leaders and warfare infrastructure directly, causing the enemy s strategy to be 9 defeated ( The enemy as a system, Airpower Journal. Spring95)

Ⅱ Positioning of cyber domain in cross-domain operation John A. Warden Ⅲ (1943~) Five-Ring Model Based on the "Center of Gravity (C.O.G) " advocated by Clausewitz, C.O.G of the modern state was analyzed with the hint and it was conceptualized with the "Five-Ring Model" consisting of the following five C.O.G Center of Gravity Link to cyber domain Case Leadership System Essentials Infrastructure Population Fielded Military State agencies such as Executive Office of the President, which are responsible for the staff function of national leaders, are subject to attack Information on cutting edge technology relating to military technology itself is subject to attack Infrastructure for which IOT(Internet od Things) is going to be vulnerable to attack Manipulate the will of the people of the opponent country with fake news Winning cyber superiority with Cyber weapons, advance overall operations to absolute advantage Estonia(2007) Georgia(2008) Ukraine(2014) Cyber attack by 61398 unit (China) (2006-2013) Stuxnet(2010) Ukraine(2014) Elections in West(2016-2017) Operation Orchard(2007) Cyber attacks against 5 C.O.G (National Decision Making Organization) are Strategic Cyber Attack 10 Cyber attacks against an Field Military can be said to be a Tactical Cyber Attack"

Ⅲ Cyber domain seen in China's strategy 超限战 (Unrestricted Warfare) 乔良 Col. Qiao Liang 王湘穗 Col. Wang Xiangsui In terms of beyond-limits warfare, there is no longer any distinction between what is or is not the battlefield. Spaces is nature including the ground, the seas, the air, and the outer space are battlefield, but social spaces such as the military, politics, economics, culture, and the psyche are also battlefields. And the technological space liking these two great spaces is even more so the battlefield over which all antagonists spare no effort in contending.( Unrestricted Warfare,pp177) 11

Ⅲ Cyber domain seen in China's strategy 863 Program and Assassin s Mace 863 Program Initiated in March 1986, China s National High- Technology Program was a major effort by China to overcome shortcomings in its national security through the use of science and technology.(the Hundred-Year Marathon) Assassin s Maceis a key component to China s military strategy in the Hundred-Year Marathon. (Michael Pillsbury, The Hundred-Year Marathon, Henry Holt, New York, 2015, pp139) In March 1986 (during the 863 program) the Reagan administration assisted China s development of eight national research centersfocused on genetic engineering, intelligent robotics, artificial intelligence, automation, biotechnology, lasers, supercomputers, 12 space technology, and manned spaceflight.(ibid., p.78.)

Ⅲ Cyber domain seen in China's strategy What is 杀手锏 (Assassin s Mace)? 13

Western Style Asymmetric warfare Attack opponent's weak point Network Strong Point (U.S.) Cyber Attack Means of attack Global Basing Logistic Structure Cyber Attack, ASBM Democratic What is 杀手锏 (Assassin s Mace)? Chinese Style Assassin s Mace Change opponent's strength to weak point Combine Western technology with Eastern wisdom Cyber Propaganda(Fake News) Assassin s Mace concept is consistent with the long-standing Chinese military thinking and is centered on information warfare and extended-range strikes. (Andrew Krepinevich, 7 DEADLY SCENARIOS, Bantam Book, New York, 2010, pp187) 14

Ⅳ Approach to Cyber Domain in Japan Cybersecurity Strategy (September 2015) National center of Incident Readiness and Strategy for Cybersecurity(NISC) There was a potential shortage of further 80,000 information security experts approximately in Japan. The Ministers called for deepening consultations in a timely manner on Alliance responses to serious cyber incidents. (JOINT STATEMENT OFTHE SECURITY CONSULTATIVE COMMITTEE, Aug 2017)

Ⅳ Approach to Cyber Domain in Japan Japan s challenge to withstand cyber warfare Citizen's awareness of cyber threats No organization dealing with cyber intelligence Japan? U.S. National Security Agency U.K. Government Communications Headquarter

Ⅳ Approach to Cyber Domain in Japan Cyber attack weapon as protection reserve capacity Phase Reconnaissance Weaponization Delivery Exploitation C2(Command & Control) Actions on Objectives Indicators Research, identification and selection of targets, often represented as crawling Internet websites Coupling a remote access trojan with an exploit into a deliverable payload, typically by means of an automated tool (weaponizer). Transmission of the weapon to the targeted environment. After the weapon is delivered to victim host, exploitation triggers intruders code Penalty on electromagnetic records by illegal command and Installation Control Law of Injustice Access Installation of a remote access trojan or backdoor on the victim system allows the adversary to maintain persistence inside the environment. These are restricted by these two domestic laws Typically, compromised hosts must beacon outbound to an Internet controller server to establish a C2 channel. Only now, after progressing through the first six phases, can intruders take actions to achieve their original objectives. Reference:Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, Lockheed Martin

Ⅳ Approach to Cyber Domain in Japan Cyber abilities necessary for Japan The organization responsible for cyber intelligence Cyber attack weapon as protection reserve capacity Clarify the strategic goal of cyber attack

Ⅴ The Implication on Cyber Operation in the Western Pacific and Japan-US Alliance Clarification of strategic objectives by adapting Cyber 4.5 ring model (My Plan) Fielded Military Infrastructure System Essentials Public Mindset Leadership Five-Ring Model (Air Strategy) Cyber Decapitation Cyber Propaganda (Fake News) Strategic Cyber Attack Cyber Espionage Electromagnetic Attack 4.5-Ring Model(Cyber Strategy) Strategic Level Operational Level Tactical Level(Mainly EMS) It could be a cyber warfare concept against democracies 19 Mind Physical

Ⅴ The Implication on Cyber Operation in the Western Pacific and Japan-US Alliance Information sharing learn from small countries Innovation on Cyber Security