About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

1 1 (August 13, 2019)

handle is hein.crs/govbate0001 and id is 1 raw text is: 




   kI
,       :Congressional Research Service
   Ifo rmrng the Vegiative debate since 1914


0


                                                                                                 August 13, 2019

Convergence of Cyberspace Operations and Electronic Warfare


Over the past two decades, cyberspace operations have
become an important element in military operations.
Electronic warfare (EW) has been a component of military
operations since the advent of the radio at the beginning of
the 20th century. These two types of operations are
becoming somewhat analogous as technical capabilities
converge, yet historical divides between EW and cyber
operations remain in Department of Defense (DOD)
organization and doctrine.

Both cyberspace operations and EW are efforts to dominate
aspects of the electromagnetic spectrum (EMS) that
transmit packets of information. As such, EW and
cyberspace operations have traditionally been used as part
of a broader information operations (1O) campaign, and
previously existed in joint doctrine as two of the five pillars
of 1O (along with psychological operations, military
deception, and operations security). These capabilities are
increasingly being used in support of operations in the
information environment (IE)-the aggregate of social,
cultural, cognitive, technical and physical attributes that
ultimately affect action. Current and evolving DOD
doctrine refers to EMS operations and cyberspace
operations as separate but related to operations in the IE.

Cyberspace Operations (CO)
Cyberspace operations are defined by DOD as the military,
intelligence, and ordinary business operations of the DOD
in and through cyberspace. Military cyberspace operations
use cyberspace capabilities to create effects that support
missions in both physical domains and cyberspace.

DOD categorizes cyberspace operations as follows:

* Offensive cyberspace operations, intended to project
   power by the application of force in and through
   cyberspace. These operations are authorized like
   operations in the physical domains.
* Defensive cyberspace operations, intended to defend
   DOD or other friendly cyberspace. Defense operations
   are both active and passive conducted inside and outside
   of DOD information networks (DODIN).
* DODIN operations, to design, build, configure, secure,
   operate, maintain, and sustain DOD communications
   systems and networks across the entire DODIN.

Electronc Warfare (EW)
Since the introduction of two-way radios, militaries have
become highly dependent on the EMS. This reliance has
expanded over the past century to include nearly every
weapon system. Applications include
* radio frequencies to communicate with friendly forces;


* microwaves for tactical data-links, radars, and satellite
   communications;
* infrared for intelligence and to target enemies; and
* lasers to communicate, transmit data, and potentially
   destroy a target.
Modern militaries rely on communications equipment that
uses broad portions of EMS to conduct military operations.
This allows forces to talk, transmit data, provide navigation
and timing information, and to command and control forces
all over the world. They also rely on the EMS to determine
where adversaries are and what they are doing, where
friendly forces are, and what effects weapons achieve.
Because of this dependency, modern militaries attempt to
dominate EMS through electronic warfare.

From the perspective of military operations, there are three
broad divisions of electronic warfare:

* Electronic protection involves actions to protect access
   to EMS for friendly military assets.
* Electronic attack uses electromagnetic energy to
   degrade or deny an enemy's use of EMS.
* EW support identifies and catalogues emissions of
   friendly or enemy forces either to protect U.S. forces or
   develop a plan to deny an enemy's access to EMS.
These subsets of EW often mutually support each other in
operations. For example, radar jamming (electronic attack)
can serve a protection function for friendly forces to
penetrate defended airspace; it can also prevent an
adversary from having a complete operating picture. EW
may attack and defend the EMS using cyber capabilities,
while cyber operations may target parts of the EMS that are
vulnerable to EW.

Differences and Overlap
Part of the convergence involves not just similarities in
technical capabilities, but also cyberspace operations being
used to provide EW effects, and vice versa. Cyberspace
operations attempt to deny an adversary access to their
computer networks using software and computer codes. EW
affects communications between networks using radio
jamming or other spectrum controls, while cyber operations
use computer code to provide a range of effects from
disruptive (e.g., denial of service attacks) to destructive
(e.g., physically damaging computer components and
platforms).

The most recognizable convergence of electronic warfare
and cyberspace operations is when forces transmit
computer code to inject it into an adversary's network. In
these types of operations, radios can transmit data packets


httfps:crsreports cong ress.g

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Contact us for annual subscription options:

Already a HeinOnline Subscriber?

profiles profiles most