About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

1 (December 9, 2003)

handle is hein.crs/crsuomaaaam0001 and id is 1 raw text is: Distributed by Penny Hill Press                     BT-1017
                                                    Updated Dec. 9, 2003


               Congressional Research Serice

             1,o 3http:lpennyhill.com
  Cyberwa rfa re

  Clay Wilson


  Isse Definition

  Military planning is shifting toward the view that combat power can be
  enhanced through increased use of computers, communications networks,
  and digital information, Several policy issues raised by cyberwarfare, or
  information warfare activities include (1) does reliance on computer
  technology and the civilian communications critical infrastructure create
  unacceptable vulnerabilities for the U.S. military; (2) should the U.S.
  engage in covert psychological operations affecting audiences within
  friendly nations; (3) does the use of cyber weapons by the military invite
  similar retaliation by others; and, (4) should the US. pursue international
  agreements to harmonize cyber crime legislation to help quickly identify
  and pursue cyber attackers?

  As tools for cyberwarfare become available, appropriate and more effective,
  a key issue for Congress is whether the disabling effects of cyber weapons
  can be properly controlled to avoid damaging non-military critical computer
  systems or other systems belonging to friendly nations that may be near
  military targets.

  Current Situation

  The U.S. Department of Defense (DOD) uses the term Information
  Operations to describe military information warfare activities. Information
  Operations encompasses five capabilities: Psychological Operations, Military
  Deception, Operational Security, Computer Network Operations, and
  Electronic Warfare.

  The Joint Information Operations Center (JIOC) within the U.S. Strategic
  Command (USSTRATCOM) manages information warfare activities.
  Computer Network Operations include offensive and defensive aspects of
  information warfare; however, most of the military's resources and efforts
  devoted to information warfare are focused on defensive measures.

  National Security Presidential Directive 16, signed in July 2002, provides
  guidance for determining when and how the United States would launch
  computer network attacks against foreign adversary computer systems. It
  is intended to clarify circumstances under which an attack by DOD would
  be justified and would identify who has authority to launch a computer
  attack.

  Polky Analysis

  A large percentage of U.S. military administrative information is currently
  routed through the civilian Internet. Some observers believe that the

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Contact us for annual subscription options:

Already a HeinOnline Subscriber?

profiles profiles most