Omnipresent in discussions of military use of cyber is how cyberspace fits in with the other warfighting “domains” of land, air, sea, and space. This question is vital to several issues facing future security and force planners including military command and control doctrine and the possibility of deterring aggression in one domain with the promise of punitive measures in another (cross-domain deterrence).
Today’s posting features a recent paper (Document 03) by Army Lt. Col. John L. Rafferty, Jr., published by the U.S. Army War College Strategic Studies Institute, on the interplay between the land, space, and cyberspace domains, and includes selections from the significant volume of US Government publications the paper references. The Army War College report, and the literature it draws on, provide a deep profile of cyber’s importance to the future “joint force”.
For further documentation, consult the Archive's Cyber Vault Library.
New additions
Document 01
This document provides doctrine for command and control of maritime operations.
Document 02
This document provides the vision for a 2020 Joint Force achieving global integration and lists implications for force development.
Document 03
This report warns of a potential for land-cyber integration to encourage micro-management on the battlefield.
Document 04
This document provides doctrine for the planning of joint space operations.
Document 05
This white paper provides predictions for the nature of Army operations in cyberspace from 2018-2030 and identifies the capabilities and missions required to accomplish the Army’s mission.
Document 06
This document provides doctrine for command and control of air operations.
Document 07
This document provides doctrine for command and control of land operations.
Document 08
This document summarizes the unclassified seminars and discussions from the first annual Cross-Domain Deterrence Seminar which took place November 18-19 2014. Panels included: “A Historical Look at Cross-Domain Deterrence”, “Competing Concepts of Cross-Domain Deterrence”, “Considering the Role of Space and Cyber in Deterrence”, “A Global Perspective”, and “Charting a Path Forward”.
Document 09
This document provides approaches for integrating capabilities from each domain to achieve “cross-domain synergy” across the US Military.
Document 10
This document provides the predictions which guide force development and doctrine for the US Military.
Document 11
This monograph explores the impact of space and cyberspace operations on land operations and makes recommendations for the integration of new domains into the concept of multi-domain battle.
From the Vault
This pamphlet explores how "the Army's future force in 2016-2028 will leverage cyberspace and CyberOps" and how CyberOps (which is specified to consist of four components - cyberwarfare, cyber network operations, cyber support, and cyber situational awareness) will be integrated into full spectrum operations.
This study identifies significant entities and efforts addressing global cyberspace security and governance issues, U.S. entities responsible for addressing such issues and their involvement at the international level, and challenges to effective U.S. involvement in global cyberspace security and governance issues.
This formerly restricted publication discusses cyberspace (including national intelligence) operations; authorities, roles, and responsibilities (including legal considerations); and planning and coordination (including inter-organizational and multinational considerations).
Department of the Army, FM 3-38, Cyber Electromagnetic Activities, February 2014.
This Army field manual consists of seven chapters, including chapters on the fundamentals of cyber electromagnetic activities; roles, responsibilities and organization; and cyberspace operations.
U.S. Army War College, Strategic Cyberspace Operations Guide, June 1, 2016. Unclassified.
This guide discusses the design, planning, and execution of cyberspace operations as well as operations in the homeland. It also contains a case study of Russian cyber operations against Georgia in 2008.
Discussions of cyber issues are distributed throughout this report, with regard to the near-future as well as to the longer term. Its includes the presentation of fictional cases involving cyber components.