Content deleted Content added
(3 intermediate revisions by 2 users not shown) | |||
Line 4:
Within the United States military ___domain, CNO is considered one of five core capabilities under Information Operations (IO) [[Information Warfare]]. The other capabilities are [[Psychological Operations]] (PSYOP), [[Military deception|Military Deception]] (MILDEC), [[Operations security|Operations Security]] (OPSEC) and [[Electronic Warfare]] (EW). Other national military organizations may use different designations.
Computer Network Operations, in concert with electronic warfare (EW), is used primarily to disrupt, disable, degrade or deceive an enemy's command and control, thereby crippling the enemy's ability to make effective and timely decisions, while simultaneously protecting and preserving friendly command and control. Full Spectrum Cyberspace Operations (CNO: CNA,CND & CNE) was conceived and written by Mr. Donald A. Tyler the RCERT Branch Chief under the Land Information Warfare Activity (LIWA) Command ADCON to HQ INSCOM responsible for the Global Regional Computer Emergency Response Team (RCERT) in 1999 through 2000 as the fifth pillar of IO and indoctrinated into the Joint Publications that change the history of Warfare across the Glob. Systems and Networks are a primary war fighting tactical advantage across ALL OS.
==Types of military CNO==
According to ''Joint Pub 3-13'', CNO consists of computer network attack (CNA), computer network defense (CND) and computer network exploitation (CNE).<ref>[http://www.fas.org/irp/doddir/dod/jp3_13.pdf United States Joint Publication 3-13: Information Operations]</ref>
* ''Computer
* ''Computer
* ''{{vanchor|Computer
==See also==
|