Computer network operations: Difference between revisions

Content deleted Content added
 
(46 intermediate revisions by 36 users not shown)
Line 1:
'''Computer network operations''' ('''CNO''') is a broad term that has both military and civilian application. Conventional wisdom is that information is power, and more and more of the information necessary to make decisions is digitized and conveyed over an ever-expanding network of computers and other electronic devices. Computer network operations are deliberate actions taken to leverage and optimize these networks to improve human endeavor and enterprise or, in warfare, to gain information superiority and deny the enemy this enabling capability.
'''Computer Network Operations''' ('''CNO''') is a U.S. military doctrinal term which comprises [[computer network attack]], [[computer network defense]], and related [[computer network exploitation]] enabling operations.
 
==In the military ___domain==
* ''Computer Network Attack'' ('''CNA'''): Actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.
Within the United States military ___domain, CNO is considered one of five core capabilities under Information Operations (IO) [[Information Warfare]]. The other capabilities are [[Psychological Operations]] (PSYOP), [[Military deception|Military Deception]] (MILDEC), [[Operations security|Operations Security]] (OPSEC) and [[Electronic Warfare]] (EW). Other national military organizations may use different designations.
 
Computer Network Operations, in concert with electronic warfare (EW), is used primarily to disrupt, disable, degrade or deceive an enemy's command and control, thereby crippling the enemy's ability to make effective and timely decisions, while simultaneously protecting and preserving friendly command and control. Full Spectrum Cyberspace Operations (CNO: CNA,CND & CNE) was conceived and written by Mr. Donald A. Tyler the RCERT Branch Chief under the Land Information Warfare Activity (LIWA) Command ADCON to HQ INSCOM responsible for the Global Regional Computer Emergency Response Team (RCERT) in 1999 through 2000 as the fifth pillar of IO and indoctrinated into the Joint Publications that change the history of Warfare across the Glob. Systems and Networks are a primary war fighting tactical advantage across ALL OS.
* ''Computer Network Defense'' ('''CND'''): Actions taken through the use of computer networks to protect, monitor, analyze, detect and respond to unauthorized activity within Department of Defense information systems and computer networks.
 
==Types of military CNO==
* ''Computer Network Exploitation'' ('''CNE'''): Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks.
According to ''Joint Pub 3-13'', CNO consists of computer network attack (CNA), computer network defense (CND) and computer network exploitation (CNE).<ref>[http://www.fas.org/irp/doddir/dod/jp3_13.pdf United States Joint Publication 3-13: Information Operations]</ref>
* ''Computer Networknetwork Attackattack'' ('''CNA'''): ActionsIncludes actions taken through the use ofvia computer networks to disrupt, deny, degrade, or destroy informationthe residentinformation inwithin computers and computer networks, and/or the computers and /networks themselves.
* ''Computer network defense'' ('''CND'''): Includes actions taken via computer networks to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions or other unauthorized actions that would compromise or cripple defense information systems and networks. ''Joint Pub 6.0'' further outlines Computer Network Defense as an aspect of [[NetOps]]:
* ''{{vanchor|Computer Networknetwork Exploitationexploitation}}'' ('''CNE'''): EnablingIncludes operationsenabling actions and intelligence collection capabilities conducted through the use ofvia computer networks tothat gatherexploit data gathered from target or adversary automatedenemy information systems or networks.
 
==ByzantineSee Footholdalso==
* [[Cyberwarfare in the United States]]
'''BF''' is supposedly a classified [[United States Department of Defense]] emergency program within the larger Cyber Initiative framework, specifically aimed at curbing and preventing foreign intrusions into the computer networks of US federal agencies. The twenty largest American military-industrial contractors have also been invited to participate in the program, after a highly potent hacker attack was detected at [[Booz Allen]] Corp.<ref name='Busweek'>{{cite news | first=Brian | last=Grow | coauthors= Keith Epstein, Chi-Chu Tschang | title=The New E-spionage Threat | date=2008-04-10 | publisher= | url =http://www.businessweek.com/magazine/content/08_16/b4080032218430.htm | work =BusinessWeek | pages = | accessdate = 2008-04-15 | language = }}</ref>
* [[Chinese information operations and information warfare]]
*[[Cyberwarfare by Russia]]
 
==References==
Line 14 ⟶ 21:
 
==External links==
* [https://web.archive.org/web/20090712035312/http://www.cyberwarandlaw.com/ Cyber, War and Law]
* [http://www.dtic.mil/doctrine/jel/new_pubs/jp3_13.pdf United States Joint Information Operations Doctrine]
* [https://web.archive.org/web/20050917004149/http://www.leavenworth.army.mil/ United States Army Combined Arms Center]
 
[[Category:Information operations| and warfare]]
[[Category:United States Department of Defense doctrine]]
 
[[de:Computer Network Operations]]