Studi Strategici ed Intelligence… for dummies

Cyberwar: un case study

Published by Silendo on Gennaio 29, 2011

Un interessante studio sull'attacco russo alla Georgia nell'agosto del 2008 e su come le operazioni nel cyber-spazio sono state efficacemente integrate con le tattiche militari convenzionali. Uno dei pochi saggi (nel mare magnum della CMF*) in cui si ragiona su principi strategici.
Per David Hollis, infatti, il conflitto georgiano è il primo caso di attacco nel cyber-space sincronizzato con vere e proprie operazioni militari in aria, su terra ed in mare. Esso fornisce quindi una serie di utili insegnamenti, tattici e strategici, operativi e d'intelligence.


"Three developing trends that extend across the levels of warfare from strategic to tactical are: 1) the increasing ability of network intelligence operatives at all levels to exfiltrate critical information from potential opponents and neutral players that is valuable for military, economic, diplomatic, and social/cultural purposes; 2) the increasing value of controlling and degrading/denying an opponent‟s media and publicity message (Information Operations) through denial/disruption/degrading and subversion of targeted information conduits such as web sites, voice over IP (VOIP), chat rooms, social networking sites (Twitter, FaceBook, etc .. ), and other cyberspace technology-based communications mediums; and 3) the time-sensitive nature of cyberspace warfare – a nation cannot engage in cyberspace warfare from a cold start, it must have well-developed tactical, operational, and strategic capabilities developed well in advance of any conflict. These capabilities are represented by trained human capital supported by doctrine, organization, command and control (C2), and technology that has been developed, tested, and refined in strenuous cyberspace combat exercises. Cyberspace intelligence capabilities and situational awareness also need to be developed long before any potential conflict involving the cyberspace domain.
Doctrinal concepts such as center of gravity and effects based targeting; and military principals such as mass, economy of force, C2, surprise, and unity of effort apply equally to military operations in the cyberspace domain as to operations in the other domains. Attacking and defeating the enemy‟s center of gravity and breaking the will of the enemy to continue the conflict are traditional objectives of warfare and they are as applicable to the cyberspace domain as any other warfighting domain.
At the operational and tactical levels of warfare, (alleged) Russian cyberspace operations were closely synchronized to achieve effects with their land, air, and sea domain military operations. It appears that networks and web sites within specific geographic locations were targeted for denial and disruption operations in order to cause panic and uncertainty (disruption) in the Georgian civilian population, hindering an effective military response. Georgian hacker forums were targeted early-in the process to preempt, disrupt, and degrade retaliatory operations. At the strategic level, these cyberspace actions supported attacks upon the Georgian center of gravity via propaganda attacks and by impeding official government web sites, obstructing the flow of military and intergovernmental information, and degrading/denying communications (internal and external). The intelligence lessons learned from these cyberspace operations represent tactical and operational level attack sensing and warning (AS&W) indicators as well as strategic-level indicators of potential national conflict. Any one of these individual indicators is probably happening in cyberspace every day so it is difficult to sort through the potential avalanche of Internet, wireless, and electronic spectrum intelligence data. But correlating and fusing cyberspace intelligence from all of these levels and sources in a central fusion center (or, better yet, a well-networked set of collaborative centers….) can help provide a more comprehensive intelligence/situational picture. All-source intelligence collection and analysis within the cyberspace domain is critical, as is combining cyberintelligence with other forms of traditional intelligence (HUMINT, SIGINT, etc…) to gain a complete fusion of all-source intelligence.
"

Alla fine la domanda sorge spontanea: in Italia, alla luce di quanto sopra, come siamo messi in quanto a dottrina, capacità operative e d'intelligence?

* Messaggio in codice per Jack, Giovanni e gli Allegri… :))

Posted in: Blog
Tagged:
affari strategici, cyber-mf, italia, russia, sicurezza nazionale

Chi Sono

Silendo

Un appassionato di relazioni internazionali e studi strategici. In particolar modo di questioni connesse con l'intelligence.
Per contattarmi:
info@silendo.org

Leggi tutto...

Accedi

Tweet di @Silendo_org

Archivio

Categorie

Tags

affari strategici afganistan algeria al qaeda arabia saudita australia cina criminalità organizzata cyber-mf difesa egitto estremismo francia germania gran bretagna guerriglia hamas hezbollah india intelligence iran iraq ISIS israele italia Leadership e classe dirigente libano libia libri medio-oriente minkiate nato nucleare e risorse energetiche pakistan palestina russia sentimenti sicurezza nazionale siria somalia stati uniti strategic foresight studi di intelligence terrorismo turchia

Blogroll

  • Affari Internazionali
  • Agentura
  • American Enterprise Institute
  • ANSSI
  • AOL Defense
  • Arms Control Wonk
  • Asia Centre
  • Asia Times
  • Aspen Institute Italia
  • ASPI
  • Atlantic Council
  • Baker Institute
  • Banca d'Italia
  • BBC
  • Belfer Center
  • Bellingcat
  • Bertelsmann Foundation
  • BESA Center
  • Bibliografia sull'intelligence
  • Bloomberg
  • Bloomberg View
  • Brookings Institution
  • Bruegel
  • Carnegie Endowment
  • Carnegie Middle East Center
  • Carnegie Moscow Center
  • CASD
  • Center for a New American Security
  • Center for Economic Policy Research
  • Center for European Reform
  • Center for Naval Analyses
  • Center for Nonproliferation Studies
  • Centre d'Analyse Stratégique
  • Centro Einaudi
  • Centro Studi Confindustria
  • CEPR
  • CF2R
  • Chatham House
  • China Leadership Monitor
  • CISAC
  • Combating Terrorism Center
  • Comparative Strategy
  • COPASIR
  • Corriere della Sera
  • Council on Foreign Relations
  • CSBA
  • CSFRS
  • CSI – CIA
  • CSIS
  • CSS
  • CSS Strategic Trends Analysis
  • Danger Room
  • DCAF
  • Defence News
  • East online
  • ECFR
  • ECIR
  • Economist
  • Egmont Institute
  • Epistemes
  • EsadeGeo
  • ESPAS
  • EU Institute for Security Studies
  • Eurasianet
  • European Policy Centre
  • Fareed Zakaria
  • FAS
  • FAS – CRS
  • FAS – DNI
  • Fas – Strategic Security Blog
  • Financial Times
  • Foreign Affairs
  • Foreign Policy
  • Foreign Policy – National Security
  • FPRI
  • FRS
  • FSI – Stanford
  • Geneva Centre for Security Policy
  • German Council on Foreign Relations
  • German Marshall Fund
  • Global Trends 2030
  • Globalsecurity.org
  • Governo italiano
  • H-Net
  • Harvard International Review
  • HCSS
  • Heritage Foundation
  • Horizon Scanning Centre
  • Horizon Scanning Centre – Toolkit
  • House Armed Services Committee
  • House Committee on Homeland Security
  • House Committee on International Relations
  • House Intelligence Committee
  • HSPI
  • https://sinocism.com/
  • Hudson Institute
  • IAEA
  • IDSA
  • IEA
  • IFRI
  • IHEDN
  • IISS
  • IMF
  • INET
  • Infinity Journal
  • Infoguerre
  • INSS – Israele
  • INSS – USA
  • Institute for Government
  • Intelligence & National Security
  • Intelligence Studies Section
  • IntellNews
  • International Crisis Group
  • International Journal of Intelligence and Counterintelligence
  • International Security
  • International Security Studies
  • IRIS
  • ISIS
  • Istituto Affari Internazionali
  • Istituto Italiano di Studi Strategici
  • Jamestown Foundation
  • JFK School of Government
  • JFQ
  • Joshua Rogin
  • Journal of Military and Strategic Studies
  • Journal of Strategic Security
  • Journal of Strategic Studies
  • Kings of War
  • Lowy Institute
  • LSE IDEAS Blog
  • Macro Polo
  • McKinsey Global Institute
  • Mercator Institute
  • Merlin
  • Military Review
  • Miller Center
  • MIT Center
  • Munich Security Conference
  • National Bureau of Asian Research
  • National Defense Intelligence College
  • National Intelligence Council
  • National Interest Online
  • National Security Archive
  • National Security Journal
  • Naval War College Review
  • NCTC
  • New America Foundation
  • New York Times
  • Newsweek
  • Nixon Center
  • Notre Europe
  • OCSE
  • ODNI
  • On Think Tanks
  • Orbis
  • Oxford Analytica
  • Oxford Intelligence Group
  • Papers – APSA
  • Papers – ISA
  • Parameters
  • Perspectives on Terrorism
  • Peter Bergen
  • Peterson Institute
  • Phillips P. Obrien
  • Proceedings
  • Project 2049
  • Project Syndicate
  • Public Intelligence
  • RAND
  • Real Instituto Elcano
  • Reuters
  • Robert Kaplan
  • RSIS
  • RUSI
  • Secrecy News
  • Security Studies
  • Senate Armed Services Committee
  • Senate Committee on Foreign Relations
  • Senate Committee on Homeland Security
  • Senate Committee on Intelligence
  • Sentinel
  • SGDSN
  • Silicon Continent
  • SIPRI
  • SISR – Intelligence italiana
  • Source&Methods
  • South Asia Analysis Group
  • Spiegel International
  • Stephen Walt
  • Stimson Center
  • Strategic & Defence Studies Centre
  • Strategic Studies Institute
  • Strategic Studies Quarterly
  • Strategika
  • Stratfor
  • Studies in Conflict & Terrorism
  • Terrorism and Political Violence
  • The Back Channel
  • The Diplomat
  • The Interpreter
  • The Overoholt Group
  • The Strategist
  • The Strategy Bridge
  • Time
  • Transatlantic Academy
  • U.S.-China Commission
  • UN Millennium Project
  • Venus in Arms
  • VOX
  • Wall Street Journal
  • War on the Rocks
  • Washington Institute for Near East Policy
  • Washington Post
  • WCFIA – Harvard
  • Wilson International Center
  • World Economic Forum
Locations of visitors to this page
© 2026 SILENDO Design & Dev by Artemida Srl