Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-nmvwc Total loading time: 0 Render date: 2024-06-15T19:29:01.010Z Has data issue: false hasContentIssue false

6 - Conclusions and Recommendations

Published online by Cambridge University Press:  24 March 2017

Alison Lawlor Russell
Affiliation:
Merrimack College, Massachusetts
Get access

Summary

“The most important of strategic lines are those which concern the communications. Communications dominate war,” wrote Sir Alfred T. Mahan. Modern strategic lines of communications are embedded in and dependent upon cyberspace. Protection of these lines and ensured access to them should thus be of paramount concern for national security. In Mahan's seminal work, he observed that “war is a business of positions.” Just as he advocated over a century ago for control over the sea lines of communication, today's “business of positions” is control over the networks of communication. Seaborne trade still matters greatly, but information and communications passed through global cyber networks is critical for the modern environment.

SUMMARY OF THE BOOK

A2/AD operations have a long and rich military history, as the ability to exclude an enemy from a particular area can be a strategic advantage in a conflict. The principle behind A2/AD operations is that preventing the enemy from reaching the battlefield can negatively impact its ability to maximize capabilities and can lead to a defeat, even if the enemy is the militarily stronger force. US policy has focused on this concept (under a variety of names) for over a decade, but has not yet linked it to strategic access to cyberspace, despite consistently acknowledging the importance of “assured access” to cyberspace as a critical enabler to modern military operations.

Strategic A2/AD operations in cyberspace can be achieved through degradation or destruction of the physical network and infrastructure that underpins cyberspace. The physical infrastructure of cyberspace can be degraded and destroyed in a way that would prevent an adversary from accessing the domain or, if the enemy is already present, diminish its capacity to fully utilize its capabilities. Satellites and fiber optic cables are essential to this communications network and can be damaged or destroyed by physical assault. EMPs can wreak havoc within the electromagnetic spectrum, thereby interrupting an essential part of the domain. Physical attacks on infrastructure could have short- or long-term effects, depending on the type and location of infrastructure targeted, redundancies within the system, and the type of attack that takes place.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×