Arranging the Defence of the Cyber Environment as a Part of Military Affairs : Tactical, Operational and Strategic approach in retrospect of The Russian - Ukrainian War 2022

Juha Kai Mattila

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

4 Downloads (Pure)

Abstract

The artificial cyber environment has reached national security interest and emerged as the fourth domain of battle in the military concept of all-domain operations in most Western armed forces and coalitions in the past 30 years. Currently, militaries are struggling to keep up with cybercriminals and advanced persistent actors while trying to gain an advantage of their data and digital infrastructure. The paper focuses on military affairs' ways and means to address the need for cyber warriors operating in friendly, neutral, and hostile cyber environments integrated under Multi-Domain Operations. The paper uses design research methodology to create and test a model for cyber defence capabilities generation and utilisation. The theoretical reference to military affairs is based on Beer's Viable System Model and previous studies of military organisations' evolution as capability generators. The military and societal cyber environment evolution model is based on industrial revolutions and current tendencies. These approaches define a hypothetical model for two main functions of military affairs (force generation and utilisation) concerning cyber defence capabilities. The fast evolution of cyber threats sets unique requirements for cyber force utilisation and generation structures. This difference has culminated in a recent war between Russia and Ukraine, and data from that conflict is used to test the hypothetical model. The rapid evolution of the cyber environment and its weaponisation establish different requirements for military cyber capabilities compared to any other operational dimension or capability (space, air, land, or maritime). The difference is evident in sourcing resources, generating capabilities, and using them in Multi-Domain Operations. The paper provides a tested model for generating cyber defence capabilities at a strategic level and an operation model for cyber defence at a tactical and operational level. The designed model extends the technically oriented cybersecurity thinking with operational and strategic levels. Furthermore, the model introduces the value stream behind the cyber capability acquisition and supports strategic designers in national and military analysis.
Original languageEnglish
Title of host publicationProceedings of the 23rd European Conference on Cyber Warfare and Security
EditorsMartti Lehto, Mika Karjalainen
Place of PublicationUK
PublisherAcademic Conferences International
Pages296-304
Number of pages9
ISBN (Electronic)978-1-917204-07-1
Publication statusPublished - 1 Jul 2024
MoE publication typeA4 Conference publication
EventEuropean Conference on Cyber Warfare and Security - Jyväskylä, Finland
Duration: 27 Jun 202428 Jun 2024
Conference number: 23

Publication series

NameProceedings of the European Conference on Cyber Warfare and Security
PublisherAcademic Conferences International
Volume23
ISSN (Print)2048-8602
ISSN (Electronic)2048-8610

Conference

ConferenceEuropean Conference on Cyber Warfare and Security
Abbreviated titleECCWS
Country/TerritoryFinland
CityJyväskylä
Period27/06/202428/06/2024

Keywords

  • Cyber Conflict
  • Cyber Defence
  • Cyber Operations
  • Military Affairs
  • Multi-Domain Battle

Fingerprint

Dive into the research topics of 'Arranging the Defence of the Cyber Environment as a Part of Military Affairs : Tactical, Operational and Strategic approach in retrospect of The Russian - Ukrainian War 2022'. Together they form a unique fingerprint.

Cite this