Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations

Conference Paper (2019)
Author(s)

E.C. Maathuis (TU Delft - Information and Communication Technology, TNO Defense, Safety and Security)

W. Pieters (TU Delft - Organisation & Governance)

J. van den Berg (TU Delft - Information and Communication Technology)

Research Group
Information and Communication Technology
Copyright
© 2019 E.C. Maathuis, W. Pieters, Jan van den Berg
DOI related publication
https://doi.org/10.1109/MILCOM.2018.8599729
More Info
expand_more
Publication Year
2019
Language
English
Copyright
© 2019 E.C. Maathuis, W. Pieters, Jan van den Berg
Research Group
Information and Communication Technology
Volume number
2019-October
Pages (from-to)
438-443
ISBN (electronic)
978-1-5386-7185-6
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Cyber Operations stopped being utopia or Sci-Fi based scenarios: they became reality. When planning and conducting them, military actors encounter difficulties since they lack methodologies and models that support their actions and assess their effects. To address these issues by tackling the underlying scientific and practical gap, this article proposes an assessment methodology for the intended and unintended effects of Cyber Operations, labeled as Military Advantage, Collateral Damage and Military Disadvantage, and aims at supporting the targeting process when engaging targets in Cyber Operations. To arrive at this methodology, an extensive review on literature, military doctrine and methodologies was conducted combined with two series of interviews with military commanders and field work in joint military exercises. The assessment methodology is proposed considering multidimensional factors, phases and steps in a technical - military approach. For validation, one realistic Cyber Operation case study was conducted in a focus group with nine military experts plus four face-to-face meetings with another four military experts.

Files

08599729.pdf
(pdf | 0.64 Mb)
- Embargo expired in 03-01-2022
License info not available