NATO’s needed offensive cyber capabilities
At the 2016 NATO Summit in Warsaw, cyberspace was recognized as an operational domain in which NATO military forces must be able to maneuver as effectively as they do on land, at sea and in the air. Since then, Allies have conducted several successful offensive cyber operations1 against non-state adversaries, such as Daesh. Due to technological transformations in recent years, cyber is no longer viewed by NATO and its member states only as a hybrid threat, but also as a weapon in its own right and as a force multiplier2 in current military operations. Over the next two decades, NATO will look for new ways to integrate cyber weapons (or offensive cyber capabilities) into its operations and missions.3
This Policy Brief looks at the distinctions between cyber as a hybrid threat and cyber as a weapon, from theoretical, policy and practice perspectives, and proposes new ways in which NATO can integrate offensive cyber capabilities into its operations.
* (back) Eisenhower PhD Candidate Fellow, NATO Defense College, and Senior Advisor, European Union Research Center, George Washington University School of Business.
1 (back) Offensive cyber operations refer here to coordinated actions where adversary data used to communicate between physical (hardware), logical (software) and/or social (digital persona) systems is infringed upon for the purpose of achieving a specific military effect.
2 (back) J.N. Mattis and F.G. Hoffman, “Future warfare: the rise of hybrid wars”, Proceedings, Vol.131, No.11, 2005, pp.18-19.
3 (back) D.F. Reding and J. Eaton, Science & technology trends 2020-2040 exploring the S&T edge, NATO Science & Technology Organization, Paris, March 2020, p.57, https://www.nato.int/nato_static_fl2014/assets/pdf/2020/4/pdf/190422-ST_Tech_Trends_Report_2020-2040.pdf (accessed on 4 May 2020).
Download the publication to keep reading.