HYLAND
e extent of cross-boundary cooperation has been variable, and quite
often low.4
Events have proved, however, that the prospect of a catastrophic disaster
is all too real, and is in some ways enabled by a stove-piped approach to
security. Major terrorist events such as the 9/11 attacks in the United
States and the July 2005 attacks in London have demonstrated that a
stove-piped approach to security is counter-productive: the world has
become a much more complex and interconnected place in the era of
globalization, and we need to adopt a more holistic approach to security
in order to meet this. is is particularly true in the case of cyber-security,
where an organization is as vulnerable as the least prepared person in that
organization, and an organization's center is as vulnerable as its least well-
protected outpost.
Military Operations In Cyberspace
Operations in cyberspace have already changed the nature of information
warfare, and are beginning to change the nature of warfare as a whole.
Military operations in cyberspace can be classified into four categories
with four separate aims:
• Intelligence-gathering operations, intended to gather information
from the enemy's electronic data, networks and/or people, for example
gathering intelligence on an adversary's plans, forces and deployments
ahead of the beginning of military operations, or enabling more accurate
battle damage assessments of kinetic and other attacks on an adversary's
forces and assets.
• Morale operations, intended to damage the morale and will to fight
of an adversary's population via propaganda, disinformation and other