The purpose of this study is to analyze existing United States Army Special Operations Forces (ARSOF) cyber capabilities, identify gaps, and explore the possible need for US Army special operations warfighters to build a robust cyber skill set. This research reviews the current status of cyber-capacity and capability for ARSOF to conduct cyberspace operations, the vulnerabilities that inhibit Army Special Operations Forces from conducting Cyberspace Operations at the Tactical Level, and provides recommendations as to what steps to take to improve the warfighting posture of ARSOF in the cyber domain.
This research found that it is critical to train and equip Army Special Operators in cyberspace operations at the tactical echelon, in order to compete with adversaries with sophisticated cyber capabilities in combat operations within multi-domain operations. The Doctrine, Organization, Training, Materiel, Leadership Education, Personnel, Facilities, and Policy (DOTMLPF-P) analysis is used to study problems to help solve the warfighters cyber capability gaps. In addition, this research reviewed historical cyber attacks to ascertain if the success cyberspace operations proved efficacious when integrated during conflicts.
This research provided recommendations to support ARSOF in the ways-ahead to contest in today's digital warfare. The Army Special Operations should be able to employ organic cyber capabilities at the tactical echelon with dedicated personnel to compete in modern-day warfare. ARSOF leaders must be prepared to operate with proper authorities and permissions it might gain in the future to employ robust cyberspace operations capabilities.
|Advisor:||Giordano, Joe, Accorto, Derek|
|Commitee:||John, Alan, Sanchez, Michael|
|School Location:||United States -- New York|
|Source:||MAI 58/03M(E), Masters Abstracts International|
|Subjects:||Military studies, Computer science|
|Keywords:||Cyberspace intelligence, Cyberspace operations|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be