top of page

Winning in the Cyber Frontier: Developing Cyber Targeters and Military Daring

In developing cyber personnel for national security functions, including air power, no single role may be as important as that of a targeter. This view has been expressly shared by two Chinese military specialists who see the role as the ‘fundamental work in [a] cyberspace operational plan’ (Zhang and Yao, 2015). The United States Air Force (USAF) also has strong advocates for the view that cyber targeting should be at the centre of its strategy and development plans for full-spectrum cyberspace operations (Anderson, 2016).


These sentiments, although not often encountered in open-source discussions of cyber-military operations, can be easily justified. Targeters can take on deeply complex tasks, breathtaking military ambition, and heavy responsibilities given evolving warfighting concepts. These concepts have been expressed in various ways over two decades. China’s cyber forces have been tasked to undertake operations to ‘paralyse the enemy’s operational system-of-systems [… and] sabotage the enemy’s war command system-of-systems’ during the early stages of hostilities (Costello and McReynolds, 2018). U.S. leaders have talked about ‘global strike in milliseconds’ (Cartwright, 2009) or cyber options for all phases of operations (Cyber Command, 2015). The most ambitious U.S. concept has been to achieve ‘penetration and then disintegration of an adversary’s systems and decision-making, thereby defeating their offensive capabilities’ (Pacific Command, 2020).


This 2024 article looks at what is needed to marry a cyber targeter’s talent to the goal of system penetration and profound disabling effects that can defeat adversary kinetic capabilities. The discussion suggests that a long-standing orthodoxy on the limited value of cyber operations in war will, in time, be overcome by the realisation of just how military daring and ambition can help realise the full potential of cyber warfare.

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating

NAVIGATE

  • Social Cyber Institute

JOIN SOCIAL CYBER UPDATE LIST

© 2022 SOCIAL CYBER GROUP

Sign up with your email and we will send you information on the activities of the Social Cyber and Tech Academy and/or the  Social Cyber Institute. Scroll down to select one or both options. Scroll further down for the Captcha button and Submit button. Terms and conditions are adjacent to this form.**

ALL RIGHTS RESERVED

** Terms and Conditions for Signing Up

By submitting this form you consent (according to your selections), to the Social Cyber Institute and/or the Social Cyber and Tech Academy collecting and using your name and email address to send you email updates about our publications, events, research, courses or related activities. 


You can withdraw your consent at any time by clicking “unsubscribe” in our emails or by clicking this email address:  greg,austin@socialcyber.co and pushing send on your email app. If you are located in the EU, UK or EEA, we process your data on the basis of your consent for direct marketing and you have rights to access, correct and delete your personal information, subject to applicable law. For more detail, please see our Privacy Policy.

bottom of page