Cyber - Commanders - Handbook
Cyber - Commanders - Handbook
Commanders’
Handbook
Cyber COMMANDERS’ HANDBOOK
This restriction does not apply to making digital or hard copies of this publication for
internal use within NATO, or for personal or educational use when for non-profit or
non-commercial purposes, providing that copies bear this notice and a full citation on
the first page as follows:
FOREWORD 5
Executive Summary 7
1. INTRODUCTION 9
1.1. Scope 9
1.2. Development Process 9
1.3. Target Audience 9
1.4. Purpose 9
1.5. Content 10
1.6. Application 10
1.7. Definitions and Descriptions 10
2. CONTEXT 11
2.1. Strategic View 11
2.2. Cyberspace 13
2.2.1. The nature of cyberspace 13
2.2.2. Cyberspace as a domain 14
2.2.3. Cyberspace zones 17
2.2.4. The threat landscape 18
2.3. Opportunities and Challenges 20
2.3.1. Opportunities 20
2.3.2. Challenges and limitations 20
3. CYBERSPACE OPERATIONS: 24
ROLES AND RESPONSIBILITIES
3.1. Introduction 24
3.2. Mission, Vision & Mandate 26
3.3. Reference Cyber Command Structure 26
3.3.1 Cyber manoeuvre element 27
3.3.2 Cyber support element 29
3.4. Staff Integration 29
3.5. Limitations 30
3.6. Assumptions 30
3.7. Tasks 30
4. CYBERSPACE OPERATIONS: CORE ACTIVITIES 31
4.1. Introduction 31
4.2 Cyberspace Operations Framework 31
4.2.1 CIS Infrastructure Operations (CISIO) 32
4.2.2 Cyberspace ISR Operations (CISRO) 33
4.2.3 Defensive Cyberspace Operations (DCO) 34
4.2.4 Offensive Cyberspace Operations (OCO) 35
4.3 Cyberspace Activities Catalogue 36
4.4 Synchronisation 37
4.4.1 Maturity 37
4.4.2 Joint targeting process 37
4.4.3 Electronic warfare 37
4.4.4 Sovereign Cyber Effects provided 37
voluntarily by Allies (SCEPVA)
4.5 Legal considerations related to different operations 38
4.5.1 Legal basis 38
4.5.2 Law governing operations 38
4.5.3 Targeting 39
4.5.4 Rules of Engagement 39
5. CYBERSPACE OPERATIONS: PLANNING, 41
COORDINATION, EXECUTION & ASSESSMENT
5.1 Pre-requisites 41
5.1.1 Political & Strategic Pre-requisites 41
5.1.2 Phase zero operations 41
5.1.3 Technical pre-requisites 42
5.2 Planning 42
5.2.1 COPD 42
5.2.2 Planning 43
5.2.3 Considerations 43
5.3 Coordination and Cooperation 46
5.4 Assessment 48
5.4.1 Considerations of targeting cycle 50
6. RECOMMENDATIONS & BEST PRACTICES 52
6.1. Recommendations 52
6.1.1 Standard Operating Procedures 52
6.2. Future research 52
6.2.1. Artificial intelligence 52
6.2.2. Standardisation and diversification 52
ANNEX A Definitions 53
ANNEX B References 56
ANNEX C Cyber Collateral Effects Estimate Process 58
ANNEX D Positive Identification 66
ANNEX E Functional areas and special advisors – cyber-specific tasks 68
Document Information
Project lead:
• LTC Arthur Dalmijn, Law Branch, CCDCOE
Project team:
• LTC Vincent Banse, Strategy Branch, CCDCOE
• LTC José Teixeira, Operations Branch, CCDCOE
• Ahmet Balci, Technology Branch, CCDCOE
• Liina Lumiste, Law Branch, CCDCOE
3
Version 1.0
4
FOREWORD
Cyberspace is NATO’s newest operational domain and it will present the Alliance
with both significant opportunities and significant challenges in the years ahead. This
domain will require the Alliance to present a range of capabilities and forces – both
defensive and offensive – for the conduct of a full spectrum of cyber operations, all
of which must be executed within a strong legal framework and significant political
oversight. The ability to achieve mission outcomes and operate successfully in this
new arena will be increasingly important to NATO.
This Handbook is intended to assist Commanders (and by extension their staffs and
subordinate organisations) who are tasked with leading organisations that are focused
on operations in cyberspace. It represents an initial effort to characterise, from the
perspective of a Commander, the planning, coordination, execution and assessment of
cyber operations. It does not address the “how” of those cyber operations but rather
focuses on the “what” and “why” of those duties.
Your understanding of the broader context in which you and your command conduct
its cyber operations will be critical to your effectiveness. You will likely operate as
one element of a broader effort or strategy on the part of NATO, and understanding
those broader efforts will be critical to achieving the desired success – for you and
for your broader set of partners in NATO. You must execute your activities while
supporting those efforts, not disrupting them.
Finally, great journeys often begin with small steps. NATO’s efforts in this operational
domain represent such a journey. This Handbook is one of those small steps and it
5
will help to power the Alliance’s efforts as it progresses with its work in cyberspace.
It combines opinions from leading experts who provide an interdisciplinary take on
a Cyber Command’s vision, mission and core tasks. But never forget that it is a point
of departure – not an end state. You, as a Commander or practitioner, must be the
ultimate driver of that journey. I urge all who read this and who plan or execute cyber
operations or cyber policy to share their insights, experiences and perspectives with
each other and with CCDCOE as it continues to refine and, over time, expand this
Handbook. The Handbook must be a living document that represents the knowledge
and insights gained through hard experience by both practitioners and policy.
6
Executive Summary
The rapid evolution of cyber capabilities has opened new doors to influence and
coercion. State and non-state actors abuse cyberspace in order to weaken democratic
institutions and gain economic, diplomatic and military advantages. Cyber attacks
are becoming on the one hand more common, but on the other hand more complex.
Furthermore, cyber attacks are continuously fine-tuned so that they do not reach the
threshold of an armed attack, leaving the targeted state perplexed. Cyberspace has
many specific characteristics: it has no time or geographic dependency; guaranteed
control is considered unreachable; no offensive or defensive actions and/or
capabilities remain indefinitely effective; no advantage is permanent. What is more,
no nation can claim sovereignty over cyberspace. Instead, there is sovereign equality
among nations. Sovereignty remains over physical assets, individuals and territory.
These features create several challenges, such as complexity of attribution or conflict
between time-consuming preparations and a quickly changing threat-landscape. It
also creates opportunities such as distribution of force, economisation of costs and
potentially instant effects.
The difference between cyberspace operations and operations in other domains is that,
in general, cyberspace operations can be conducted also in peacetime. Considering
all the aspects and layers of cyberspace, it is clear that management of any operation
includes several actors. Although the implementation of roles and responsibilities in
cyberspace operations will always differ from one nation to another, in general those
roles and responsibilities have important common traits. Based on these common
traits, the Handbook gives an overview of the general division of responsibilities at
the national level and provides a Cyber Command’s generic modular structure.
7
Due to the complexity and the fact that cyberspace does not acknowledge state
borders, national and international cooperation gains especial importance in cyber
operations. These are only a few of the aspects that a Cyber Commander must take
into consideration.
This Handbook will help Cyber Commanders to command cyber operations efficiently
and avoid stumbling blocks that may be found due to the specifics of cyber space.
In addition, this material aims to facilitate the overall awareness and understanding
of the Cyber Commander’s staff regarding the conduct of cyber operations as a
comprehensive process.
8
1. Introduction
1.1. Scope
The aim of the project was to integrate the strategic, operational, technical and legal
issues into a practical guide for national Cyber Commands. For this purpose, the
Cyber Commanders’ Handbook has been developed in close cooperation with experts
from national Cyber Commands and other relevant national and NATO entities. The
concept, structure and contents of the Handbook were developed through several
workshops and written submissions. The process was planned to obtain expert insight,
best practices and real-life lessons learned by the contributing nations in order to
ensure that the Handbook would be relevant and would address the needs of its target
audience. The final version of the Handbook was coordinated with all contributors,
capturing their feedback and comments.
The Handbook is the first of its kind and reflects the evolving state of national
commands, doctrine, operations, and the rapidly evolving nature of cyberspace. The
existence of different national approaches on how to structure organisations forced the
authors to set the environment by creating, framing and establishing the relations of a
generic Cyber Command that will be the basis for all the following chapters.
The primary target audience for the Cyber Commanders’ Handbook is the national
Cyber Commander and staff.
1.4. Purpose
9
building and issues already covered in other publications, such as the Comprehensive
Operations Planning Directive (COPD) or the AJP-3.20 Cyberspace Operations
Doctrine. It highlights cyber-specific issues.
1.5. Content
The Handbook is divided into six chapters, covering the most important aspects of
preparing and conducting cyber operations. After giving an overview of the Handbook’s
scope, target audience and purpose in the first chapter, the overall context of cyber
operations is introduced in Chapter 2. The chapter introduces the features of cyberspace
as a domain for operations and focuses on the opportunities and challenges inherent
to it. The third chapter describes different actors and their roles and responsibilities
in cyberspace operations. Furthermore, this chapter introduces a possible model for a
Cyber Command Structure and Cyber Manoeuvre elements. In the next chapter, the
Handbook goes into depth regarding four types of cyber operations: Communication
and Information Systems Infrastructure Operations (CISIO); Cyberspace Intelligence,
Surveillance and Reconnaissance Operations (CISRO); Defensive Cyber Operations
(DCO); and Offensive Cyber Operations (OCO). In addition to describing different
operations, the fourth chapter includes considerations of synchronisation and
legal matters. The fifth chapter covers different stages of an operation - planning,
coordination, execution and assessment – and provides pre-requisites for a cyber
operation. In the last chapter, the Handbook provides some extra recommendations
and looks into the future by discussing some trends that may have effects on the way
in which cyber operations are conducted in coming years.
1.6. Application
1 In order to support the implementation of cyberspace as a domain of operations, the terms and definitions
in Annexe A shall be used as working definitions in the context of development of the Cyber Commanders’
Handbook until NATO-agreed definitions become available.
10
2. Context
2.1. Strategic View
11
development of offensive cyber capabilities that are now an inherent part of conflicts.
State and non-state actors target government and private-sector information networks
to gain competitive advantages that promote their particular interests. Non-state
actors use cyberspace to target Allies. Criminal elements continue to show growing
sophistication in technical capability and targeting, and today operate a pervasive,
online service economy in illicit cyber capabilities and services that is available to
anyone willing to pay.
NATO considers that ensuring our common defence and security is the ultimate
objective to be sustained by its core activities, and that large-scale or irregular armed
conflict or hybrid war is an undesirable aspect of international relations. We are
living in a world of competition and conflict, in which our adversaries are positioning
their other elements of power (political/social, diplomatic and economic) in such a
way that they have a clear advantage over us. One thing is certain - if the way we
position ourselves before any existing conflict does not grant us freedom of movement
and sometimes information superiority, we may not be able to survive. We must
understand that our tendency to clearly divide areas of expertise such as cyberspace,
electronic warfare, signals intelligence etc., and treat them separately may prevent us
from having a broader view and realising that we are being shaped by the adversary’s
intent.
During the Wales Summit in 2014, it was recognised that cyber defence was part of
NATO’s core task of collective defence. NATO announced after the Warsaw Summit
in 2016 that cyber attacks presented a clear challenge to the security of the Alliance
and could be as harmful to modern societies as conventional attacks. Additionally,
NATO stressed its defensive mandate, and its recognition of cyberspace as a domain
of operations in which the Alliance must defend itself as effectively as it does in the
air, on land and at sea. The latest developments during the Brussels Summit showed
that NATO had agreed how to integrate sovereign cyber effects provided voluntarily
by Allies (SCEPVA) into Alliance operations and missions, in the framework of strong
political oversight. Reaffirming NATO’s defensive mandate, nations were determined
to employ the full range of capabilities, including cyber, to deter, defend against, and
to counter the full spectrum of cyber threats.
Countries have been developing cyber forces in an ongoing process for several
decades; most nations have established or are in the process of establishing a Cyber
Command. Even though this process started with a focus on defensive capabilities,
some NATO countries have publicly announced that they are in “the process” of
developing offensive cyberspace capabilities.
12
A set of basic principles and guidelines needs to be THE ESSENCE
provided in order to operate as a Cyber Command that
OF STRATEGY
can execute its mission, tasks and responsibilities.
IS CHOOSING
Political guidelines and authorisation, strategic
guidelines, chains of command, organisational
WHAT NOT TO
set-ups, (inter)national deployments, roles and DO.
responsibilities, key functions (offensive, defensive
Michael Porter
and intelligence, surveillance and reconnaissance
(ISR)) of military cyberspace forces are essential.
2.2. Cyberspace
3. Cyber-persona layer
2. Logical layer
1. Physical layer
Cyberspace can be described in terms of three layers: physical, logical and cyber-
persona layers, as shown in Figure 1. Conduct of cyberspace operations always
involves the logical layer, but may also include activities or elements in the other
3 This chapter is based on Allied Joint Doctrine for Cyberspace Operations AJP 3-20.
13
two layers. The desired effects of cyberspace operations may exist in all layers or
ultimately outside cyberspace. Activities outside cyberspace that affect cyberspace
are not considered cyberspace operations (e.g., dropping a bomb on communication
information systems (CIS) infrastructure).
Entities in the physical layer, i.e. hardware components, have a geographical location.
The components in this layer include computers, servers, routers, hubs, switches,
wiring and other equipment crucial to data storage, processing and transmission.
It also includes the integrated information and communication technology (ICT)
components of other equipment or systems such as digital sensors, weapons systems,
C2 systems and critical infrastructure. Although the logical and cyber-persona layers
have no geographical borders, the actual position of hardware components is relevant
with regard to jurisdiction.
Entities in the logical layer are elements that are manifested in code or data, such
as firmware, operating systems, protocols, applications, and other software and
data components. The logical layer cannot function without the physical layer,
since information flows through wired networks or the electromagnetic spectrum
(EMS). The logical layer, along with the physical layer, allows the cyber-persona to
communicate and act.
The cyber-persona layer does not consist of real persons or organisations but
representations of their virtual identities. A virtual identity can be an email address,
user-identification, a social media account or an alias. Consequently, one person or
one organisation can have multiple cyber-personas. Conversely, multiple people or
organisations can also create a single, shared cyber-persona. These cyber-personas
form the third layer.
4 United States Cyber Command (April 2018) Achieve and maintain cyberspace superiority. Available
at: https://www.cybercom.mil/Portals/56/Documents/USCYBERCOM%20Vision%20April%202018.
pdf?ver=2018-06-14-152556-010
14
disruptive technologies offers all actors fresh opportunities for exploitation. In this
dynamic environment, nations must increase their resilience, defend in depth, demand
security by design and persistently contest malicious cyberspace actors to generate
continuous tactical, operational, and strategic advantages. Nations and organisations
should operate under a constant state of successful adversary infiltration. We achieve
success by seizing the initiative, retaining momentum, and disrupting our adversaries’
freedom of action.5
Although the details of the principle of sovereignty in relation to cyberspace are still
discussed among nations, some parts of this principle seem to be settled: no nation
can claim overall sovereignty over cyberspace; there is sovereign equality among
the nations; and sovereignty includes exclusive authority over territory, individuals
and physical assets. This leads to the situation in the cyber context in which only
sovereign control can be executed over (physical) cyber infrastructure that is located
within the borders of a nation.
One of the big challenges to the understanding of cyberspace and cyberspace operations
as a domain of military operations is the identification of the role and capabilities of
this domain compared with those of the other traditional domains. Understanding
when activities within or through cyberspace can be and are conducted, and for what
reason they are conducted, will help to integrate cyberspace in the overall process
of planning and leading military operations. In general, the traditional military
operational domains are used from the beginning to the end of a crisis – from the first
phase of a crisis to the end of an armed conflict. In contrast, operations in cyberspace
can be, are and will be planned and conducted at any phase of a crisis development
roadmap, including the peacetime phase. Therefore, cyberspace demarcates itself
from the traditional domains and provides any actor, from military organisations to a
single individual, with an opportunity to act.
Because of the possibility that cyberspace operations may be used or cyberspace events
may have to be faced at any time and at any place, conclusions or indications from
any activities can be drawn, analysed and used for own or allied intelligence services.
Increases in the numbers of events in cyberspace can help to indicate potential threats
and risks, which can be within, but not limited to, the activity-spectrum between
intelligence activities and the shaping of the battlefield in advance of a kinetic attack.
5 Ibid.
15
FIGURE 2: ROAD TO CRISIS
Compared with traditional domains and the Commands of the other domains, a Cyber
Command plans and conducts cyber operations before other Commands are activated.
As a result of the early stage of activity of a Cyber Command, all other Commands
support the Cyber Command and its operations as the supported command. The role
of the Cyber Command changes to a hybrid supported/ supporting role depending on
the intermediate goals and tasks in later stages.
Cyber capabilities range from technologically relatively simple means that can
be developed rapidly, to technically sophisticated instruments that require a long
development period. Cyber capabilities can exert tactical effects or achieve strategic
impacts (and all possible variations in between). The complexity and level of
technology mainly depend on the aimed effects, and the hardening and complexity of
the target system.
16
– The preparation time for an attacker will be long in cases in which target
complexity, intelligence gathering, specific effects, collateral damage,
access and/or anonymity are important. Consequently, the period between
the decision to create an effect and its actual use could be significantly
longer than when using traditional weapons. Equally, the time could be short
in cases in which these aspects are of no concern.
– The effects of cyberspace operations can be instant, or purposely delayed.
This fact requires a potentially very high operational tempo and a constant
state of situational awareness.
6 For general legal considerations, see Chapter 4, section 4.5: “Legal considerations related to different
operations”
7 A mechanism to show cyberspace components in Allied (Blue) or Neutral (Grey) zones that are controlled
by an adversary is advised.
17
2.2.4. The threat landscape
Cyber attack can be invisible, asymmetric, multi-role, deniable, global/ instantaneous
and a complete doctrine changer when the attacker has the advantage, which makes it
an ideal toolset for big and small actors alike.
2.2.4.1. Actors
A wide variety of parties are active in cyberspace, including own forces, allied forces,
neutrals and adversaries. A range of the actors can be classified as threats, actual or
potential:
Overlaps may exist between different categories of threat actors as particular actors may
choose to employ other categories as proxies. Extensive reuse of tactics, techniques
and procedures (TTP) by different types of threat actors renders the distinguishing of
categories by this means a hazardous proposition.
18
collaborative planning and combined execution and assists all echelons to achieve
situational awareness.
There is a misconception that the Cyberspace COP is synonymous with the CIS COP.
This is not true. The CIS COP typically focuses on the availability of CIS services/
systems and applications, whilst the Cyber COP is the fusion of data from across all
operational cyberspace activities and their implications at the operational and possibly
strategic levels. The information from the CIS COP feeds into and is part of the
Cyberspace COP. The CIS COP shows the levels of risk to operational missions and
conveys implications in terms of mission failure and success across all operational
domains. In short, it strives to achieve situational awareness for the Commander and
his or her staff, in order to support the decision-making process and ensure mission
success. In order to achieve situational awareness in cyberspace, we require three
things:
1. Missions. The Cyber Command must understand the Allied (blue) zone8 in
cyberspace and its implications and links to the other operational domains.
Where are we operating? When are the most important times of those
operations? What are the critical information exchange requirements upon
which decision makers rely? The answers to these questions come from the
mission owners, who are also the individuals who can decide whether a risk
in cyberspace is acceptable or must be mitigated.
2. The Cyber Command also needs to understand the CIS & Technical Aspects that
directly support and enable all missions across all domains. This requires the
decomposition of missions into discrete business processes, an understanding
of the data and information that are required by those business processes and
lastly, an understanding of the CIS services, systems and applications that
provide that data and information. When you have that detailed understanding
of your CIS, you can understand implications at all levels: data, business
process and ultimately the impact on the mission. When a node goes down,
what part of the mission is impacted? Does the mission stop or is it degraded?
Are these NATO-owned systems or sovereign capabilities?
3. Intelligence. Finally, the Cyber Command needs to understand the current
threat picture. We must understand the active threats against our nation, the
Alliance and partner nations. When potential adversaries are identified we can
begin to access the tactics, techniques and procedures used by those potential
adversaries to ensure we are actively defending against those activities,
thereby enabling intelligence to focus our defensive actions. We obtain this
intelligence through intelligence channels and through information provided
by commercial subscription services, from industry service providers, from
the media and via open sources.
19
2.3. Opportunities and Challenges
2.3.1. Opportunities
In the traditional warfare domains, the concentration of force in both time and space
is a prerequisite for campaign success. Cyberspace, on the other hand, enables the
distribution of force: the same effects can be generated at multiple locations at the
same time, or distributed over time.
Although collateral damage (second and third order effects) is difficult to predict
entirely, cyberspace operations potentially enable a more proportionate generation of
effects and better risk management than traditional warfare.
The Cyber Command can exploit various opportunities that are unique to the digital
domain. Budget requirements for capabilities are low in comparison with those of
other military domains. Cyber capability development may be effectively shielded
from premature detection and may take advantage of the reuse of adversary TTPs.
These capabilities may offer an asymmetric advantage, rendering irrelevant the
capabilities of an adversary in other military domains. Cyber effects may span a wide
range from influence to disruption and destruction. Cyber capabilities offer a near
instantaneous global strategic reach concurrent with distribution of force over space
and time.
All these properties make cyberspace operations a valuable capability in their own
right, but they also form an essential enabler for the other domains. At the same time,
while there are benefits in cyber operations, they still pose challenges and risks that
need to be considered. Some of these are explored in the next subsection.
The less physical the attack, the less certainty that it has caused harm. This makes
battle damage assessment in cyberspace extremely difficult, especially regarding
second and third order effects.
To oppose these threat actors, knowledge and cooperation are key. Knowledge is
crucial to understand the technological evolutions, anticipate adversary TTPs and
develop our own defence, intelligence and offensive capabilities. Cooperation is a
20
real force multiplier and is enabled through sharing knowledge of adversary TTPs and
by giving mutual assistance during cyber incidents.
In other words, to ensure high-quality cyberspace operations, good infrastructure,
high-performance toolsets, but most importantly skilled personnel are key.
2.3.2.1. Attribution
Attribution concerns the identification or location of an attacker or attacker’s
intermediary. This activity is undertaken after an attack has been detected and may
be conducted while the attack is in progress or after its conclusion. Defensive cyber
operations will generally prioritise mitigation of an attack over the establishment of
the identities of the parties responsible. Attribution is a prerequisite for reciprocal
action and should therefore precede offensive cyber operations that are conducted in
response to hostile activity.
Attribution has intelligence, technical, legal and political aspects. The Cyber
Command may be involved directly in any or all of these aspects of attribution. The
exact level of involvement is dependent on the division of responsibilities to each
nation. The attribution process may lead to public attribution which will always be a
political decision taken at higher levels than the Cyber Command.
Threat actors also reuse known TTPs among each other. They start with simple TTPs,
escalate to the more sophisticated ones or develop new toolsets when needed. This
depends on the actor’s skills, resources and target environment, which complicates
attribution even more.
21
evidence from other sources to reach a satisfactory level of certainty. Necessary
resources may be derived from capabilities available within the Cyber Command or
the wider defence organisation as well as public or private sector partners.
As a rule, acts executed by organs of a State are attributable to the State of their origin.
No matter what the functions of the organ – legislative, executive, judicial, or any
other – its acts are counted as the acts of a State.9 This also covers persons and entities
that, under domestic law, are empowered to exercise elements of governmental
authority,10 as long as they act “under colour of authority”.11
In cyberspace, we can see more activity by non-state actors – both individuals and
groups. In some cases, their actions are also attributable to a State. Conduct of a non-
state actor shall be considered as an act of a State if it is acting “on the instructions of,
or under the direction or control of, that State”. Non-state actors are considered to be
acting under effective “direction or control” of a State when they direct or control the
specific operation and the conduct complained of is an integral part of that operation.12
In cases where the conduct of a non-state actor is not attributable to a State based on
the aforementioned grounds, it shall be considered as an act of a State if that State
acknowledges and adopts the conduct as its own. The two conditions are cumulative.
In addition, the State has to actively adopt the conduct as its own, meaning that tacit
approval or omission is not enough.13
9 Draft articles on the responsibility of States for internationally wrongful acts adopted by the International
Law Commission at its fifty-third session (2001), Article 4. Hereafter: Articles on State Responsibility.
10 Schmitt, M. (gen. ed)(2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations.
Cambridge, United Kingdom: Cambridge University Press, Rule 15 commentary, p 87-88.
11 Articles on State responsibility, Art 4, para 13 of commentary.
12 This principle is expressed in rule 17 of Tallinn Manual 2.0 [Schmitt, M. (2017)] and mirrors the “effective
control” test in the Nicaragua judgment (Nicaragua v. United States of America - Military and Paramilitary
Activities in and against Nicaragua - Judgment of 27 June 1986, International Court of Justice).
13 Articles on State responsibility, Art 11.
22
of human resources, requiring constant attention to the attraction of new talent with
the appropriate skills and to the education and retraining of existing personnel.
23
3. Cyberspace Operations:
Roles and Responsibilities
3.1. Introduction
Cyberspace is a complex environment that affects every layer of our society. This
is why often a lot of different interdependent actors have been assigned roles and
responsibilities in cyberspace operations at the national level. In order to fulfil their
role effectively, these actors need to be aware of the others’ areas of governance
and mandates. Although the implementation of roles and responsibilities within
cyberspace operations will always differ from one nation to another, in general the
roles themselves have the following traits in common:
– National cyber security. Most nations have an entity that is responsible for
national cyberspace and that pays particular attention to Critical National
Infrastructure (CNI). The main purpose of this entity is to detect, observe
and analyse online security problems and to inform the public. Generally,
a national Computer Emergency Response Team (CERT) is established to
provide assistance to public and private entities affected by cyber incidents.
24
• CIS authority. This authority is responsible for employing, operating,
maintaining and securing ICT infrastructure. It has to cooperate closely
with the Cyber Command to ensure secure military networks and
weapon systems.
• Military Police. The Military Police is responsible for cyber-crime
investigations within military installations.
• Military intelligence. Military intelligence plays an important role in
cyber threat identification, counter-intelligence and the cyber targeting
process in support of military operations. In some cases, usually
in smaller nations, military intelligence wears two hats: it provides
intelligence and supports or executes the delivery of cyberspace effects.
In bigger nations, the Cyber Command would generally offer the latter.
• Cyber Command. The Cyber Command is the most important authority
with regard to cyber operations and thus national cyber defence.
– Private sector. The private sector plays an important role, since Internet
Service Providers (ISPs), Critical Information Infrastructure (CII) and other
Critical National Infrastructure (CNI) are generally in private hands. The
Cyber Command will often act through private ISP networks or is expected
to defend private CII/CNI. The private sector is responsible for the security
of its own infrastructure and for cooperating with state institutions to
promote cyber security and to enable cyberspace operations where needed.
25
The intent of the threat actor is not always clear from the beginning. Moreover, there
is no clear demarcation between criminal activities, terrorism, espionage, a military
operation, etc. So all possible legal authorities, including those of the civilian sector,
should actively cooperate and share information as early as possible when conducting
cyberspace operations.
Instrução
14 The fourth category, CIS Infrastructure Operations, is the responsibility of the J6/CIS Support structure,
further explained in Par 4.4.
26
o For some nations, almost all core activities of cyberspace operations might
fall under the authority of the Cyber Commander, whereas for others only a
few will.15
o The cyber-related tasks and responsibilities for the different functional areas
might be concentrated into a single new staff function or distributed over
existing staff functions.
– Commander;
– Advisors;
– Staff; and
– Subcommand level.
For further detailed explanations with regard to tasks and responsibilities, see Annexe D.
15 E.g. for some nations, intrusive ISR and/ or offensive operations might be part of the intelligence
community, while for other nations it may also be available within the Cyber Command structure itself.
27
deployable cyber defence capability (DCDC) in accordance with the NATO Defence
Planning Process (NDPP).
3.3.1.1 SOC
A security operations centre (SOC) is a command centre facility for a team of cyber
professionals that is organised to detect, analyse, respond to, report on, and prevent
cyber security incidents. In the SOC, internet traffic, corporate area networks (CAN),
desktops, servers, endpoint devices, databases, applications and other systems are
continuously examined for signs of a security incident. The SOC staff may work with
other teams or departments, but the SOC is typically self-contained and has employees
that have high-level information technology and cyber security skills. Additionally,
most SOCs function around the clock as employees work in shifts to constantly log
activity and mitigate threats.
Tasks of the SOC employees include real-time monitoring of own cyberspace with a
focus on real-time triage of alerts, fielding phone calls, handling inquiries, and other
routine tasks. SOC employees are not intended to conduct in-depth analysis. Cyber
security incidents that need further attention and/or analysis are escalated to the CERT
level.16
3.3.1.2 CERT17
A computer emergency response team (CERT) is a team of cyber experts that is
organised to analyse, respond to, report on, and mitigate cyber security incidents.
Among other tasks, the CERT analyses cyber incidents in depth and advises
organisations on mitigation. A CERT also has the responsibility of hunting for
threats on own networks or other networks that are temporarily within its area of
responsibility.
3.3.1.3 RRT
A Rapid Reaction Team (RRT) is a segment of a CERT that can be deployed fast.
The primary task of the RRT is incident handling on a site where remote technical
assistance is not an option. The RRT has a notice-to-move period, depending on the
alert status, of within 72 hours. It is comprised of a small team of experts, usually
around six persons who represent the CERT capability. To be able to execute its
tasks remotely, the RRT has a deployable technical kit. The composition of the team
depends on the initial assessment of the assigned cyber incident. To be able to fulfil
assigned tasks, a CERT needs to have a highly qualified and experienced team that
16 Zimmerman, C. (2014) Ten Strategies of a World Class Cybersecurity Operations Centre. MITRE
Corporation. Available at: https://www.mitre.org/sites/default/files/publications/pr-13-1028-mitre-10-
strategies-cyber-ops-center.pdf.
17 The terms SOC, CERT, CSOC, CIRT and CSIRT are sometimes used interchangeably, but a SOC should
be seen as the first level at which a cyber incident is usually detected. The CERT level handles difficult
incidents. CSOC is a different name for a SOC in cases where CERT, CIRT and CSIRT are terms that are
used interchangeably.
28
is trained on a regular basis. A RRT uses the CERT as a reach back functionality to
expand the RRT resources.
In addition to other commands, liaison elements should be sent out to all other military
and governmental units/entities that are responsible for strategic level planning.
3.3.1.5 DCDC
A deployable cyber defence capability is a term used in the NDPP. It is a national
responsibility to fulfil that capability either through a remote network monitoring and
response model or through capabilities on site. The first option is preferable due to
several aspects such as speed, coordination, centralisation of scarce resources and
unity of effort.
Effective staff integration is achieved when functional expertise from across the
staff and from external mission partners is brought together in direct support of the
commander’s decision. Decision boards leverage the analytical capability of the
entire staff and mission partners to support decision requirements through thought-
out interaction between J-codes, working groups and operational planning teams..
The use of these kinds of staff-integrating elements (sometimes referred to as boards,
bureaus, centres, cells, working groups or Operational Planning Teams (OPT)) makes
staff coordination more routine, facilitates monitoring, assessment and planning,
and enables the management of activities across the three event horizons (current
operations, future operations, and future plans).18
18 Deployable Training Division, Joint Staff J7 (September 2019) Joint Headquarters Organization, Staff
Integration, and Battle Rhythm, Third Edition, p 5-8. Available at: https://www.jcs.mil/Portals/36/
Documents/Doctrine/fp/jtf_hq_org_fp.pdf
29
3.5. Limitations
3.6. Assumptions
The assumption is made that the Cyber Command has all the capabilities needed to
execute all types of cyber operations.
3.7. Tasks
The main tasks of a Cyber Command are usually the following (but they are not
limited to this list):
– Conduct defensive cyberspace operations to preserve and/or restore the
ability to utilise friendly cyberspace capabilities and protect data, networks,
net-centric capabilities, and other designated systems;
– Conduct ISR operations for non-intrusive and intrusive intelligence
collection;
– Conduct offensive cyberspace operations to project power in and through
cyberspace by employing cyberspace capabilities;
– Prepare the operational environment;
– Act as the cyber advisor.
30
4. Cyberspace Operations:
Core Activities
4.1. Introduction
Cyberspace operations in general ensure a nation’s ability not only to act as a sovereign
nation in peacetime, but also to achieve military advantage in times of conflict. Military
operations in general depend heavily on having effective access to, and the usage of,
CIS and the data stored within it. On the other hand, preventing or reducing the ability
of the adversary to use similar assets of its own will facilitate the mission. Cyberspace
operations must be synchronised with air, land, sea, space and special operations, and
of course conducted in conformity with political and diplomatic efforts, not leaving
the joint aspect.
Defensive Cyber Operations (DCO) and Offensive Cyber Operations (OCO) depend
on the Cyber Commander’s intent and objectives. In broad terms, they aim:
31
– Offensive Cyber Operations (OCO) project power in and through cyberspace
through the employment of cyberspace capabilities.
A cyber security audit team verifies that security measures are implemented and
maintained in accordance with national cyber security policies and directives. The
audit team is also responsible for:
32
– providing a statement of security accreditation for the deployed CIWS.
Intrusive ISR operations contain, but are not limited to, system compromise - data
exfiltration - and target observation in the digital environment.
33
can support national intelligence efforts i.a.w. national regulations, agreements and
procedures.
Military cyberspace
Mission impact / Operational environment
intelligence area
Both ISR and OCO typically require digital reconnaissance, weaponisation through
code development, exploitation of delivery, system exploitation, persistence
activation, command and control and finally the desired actions on objective.
Substantial preparation times might be required. This essential activity is known as
Comprehensive Preparations of the Operational Environment (CPOE), i.e. ensuring
future access to external networks or systems in order to enable the collection of
information or the delivery of effects.
In general, DCO are operations that are only planned for and conducted on own owned
networks and services. Any action outside own owned networks or services, even as
34
a result of DCO, change the defined character of DCO and therefore changes the type
of operation to an offensive CO. Therefore DCO are strictly limited to actions within
own networks or controlled services.
DCO are not limited to secure own networks and services, but operate actively within
those networks to ensure safety and security and denial of break in into the networks.
All actions after a detection of unauthorised access to networks or services, including
clean up and securing the network, are also defined as DCO.
In addition to the definition of DCO by AJP-3.20, DCO can be used to support other
military or non-military actions by securing the area of operations and responsibility
from attacks/actions against own forces in or through cyberspace.
The full spectrum for this kind of support can start with coordinated cooperation with
non-military organisations/companies (such as private service providers) and ends
with cooperation with other international organisations (NATO, EU) and/ or militaries
of partner nations.
The planned deactivation of not owned services or the denial of services in advance
of, or parallel to, any operations (including CO) to create an example can have a
huge impact and advantage for the own operation. This kind of DCO, in comparison
with typical OCO, does not involve any enemy cyberspace services or networks, but
networks from partners or service providers with their permission. Most important,
the execution within those networks will be done by the providers themselves.
Awareness is one of the most crucial aspects to keep cyber security healthy in our
networks. Nevertheless, often this issue is not addressed effectively enough, since
it is usually focused more on the content rather than on development of appropriate
secure behaviour in cyberspace. In particular, the awareness issue faces the following
challenges:
35
using it. This is contrary to the situation with other domains. Yet, it is possible, in
limited amounts of time, to deny adversaries this capability by causing a disruption
or degradation of their freedom of action in cyberspace. OCO are used with the clear
intention to project power in and through cyberspace in order to help commanders
achieve operational or strategic objectives.
Before executing OCO, the following points should be taken into account:
Possible organisation, functions and tasks of the above described operations are
presented in Figure 8.
36
4.4 Synchronisation
4.4.1 Maturity
Cyber operations at national level have reached a level of maturity at which they are
included in national operational processes. On an international level, the level of trust
is currently not sufficient to include national cyber operations in most multinational or
NATO operations. In order to support multinational operations with cyber capabilities,
NATO has started using the SCEPVA-process (see section 4.4.4).
NATO, as an organisation, does not intend to develop any offensive capability of its
own in cyberspace. However, the Alliance will benefit from cyber effects provided
by nations, in accordance with the legal and political principles agreed by the North
Atlantic Council (NAC), and which abide by AOM dedicated rules of engagement.
NATO will not directly task the nation’s offensive cyber capabilities. NATO’s
Cyberspace Operations Centre (CyOC) in Shape will facilitate the integration of
the SCEPVA into the military planning process. It will provide willing nations with
military objectives to achieve and provide to the NATO operational chain of command
the expertise to approve and synchronise the provided effect.
37
4.5 Legal considerations related
to different operations
One of the basic principles of international law, as also recognised in national policy
and doctrine, is that nations may not operate in another State without that State’s
consent, or without a legal basis under international law. Three legal principles reflect
this prohibition: the non-intervention principle; the principle of sovereignty; and
the prohibition on the use or threat of the use of force in international relations (as
expressed in the UN Charter). The legal basis for operating across other state borders
is UN Charter chapter 7, (collective) self-defence (Article 51) or authorisation from
the Security Council (Article 42).
It must be borne in mind that the prerequisite to use force in self-defence is armed
attack24, and not every internationally wrongful act gives grounds for use of force.
When an act against a State stays below the threshold of armed attack, but is
attributable to another State, countermeasures can be used. Countermeasures are acts
that are otherwise illegal, but can be taken by the injured State as a response to a
breach of an international obligation.
23 Military forces still have to adhere to their national laws even when deployed abroad. See Stinissen, J. et
al. (2015) A Study for Existing and Possible Rules of Engagement. NATO Cooperative Cyber Defence
Centre of Excellence, 2015, p 15.
24 In order to amount to an “attack”, an operation (regardless whether it is offensive or defensive) must
conclude in violent consequences resulting in injury or death to persons or damage to or destruction
of objects. See Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the
Protection of Victims of International Armed Conflicts (Protocol I), 8 June 1977, Article 49(1) and
Schmitt, M. (2017), Rule 92.
25 Articles on State Responsibility, Art 25. See also Schmitt, M. (2017), Rule 26.
38
conduct during armed conflicts, including cyber operations in that context. IHL
regulates the powers of combatants to take part in hostilities, while the restrictions
mainly encompass rules for the methods and means of warfare and rules that govern
the protection of non-combatants and civilian objects and property. IHL only applies
officially in situations of “armed conflict”; whether a situation is one of armed conflict
depends on a factual evaluation of the situation. It is also standing NATO policy to
apply protective provisions of IHL as a safety margin for all military operations
carried out by NATO forces.
4.5.3 Targeting
In the targeting process, it is mandatory also to apply IHL. The overall rule for
targeting is that it is forbidden to conduct cyber operations that amount to an attack
against civilians or civilian objects.26 Even though cyber infrastructure is often used
for both military and civil objectives, it may be in conformity with IHL still to target
such an infrastructure, if civil components, incidental damage and proportionality
are taken into consideration.27 In cyber activities, non-state actors may be involved
more often than in kinetic activities. This may raise the question of whether these
actors can be targeted. If their activities amount to the criteria of threshold of harm,
direct causation and belligerent nexus, they can be considered to be participating in
hostilities and, therefore, as possible targets.28
39
important specifically to include cyber capabilities in the planning when preparing the
mandate and the ROE for an operation.31
31 Commanders may restrict the relevant ROE for subordinate commanders at any time, but they cannot
expand them. ROE never restrict the universal right to personal self-defence provided that the principles of
proportionality - no more force may be used than is necessary to counter the threat - and necessity – force
should be the last reasonable resort and be absolutely necessary under the circumstances - are adhered to.
40
5. Cyberspace Operations:
Planning, Coordination,
Execution & Assessment
5.1 Pre-requisites
The traditional prerequisites are required to start the cyber planning process. These are
based on the Comprehensive Operations Planning Directive (COPD). However, an
additional pre-requisite is the minimum Cyber Common Operational Picture (Cyber
COP). The minimum Cyber COP consists of information about:
The Cyber COP preferably contains much more information than this minimum.
The content of the Cyber COP determines the quality of information available to
the commander, and is therefore heavily dependent on the sharing of cyber related
information and INTEL between nations and national organisations in a timely
fashion.
41
operations as a domain of military operations is the identification of peculiarities
(force, space, time, information) of cyberspace.
In general, traditional military operational domains are used to plan and act from the
beginning to the end of a crisis – from the first phase of a crisis to the end of an armed
conflict. With regard to the cyber domain operations within cyberspace, preparations
and the setting of prerequisites need to be done in advance of any other planning or
preparation cycle.
5.2 Planning
5.2.1 COPD
The Allied Command Operations COPD is the international standard tool for
operational planning and should therefore be used in the cyber domain as well.
42
5.2.2 Planning
Compared with the traditional domains and therewith the component commands
of each domain, a Cyber Command plans and conducts cyber operations before
other commands are activated and therefore starts to plan and to execute operations
accordingly. As a result of the early stage of activity of a Cyber Command, all other
commands, where appropriate, will support cyber operations and the Cyber Command
as the supported command. The role of the Cyber Command might change from
supported to supporting in a later stage of the crisis development roadmap, depending
on the situation. Nevertheless, the threat landscape or situation may require immediate
implementation of prepared and sometimes pre-authorised actions.
5.2.3 Considerations
The planning and execution of cyber operations and their integration into the COPD
exposes the differences between this new domain of military operations and the
traditional air, land and maritime domains. To avoid difficulties in the planning and
use of cyber operations, some main differences need to be taken into account during
the entire planning process and each step of any sort of crisis response planning.
5.2.3.2. Phasing
Cyber effects and the planning of cyber effects as cyber operations are not limited to
the last phase of the crisis development of an armed conflict. This differs therefore
from the traditional domains. Cyber operations can be and are conducted in peacetime
and during the first phases of a crisis. Therefore, cyber operations are not only to be
32 A Cyber Commander and staff can make use of the US Cyber Space Operations Planning Task List (US
Cyspace OpPl UJTL Baseline measures and Cyspace conditions UJTL Baseline measures).
43
planned and executed in parallel with land/air/maritime operations, but can be the first
effect/action that is taken during the crisis development because of the complexity
in planning, execution and operability. As an effect that can be executed without
physical deployment of any troops, the full spectrum of cyber operations can and must
be used as early as possible within the roadmap of development of a crisis. Cyber
operations are a primary asset for “shaping the battlefield” to support operations of
land/air/maritime forces that follow them. As such, cyber operations are not only
conducted during the traditional “execution phase” of military operations, but they are
also conducted concerning requirements, effectiveness, operability and availability,
separated from phases if necessary. Special attention should be paid to risk assessment
of the chances of detection by the opponent. Cyber operations have a higher risk
of failure due to the rapidly changing technical environment or enhancements of
protection, countermeasures and design.
5.2.3.3. Timelines
Planning and execution of cyber operations are different from those in other domains
and services regarding the timelines for planning and the time that is needed for
execution. Preparation of cyber operations in particular requires more time for the
evaluation of the possibility for operability of a cyber effect. As a result, cyber
operations must be considered as an option as soon as possible before and during the
operational planning process. Cyber effects cannot be considered short-notice assets,
as long as they are not a result of prepared and pre-authorised actions.
5.2.3.5. Effects
Cyber operations can have these expected (first, second and third order) and/or
unexpected effects, which can be lethal or non-lethal with the goal, but they are not
limited to this list: coerce, deter, contain, defeat, secure, isolate, neutralise, recover,
manipulate or corrupt, exfiltrate, degrade, disrupt, deny or destroy. The always-
growing interconnected mesh that we call cyberspace is the perfect environment to
produce unwanted and uncontrolled effects. This can turn a simple cyber operation
that in a first assessment would fall below the threshold of the use of force or an
armed attack (e.g. a temporary denial of service) into a sum of undesired effects that
44
may cause sufficient damage to be considered to fall under the UN Charter and jus
ad bellum. The aforementioned would be a ground for the adversary to use force in
self-defence (individual or collective). Some of the criteria used to assess the impact
of these effects can interfere with critical infrastructure or functionality, severity and
reversibility of the effects and their invasiveness. Briefly, the legality of the response
depends on the context and the effects of the respective cyber operation. Even though
the existence of unwanted effects is not exclusive to this domain, the interconnectivity
and interdependency between all kinds of networks and systems (military, state-
owned and private or corporate) increases the risk that they may happen. It is
therefore extremely important, but also very difficult, to assess the risk of collateral
and cascading second or third order effects. Whatever a commander’s risk appetite is,
he or she has to have a perfect understanding of these interdependencies and of the
impact that the suggested cyber operation may have on their normal operation.
45
5.3 Coordination and Cooperation
Coordination is essential and can act as a force multiplier in this domain due to its
interconnectivity and interdependency. This can be achieved in DCO by information
sharing and provision of mutual assistance, but may be more difficult to achieve
in OCO due to the employment of sovereign capabilities. Nonetheless, OCO may
benefit from cooperation in the preparation phase through exchange of intelligence
and situational awareness. The main goal for this is to deconflict opposing or untimely
effects and synchronise them to enable their full potential and wanted effects.
Cooperation between the military, industry and academia is probably the best way
to supply operational needs with the required resources to develop them, both
financial and intellectual. In the same way that NATO has developed a partnership
with industry (NICP), it should eventually consider establishing one with academia.
Effective collaboration could, among other things, increase the availability of qualified
personnel. These collaboration activities are essential to establish the necessary
trust relationships between stakeholders. The need for national and international
collaboration increases due to the fact that this is a knowledge domain in which
all inputs and different perspectives are helpful to find solutions and establish new
challenges. This need is highly increased with the existence of grey zones and areas
of responsibility between who owns the systems (the problem of establishing clear
borders), how to typify the cyber incidents (crime, use of force, espionage, etc.), and
the different kinds of threat actors that may be responsible for them (states, state-
sponsored, criminals, hacktivists, insiders, braggers, etc.).
46
planning along with conventional capabilities in the initial planning phase.
One of the best ways to enhance cooperation and mutual support between
different military domains is the establishment of training and exercises
that integrate cyberspace operations into a command module. An example
is the exercise Crossed Swords that is organised by the NATO CCDCOE.
This kind of exercise brings together cyber technical teams, intelligence
units and Special Operation Forces (SOF) to achieve the mission goal by
accomplishing integrated cyber and kinetic objectives and fostering joint
operations. Depending on national needs, such exercises help to integrate
offensive cyber with special operations, enabling new technologies, tactics,
procedures and methods of contemporary conflicts to be practised in a
realistic environment. During this process, practical joint dictionaries and
information-exchange procedures can be developed to support better mutual
understanding and communication. Communication between different
domains during multi-domain operations is crucial, bearing in mind the
intensive, fast-paced, and mission-centric environment.
47
The staff who monitor technology should be in contact with cyber security/
defence-related companies, think tanks and scientific forums; should test
cutting-edge products and technologies according to the Cyber Command’s
needs; and should develop a catalogue of potentially suitable products and
technologies to serve as a reference for all the Cyber Command’s personnel.
– Cooperation with academia. The Cyber Command has several ways that
it can acquire new technologies and products, mainly through commercial
procurement processes (COTS), research and development projects from
the public sector (GOTS) and by own R&D. Own R&D, in some cases,
is necessary for economic, time or security reasons. In any case, over time
the three different mechanisms will be used to fulfil the Cyber Command’s
FOC. During the three acquisition processes, the support of the academic
community will be necessary. Furthermore, this support could be essential
to support own R&D.
5.4 Assessment
There are a number of assessments that a commander and his or her staff should take
into account when conducting cyber operations. A commander should seek to measure
whether the planned outcomes have been achieved against criteria set by the various
boards and the estimate process. Such measurements should seek to inform future
iterations of the cycle and the commander’s end-state.
48
System Analysis (TSA), which identifies and prioritises targets to best exert influence
on a system and thus to instruct which elements, criteria or conditions should be
monitored to inform targeting assessment, and which intelligence sources are best
suited to collect data against those indicators. Key to targeting assessments is gaining
an understanding of the following:
49
dations merge the results of what has been done with how it has been
done to provide the commander with recommendations on whether a
target should be nominated for re-attack or whether attention should be
turned to a new target.
50
FIGURE 9. CONSIDERATIONS IN THE CYBERSPACE ACTIONS CYCLE 34
51
6. Recommendations
& Best Practices
6.1. Recommendations
6.1.1 Standard Operating Procedures
It is recommended that SOP should be implemented to ensure effective resource and
time management for execution of all types of cyberspace operations. Every complex
routine operation or set of repetitive actions should be listed as a list of instructions or
procedures to be carried out.
52
Annex A
Definitions
The definitions used in this document are either: (a) agreed NATO definitions; or (b)
working definitions used in cyber-related documents in different states of maturity
which are expected to be adopted by NATO at a later date.
Cyber defence (CD) - The means to achieve and executive defensive measures
to counter cyber threats and mitigate their effects, and thus preserve and restore
the security of communications, information or other electronic systems, or the
information that is stored, processed or transmitted on these systems.37
35 IMSM-0222-2018 and AJP 3-20 Allied Joint Doctrine for Cyberspace Operations, Draft Version, Jan 2017
(hereafter: Draft AJP 3-20).
36 AC/322-N(2014)0072, Report on Cyber Defence Taxonomy and Definitions, May 2014.
37 Ibid.
38 Draft AJP 3-20.
39 A working definition for effect is provided through NATO definitions.
53
Cyber event - Any observable occurrence in cyberspace.40
Cyber incident - Any detected anomaly compromising or that has the potential
to compromise communication, information or other electronic systems or the
information that is stored, processed or transmitted in these systems.
Cyber security (CS) - The application of security measures for the protection of
communications, information and other electronic systems, and the information
that is stored, processed or transmitted in these systems with respect to
confidentiality, integrity, availability, authentication and nonrepudiation.
Cyberspace security (CS) - The state of a system in which it can resist events from
cyberspace likely to compromise the confidentiality, integrity and availability of
the data stored, processed or transmitted and of the related services that these
systems offer or make accessible.43
Domain - The sphere of interest and influence in which activities, functions, and
operations are undertaken to accomplish missions and exercise control over an
opponent to achieve desired effects.
40 National Institute of Standards and Technology Special Publication 800-61 Revision 2, August 2012.
41 IMSM-0222-2018.
42 Draft AJP 3-20.
43 Ibid.
44 Ibid.
54
Mission assurance (MA) - A process to protect or ensure the continued function
and resilience of capabilities and assets, including personnel, equipment, facilities,
networks, information and information systems, and infrastructure and supply
chains critical to the execution of mission-essential functions in any operating
environment or condition.45
45 Ibid.
46 Ibid.
55
Annex B
References
NATO documents
Legal documents
Case law
Other
56
11. Stinissen, J., Minarik, T., Pissanidis, N., Veenendaal, M., Glorioso, L. 2015.
A Study for Existing and Possible Rules of Engagement. NATO Cooperative
Cyber Defence Centre of Excellence.
12. Schmitt, M. N. (gen. ed.) 2017. Tallinn Manual 2.0 on the International Law
Applicable to Cyber Operations. Second edition. Cambridge University
Press, Cambridge.
13. Melzer, N. 2009. ICRC Interpretive Guidance on the Notion of Direct
Participation in Hostilities under International Humanitarian Law.
International Committee of the Red Cross.
57
Annex C
Cyber Collateral Effects Estimate Process
Step 2
Step 3
Step 4
58
Step 5
59
60
Background
1. The purpose of this document is to provide guidance notes for the Collateral
Effects Estimate Process (CEEP). The requirement for a CEEP is to provide
a framework for operational planners and commanders to ensure that due
diligence has been applied in understanding the collateral effects that may
be realised as a result of an intended non-kinetic strike.
2. The CEEP has been designed as a 6-step process and is broken down as
follows. Step 1 is target validation; this mirrors the standard target validation
processes. Steps 2, 3 and 4 set the scene and provide context for how
significant the collateral effect will be. Steps 5 and 6 provide a quantitative
and qualitative summary of the likely collateral47 effect for the commander.
Phases
3. Step 1 - Target validation. The first step of the CEEP is to ensure that the
target is valid. The target must have been positively identified (PID) and be
authorised by Rules of Engagement (ROE); should either of these not be
in place, the collateral estimate process stops and further target validation
work is required. It is necessary to confirm that there is no environmental or
CBR plume hazard estimated; if there is a likelihood of this being possible,
the Sensitive Target Approval Review (STAR) process must be followed
before the next step of the CEEP. If the target is considered a Non-Strike
Entity (NSE) then a higher level of authority will be required and the target
removed from the NSE list before validation. A target considered NSE will
result in a CEE value of ‘high’; however, the collateral effects estimation
process can continue to better determine the residual risk.
61
network and its immediately connected networks, systems or services.49
Wide propagation can be defined as the target network, its directly connected
networks and subsequent indirectly-connected networks.50 The effect may
propagate from the target and reach other legitimate targets. In this case, the
effect would be considered transient or additional and thus the CEE would
be considered zero.
5. Step 3 - NSE. The third step requires consideration of whether the effect
could extend into NSE. This is not to confirm if the intended target is NSE
(Step 1 deals with this), but rather to understand the likelihood of the effect
propagating beyond its intended target and resulting in an undue effect on an
NSE.
6. Step 4 - Persistence. The fourth step considers how persistent the effect
is; specifically, if the effect can be considered reversible either by the
implementer or by the adversary. Reversible is defined it being possible
through a series of actions to reverse or mitigate the effect and return all
services to normal. That is, it is non-destructive and non-permanent. From
an implementer’s perspective, this could be considered a buzzer on/buzzer
off capability. From an adversary’s perspective, it would require basic
administrative intervention or a system restart returning services to normal.
The output of this step should be considered as an input to the Estimated
Recovery Effort element of Step 5.
7. Step 5 - Assessment. The fifth step in the process reviews three critical areas
of concern and allocates a quantitative and qualitative value for each. The
three areas are:
49 Example: A local propagation in the same circumstances would see the effect realised outside of the VLAN
and spread throughout the local network but limited to the immediately connected infrastructure.
50 Example: A wide propagation in the same circumstances would result in the effect being realised beyond
the target infrastructure and into non-target networks that may include, but is not limited to, the internet.
51 Defined as loss of human life but does not include non-lethal injury.
62
(2). A number of civilian casualties that is greater than one but
lower than the allowed threshold results in a score of three
and a CEE value of Medium. This will result in a minimum
of an overall CEE value of Medium in step 6.
(3). A number of civilian casualties that is greater than the allowed
threshold results in a score of five and a CEE value of High.
If the estimated number of civilian casualties is likely to
be greater than the allowed threshold, other mitigations or
additional authorisation must be sought by the commander
before proceeding.
63
c. Estimated Recovery Effort. This requires an estimation of the total
burden of effort that the adversary, neutral or friendly forces are likely
to have to expend as a direct result of the effect and its immediate
implications. The estimation takes into account time and resources to
give greater fidelity to the overall cost. A breakdown and definition of
each of the scores are as follows:
56 An example of this would be a system restart by the system owner or for the perpetrator to ‘turn off’ the
effect. .
57 An example of this would be a 2-5 day degradation of service and/or up to £10k cost.
58 An example of this would be a degradation of greater than 5 days (but not resulting in complete
replacement of the system) and/or a financial cost greater than £10k.
64
a. Numerical score. The overall numerical score is an aggregate of each of
the scores from step 5. A total score of 3-6 will result in an overall CEE
value of Low. A total score of 7-10 will result in an overall CEE value of
Medium. A total score of 11 or higher will result in an overall CEE value
of High.
65
Annex D
Positive Identification
Annex E provides PID criteria that need to be further developed and analysed. The
criteria must be in accordance with international law, for instance with the principle
of distinction.59
59 For example, ‘Persona is adjacent or connected to other known personas (member of an administrators’
group) within a network providing the targeted function’; It cannot be positively identified that they are
directly contributing to hostilities.
66
Persona is associated Applications or Physical coordinates
with unique accounts services (domains, associated with
(forum ID, login IP addresses, email the facilities or
credential) associated addresses) associated infrastructure
with the target with the targeted
function function
67
Annex E
Functional areas and special
advisors – cyber-specific tasks
Functional
Main Tasks / Responsibilites
area
68
• Identify, create and update the Cyber Prioritised Asset List (CPAL).
• Identify targets and Cyber Key Terrain (CKT).
• Nominate cyber targets.
• Create and update a contact database with all relevant national and
international actors.
• Integrate cyber defence aspects into all relevant processes, include
cyber considerations in operations synchronisation.
• Maintain awareness of own important enablers connected to
cyberspace, and identify and list cyber dependencies for the operation.
iC3
• Conduct a risk assessment of those dependencies.
• Coordinate mitigation efforts with J6.
• Coordinate between cyber intelligence and targeting.
• De-conflict cyber battle damage assessment.
• Include mission-relevant cyber aspects in the CPOE.
• Coordinate cyber activities within the JOA.
• Coordinate update and dissemination of Cyber IRs.
• Monitor FC/CCs cyber defence plans.
• Conduct CDWG.
• Make sure systems are up and running, and that they stay up and
running.
• Be responsible for conducting the necessary CIS Infrastructure
Operations.
• Maintain an overview of the status of relevant systems.
• Mitigation and business continuity planning.
C6 • Information assurance, CIA.
• Maintain a detailed overview of infrastructure, bandwidth, sensors,
coding, etc.
• Support the Cyber Defence SMEs in coordinating Cyber Defence CIS
issues.
• Liaise with NCIA and other reporting/coordinating/warning
organisations – identify if and when help is needed.
69
• Develop the goals and objectives for cybersecurity training, education,
and awareness for the different target audiences.
• Evaluate the effectiveness and comprehensiveness of existing training,
education and awareness programmes.
• Develop new or existing awareness and training materials that are
appropriate for the intended audiences.
• Setup effective learning environments and classroom techniques
(including cyber ranges).
• Follow-up of the execution the training, education and awareness
C7 programmes.
• Lessons learned: Documentation of identified lessons is important for
the ability to work continuously on improving the implementation of
cyber aspects
C8
70
• Be aware of, and advise on, local, national,
regional and international cyber policies.
• Identify gaps and develop policies, programs,
and guidelines for implementation such as a
POLAD cyber security strategy, supply chain security
concept.
• Participate in International meetings and
coordination
71