The trope of the cyber warrior has changed radically. Circa 1999, cyber warriors at the Joint Task Force Computer Network Defense worked under the U.S. Space Command. It seemed like a poor fit. Space operations require the careful orchestration of many different parts, huge checklists, and a zero-defect culture in the face of literally thousands of possible errors. Every move is choreographed. Cyber warriors, at least then, did not work that way. They entered systems silently. When there, they braced themselves for surprise regardless of how thoroughly they were briefed. They learned to orient themselves quickly, looking for handholds that let them manipulate the system before the system found and expelled them. They innovated when they had to. They left as quickly as possible. It sounded as though the special forces community would have been a better fit.
Planning a Cyberwar
“To the extent that eroding the adversary’s confidence is the main point of a cyber attack, the character and sequencing of cyber attacks might make a great difference.”
By Martin C. Libicki