There's still time to register for today's webinar on cyber force structures! Tune in from 2pm GMT to hear from @JasonABlessing, @HoansSolo and @GregDAustin | Register here: http://go.iiss.org/2XvwVAz 
There is a severe lack of data on cyber force structure, and this is problematic for several reasons, explains @JasonABlessing.
In his presentation, @JasonABlessing introduces a novel typology for understanding cyber force structure: 'Our expectations of a dominant force structure emerging do not hold up with the data... There is no single approach to cyber force structure.'
While the typology is important in helping to survey the field, it is static, @JasonABlessing says. Militaries can change cyber force structure over time, he adds, noting cyber force structures in the United States and Estonia as examples.
'Ultimately, new technologies and new practices are implemented by people and organisations,' says @JasonABlessing. One of the factors shaping implementation is geopolitical pressures, but geopolitical pressures alone cannot determine force structure decisions, he argues.
The four factors shaping implementation are geopolitical pressures, civil-military dynamics, military organisational culture, and the size of the military bureaucracy, explains @JasonABlessing.
'Not all cyber forces are cyber commands. The language that we use is important... Importantly, my data shows that cyber forces have been tailored by states to fit political and military conditions.' – @JasonABlessing
'Cyber is moving more into the operational space,' says @HoansSolo in response to @JasonABlessing's presentation, noting in particular the role of multi-domain operations going forward.
Who really has the authority to launch cyber operations? – When you think about the integration of kinetic and cyber capabilities, when will we move the command down to lower echelons? – @HoansSolo
Authority will not come from NATO commanders to deploy offensive cyber capabilities – it will be done at member state levels, says @JasonABlessing.
What policymakers need to understand is that you cannot have strong cyber defence without strong signals intelligence, concludes @HoansSolo.
A full recording of this webinar will be made available on our website shortly – stay tuned! | http://go.iiss.org/2XvwVAz 
You can follow @IISS_org.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.