Steven J. Anderson
Published: 2013
Total Pages: 154
Get eBook
"This thesis examines historical targeting theories for airpower and their effects on the Air Force organize, train, and equip functions. This analysis is intended to develop lessons learned in order to focus Air Force cyberpower organize, train, and equip functions. Just as early theorists conceptualized the use of airpower, so must the Air Force develop a cyberpower targeting theory to apply in future war. Following World War I, Airmen at the Air Corps Tactical School (ACTS) developed an "Industrial Web Theory" for targeting to achieve victory through airpower. This theory informed senior leadership decisions regarding organize, train, and equip functions for the Air Force throughout its use. The targeting theory was employed with mixed results from World War II through the Vietnam War. In the late 20th century, Colonel John Warden conceptualized and validated an airpower targeting theory based around a concept of the enemy as a system. This model earned its success in Operation DESERT STORM and is continually used in doctrine, education and training, and planning today. Although the Air Force went to war with the force it had in the early 1990's, Colonel Warden's theory informs organize, train, and equip decisions for senior leaders today. An Air Force cyberpower targeting theory should consider lessons learned by early airpower theorists and practitioners. Just as Airmen attempted to influence the third warfighting domain during airpower's infancy and maturation, Airmen are attempting to influence the fifth warfighting domain of cyberspace today. This thesis evaluates early airpower targeting principles and attempts to draw parallels in order to propose a cyberpower targeting theory. Next, the thesis draws upon limited artifacts inherent to wielding cyberpower -- attribution, authorities, and centers of gravity -- and acknowledges their impacts upon leaders and practitioners of cyberpower. Finally, the thesis proposes a cyberpower targeting theory based on offense, defense, and exploitation objectives. In addition to focusing on the adversary, the theory is intended to cause introspect in order to identify potential Air Force and national security vulnerabilities in, through, and from cyberspace"--Abstract.