Stephen W. Korns’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


Georgia’s Cyber Left Hook
  • Article

November 2008

·

5 Reads

·

52 Citations

The US Army War College Quarterly Parameters

Stephen W. Korns

·

Joshua E. Kastenberg

Cyber Operations: The New Balance

41 Reads

·

8 Citations

A new normalcy is ascendant in cyberspace. What does this mean, and what are the implications for the Department of Defense (DOD) cyber policy. Some characterize cyber new normalcy as hybrid, multimodal Internet conflict, which combines state-level lethality with amorphous cyber formations. Others view cyber new normalcy as a breathtakingly broad and globally inclusive campaign of deliberate cyber penetrations against governments, militaries, and commercial concerns. In a January 2009 Foreign Affairs article, Defense Secretary Robert Gates described today's new normalcy as the search for balance in defense capabilities. A few examples might serve to better illuminate the cyber new normalcy concept. During the August 2008 conflict between Russia and Georgia, cyber attackers used tools from a Web site hosted by a company in Texas to attack a Georgian government Web site that had been relocated- coincidentally-to a Web hosting company in Atlanta, Georgia. In essence, the United States experienced collateral damage during these cyber attacks. Borderless cyber operations confounding border-based paradigms are not a deviation; it is cyber new normalcy. During the December 2008 attacks in Mumbai, India, the attack teams used cable television, BlackBerry phones, Google Earth imagery, and global positioning system information to form an integrated, low-cost command and control capability that enabled a modicum of information superiority. As Ralph Peters points out, incidents such as Mumbai demonstrate that nonstate actors "do not fear network-centric warfare because they have already mastered it." Mumbai is not an outlier; it is cyber new normalcy. Finally, in a subtle yet telling sign of cyber new normalcy, hackers in 2008 attacked the Barack Obama and John McCain campaign.

Citations (2)


... 7 It is also the first documented instance in which foreign actors, in particular private actors (i.e., Google), stepped in to re-establish network services for the affected state. 8 The subjective impact of these attacks is a perceived amplification of the ongoing physical invasion. Psychologically, the attacks undermined confidence in the state and provided a publicly visible indication of a cyber-kinetic conflict. ...

Reference:

The bitskrieg that was and wasn’t: the military and intelligence implications of cyber operations during Russia’s war on Ukraine
Georgia’s Cyber Left Hook
  • Citing Article
  • November 2008

The US Army War College Quarterly Parameters