Since 9/11, the US has invested heavily in high-end technologies to counter military threats. We have all been amazed at some of the breakthroughs that have been made. Eleven years of fighting on multiple battlefields has given us the opportunity to test these new technologies in places and ways that were never possible before. Throughout these many campaigns however, we have had the luxury of constant, assured access to cyberspace. Sure - there was never enough bandwidth for data-thirsty military operations, but we were basically un-contested in the cyberspace domain throughout our wars and other military activities. Whatever we wanted to do, cybersapce was more or less always usable. As we wind down and try to move these bandwidth-intensive technologies and advancements to counter other potential adversaries, we should understand that owning the cyberspace domain will not always be possible. Our dependency on this connectivity might just be our Achilles heel.
Anti-Access Area-Denial (A2AD) in Military Domains and in Cyberspace
Chris Scott is an experienced department of defense enterprise technology professional and business executive with a long running track record of fielding proven technologies into large organizations. She interacts with senior DoD and IC officials and provides insights to our readers here. She publishes at CTOvision.com and DelphiBrief.com and the new analysis focused Analyst One