The U.S. Army is developing new cyberwar strategies, recognizing that the nature of cyberwar reduces the advantages that America has had over its enemies through its traditional military, reports Joseph Farah’s G2 Bulletin.

“Today’s adversaries have studied how the U.S. Joint Force prefers to operate and have adapted by developing capabilities that contest U.S. operations on land, at sea, in the air, in space, and in cyberspace, as well as across the electromagnetic spectrum, information environment, and cognitive dimension of warfare,” explains a new report, “The U.S. Army Concept for Cyberspace and Electronic Warfare Operations.”

“Defeating futures enemies that possess advanced capabilities calls for land forces operation as part of integrated joint teams that conduct simultaneous and sequential operations across multiple domains.”

A key, the report explained, will be to grab “windows of advantage” that will let the nation’s forces for freedom “seize, retain, and exploit the initiative.”

The report propses ideas to integrate cyberspace, electronic warfare and spectrum management operations into the rest of the fighting forces.

“The ability to employ cyberspace, EW, and SMO capabilities as an integrated system, acting as a force multiplier, improves the commander’s ability to achieve desired operational effects,” the report says.

Already involved are Department of Defense information network operations, defensive cyberspace operations and offensive cyberspace operations.

“The end state is for Army forces to have fully capable cyberspace and EW capabilities and the authorities to conduct effective cyberspace operations as part of their overall combined arms strategy to support joint combined arms operations. Cyberspace and EW operations provide the commander the capability to process and manage operationally relevant activities across multiple domains, both physical and virtual.”

The Army in 2012 published an assessment that set an outline for such activities. The next year it established the Army Cyber Institute and the U.S. Army Cyber Center of Excellence.

For the rest of this report, and more, please go to Joseph Farah’s G2 Bulletin.

Note: Read our discussion guidelines before commenting.