by Mark Grzegorzewski
In this Quick Look, Dr. Mark Grzegorzewski provides an overview of cryptocurrency—a medium of exchange aimed at digitally freeing economics from politics and developing a currency free from state oversight. In addition to a description of how cryptocurrency is created and managed, this Quick Look also includes how this currency is used by competitors and ways SOF can anomalously employ cryptocurrency.
As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.
The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply chain in managing and mitigating risks, and the authors define C-SCRM as the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of information and operational technology products and service supply chains. As Special Operations Forces increasingly rely on sophisticated hardware and software products, this quick, well-researched monograph provides a detailed accounting of C-SCRM associated laws, regulations, instructions, tools, and strategies meant to mitigate vulnerabilities and risks—and how we might best manage the evolving and ever-changing array of those vulnerabilities and risks.
by Lieutenant Colonel Mitchell Wander
This Quick Look describes how Cyber Operations (CO) can present options to policymakers and military leaders to influence through the information environment or, if needed, create effects against critical infrastructure in the physical environment. Ultimately, SOF can use a foundational understanding of CO as both a planning consideration for force protection and operational enhancement to present opportunities to execute core mission areas.