AZERBAIJAN NATIONAL ACADEMY OF SCIENCES
CYBER-TROOPS: FUNCTIONS, WEAPONS AND HUMAN RESOURCES
Yadigar N. Imamverdiyev

Conflicts between countries are transferred into cyberspace, and operations in the virtual space in peacetime and wartime require a special type of troops: cyber-troops. To provide information security, in some countries there are cyber-troops or plans to develop cyber-troops in the coming years. This paper studies the problem of forming cyber-troops. The main aspects of forming cyber-troops, the tasks and functions of cyber-troops, the structural and organizational models of a cyber command, the arsenal of weapons and human resources of cyber-troops are considered, and the experiences of developed countries in this field are analyzed. Problems with coordinating the activities of cyber-troops and other public organizations involved in cyber security and issues of international cooperation are also discussed (pp. 13-21).

Keywords:information warfare; cyberwar; cyber defense; cybertroops; cyber weapons; Cyber Command.
DOI : 10.25045/jpis.v06.i2.02
References
  • Alguliyev R.M., Imamverdiyev Y.N. E-government, information security: Actual research directions // Problems of Information Society, 2010, No 1, pp. 3-13.
  • Clarke R.A., Knake R. Cyber War: The next threat to national security and what to do about it. Harper Collins 2010, 304 p.
  • Evron G. Battling botnets and online mobs. Estonia's defense efforts during the Internet War // Georgetown Journal of International Affairs, 2008, vol. 9, no. 1, pp. 121-126.
  • Hollis D. Cyberwar case study: Georgia 2008 // Small Wars Journal blog, 2010, http://www.smallwarsjournal.com/blog/journal/docs-temp/639-hollis.pdf
  • Gumahad A. T. Cyber troops and net war: The profession of arms in the information age. BiblioScholar, 2012. 68 p.
  • Conti G., Surdu “Buck” J. Army, navy, air force, cyber: is it time for a cyberwarfare branch of the military? // Information Assurance Newsletter, 2009, vol. 12, no. 1, pp. 14-18.
  • Owens W.A., Dam K.W, Lin H. S. (eds.) Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. National Academies Press, 2009, 390 p.
  • Geers K. Strategic cyber security. CCD COE Publication, Tallinn, Estonia, 2011, 168 p.
  • Alakbarova I.Y. Information warfare technologies. Express-information. Information Society series. “Information Technologies” Publishing House, 2012, p.108.
  • Libicki M. What is information warfare? // National Defense University, 1995, 110 p.
  • Alguliyev R.M., Imamverdiyev Y.N. Information security incidents. Baku: Information Technology, 2012, p.212
  • Floridi L., Taddeo M. The ethics of information warfare. Springer. 2014, 145 p.
  • Hutchins E. M., Cloppert M. J., Amin R. M. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare and Security Research, 2011, pp. 78-104.
  • Langner R. Stuxnet: dissecting a cyberwarfare weapon // IEEE Security & Privacy, 2011, vol. 9, no. 3, pp. 49-51.
  • Gostev A. The Flame: questions and answers. 2012, http://www.securelist.com/blog/incidents/34344/the-flame-questions-and-answers-51
  • O'Gorman G., McDonald G. Symantec security response report: The Elderwood Project. September, 2012, 137 p.
  • DARPA Information Innovation Office Programs: Plan X, http://www.darpa.mil/Our_Work/I2O/Programs/Plan_X.aspx
  • HP Security Briefing - Episode 16 “Profiling an enigma: The mystery of North Korea’s cyber threat landscape,” August 2014.
  • Mandiant.  APT1: Exposing one of China’s cyber espionage units. February, 2013.
  • Peng G., Yao Y. (editors) The Science of Military Strategy. China Military Science Publishing House, 2005, 504 p.
  • Czosseck C., Podins K. A vulnerability-based model of cyber weapons and its implications for cyber conflict // International Journal of Cyber Warfare and Terrorism, 2012, vol. 2, no. 1, pp.14-26.
  • Dumitras T., Bilge L. Before we knew it: An empirical study of zero-day attacks in the real world / ACM Conference on Computer and Communications Security, 2012, pp. 833-844.
  • Miller C. Kim Jong-il and me: How to build a cyber army to attack the U.S., DefCon 18, 2010,http://www.defcon.org/images/defcon-18/dc-18-presentations/Miller/DEFCON-18-Miller-Cyberwar.pdf