The challenges of military adaptation to the cyber domain: a case study of the Netherlands

Whilst NATO speaks increasingly publicly about the military use of cyber opera-tions, adaptation to the cyber domain has reportedly been challenging for most militaries. Little research has sought to understand the nature of these chal-lenges. This study seeks to address this gap through a case study of the Netherlands. By utilizing a range of primary and secondary sources, this article reveals that the Dutch Defense Cyber Command has faced significant con-straints in its adaptation to the cyber domain, primarily due to issues related to organizational structure, operational mandate, and the a... Mehr ...

Verfasser: Smeets, Max Willem Eline
id_orcid:0 000-0003-4057-6445
Dokumenttyp: Artikel
Erscheinungsdatum: 2023
Verlag/Hrsg.: Routledge
Schlagwörter: NATO / Military / cyber commands / cyber operations / intelligence
Sprache: Englisch
Permalink: https://search.fid-benelux.de/Record/base-27584377
Datenquelle: BASE; Originalkatalog
Powered By: BASE
Link(s) : https://hdl.handle.net/20.500.11850/623312

Whilst NATO speaks increasingly publicly about the military use of cyber opera-tions, adaptation to the cyber domain has reportedly been challenging for most militaries. Little research has sought to understand the nature of these chal-lenges. This study seeks to address this gap through a case study of the Netherlands. By utilizing a range of primary and secondary sources, this article reveals that the Dutch Defense Cyber Command has faced significant con-straints in its adaptation to the cyber domain, primarily due to issues related to organizational structure, operational mandate, and the availability of skills and resources. A cyber command that lacks regular opportunities for day-to-day operations and where personnel may not have continuous learning opportu-nities to acquire and refine their skills will encounter difficulties in recruiting, training, and retaining a proficient workforce. These findings highlight the tendency of observers to mistakenly equate the mere establishment of a cyber command with the existence of a robust military cyber capability – namely, the ability to effectively carry out and sustain a range of cyber opera-tions for tactical or strategic purposes. ; ISSN:0959-2318 ; ISSN:1743-9558