The IT Law Wiki

Computer network exploitation

32,068pages on
this wiki
Add New Page
Add New Page Talk0

Definitions Edit

Computer network exploitation (CNE) refers to

enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks.[1]
[a]ction taken to make use of a computer or computer network, as well as the information hosted therein, in order to gain advantage.[2]

Overview Edit

CNE is

an area of Information Operations that is not yet clearly defined within DOD. Before a crisis develops, DOD seeks to prepare the IO [information operations] battlespace through intelligence, surveillance, and reconnaissance, and through extensive planning activities. This involves espionage, which in the case of IO, is usually performed through network tools that penetrate adversary systems to return information about system vulnerabilities, or that make unauthorized copies of important files. Tools used for CNE are similar to those used for CNA, but configured for intelligence collection rather than system disruption.[3]

The term CNE has been replaced by "advance force operations" "when used to describe cyberspace operations intended to support/facilitate a specific planned operation or set of operations via clandestine means, e.g., by delivery of software payloads that may facilitate preparation of the battlespace and/or provide effects in support of an operation."[4]

References Edit

  1. U.S. Department of Defense, Joint Pub. 1–02: DOD Dictionary of Military and Associated Terms (Nov. 8, 2010, as amended through May 15, 2011) (full-text).
  2. NATO Standardization Agency, NATO Glossary of Terms and Definitions 2-C-12 (2008) (full-text).
  3. Information Operations and Cyberwar: Capabilities and Related Policy Issues, at 5.
  4. Joint Terminology for Cyberspace Operations, at 2.

See also Edit

Also on Fandom

Random Wiki