Contributor: Griff Served with the Canadian Army Reserve for ten years, first as a Medic and later as an Infantry Officer. He also has two years of experience as a Junior Officer in the British Army Reserve, whilst concurrently working as a cyber security professional in his civilian life.

Cyber is in a state of conflict – an ongoing contest of wills to compete over scarce resources.  Fought across technological means, the cyber conflict ultimately pits human against human in a drama that encompasses chance, risk, and policy.  

While cyber may seem a daunting domain dominated by experts, experienced officers are surprisingly well equipped to join the fray.  The military is a jurisdiction where information constraints imposed on decision making are real and pressing.  A high-risk environment coupled with imperfect information has developed an approach that fills in the gaps with rigorous analysis.  The 7 Questions Estimate format ultimately derives the ‘So What’ statement from a series of possibly unrelated observations to form a coherent plan.

Conceptual tools of the military trade can be modified and applied to cyber.  For example, the Geographic Framework can readily be applied to cyber if you replace physical distance, which is largely irrelevant to IT systems, with degree of control.  With this mind-set, the Deep is synonymous with the deep web and darknet, while the Close is the internet and common interactions with general cyberspace.  Notably, there is an interplay in the Close between cyber and physical assets.  Finally, the Rear is analogous to an organization’s own networks and databases.

Defenders have a high degree of control in the Rear, while limited to no control over the Deep.

Cyber Strategic Framework as Presented by Author

Figure 1 maps out key features of information technology in relation to the degree of control a defender holds over them.

Cyber Terrain analysis

Instead of hills, rivers or roads, cyber has prominent features like networks, databases and applications.  There is no real constraint on what constitutes a cyber terrain feature provided that the it is:

  • Representative of an element relevant to cyber, and;
  • Is something an attacker or defender would be interested in.

Some prominent examples of cyber terrain would be:

  • Perimeters
  • Networks
  • Applications
  • Hardware
  • Databases
  • People

These broad terms can be further split based on additional criteria.  As long as some analysis has gone into the planning it is a valid observation of the cyber terrain.  Once the initial list of cyber terrain is assembled it can be mapped onto the framework.  Recalling that the framework provides a top to bottom axis based on low to high degrees of control, each aspect of cyber terrain is overlaid, as in the example below in Figure 2:

In this example the networks, applications, and people have been divided into distinct terrain features based on their externality.  This allows for greater granulation of risk and to identify which aspects are further forward in the cyber conflict and thus less controlled.  With an understanding of the cyber terrain, the next step is to understand how an attacker may move through the terrain in order to achieve their objectives.

Threat Integration

To demonstrate how an attacker can move through the cyber terrain, consider the recent WannaCry attacks.  Technical details of the attack are taken from Microsoft’s response to the attack found here.

Britain’s National Cyber Security Centre (NCSC) and their American counterpart the National Security Agency (NSA) have both linked the origin of attack to North Korea.  While the attack was indeed likely launched by a state sponsored group, its objective is deemed to be financial.  Threat intelligence company Recorded Future suggests that the use of ransomware to raise funds for the state falls under North Korea’s self-financing asymmetric military strategy.  In this sense, it most closely aligned with the Cyber Criminal [see CC in Fig 3] threat group.

WannaCry was a variation on the typical ransomware mechanism; instead of the more traditional social engineering/phishing approach, the attack used a technical breach point to install the virus.  To reflect the two attack types on our cyber terrain graphic, we show the primary breach via a vulnerability in the External Network [see Fig 3] as a thick red line, while a thinner red line represents a possible secondary attack against Externally Facing People [see External Facing Person in Fig 3].

Figure 3: The WannaCry Attack. A Threat Integration Model of the WannaCry May 2017 Cyber Event [Copyright DAMROD]
The initial breach came through a known vulnerability in the External Network [see (1) in Fig 3] which used a virus with wormlike functionality to spread through the Internal Networks [see (2) in Fig 3] and then moved to Hardware to exploit unpatched Windows 7 systems [see (3) in Fig 3].

At this point, the attack deployed the WannaCrypt virus on a local machine [see (4) in Fig 3] and looked through the internal directory [see Internal Facing Person in Fig 3] to find other machines with unpatched Windows 7 systems – exponentially increasing the scale of the attack.

To exfiltrate, the WannaCry virus connected the local machine back to an external domain [see (5) in Fig 3] and victims were directed to pay bitcoin to a specific address.

Concluding Thoughts

By no means is this summary put forth as the definitive history of the WannaCry attack, however, by applying the Geographic Framework to the WannaCry attack a tactical scenario suitable for analysis emerges.  As military professionals, we need to be conversant in the threats that face our nation.  Cyber is a domain of conflict we are a conceptually familiar with – connected, contested, congested, cluttered, constrained, and increasingly coalition.  The nature of conflict rarely changes, and cyber is simply the newest iteration of an ancient struggle.  Tried and tested tools backed up by robust analysis is an essential, and arguably absent, aspect in cyber conflict.  Here the military has something to offer.  We just need to adapt to it and understand it, recognise that it is not rocket science and determine the military’s role in cyber security.

The views expressed within individual posts and media are those of the author and do not reflect any official position or that of the author’s employees or employer. Concerns regarding content should be addressed to

A Threat Integration Model of the WannaCry May 2017 Cyber Event

[Copyright DAMROD]
DAMROD Cyber Stragic Framework
The Cyber Terrain Overlay [Copyright DAMROD]

Leave a Reply

2 Comment threads
1 Thread replies
Most reacted comment
Hottest comment thread
3 Comment authors
KittyGriffGarry Recent comment authors

This site uses Akismet to reduce spam. Learn how your comment data is processed.

newest oldest most voted
Notify of

Griff, great article and really liked the synergy with the 7Qs process (which means you will not scare the horses by introducing what might be seen as some sort of radical new approach). It also brings a new dimension to Centre of Gravity Analysis; a real opportunity to expand the traditional ‘6’ planning both in terms of exercises and operations. Thanks


Thanks Garry – Sorry I didn’t see this til now. I think military officers will have great opportunities in the cyber security space. The growth of AI to handle a lot of the expert systems may lead to a greater emphasis on human analytical skills in the future. has more info on the subject.


The application of the geographic framework to cyber space is a great idea – finding an understandable approach like that is key to operating effectively in that domain. Griff, have you read the nueromancer trilogy? It introduces the idea of mapping cyberspace. Have you seen these ideas developed anywhere else? I would be interested in reading more.