An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

The Cyber Defense Review

Articles

1 ... 15 16 17 18 19 20 21 22 23 24 ... 38

Strategic Cyber: Responding to Russian Online Information Warfare

December 9, 2019 — The success of the democratic world and its citizens depends to a great extent on recognizing one’s strategic advantages. Secure on this high ground, a nation can dictate interstate strategic competition in favor of U.S. national security. In cyberspace, that advantage rests on defending and advancing a U.S. ideological advantage inherent in that platform. The quality of openness ensures the unfolding of confrontation well short of armed conflict and winning this war matters most to those seeking to erode U.S. strategic ascendancy. This paper follows Russia’s progression in its effort to reverse its unfavorable situation in cyberspace, largely by hoping to panic the United States into a series of poor policy decisions. A failure to see openness as the means to thwart this cognitive offensive all but hands Russia a victory. Reversing this outcome stands to blunt cyber tensions from giving rise to a means of setting conditions for a fait accompli and a military clash of arms. With this end in mind, there is much reason for optimism at the strategic level of such a war in cyberspace. MORE

Fake News, (Dis)information, and the Principle of Nonintervention: Scope, limits, and possible responses to cyber election interference in times of competition

December 9, 2019 — In the era of asymmetrical conflicts, information and communication technologies (ICT) play an essential role due to their importance in the manipulation and conditioning of public opinion.[1] Several threats are linked to the use of ICT but, in terms of interstate, strategic competition, one of the main dangers is represented by socalled “cyber election interference” (i.e., cyber election-meddling activities carried out by foreign states to influence the electorate of a target state through the diffusion of “fake news” or “alternative truths,” principally via the media and social networks (Facebook, Twitter, YouTube, etc.)). The aim of this paper is to clarify whether and when this kind of interference constitutes a breach of international obligations—in particular, of the principle of nonintervention in the internal affairs of a state—and to envisage possible lawful responses under international law by states targeted by said interference. MORE

Defense Support to the Private Sector New Concepts for the DoD’s National Cyber Defense Mission

December 9, 2019 — Aprimary mission of the Department of Defense (DoD) remains defending the nation in cyberspace, a function which has until this point has been oriented around the traditional Defense Support of Civil Authorities (DSCA) framework. However, conceptual confusion as to the most effective mechanisms for DoD support during national cyber emergencies has generated a perpetual “fog” that restricts the frameworks optimal employment. This paper examines the typical forms of DoD cyber support currently employed, and presents four additional pillars for consideration. These proposed pillars highlight the potential value of the DoD’s defined role and functionality as a supporting command to the private sector during national cyber emergencies. Furthermore, this paper recommends new, adaptable structures and defined roles that can serve as a model for the DoD’s future composition, disposition, and employment in cyberspace when called upon to defend the nation. Because the private sector is on the front lines of the conflict, a new model of Defense Support to the Private Sector (DSPS) needs consideration. MORE

Borders in Cyberspace Strategic Information Conflict since 9/11

December 9, 2019 — “The idea of degrading the opponent's information flow and, conversely, to protect or improve our own, has gained reasonably widespread acceptance and has resulted in important applications.” -- Thomas P. Rona, Weapons Systems and Information War, 1976[1] The Cold War ended in 1991 with the Soviet Union extinct and the United States perhaps the most powerful country in history, at least in relative terms. President Bill Clinton suggested at his 1993 inauguration that conflict had become an isolated phenomenon of extremists fighting against world order, disrupting nations and peoples but holding no real hope of accomplishing anything positive.[2] The end of the Cold War seemed to have restored respect for sovereignty grounded in international law. History had “ended” and the world had turned toward liberalism—but not wholly. MORE

Persistent Engagement, Agreed Competition, and Cyberspace Interaction Dynamics and Escalation

December 9, 2019 — Policymakers and academics have raised concerns over escalation should states adopt a more proactive cyberspace posture. The unspoken context for those fears is potential, episodic, offensive cyber operations that threaten to cause, or cause, physical damage. This narrow focus excludes an equally, if not more important, strategic space—actual, continuous, strategic competition without resort to armed attack, a space which, according to 2018 U.S. strategic guidance, poses a central challenge to national security. U.S. Cyber Command (USCYBERCOM) has described a strategic approach to cyberspace intended to counter and contest adversary gains: persistent engagement. This approach is assessed through a re-consideration of Herman Kahn’s On Escalation. It is concluded that competitive interaction in cyberspace short of armed conflict in an agreed competition, as opposed to spiraling escalation, best explains the dynamic from persistent engagement and, consequently, prevailing concerns of escalation are unwarranted. Agreement to compete robustly short of armed conflict may be the grand strategic consequence of cyberspace. MORE

The Cyber Defense Review: Defending Forward

November 15, 2019 —  Welcome to the Fall edition of The Cyber Defense Review (CDR). This tenth edition of the CDR is published in conjunction with the Army CyberInstitute’s (ACI) International Conference on Cyber Conflict U.S.(CyCon U.S.), which takes place November 18-20, at the Crystal Gateway Marriott in Arlington, VA. The CyCon U.S. conference is the premier forum MORE

A Conversation with General (Ret.) David H. Petraeus

November 15, 2019 — Cyber operations are a perfect example of how efforts in one domain can affect virtually every aspect of a nations comprehensive security. The CDR was keenly interested in General David Petraeus’ view of comprehensive security, its whole-of-government implications, and its critical importance to the United States. The interview was conducted via MORE

A Case for Action: Changing the Focus of National Cyber Defense

November 15, 2019 — The United States government has made major strides in the past year in improving our nation’s cyber defense with initiatives such as the creation of the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) and the new DoD Defend Forward policies. However, our nation’s emphasis re­mains focused on improving MORE

Information Warfare and Its 18th and 19th Century Roots

November 15, 2019 —  For Joint Force leaders to visualize and describe how the operational environment shapes the range of military operations, they must have a deep understanding of the capabilities comprising the multi-domain battlefield. The information environ­ment, which Joint Publication (JP) 3-13 defines as the “aggregate of individuals, organizations, and MORE

Data Privacy and Protection: What Businesses Should Do

November 15, 2019 — Data privacy and protection should be priorities for every business, large or small, regardless of sector or geographic location. Data collection is now a critical com­ponent of all business operations, whether it is client data to perform a simple service or enterprise data to ensure operations of critical infrastructure. In to­day’s operating MORE

1 ... 15 16 17 18 19 20 21 22 23 24 ... 38