An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

The Cyber Defense Review

Articles

1 2 3 4 5 6 7 8 9 10 ... 38

Cyber: If you want to go fast, go alone, if you want to go far, go together

December 5, 2023 — When I reflect on the changes over the last decade in the cyber domain, there appears to be a common theme: collaboration and interdisciplinary teamwork. Technology continues to evolve rapidly. However, our ability to employ technology and defend cyberspace suc¬cessfully has increasingly required collaboration and teamwork; hence, we cannot do it all alone. Just as in the post-WWII era other manufacturing economies stood up and be¬gan to compete with American dominance, so too has American dominance in the cyber domain begun to erode as other nations with different skills and technology emerge as global leaders. MORE

The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Christian Espinoza

August 22, 2023 — Christian Espinoza’s The Smartest Person in the Room provides a creative approach to understanding and improving company culture. While the book emphasizes improving highly technical employees’ communication and interpersonal skills, it ensures broad applicability through simplistic language and relatable personal anecdotes. The “Secure Methodology” lists in-detail human-centric goals for technical em­ployees who experience challenges communicating with co-workers. Tailoring a technical­ly-oriented methodology to advance social development makes Espinoza’s book a useful, thought-provoking read. MORE

Posturing U.S. Cyber Forces to Defend the Homeland

August 22, 2023 — As revision­ist powers seek to disrupt the international order and cyber threats to critical infra­structure persist, the Department of Defense (DoD) must effectively position its cyber forces and capabilities to defend against cyber-attacks before they hit the homeland. An attack against the US power grid could result in multiple failures in life-sustaining infrastructure and significantly impact Joint Force power-projection capabilities. U.S. Northern Command (USNORTHCOM) must work closely with U.S. Cyber Command (USCYBERCOM) to orchestrate federal and non-federal stakeholders’ cyber authori­ties, capabilities, and equities to posture DoD cyber forces to respond with speed and agility. However, the myriad of federal cyber laws, regulations, authorities, and public and private sector stakeholder equities could impede DoD’s response efforts. National cybersecurity is “a team sport,” but players tend to use different playbooks or play by different rules. Tools such as a DoD “Complex Catastrophe Cyber Stakeholders, Communications, Authorities, and Narratives” (C3 SCAN) framework could enable USNORTHCOM and USCYBERCOM to foster collaboration, validate plans and orders, enumerate and prioritize mission-relevant terrain in cyberspace, and ensure readiness for Defense Support to Cyber Incident Response (DSCIR). MORE

Synthetic Environments for the Cyber Domain: A Survey on Advances, Gaps, and Opportunities

August 22, 2023 — The need to understand cyber vulnerabilities and information in real time is imperative and often mission-critical in battlefield scenarios. As technologies continue to evolve, a need arises for more time-efficient and effective solutions within the cyber domain. With the growing popularity of synthetic environment technologies such as Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR) in a variety of fields, the question emerges: How can applications of this technology be applied to the field of cyber and what impact can they have? In this article, we survey the body of knowledge, both theoretical and empirical, of existing works exploring AR, VR, and MR technologies as solutions to common cyber challenges, as well as discuss the advances, gaps, and opportunities of this technology within the cyber domain. MORE

Expanding the Dyadic Cyber Incident and Campaign Dataset (DCID): Cyber Conflict from 2000 to 2020

August 22, 2023 — This article provides an overview of updates to the Dyadic Cyber Incident and Campaign Dataset (DCID). Whereas most efforts to catalogue cyber incidents focus on curated lists and attack typologies, the DCID uses a standardized set of coding procedures consistent with best practices in social science. As a result, the analysis reveals there is a tendency to exaggerate the use and impact of cyber operations, obscuring their role as an instrument of disruption, espionage, and sabotage, and complements to larger coercive campaigns. The article outlines the construction of version 2.0, which documents rival, state-to-state use of cyber operations as an instrument of power. The expanded dataset introduces additional incidents based on various web-searching methods and human coder cross-validation while also adding new variables for ransomware, supply chain attacks, and connections to ongoing information operations. DCID 2.0 contains 429 incidents representing a critical attempt to scope the domain of conflict among strategic rivals. MORE

Killer bots instead of killer robots: Updates to DoD Directive 3000.09 may create legal implications

August 22, 2023 — Whichever country successfully harnesses AI throughout its military first may obtain both a decisive advantage while also changing the character of war for future generations. Therefore, it is vital for the US to be the first to employ autonomous weapons systems in an operational environment. The Cyber Mission Forces have an urgent and operational need to augment its forces with autonomous and semi-autonomous cyberspace capabilities to meet its ever-expanding mission objectives. Exempting autonomous cyberspace capabilities in Department of Defense Directive (DODD) 3000.09 will (1) provide near-term benefits that avoid the path of a hollow Cyber force but (2) may create legal implications that could undermine the directive. MORE

Recruit, Train, and Retain DoD Cyber Skills Like Language Skills

August 22, 2023 — How many personnel in the Department of Defense (DoD) can create and use com-puter code? Using what coding languages? How well? These are straightforward questions, but the answers are unknown, particularly to the personnel management system. The answers could also be a critical part of solving one of the DoD’s thorniest problems: filling the ranks of the US military’s cyber forces. In an increasingly cyber-dependent and volatile world with fierce recruitment competition from the private sector, the DoD needs to be more creative in recruiting, training, and retaining cyber talent. To date, the primary focus of the DoD has been attracting cyber talent from outside. However, as the DoD is America’s largest employer with 2.91 million employees, it is essential that it also recruits internally to see if already hired personnel can fulfill DoD cyber talent needs. MORE

Using International Law to Deter Russian Hackers

August 22, 2023 — Unchecked, proxy hacking attacks will further undermine the rule of law in cyberspace and increasingly threaten if not cause ir¬reparable harm to the international community. Unabated, proxy hacker attacks will spread disinformation, undermine public confidence in governments and diminish the ability of countries to maneuver freely in cyberspace. The US should prioritize efforts to continue to defend forward and impose costs on proxy hackers and their supporters. Meanwhile, specific application of deterrence and compellence theories against proxy hacker efforts by Russia, combined with an effort to further develop international law and norms will help combat the problem. Over time, the use of proxy hackers may diminish under the pressure of such sustained efforts by the US and its partners. MORE

The Army Cyber Institute: The U.S. Army’s Cyber Think Tank

August 22, 2023 — In his introduction to the Fall 2022 issue of The Cyber Defense Review (CDR), COL Jeff Erickson, the Army Cyber Institute (ACI) director at the time, opened with, “The only constant in life is change,” a phrase credited to the ancient Greek philosopher Heraclitus. COL Erickson went on to relate this idea via a list of impactful changes that had occurred within the Army’s Cyber Community in the decade since the ACI’s founding in 2012. Three years earlier, the Secretary of Defense had directed the establishment of U.S. Cyber Command as a subordinate unified command under U.S. Strategic Command, followed in 2010 by the stand-up of the U.S. Army Cyber Command. COL Erickson recounted that during this period, “the Army was trying to figure out the best approach to address the uncertain environment and growing demand for deeper understanding” in cyberspace. In my estimate, the Army saw risk in the uncertainty and took action to address and mitigate that risk by directing the creation of the ACI at West Point. Internally, the creation of the ACI was carried out by members of the Department of Electrical Engineering and Computer Science (EECS). MORE

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke and Robert K. Knake

April 7, 2023 — Richard A. Clarke and Robert K. Knake’s book The Fifth Domain: Defending our Country, our Companies, and Ourselves in the Age of Cyber Threats (2019) ex-plains “why raising the alarm on cyber threats is warranted, and… lays out a plan for how the worst outcomes can be avoided.” Both Clarke and Knake provide unique perspectives on potential cyber threats as both have served as members of multiple presidential administrations’ Department of Defense and Homeland Security staffs. Richard Clarke “drafted the first national strategy on cybersecurity that any nation ever published.” With a foundational understanding of cyber policy im¬plementation, both Clarke and Knake capitalize on their experience to create a superb¬ly-crafted plan to reinforce corporations' cyber readiness, increase governmental focus and impact on cyber security, develop lasting and successful cyber policies, increase personal cyber security, and share their perspectives on critically important issues like¬ly to surface in the near future. This review highlights Clarke and Knake’s key assertions about establishing lasting cyber peace, and their views on implementing the proposed segmented plan. MORE

1 2 3 4 5 6 7 8 9 10 ... 38