MilitarySpot.com

Serving the U.S. Army, Navy, Air Force, Marines, Coast Guard and National Guard

Online Schools
| Find Jobs
Follow MilitarySpot:
 
  • Home
  • Enlist
    • Join The Army
    • Join The Navy
    • Join The Air Force
    • Join The Marines
    • Join The Coast Guard
    • Join The National Guard
    • ASVAB
    • Army Physical Fitness Test
    • Military Draft
    • Prior Service Army Enlistment
  • Career
    • Join the Military
    • Jobs for Military and Civilians
    • Career Center
    • Prior Service Army Enlistment
    • Criminal Justice
  • Education
    • Online Schools
    • Spouse Education Benefits
    • GI Bill
    • Military Schools
    • Criminal Justice
  • Benefits
    • Army Benefits
    • Navy Benefits
    • Air Force Benefits
    • Marine Corps Benefits
    • National Guard Benefits
    • Coast Guard Benefits
    • Veteran Benefits
    • Basic Pay Rates
    • Allowances
    • Special & Incentive Pay
    • Military Spouse Education Benefits
    • VA Education Benefits
    • GI Bill
  • News
    • Headline News
  • Finance
    • Debt Relief
    • Military Pay Rates
    • Military Personal Loans
    • VA Loans
    • Military Star Card
    • Military MyPay
  • Spouses
    • School Finder
    • Scholarships & Grants
    • PCS, DITY, & Moving
    • Pay Rates
    • MyCAA
    • Education Benefits
  • Community
    • Military Games
    • Military Reunions
    • Classifieds
    • Photo Gallery
    • Buddy Finder
    • MilitarySpot Pinups
    • Military Bases
  • Resources
    • Military Alphabet
    • Military Reunions
    • Military Acronyms
    • Currency Converter
    • Military Tools
    • Ranks
    • Military Time
    • Military Tactics
    • Military Discounts
    • Military Games
    • Military Videos
    • Photo Gallery
    • Infographics
    • How To
  • Travel

DOD Releases First Strategy for Operating in Cyberspace

By Cheryl Pellerin
American Forces Press Service

WASHINGTON, July 14, 2011 — The Defense Department’s first strategy for operating in cyberspace is a milestone in the fight to protect the nation from potentially devastating network attacks, Deputy Defense Secretary William J. Lynn III said today.

Lynn addressed an audience of military and civilian officials, educators and reporters at the National Defense University.

“We do not know the exact way in which cyber will figure in the execution of [DOD’s] mission, or the precise scenarios that will arise,” Lynn said.

“But the centrality of information technology to our military operations and our society virtually guarantees that future adversaries will target our dependence on it,” he added.

“Our assessment is that cyber attacks will be a significant component of any future conflict, whether it involves major nations, rogue states or terrorist groups,” the deputy secretary said.

The existence of tools that disrupt or destroy critical networks, cause physical damage, or alter the performance of key systems marks a strategic shift in the evolving cyber threat, Lynn said.

“As a result of this threat,” he added, “keystrokes originating in one country can impact the other side of the globe in the blink of an eye. In the 21st century, bits and bytes can be as threatening as bullets and bombs.”

An important element of the strategy is to deny or minimize an attack, Lynn said. “If we can minimize the impact of attacks on our operations and attribute them quickly and definitively, we may be able to change the decision calculus of an attacker.”

Other elements, or pillars, of the strategy include:

– Treating cyberspace as an operational domain like land, air, sea and space, operating and defending department networks and training and equipping forces for cyber missions.

– Introducing new operating concepts on department networks, including active cyber defenses, using sensors, software and signatures to stop malicious code before it affects operations.

– Working with the Department of Homeland Security and the private sector to protect critical national infrastructure like the power grid, transportation system and financial sector.

– Building collective cyber defenses with allies and international partners to expand awareness of malicious activity and help defend against attacks.

Ready to Join the Army? Contact a Recruiter Now!

– Fundamentally shifting the technological landscape of cyber security by significantly enhancing network security.

“Over the past year,” Lynn said, “we have made progress in each of these five pillars.”

In May 2010, U.S. Cyber Command became operational to centralize network operations and defense.

“We have established supporting activities in each of the military services,” Lynn said, “and we are now training our forces to thwart attacks that compromise our operations.”

The United States partnered with Australia, Canada, the United Kingdom and NATO, and under President Barack Obama’s Comprehensive National Cybersecurity Initiative, launched in May, the Defense Department will increase cooperation with other nations in the coming months, he added.

“We have also committed half a billion dollars in [research and development] funds to accelerate research on advanced defensive technologies,” the deputy secretary said.

“Our research agenda includes novel approaches to improving network security and defense,” he said.

“We imagine a time when computers innately and automatically adapt to new threats,” he said. “We hope for a world when we can not only transmit information in encrypted form, but also keep data encrypted as we perform regular computer operations. Having data encrypted 100% of the time would be a revolution in computer security, greatly enhancing our ability to operate in untrusted environments.”

The Defense Department has made “substantial progress,” Lynn said, in working with private industry and the rest of government to make critical infrastructure more secure.

Last October, the Departments of Defense and Homeland Security, which is responsible for protecting critical infrastructure, signed an agreement to coordinate cyber security efforts.

The agencies established a joint planning capability and exchanged cyber personnel in their operations centers, he said.

DOD is helping Homeland Security deploy advanced defensive technologies on government networks, Lynn said.

The critical infrastructure the military depends on extends to private companies that build DOD’s equipment and technology, he added.

“It is a significant concern that over the past decade, terabytes of data have been extracted by foreign intruders from corporate networks of defense companies,” Lynn said. “In a single intrusion this March, 24,000 files were taken.”

The stolen data ranges from specifications for small parts of tanks, airplanes and submarines to aircraft avionics, surveillance technologies, satellite communications systems and network security protocols.

“Current countermeasures have not stopped this outflow of sensitive information,” the deputy secretary said. “We need to do more to guard our digital storehouses of design innovation.”

In response, he said, the Departments of Defense and Homeland Security established a pilot program with a handful of defense companies that gives the companies robust protection for their networks.

“In this Defense Industrial Base — or DIB — Cyber Pilot,” Lynn said, “classified threat intelligence is shared with defense contractors or their commercial Internet service providers, along with the know-how to employ it in network defense.”

Such intelligence helps the companies and their Internet service providers identify and stop malicious activity in their networks, he said.

“Although we are only beginning to evaluate the effectiveness of the pilot,” Lynn said, “it has already stopped intrusions for some participating industry partners.”

Through information sharing promoted by the program, he added, “we not only halted intrusions, we also learned more about the diversity of techniques used to perpetrate them.”

The United States stands at an important juncture in the development of the cyber threat, Lynn said.

“More destructive tools are being developed, but have not yet been widely used,” he added.

The Defense Department needs to develop stronger defenses, the deputy secretary said, before those who mean harm to the United States gain the ability to launch more damaging cyber attacks.

“We have a window of opportunity,” he added, ” … in which to protect our networks against more perilous threats.”

Related Posts:

  • Release of U.S. Coast Guard Cyber Strategy
    Release of U.S. Coast Guard Cyber Strategy
  • Additional Budget Cuts Could Devastate Military
    Additional Budget Cuts Could Devastate Military
  • FCC/C10F Releases Strategic Plan
    FCC/C10F Releases Strategic Plan
  • Changes Aim to Strengthen Military Health System
    Changes Aim to Strengthen Military Health System
  • DoD Initiates Process to Elevate U.S. Cyber Command to Unified Combatant Command
    DoD Initiates Process to Elevate U.S. Cyber Command…
  • New Law Identifies No Additional Defense Cuts
    New Law Identifies No Additional Defense Cuts

Comments

Filed Under: Benefits, News, Resources

  • News
  • Enlist
  • Education
  • Career
  • Finance

Newest Handheld Radios Tested By Airborne Forces

FEBRUARY 24, 2021 – Airborne Soldiers with 1st Battalion, 504th Parachute Infantry Regiment (PIR), 82nd Airborne Division, completed almost two weeks testing the Army’s newest small leader radio (LR) packages. “Soldiers of the 82nd Airborne Division demonstrated tactical communications at its finest during the initial operational test,” said Maj. Brian Ramirez, Leader Radio (LR) Test […]

Answers to Top Questions About ACFT Equipment Fielding

OCTOBER 14, 2019 – As Army Soldiers start preparing for the new Army Combat Fitness Test, behind the scenes Army logisticians are also preparing to distribute more than 36,000 equipment sets to conduct the new test. At a recent Facebook Live event, watched by more than 150,000 viewers, Sergeant Major of the Army Michael Grinston […]

Leadership Mentoring Symposium Develops the Force

FEBRUARY 8, 2021 – Mentors and mentees virtually attending the two-day Air Education and Training Command Leadership Mentoring Symposium Jan. 26-27 were given tools needed to inspire and advance the force through mentoring. “Everyone needs mentors, and my advice is to find mentors within and outside of your career field, as well as mentors who […]

Air Force Allows Longer Braids, Ponytails, Bangs for Women

JANUARY 22, 2021 – As an outcome of the 101st Air Force uniform board, Air Force women will be able to wear their hair in up to two braids or a single ponytail with bulk not exceeding the width of the head and length not extending below a horizontal line running between the top of […]

Navy Modernizes Tuition Assistance Debt Payments

JANUARY 4, 2021 – The Navy has modernized the way Sailors, Marines, and Coast Guardsmen can pay back tuition assistance (TA) debts beginning in January 2021. The new program provides service members with the option to pay their debt on a mobile device or computer using a debit card, electronic funds transfer (EFT) or via […]

Recent Posts

  • Newest Handheld Radios Tested By Airborne Forces
  • Cyber Workforce Vital to Protecting National Security
  • Rifle Qualification To Make Marines More Lethal
  • DoD ‘Problem Solvers’ Asked to ‘Imagine Tomorrow’
  • AAFES Offering 10% Off Tax Preparation at H&R Block
MAINMENU




SITESEARCH
Can't find something? Try using our site search to dig through our entire site.



Still having trouble? Try the Advanced Search to refine your searches.
NEWSLETTERSUBSCRIBE
Sign Up To Receive Information, Updates and Special Officers from MilitarySpot.com.



Don't miss an issue! Jump in the Newsletter Archives to catch up on previous issues.
FOLLOWMILITARY SPOT

Follow us on Facebook, Twitter & StumbleUpon and more. Keep up with MilitarySpot.com news & updates. We also have an RSS Feed.

Advertise | About | Contact | Feedback | Unsubscribe | DMCA | Privacy Policy | Terms of Use
 
Copyright 2004-2021 Sun Key Publishing. All Rights Reserved.



 
This is not the official recruiting website of the U.S. Military. The site you are on is run by Sun Key Publishing, a private company, and is not endorsed by or affiliated with the U.S. Military.