MilitarySpot.com

Serving the U.S. Army, Navy, Air Force, Marines, Coast Guard and National Guard

Follow MilitarySpot:
 
  • Home
  • Enlist
    • Join The Army
    • Join The Navy
    • Join The Air Force
    • Join The Marines
    • Join The Coast Guard
    • Join The National Guard
    • ASVAB
    • Army Physical Fitness Test
    • Military Draft
    • Prior Service Army Enlistment
  • Career
    • Join the Military
    • Jobs for Military and Civilians
    • Career Center
    • Prior Service Army Enlistment
    • Criminal Justice
  • Education
    • Online Schools
    • Spouse Education Benefits
    • GI Bill
    • Military Schools
    • Criminal Justice
  • Benefits
    • Army Benefits
    • Navy Benefits
    • Air Force Benefits
    • Marine Corps Benefits
    • National Guard Benefits
    • Coast Guard Benefits
    • Veteran Benefits
    • Basic Pay Rates
    • Allowances
    • Special & Incentive Pay
    • Military Spouse Education Benefits
    • VA Education Benefits
    • GI Bill
  • News
    • Headline News
  • Finance
    • Debt Relief
    • Military Pay Rates
    • Military Personal Loans
    • VA Loans
    • Military Star Card
    • Military MyPay
  • Spouses
    • School Finder
    • Scholarships & Grants
    • PCS, DITY, & Moving
    • Pay Rates
    • MyCAA
    • Education Benefits
  • Community
    • Military Games
    • Military Reunions
    • Classifieds
    • Photo Gallery
    • Buddy Finder
    • MilitarySpot Pinups
    • Military Bases
  • Resources
    • Military Alphabet
    • Military Reunions
    • Military Acronyms
    • Currency Converter
    • Military Tools
    • Ranks
    • Military Time
    • Military Tactics
    • Military Discounts
    • Military Games
    • Military Videos
    • Photo Gallery
    • Infographics
    • How To
  • Travel

DOD Releases First Strategy for Operating in Cyberspace

By Cheryl Pellerin
American Forces Press Service

WASHINGTON, July 14, 2011 — The Defense Department’s first strategy for operating in cyberspace is a milestone in the fight to protect the nation from potentially devastating network attacks, Deputy Defense Secretary William J. Lynn III said today.

Lynn addressed an audience of military and civilian officials, educators and reporters at the National Defense University.

“We do not know the exact way in which cyber will figure in the execution of [DOD’s] mission, or the precise scenarios that will arise,” Lynn said.

“But the centrality of information technology to our military operations and our society virtually guarantees that future adversaries will target our dependence on it,” he added.

“Our assessment is that cyber attacks will be a significant component of any future conflict, whether it involves major nations, rogue states or terrorist groups,” the deputy secretary said.

The existence of tools that disrupt or destroy critical networks, cause physical damage, or alter the performance of key systems marks a strategic shift in the evolving cyber threat, Lynn said.

“As a result of this threat,” he added, “keystrokes originating in one country can impact the other side of the globe in the blink of an eye. In the 21st century, bits and bytes can be as threatening as bullets and bombs.”

An important element of the strategy is to deny or minimize an attack, Lynn said. “If we can minimize the impact of attacks on our operations and attribute them quickly and definitively, we may be able to change the decision calculus of an attacker.”

Other elements, or pillars, of the strategy include:

– Treating cyberspace as an operational domain like land, air, sea and space, operating and defending department networks and training and equipping forces for cyber missions.

– Introducing new operating concepts on department networks, including active cyber defenses, using sensors, software and signatures to stop malicious code before it affects operations.

– Working with the Department of Homeland Security and the private sector to protect critical national infrastructure like the power grid, transportation system and financial sector.

– Building collective cyber defenses with allies and international partners to expand awareness of malicious activity and help defend against attacks.

– Fundamentally shifting the technological landscape of cyber security by significantly enhancing network security.

“Over the past year,” Lynn said, “we have made progress in each of these five pillars.”

In May 2010, U.S. Cyber Command became operational to centralize network operations and defense.

“We have established supporting activities in each of the military services,” Lynn said, “and we are now training our forces to thwart attacks that compromise our operations.”

The United States partnered with Australia, Canada, the United Kingdom and NATO, and under President Barack Obama’s Comprehensive National Cybersecurity Initiative, launched in May, the Defense Department will increase cooperation with other nations in the coming months, he added.

“We have also committed half a billion dollars in [research and development] funds to accelerate research on advanced defensive technologies,” the deputy secretary said.

“Our research agenda includes novel approaches to improving network security and defense,” he said.

“We imagine a time when computers innately and automatically adapt to new threats,” he said. “We hope for a world when we can not only transmit information in encrypted form, but also keep data encrypted as we perform regular computer operations. Having data encrypted 100% of the time would be a revolution in computer security, greatly enhancing our ability to operate in untrusted environments.”

The Defense Department has made “substantial progress,” Lynn said, in working with private industry and the rest of government to make critical infrastructure more secure.

Last October, the Departments of Defense and Homeland Security, which is responsible for protecting critical infrastructure, signed an agreement to coordinate cyber security efforts.

The agencies established a joint planning capability and exchanged cyber personnel in their operations centers, he said.

DOD is helping Homeland Security deploy advanced defensive technologies on government networks, Lynn said.

The critical infrastructure the military depends on extends to private companies that build DOD’s equipment and technology, he added.

“It is a significant concern that over the past decade, terabytes of data have been extracted by foreign intruders from corporate networks of defense companies,” Lynn said. “In a single intrusion this March, 24,000 files were taken.”

The stolen data ranges from specifications for small parts of tanks, airplanes and submarines to aircraft avionics, surveillance technologies, satellite communications systems and network security protocols.

“Current countermeasures have not stopped this outflow of sensitive information,” the deputy secretary said. “We need to do more to guard our digital storehouses of design innovation.”

In response, he said, the Departments of Defense and Homeland Security established a pilot program with a handful of defense companies that gives the companies robust protection for their networks.

“In this Defense Industrial Base — or DIB — Cyber Pilot,” Lynn said, “classified threat intelligence is shared with defense contractors or their commercial Internet service providers, along with the know-how to employ it in network defense.”

Such intelligence helps the companies and their Internet service providers identify and stop malicious activity in their networks, he said.

“Although we are only beginning to evaluate the effectiveness of the pilot,” Lynn said, “it has already stopped intrusions for some participating industry partners.”

Through information sharing promoted by the program, he added, “we not only halted intrusions, we also learned more about the diversity of techniques used to perpetrate them.”

The United States stands at an important juncture in the development of the cyber threat, Lynn said.

“More destructive tools are being developed, but have not yet been widely used,” he added.

The Defense Department needs to develop stronger defenses, the deputy secretary said, before those who mean harm to the United States gain the ability to launch more damaging cyber attacks.

“We have a window of opportunity,” he added, ” … in which to protect our networks against more perilous threats.”

Comments

Filed Under: Benefits, News, Resources

  • News
  • Enlist
  • Education
  • Career
  • Finance

Guard Conducts Soldier Borne Sensor Drone Training

DECEMBER 18, 2025 – Infantry cadre assigned to the Pennsylvania National Guard’s 1st Battalion, 166th Regiment – Regional Training Institute, or RTI, conducted Soldier Borne Sensor, or SBS, training Dec. 9–11, as part of ongoing efforts to modernize small-unit reconnaissance and prepare instructors for future unmanned aircraft system integration. The training familiarized the cadre with […]

Air National Guard Unveils New Bonus Program

MARCH 11, 2023 – On March 1st, the Air National Guard (ANG) launched a new bonus program to attract and retain personnel in critical specialties. The initiative offers significant financial rewards, with bonuses of up to $90,000 for eligible members, depending on their Air Force Specialty Codes (AFSCs). This strategic move aims to strengthen the […]

Military Students’ Tips to Balance Service and Studies

OCTOBER 10, 2025 – Studying in college while serving in the military can be highly rewarding but also extremely demanding in some respects. Military members, veterans, and their families typically balance demanding duty schedules, deployments, family responsibilities, and school schedules. It requires careful planning, flexibility, and being willing to seek and take advantage of available […]

Former Soldier Navigates Job Hunt

NOVEMBER 19, 2024 — In early 2017, Michael Quinn endured what he called the worst day in the worst year of his life. Quinn, then a sergeant major and 24-year Army Soldier, had weathered deployments in Iraq, Afghanistan and the Philippines. As an Army counter-intelligence agent, he said he learned to operate under grave circumstances […]

How Military Families Can Avoid Financial Panic During a Shutdown

OCTOBER 23, 2025 – Government shutdowns create unique challenges for military families who live on tight budgets, frequently relocate, and manage the constant demands of military service. While the uncertainty can feel overwhelming, following these five strategies can help you navigate the crisis with confidence. Keep Perspective.  This financial disruption will end, just as the […]

Recent Posts

  • Guard Conducts Soldier Borne Sensor Drone Training
  • Coast Guard Rescues 2 From Disabled Sailboat
  • NASA Hosts Reverse Industry Day
  • Guests Attend Pentagon Christmas Worship Service
  • Service Members Need to Know About Microplastics
MAINMENU




SITESEARCH
Can't find something? Try using our site search to dig through our entire site.



Still having trouble? Try the Advanced Search to refine your searches.
NEWSLETTERSUBSCRIBE
Sign Up To Receive Information, Updates and Special Officers from MilitarySpot.com.



Don't miss an issue! Jump in the Newsletter Archives to catch up on previous issues.
FOLLOWMILITARY SPOT

Follow us on Facebook, Twitter & StumbleUpon and more. Keep up with MilitarySpot.com news & updates. We also have an RSS Feed.

Advertise | About | Contact | Feedback | Unsubscribe | DMCA | Privacy Policy | Terms of Use
 
Copyright 2004-2025 Sun Key Publishing. All Rights Reserved.



 
This is not the official recruiting website of the U.S. Military. The site you are on is run by Sun Key Publishing, a private company, and is not endorsed by or affiliated with the U.S. Military.