Wars have been occurring since the beginning of time. Wars were once fought with sticks but as humans evolved, so did the weapons involved. Today’s warfare includes anything from hand grenades to remote controlled planes that are thousands of miles away from the operator. The rise of technology has become an issue due to the increasing development of these devices. Technology is used worldwide and as wars continue to develop, so does the possibility that the next war could rise into a cyber war. The Cybersecurity Enhancement Act will ensure the United States takes on these new threats with cybercrime by protecting the country’s critical infrastructures and ensuring the people are ready for the future in the cyberworld.
As DoD laid out the strategic goals of their cyber mission, The President of the United States in February of this year was seeking 14 Billion dollars for cyber security related issues in the fiscal year 2016 budget. As the budget shrinks the cyber budget has steadily increased. The DoD would get 5.5 of the billion to use in their advancement of their cyber goals (Shalal and Selyukh 2015). These figures alone show the impact of the history of cyber operations and the impact they have had on the National Security and the National Intelligence.
1. Cyberspace: One trend of the future security environment that will most influence the operational environment (OE) is the impact of the rapidly changing technology on the use of cyberspace, which will in turn effect the Joint Force going into 2025. (Carrington post, July 28, 2016).
In the previous five years, cybersecurity has turned into the most looked for after calling around the world. More than 90 percent of respondents to an overview directed by the Ponemon Institute (2011) detailed being a casualty to cyberattacks amid the most recent year, costing all things considered more than $2 million for each association. This number keeps on ascending as the two programmers and security devices progress. As indicated by PwC, roughly 33% of all U.S. organizations are as of now utilizing digital protection (Lindros and Tittel, 2016).
The most recents detections of how cyber warfare is inevitably coming was the accusations of Russia hacking the the Democratic National Committee and former Secretary of State Hillary Clinton’s email’s releasing damaging evidence against them which ultimately lead to Donald Trump being named the President of The United States (Diamond, 2016). The effects of cyber warfare have leaked over in to televise series, forming shows such as CSI cyber, and the gaming world, Call Of Duty Infinite Warfare. Neglect regarding cyber security can: undermine the reputation of both the government and elected officials; force unacceptable expenditures associated with the cost of cleaning up after security breaches; cripple governments' abilities to respond to a wide variety of homeland security emergency situations or recover from natural or man-made threats; and disable elected officials' ability to govern (Lohrmann, 2010). Classified information such as overseas operators and attacks, missile locations, response plans and weaknesses, and much more cripples America’s ability to defend itself from enemies both foreign and domestic. To combat cyber terrorism is the Cybersecurity Information Sharing Act, or CISA. In an article titled “Why Cybersecurity Information Sharing Is A Positive Step for Online Security” it is discussed that under CISA, the Department of Homeland security will have more responsibility for domestic cybersecurity. CISA’s fundamental purpose is to better enable cybersecurity information to be shared between the private and public sectors (2016). The sharing of threat information between public and private sectors can give the the United States a head start by allowing them to share information rapidly and more often to combat enemy threats while still providing safety for privacy and civil
The Armed Forces of the United States stand at an inflection point. Fourteen years of sustained combat forged a seasoned force capable of success across the range of military operations from military engagement to joint and multinational major combat operations. Today, this seasoned force is tasked to reset from a decade plus of counterinsurgency operations and evolve capability and capacity to defend the Nation from an increasingly complex security environment. Furthermore, this transformation must be completed in the face of a stark fiscal federal budget.
The Quadrennial Defense Review (QDR) examines “the national defense strategy and priorities”, and “sets a long-term course for the DoD”. The QDR "assesses the threats and challenges that the nation faces, while seeking to re-balance DoD‘s strategies, capabilities, and forces to address today‘s conflicts and tomorrow's threats." The QDR is required by Congress every four years and is produced by the Secretary of Defense (SecDef). The three pillars that the 2014 QDR rests on are: protect the homeland; build security globally; and project power and win decisively. One of the ways that the US armed forces support the QDR is through the application of airpower. Airpower is “the ability to project military power or influence through the
As technology advances across the globe, the potential for new types of threats arise. The DHS realized that since 1997, cyber-based attacks on federal systems have continued to increase at an alarming rate. This threatens our countries national security because cyber-based attacks are ever expanding and have continued to be one-step ahead of the DHS, until 2003.
The Department of Homeland Security (DHS) is Incharge of shielding our country’s crucial infrastructure from physical and cyber dangers. Of the varied kinds of infrastructure, cyberspace is crucial constituting the information regarding the government and business operations, crisis management and readiness information, and our crucial digital and process control systems. Safeguarding these critical resources and infrastructure is
The United States of America is one of the most powerful countries in the world, and there are a full spectrum of threats that come from every single direction. The United States Department of Homeland Security is just one entity of the United States to ensure that the country is protected. In doing so, the Department of Homeland Security has a Cyber Security Division with a Mission to “contribute to enhancing the security and resilience of the nation’s critical information infrastructure and the Internet by (1) developing and delivering new technologies, tools and techniques to enable DHS and the U.S. to defend, mitigate and secure current
On October 31, 2010, The United States Cyber Command (USCYBERCOM) achieved Full Operational Capability becoming a sub-unified command under the United States Strategic Command. As a newly formed armed forces command, USCYBERCOM was given the mission for centralizing cyberspace operations, organizing existing cyber resources and synchronizing the defense of military networks. In order to achieve this mission, prior Secretary of Defense, Robert M. Gates, directed the USCYBERCOM to focus on developing cyber capability and capacity via the DoD’s Cyber Strategy. The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen the United States cyber defense and cyber deterrence posture while building cyber capabilities
A lot of opinions and meanings has been given to the word “Cyberterrorism”. Some of these meanings and definitions varies. In this light, Gordon and Ford (2003) are concerned that when 10 people define cyberterrorism and nine of the given answers are different, and these 10 people represent different government agencies tasked with safeguarding national assets and infrastructure, then it becomes a critical issue.
The branches of the military, for a couple generations, have always been the Army, Navy, Air force, Marine Corps, and the Coast Guard; however, in an ever evolving digital world, the notion that outer space would be the next military front is being rapidly replaced by the idea that cyber space will be the next arms race. The United States has been defending attacks on their infrastructure day after day, night after night, when one hacker on one side of the world sleeps, another takes their place to attempt to compromise the US government. The motives may range from a political ‘hacktivist’ trying to prove a point, to an economic spy, trying to gain a competitive edge on its more upstart rivals, to an attempt to control the United States
The damage of a full-fledged cyber attack would be devastating, the destruction would be unparalleled to any other tragedy that has occurred America. Since technology is responsible for providing America with vital entities and resources, an unadulterated cyber attack would nearly fail the American economy; this is what is known as critical systems failure. Weapons of mass destruction and cyber attacks present imminent threats of critical systems failure. Although currently Americas’ critical infrastructures are coordinated by controlled systems, majority of these systems are indeed connected to the American cyberspace. This exposes one of America’s most vulnerable spot amidst cyber security. Another major vulnerable spot within the nations IT security would be the geographical physical location for each of Americas primary infrastructures, as well as their productivity. Due to the proximal locations, the major infrastructures could very well be infiltrated by one efficient CNA.