On October 31, 2010, The United States Cyber Command (USCYBERCOM) achieved Full Operational Capability becoming a sub-unified command under the United States Strategic Command. As a newly formed armed forces command, USCYBERCOM was given the mission for centralizing cyberspace operations, organizing existing cyber resources and synchronizing the defense of military networks. In order to achieve this mission, prior Secretary of Defense, Robert M. Gates, directed the USCYBERCOM to focus on developing cyber capability and capacity via the DoD’s Cyber Strategy. The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen the United States cyber defense and cyber deterrence posture while building cyber capabilities
The most recents detections of how cyber warfare is inevitably coming was the accusations of Russia hacking the the Democratic National Committee and former Secretary of State Hillary Clinton’s email’s releasing damaging evidence against them which ultimately lead to Donald Trump being named the President of The United States (Diamond, 2016). The effects of cyber warfare have leaked over in to televise series, forming shows such as CSI cyber, and the gaming world, Call Of Duty Infinite Warfare. Neglect regarding cyber security can: undermine the reputation of both the government and elected officials; force unacceptable expenditures associated with the cost of cleaning up after security breaches; cripple governments' abilities to respond to a wide variety of homeland security emergency situations or recover from natural or man-made threats; and disable elected officials' ability to govern (Lohrmann, 2010). Classified information such as overseas operators and attacks, missile locations, response plans and weaknesses, and much more cripples America’s ability to defend itself from enemies both foreign and domestic. To combat cyber terrorism is the Cybersecurity Information Sharing Act, or CISA. In an article titled “Why Cybersecurity Information Sharing Is A Positive Step for Online Security” it is discussed that under CISA, the Department of Homeland security will have more responsibility for domestic cybersecurity. CISA’s fundamental purpose is to better enable cybersecurity information to be shared between the private and public sectors (2016). The sharing of threat information between public and private sectors can give the the United States a head start by allowing them to share information rapidly and more often to combat enemy threats while still providing safety for privacy and civil
Wars have been occurring since the beginning of time. Wars were once fought with sticks but as humans evolved, so did the weapons involved. Today’s warfare includes anything from hand grenades to remote controlled planes that are thousands of miles away from the operator. The rise of technology has become an issue due to the increasing development of these devices. Technology is used worldwide and as wars continue to develop, so does the possibility that the next war could rise into a cyber war. The Cybersecurity Enhancement Act will ensure the United States takes on these new threats with cybercrime by protecting the country’s critical infrastructures and ensuring the people are ready for the future in the cyberworld.
The threat environment has expanded from a strategic, nuclear, symmetrical threat from bombers, ICBMs, and air-or-sea-launched cruise missiles, to a continuing symmetrical threat in addition to an emergent asymmetric threat, focused across all domains, borders and agencies. Accordingly, our political leaders recognized a need to transform the military for a new ‘home game’. United States Northern Command (USNORTHCOM) was established to assume responsibility for the defence of the US homeland, and this new Command was tasked to provide military assistance to civil authorities (MACA).
The Department of Homeland Security (DHS) is Incharge of shielding our country’s crucial infrastructure from physical and cyber dangers. Of the varied kinds of infrastructure, cyberspace is crucial constituting the information regarding the government and business operations, crisis management and readiness information, and our crucial digital and process control systems. Safeguarding these critical resources and infrastructure is
On 22 January 2013, General Martin Dempsey, Chairman of the Joint Chiefs of Staff released a white paper describing his vision for the Joint Information Environment (JIE) and how it would support operations in the years to come.1 This mandated transition is driving a reassessment of the most appropriate command and control (C2) structure to conduct operations within the domain. Attempts to achieve a standardized fully interoperable environment will only achieve limited success due to the innate variability and changing nature of technology, exacerbated by service unique capabilities and requirements as well as inconsistent funding. Existing C2 models either fail to address the uniqueness of operations in the cyber domain or otherwise fail to
DHS was given the goal to strengthen the cybersecurity of critical infrastructure by increasing the volume and timeliness, as well as improve the quality of, cyber threat information shared between the Federal Government and private sectors. The “sharing of information”
I agree that the Combatant Commander and Joint Forces Commander should become more familiar with the cyber domain and how it could impact all the other domains, but the issue arises on continuity of effort. As you mention, “multiple federal government agencies” have a role or responsibility in the cyber domain and in some cases they overlap, have gaps or are concurrently ongoing without coordination.
The overall business for the U.S. army is simply to fight and win the nations wars by using a full range of operational tactics. One domain which the Army relies upon is cyber. Without the ability to communicate across boarder and into dark areas of the world, the U.S. armed forces, to include the U.S. Army would be hard pressed when devising plans to win. However, to remain the superpower the world looks to during times of strife, organizations such as the Army must define the technological edge, and ensure the organization keeps upholds that standard. To fulfill the requirements associated with defining the edge, decision makers must remain aware of change. Unfortunately change happens, and requires a reevaluation to ensure the organization has not, or will not become stagnant. If events were to occur, the organization would no longer be able to define what it is to be on the edge of technology. Moreover, the organization could also easily find itself in a situation where it is hard pressed to devise the plans required to win.
Clarke and Knake use a mixed method research approach in Cyber War to support their hypothesis that offensive prowess is meaningless without solid defense in cyberspace, and that the United States need immediately fix our defensive cyber shortfalls, or face apocalyptic doom. Specifically, the authors define ‘cyber war’ as “actions by a nation state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption.” This infers that they are really talking about ‘warfare’ and
There have been advanced studies and research conducted to determine what best techniques and practices can be implemented by the Department of Defense to effectively protect against cyberwarfare. 3 key components have been put in place to reach this objective:
Cyberspace – Joint Forces will secure the ‘.mil’ domain, requiring a resilient (DoD) cyberspace architecture that employs a combination of detection, deterrence, denial, and multi-layered defense. We will improve our cyberspace capabilities so they can often achieve significant and proportionate effects with less cost and lower collateral impact (p. 19).
Secretary Johnson, this memo is being addressed to you on the basis that the foreign policy issue that is threats to cyber security is of interest to the Department of Homeland Security. In brief explanation of the issue at hand, it can be concluded that the major foreign policy problem of cyber security threats has created and will continue to create imitate danger to the United States of America. The act of breaching the security sustained around private networks has become renowned as a type of terrorism, one that has rapidly evolved since the beginning of the 21st century and has gained even more strength with the increased use of computers. This threat has the potential to risk the exposure of the nation’s most valuable information including government documents, military plans that are considered top secret, and even the United States power grid. The convenience and the ease of use has made this threat greater as individuals conducting what has become known as cyber attacks can be thousands of miles away from the network they hack into. In order for this threat to be combated efficiently, a brief history based around the issue must be conducted as well as an examination of possible alternatives before concluding with the best proposed solution that will bring this threat under control and ultimately aim to eliminate it.
Therefore, it is important to reform current organizational deficiencies which hinder current cyber-warfare efforts, adopt a new doctrine relevant to the new threat, and make cyber-warfare one of the United States Government’s top national security priorities.
The branches of the military, for a couple generations, have always been the Army, Navy, Air force, Marine Corps, and the Coast Guard; however, in an ever evolving digital world, the notion that outer space would be the next military front is being rapidly replaced by the idea that cyber space will be the next arms race. The United States has been defending attacks on their infrastructure day after day, night after night, when one hacker on one side of the world sleeps, another takes their place to attempt to compromise the US government. The motives may range from a political ‘hacktivist’ trying to prove a point, to an economic spy, trying to gain a competitive edge on its more upstart rivals, to an attempt to control the United States
The damage of a full-fledged cyber attack would be devastating, the destruction would be unparalleled to any other tragedy that has occurred America. Since technology is responsible for providing America with vital entities and resources, an unadulterated cyber attack would nearly fail the American economy; this is what is known as critical systems failure. Weapons of mass destruction and cyber attacks present imminent threats of critical systems failure. Although currently Americas’ critical infrastructures are coordinated by controlled systems, majority of these systems are indeed connected to the American cyberspace. This exposes one of America’s most vulnerable spot amidst cyber security. Another major vulnerable spot within the nations IT security would be the geographical physical location for each of Americas primary infrastructures, as well as their productivity. Due to the proximal locations, the major infrastructures could very well be infiltrated by one efficient CNA.