Department of Defense Strategy for Operating in Cyberspace

1889 Words4 Pages

This paradigm has enabled adversaries of the U.S. to sidestep the military supremacy of the U.S and conduct asymmetric cyber-attacks against the less secured private sector of America. Adopting this approach nullifies the ability of the U.S. to respond militarily as there is no definitive redline that an adversary cannot cross in which military action would be warranted. As a result of this nexus, the private and public networked sectors have become the new front line of twenty-first century warfare (Adams, 2001). As the U.S. entered into the twenty-first century, it became clear that the lack of a U.S. cyber strategy would only exacerbate the persistent threats to the private sector, the nervous system of the U.S. economy, and the threat it presented to the information technologies that have defined contemporary U.S. military supremacy.
As stated previously, modern infrastructure is so interdependent on information technologies that it has become a defining characteristic of contemporary life and arguably the nervous system of both the U.S. economy and military. The rate in which cyberspace has invaded virtually every aspect of daily life has been extraordinary. From 2000 to 2010, global internet usage increased from 360 million to over 2 billion people (QDR, 2010). This rate of expansion has largely outpaced the rate of much needed cybersecurity efforts. This disparity initially created a large gap between the United States’ level of dependency on cyberspace or information technologies and its level of cybersecurity. As a result, foreign nations and non-state actors have worked persistently to exploit this capabilities gap by attempting and sometimes gaining access to both classified and unclassified networks, to include the D...

... middle of paper ...

... New Concern. National Strategy Forum Review, Winter 2000.
International Strategy for Cyberspace: Prosperity, Security and Openness in a Networked World. (2011). Retrieved from http://www.whitehouse.gov/international_strategy_for_cyberspace.pdf.
National Security Strategy. (2010). Retrieved from http://www.whitehouse.gov/national_security_strategy.pdf
Quadrennial Defense Review Report. (2010). Retrieved from http://www.defense.gov/qdr/pdf.
Rathbone, A. E., & Rowley, C.K. (2002). Terrorism. Public Choice, 112, (3-4), 215-224.
Singer, P. W., Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press, New York, New York.
Snow, D. M. (2014). National Security for a New Era (5th ed.). Pearson. Upper Saddle River, New Jersey.
Tucker, J. B. (1999). Asymmetric Warfare. Forum for Applied Research and Public Policy, 14, (2), 32-38.

More about Department of Defense Strategy for Operating in Cyberspace

Open Document