• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / News / Department of Defense Launches Strategy For Operating in Cyberspace; Reveals Network Defense Pilot

Department of Defense Launches Strategy For Operating in Cyberspace; Reveals Network Defense Pilot

2011-07-15 by Jason

The US Department of Defense announced in a press release today that it has created a DoD Strategy for Operating in Cyberspace (DSOC). You can download the 19-page PDF and view the Strategy for yourself.

The document covers 5 strategic initiatives the DoD hopes to bring to their use and reliance on technology:

  1. Treat cyberspace as an operational domain to organize, train, and equip so that DoD can take full advantage of cyberspace’s potential
  2. Employ new defense operating concepts to protect DoD networks and systems
  3. Partner with other U.S. government departments and agencies and the private sector to enable a whole-of-government cybersecurity strategy
  4. Build robust relationships with U.S. allies and international partners to strengthen collective cybersecurity
  5. Leverage the nation’s ingenuity through an exceptional cyber workforce and rapid technological innovation

The Strategy was announced yesterday and introduced by Deputy Secretary of Defense William J. Lynn, III. You can read the full text of the speech.

Recalling a recent cyber attack in March where 24,000 files were stolen, Lynn announced that the DoD has been working on a pilot program to protect the DoD and defense contractor’s networks.

Toward that end, the Department of Defense, in partnership with DHS, has established a pilot program with a handful of defense companies.  This program provides these companies with more robust protection for their networks.  In this Defense Industrial Base—or DIB—Cyber Pilot, classified threat intelligence is shared with defense contractors or their commercial internet service providers along with the know-how to employ it in network defense.  By furnishing this threat intelligence, we are able to help strengthen these companies’ existing cyber defenses.

In this way, the DIB Cyber Pilot builds off existing capabilities that are widely deployed through the commercial sector.  By leveraging infrastructure that already exists, the pilot suggests we can provide substantial additional protections across our critical infrastructure for only a fractional increase in cost.

In the DIB Cyber Pilot, the U.S. government is not monitoring, intercepting, or storing any private sector communications.  Rather, threat intelligence provided by the government is helping the companies themselves, or the internet service providers working on their behalf, to identify and stop malicious activity within their networks.  The pilot is also voluntary for all participants.

Although we are only beginning to evaluate the effectiveness of the pilot, it has already stopped intrusions for some participating industry partners.  And through the information sharing the pilot promotes, we not only halted intrusions.  We also learned more about the diversity of techniques used to perpetrate them.

The DIB Cyber Pilot breaks new ground in recognizing the interconnectedness of cyber and the important role of stakeholders in thwarting attacks.  We have much to do to protect our critical infrastructure from sophisticated intrusions and attacks.  But by establishing a lawful and effective framework for the government to help operators of critical infrastructure defend their networks, we hope the DIB Cyber Pilot can measurably enhance the security of our nation’s critical infrastructure.

Perhaps the DIB Cyber Pilot was what was used in May when Lockheed Martin revealed that they were able to stop an attack on their network. Will the technology for this pilot program start creating nation-state borders on the Internet? Although they pre-empt any questions of monitoring, intercepting, or storing private sector communications, it can’t help but make you a little paranoid that maybe it’s possible.

For more informationon the DSOC, see these articles from Defense.gov:

  • DOD Releases First Strategy for Operating in Cyberspace
  • Lynn: Cyber Strategy’s Thrust is Defensive

Filed Under: News, Security and Privacy

Trending

  • Mysterious power strip show up at your office? Could be a hacking device
    In Security and Privacy
  • Location, Location, Location in a Digital World
    In Media, Security and Privacy
  • Breaking down the KoobFace malware
    In Infographics

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Command line to take ownership and change permissions Command line to take ownership and change permissions
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • SOLVED: “This modification is not allowed because the selection is locked.” SOLVED: "This modification is not allowed because the selection is locked."
  • Creating and editing views in phpMyAdmin Creating and editing views in phpMyAdmin
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
  • How Digital Technology Brought the Rise of the CMO   How Digital Technology Brought the Rise of the CMO  
  • How to Purchase Cryptocurrencies? How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • The Latest Innovations In Payment Technology
  • How Digital Technology Brought the Rise of the CMO  
  • How to Purchase Cryptocurrencies?

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2023 · Magazine Pro Theme on Genesis Framework · WordPress · Log in