Digital Conflict

By Kevin Coleman

Blog archive

How do you react quickly to cyber aggression?

We have entered a period of turbulence and unrest with serious events unfolding in multiple countries. We just witnessed the United Nations, NATO, the European Union and the United States, which have all worked together many times, called on once again to coordinate military activities in an effort to establish a no-fly zone. They even received support from the chief of the Arab League. The following is a high-level timeline of the critical events that unfolded on the world stage.

Feb. 21: The suggestion that President Barack Obama establish a no-fly zone began.
Feb. 25: President Obama imposed an array of sanctions against Libya.
Feb. 28: British Prime Minister David Cameron asked the military to look into what it would take to establish a no-fly zone over Libya.
March 17: The U.N. Security Council passes resolution 1973, authorizing the use of “all necessary means” to protect Libyan civilians.
March 19: The French military launched warplanes to carry out the first air strikes necessary to establish the no-fly zone.

Some praised these efforts for the speed with which this mission was accomplished with one report stating the action occurred with “remarkable speed.” If you look at conventional conflict that might indeed be accurate. What about decision making during a cyber conflict? Cyberattacks could use a computer virus, and we all know this cyber weapon spreads at a dizzying rate. Decision making at a rate appropriate for kinetic warfare, without a doubt, would prove much too slow in the event of a cyberattack. The command and control organizational structure coupled with the decision making process must be streamlined for an adequate real-time cyber response.

Posted by Kevin Coleman on Mar 31, 2011 at 12:12 PM

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Shutterstock image: looking for code.

    How DOD embraced bug bounties -- and how your agency can, too

    Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.

  • Shutterstock image: cyber defense.

    Why PPD-41 is evolutionary, not revolutionary

    Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.

  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group