Inside DOD

By Amber Corrin

Blog archive

DOD to announce cyber strategy: What to expect

The Defense Department is gearing up to release an unclassified version of its first overarching strategy for cyberspace operations.

The official announcement of the Defense Strategy for Operating in Cyberspace will come the afternoon of July 14 from outgoing Deputy Secretary William Lynn, who will speak at the campus of the National Defense University in Washington. Lynn is expected to outline the strategy and answer press questions.

However, published reports indicate the public likely won’t be getting a meaty description of DOD operations in cyberspace. In the past, Lynn and other DOD officials have warned of the dangers of cyberattacks, but little has been said publicly about how the department defends against such attacks or how it runs offense against adversaries.

In the past, Lynn has spoken about the nascent cyber strategy. On the circuit at various conferences, he has acknowledged the lack of cohesive governance as a critical issue.

“Until recently, the military’s cyber effort was run by a loose confederation of joint task forces spread too far and too wide, both geographically and institutionally, to be fully effective,” he said in May 2010 at a U.S. Strategic Command Cyber Symposium in Omaha, Neb.

According to Stars and Stripes, at the RSA conference in San Francisco in February, Lynn said the DOD strategy will hinge on active defense systems, planning and coordination with the Homeland Security Department and a strong public-private partnership – comments that echo what Lynn has said at other speaking engagements.

Still, expect the bulk of the juicy details of DOD’s cyber arsenal to be absent from the unclassified release.

“The unclassified version, you will find, follows much of what was in the administration’s [international cyber strategy released in May],” Pentagon spokesman Col. Dave Lapan told reporters at the Pentagon July 11, per Stars and Stripes. “This isn’t about acts of war – this is about an overall cyber strategy, and how we defend ourselves against cyber threats.”

Even if it is a watered-down version that is released to the public, it sets the stage for discussions set to take place in coming days in Washington. The July 15 AFCEA Cybersecurity Summit will have several DOD officials on tap, discussing network security, the U.S. Cyber Command and related issues.

At 1105 Media’s upcoming FOSE conference July 19-21, several different aspects of cybersecurity will be discussed by an array of high-level government officials and industry insiders. 1105 Media is the parent company of Federal Computer Week and Defense Systems, which publish the Inside DOD blog.

Posted by Amber Corrin on Jul 13, 2011 at 12:14 PM


The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • computer network

    How Einstein changes the way government does business

    The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

  • Defense Secretary Jim Mattis. Army photo by Monica King. Jan. 26, 2017.

    Mattis mulls consolidation in IT, cyber

    In a Feb. 17 memo, Defense Secretary Jim Mattis told senior leadership to establish teams to look for duplication across the armed services in business operations, including in IT and cybersecurity.

  • Image from Shutterstock.com

    DHS vague on rules for election aid, say states

    State election officials had more questions than answers after a Department of Homeland Security presentation on the designation of election systems as critical U.S. infrastructure.

  • Org Chart Stock Art - Shutterstock

    How the hiring freeze targets millennials

    The government desperately needs younger talent to replace an aging workforce, and experts say that a freeze on hiring doesn't help.

  • Shutterstock image: healthcare digital interface.

    VA moves ahead with homegrown scheduling IT

    The Department of Veterans Affairs will test an internally developed scheduling module at primary care sites nationwide to see if it's ready to service the entire agency.

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    MGT Act poised for a comeback

    After missing in the last Congress, drafters of a bill to encourage cloud adoption are looking for a new plan.

Reader comments

Thu, Aug 25, 2011 Mike

Very useful article, but I think the problem between the defense systems and the hacker will never end.
Someone to spend time and money to create a super system, but one man can find a vulnerability in the short time... (

Mon, Jul 25, 2011 Jill Baltimore

This article is very interesting because cyber security and control is something we need to get a handle on if we don't want to be susceptible to cyber attacks, which would be truly detrimental to our society. I understand that this is an unclassified article but it seems to lack consistency in informational needs for a reader. I think the the meaty details on this topic are probably a solid strategy. This brief explanation leaves this reader wanting to know more about what to actually expect in the future of our cyber world. The 'wave of the future' has been riding around for years, the possibilities of the internet now seem endless. As the young generation has seemed to master the concepts behind this type communication tool, it is of dire importance that we have a way to protect and defend this freedom of speech and the many other variables that go along with it.

Thu, Jul 14, 2011

Our computers and networks will become slower than now!!

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group