USA Patriotism! ... "Showcasing Pride of America"
USA theme polo shirts, t-shirts, shorts, hats, caps, swimwear, sweatshirts, hoodies, hats, jackets, under garments, and other apparel items

Home - Articles - USA's Birth - Great Patriots - Heroes - Honor Halls - Music - Photos
Poems - Quotes - Reference - Speeches - Stars for Troops - Stories - Student Patriots
Videos - New Content
-
About - Contact - Submit - Partners - Press - CureNow - Donate

USA Store! ... American / Patriotic themed gift products at USA Patriotism!

USA Patriotism! YouTube Channel

Join / Like the USA Patriotism! Facebook page

USA Patriotism! On Twitter

Pinterest

USA Patriotism! at Tumblr

Patriotic Article
Military

Collectibles, apparel, and other gifts ... for Marines, Soldiers, Airmen, Sailors, and veterans!Checks with USA, military, and other patriotic designsFree Gifts from The Bradford Exchange Online

Cyber Strategy Defines Discerning Cyber Incidents From Armed Attacks
by Cheryl Pellerin, DOD News - July 28, 2016

Patriotic Face Coverings
Satute of Liberty / Flag Mugs and Steins

USA, military, and other patriotic themed pullover and button down Polo shirts

Personalized Patriotic Embroidered Shirts

Tough Tex American Flags

"Mere Chance" by David G. Bancroft

Cemetery Woods by David G. Bancroft

When assessing whether a cyber incident constitutes an armed attack on the nation, Defense Department leaders take the incidents case by case and consider a range of factors, the deputy assistant secretary of defense for cyber policy told a House panel on July 13, 2016.

Aaron Hughes testified during a hearing titled, “Digital Acts of War” before the subcommittees on information technology and national security of the House Committee on Oversight and Reform.

June 21, 2016 -Uniformed and civilian cyber and military intelligence specialists monitor Army networks in the Cyber Mission Unit’s Cyber Operations Center at Fort Gordon, Ga. (Courtesy photo by Michael L. Lewis)
June 21, 2016 -Uniformed and civilian cyber and military intelligence specialists monitor Army networks in the Cyber Mission Unit's Cyber Operations Center at Fort Gordon, Ga. (Courtesy photo by Michael L. Lewis)

Other witnesses included Chris Painter, coordinator for cyber issues at the State Department.

Case by Case

“When determining whether a cyber incident constitutes an armed attack, the U.S. government considers a broad range of factors, including the nature and extent of injury or death to persons and the destruction of or damage to property,” Hughes said.

“Cyber incidents are reviewed on a case-by-case basis,” he added, “... and the national security leadership and the president will make a determination if it's an armed attack.”

If a cyber incident were found to be equivalent to an armed attack, Hughes said the nation would use a whole-of-government approach to responding and deterring future malicious activities in cyberspace.

“The United States has been clear,” Painter said, “that it believes that cyber activities may in certain circumstances constitute an armed attack that triggers our inherent right to self-defense as recognized by Article 51 of the U.N. Charter.”

But even if the cyber incident is below that threshold, he added, “we still have a number of ways to respond. It could be kinetic. It could be through cyber means. It could be through economic means and sanctions. It could be through diplomacy. It could be through indictments and law enforcement actions.”

Defense, Offense, Deterrence

Since the updated DoD Cyber Strategy was signed in April 2015, Hughes said, “the department has devoted considerable resources to implementing its goals and objectives.”

When Defense Secretary Ash Carter signed the strategy, Hughes added, he directed the department to focus on three primary missions in cyberspace -- defending DoD networks, defending the nation against consequential cyberattacks and providing integrated cyber capabilities to support military operations and contingency plans.

DoD also supports a whole-of-government cyber deterrence strategy, he said, and deterrence is a key part of the cyber strategy.

The strategy describes DoD contributions to a broader national set of capabilities to deter adversaries from conducting cyberattacks.

The document also says the department assumes that cyberattacks on U.S. interests will be achieved through “the totality of U.S. actions, including declaratory policy, substantial indications and warning capabilities, defensive posture, effective response procedures, and the overall resiliency of U.S. networks and systems.”

States have not sought to define precisely or state conclusively what situations would constitute armed attacks in other domains,” Painter said, “and there is no reason cyberspace should be different.”

“In fact, he added, “strategic ambiguity could very well deter most states from getting close to the threshold of an armed attack.”

Working with Partners

The United States and the department face diverse and persistent threats in cyberspace from state and non-state actors that can't be defeated through the efforts of any single organization, Hughes told the panel.

The DoD Cyber Strategy directs that the department work with its interagency partners, the private sector and allied and partner nations to deter and if necessary defeat cyberattacks of significant consequence on the U.S. homeland and U.S. interests.

Painter said that, unlike in previous years, today there is a very strong interagency process in place to share cyber information.

“All of the different interagency colleagues do talk about these threats, talk about possible responses, and in the end it's up to the national security staff and the president,” he said.

An increasingly wired and interconnected world has brought prosperity and economic gain to the United States while the nation's dependence on these systems has left it vulnerable to evolving threats posed by malicious cyber activity, Hughes said.

DoD maintains and uses robust and unique cyber capabilities to defend its networks and the nation, but that isn't enough, he added.

“Securing our systems and networks is everyone's responsibility and requires close collaboration with other federal departments, our allies and partners internationally and the private sector to improve our nation's cybersecurity posture, and to ensure that DoD has the ability to operate in any environment at any time,” Hughes said.

By Cheryl Pellerin
DOD News
Copyright 2016

Comment on this article

USA Gifts Store! ... over 1,000 American / Patriotic themed products at USA Patriotism!USA / Americana theme ... polo shirts, t-shirts, shorts, hats, caps, swimwear, sweatshirts, hoodies, hats, jackets, under garments, and other apparel itemsAmerican Pride: Poems Honoring America and Her Patriots! by David G. Bancroft
Special Offers - FREE Gifts with Purchase
Home - Articles - USA's Birth - Great Patriots - Heroes - Honor Halls - Music - Photos
Poems - Quotes - Reference - Speeches - Stars for Troops - Stories - Student Patriots
Videos - New Content - About - Contact - Submit - Partners - Press - CureNow - Donate
USA Store! ... American / Patriotic themed gift products at USA Patriotism!

Google Custom USA Patriotism! Search

 

Zoom Custom USA Patriotism! Search

Flag Shirt ... A USA Patriotism! sponsor
Copyright © 2002-2020 | Privacy