This is a preview of how your content will look on export. To export the complete content in DOC format, click the blue export button in the upper right corner of this page.
Department of Defense
The DoD encompasses much of the U.S. government’s technical expertise to both respond to cyber-incidents, as well as conduct and defend against cyberattacks; it includes both the NSA and CYBERCOM.
  • 1 Department of Defense, Strategy for Operating in Cyberspace, July 2011

    This is an overview of the DOD’s five strategic initiatives regarding cyberspace: to treat cyberspace as an operational domain; to employ new defense operating concepts; to partner to enable a whole-of-government cybersecurity strategy; to build robust relationships allies and international partners; and to leverage ingenuity through an exceptional cyber workforce.

  • 2 Department of Defense Cyberspace Policy Report, November 2011

    This document identifies five distinct, but interrelated strategic initiatives to support DoD’s cyberspace operations and its national security mission: Treating cyberspace as an operational domain; employing new defense operating concepts to protect DoD networks and systems; partnering closely with other U.S. Government departments and agencies and the private sector; building robust relationships with U.S. Allies and international partners to enable information sharing; leveraging the Nation’s ingenuity by recruiting and retaining an exceptional cyber workforce and enabling rapid technological innovation.

  • 3 The Secretary of Defense, Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations, 23 June 2009

    This document from the Secretary of Defense directed the Commander of U.S. Strategic Command to establish the subordinate unified command, U.S. Cyber Command.

  • 4 Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the House Committee on Armed Services, 23 September 2010

    This testimony describes what is happening at US Cyber Command by providing an overview of the current status of the command and by describing the plan for moving forward in accomplishing the assigned mission.

  • 5 William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors, Committee on Offensive Information Warfare, National Research Council; Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities; Pages 161-187, 2009

    This document discusses cyberattacks in the context of U.S. military doctrine, the DoD’s organization, rules of engagement, operational planning, human capital, and weapons systems acquisition. It also provides both historical perspective (1999 and on) and hypothetical examples to support its arguments.

You've reached the bottom of your content preview.
To view the rest in your browser, click here.
To export the complete content in DOC format, click the blue export button in the upper right corner of this page.

(Note: If you view the entire playlist, any changes you've made to export settings will be lost. Large playlists may temporarily freeze your browser while loading, as well.)