For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept

For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept

    • $9.99
    • $9.99

Publisher Description

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This work examines the current cyber space threat against the US, the current gaps in combating it, and how a US cyber militia might fill those gaps. Militias have historically been used by the US as an emergency measure to protect national security and to defend the homeland in lieu of a regular standing force. Currently, there are cyber militias being utilized worldwide to do just that, but along virtual borders vice land, sea, air and space. Countries such as Estonia and India have combated State and Non-State actors successfully with all-volunteer cyber militias performing an array of tasks in the common defense of their cyber domain. The research compares the organizational structure, mission, formative strategic context, and notable actions of six volunteer cyber organizations through a qualitative case study analysis. Coupled with an extensive literature review, this study examines possible implications of a US cyber militia on US cyberspace security. The focus of the conclusions and recommendations are on the short and long term impacts a cyber militia could have on US defense operations.

Since their inception, the executive and legislative branches of the United States (US) have worked in concert to fend off various threats for the common defense of the country. The US is now facing perhaps one of the most complicated, persistent and technical threats in its history via the man-made domain known as Cyberspace. This threat is complex because it is constantly evolving, lacks attribution, is easily accessible, relatively cheap, and it is growing exponentially. As this threat develops, the resources required to defend against it have and will continue to grow unless the government can create more innovative defenses. Specifically, the amount of time, money, and personnel required to combat the escalating threats in cyberspace have increased exponentially in order for the US to keep its long held advantages in the other warfare domains. This dramatic investment by the US has seemingly kept pace with the threat, and currently shows no signs of slowing down.

Assured access to the world's shared spaces has been a pillar of US national security strategy since 1782 through its "free ship, free space" policy concerning navigation of the seas. The US has followed a similar policy in terms of assured access to cyberspace but there are unique and numerous issues that policymakers must understand to achieve this end state. These issues include competing funding priorities, a shortage in cyber security personnel, and a legislative system designed for rigor and not necessarily speed. However, the greatest issue is the nature of the threat itself. It is complex, uncertain, growing and affects anyone using a network. Public and private entities share varying degrees of vulnerabilities and the DoD is no different. There is an ever-increasing demand for weapon systems reliant upon cyber connectivity, a growing number of provocateurs with access to powerful viruses, and the fact remains that despite the increase in the complexity of defensive measures, there has not been a corresponding decrease in cyber-attacks. Additionally, current efforts to deter or coerce belligerents from performing cyber-attacks through political or economic sanctions will continue to remain ineffective until the anonymity provided by mostly open systems architecture is solved.

GENRE
Computers & Internet
RELEASED
2017
April 2
LANGUAGE
EN
English
LENGTH
152
Pages
PUBLISHER
Progressive Management
SELLER
Draft2Digital, LLC
SIZE
1.4
MB

More Books Like This

Wired Fast and Thinking Slow: Cyber Technology and the U.S. Army - Increase in Speed and Quantity of Social Transactions, Inadequate Coverage of Implications of Cyberspace Through Military Doctrine Wired Fast and Thinking Slow: Cyber Technology and the U.S. Army - Increase in Speed and Quantity of Social Transactions, Inadequate Coverage of Implications of Cyberspace Through Military Doctrine
2018
Cyber Conflict Cyber Conflict
2013
Total Army Cyber Mission Force (CMF): Reserve Component Integration - Buckshot Yankee Cyberspace Military Exercise, Mission Areas and Initiatives for Training, Development and Integration of RC Forces Total Army Cyber Mission Force (CMF): Reserve Component Integration - Buckshot Yankee Cyberspace Military Exercise, Mission Areas and Initiatives for Training, Development and Integration of RC Forces
2019
Army Cyber Mission Force: Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices Army Cyber Mission Force: Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices
2017
Cyberwar and Information Warfare Cyberwar and Information Warfare
2012
Information Warfare Information Warfare
2012

More Books by Progressive Management

21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series) 21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series)
2011
Apollo and America's Moon Landing Program: History of the Development Program of the Saturn Rocket and the Saturn V from 1957 to 1968 by the Marshall Space Flight Center Apollo and America's Moon Landing Program: History of the Development Program of the Saturn Rocket and the Saturn V from 1957 to 1968 by the Marshall Space Flight Center
2012
The Effects of Nuclear Weapons: Glasstone and Dolan Authoritative Military Reference on Atomic Explosions, Blast Damage, Radiation, Fallout, EMP, Biological, Radio and Radar Effects The Effects of Nuclear Weapons: Glasstone and Dolan Authoritative Military Reference on Atomic Explosions, Blast Damage, Radiation, Fallout, EMP, Biological, Radio and Radar Effects
2011
The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108) The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108)
2012
War in the Balkans, 1991-2002: Comprehensive History of Wars Provoked by Yugoslav Collapse: Balkan Region in World Politics, Slovenia and Croatia, Bosnia-Herzegovina, Kosovo, Greece, Turkey, Cyprus War in the Balkans, 1991-2002: Comprehensive History of Wars Provoked by Yugoslav Collapse: Balkan Region in World Politics, Slovenia and Croatia, Bosnia-Herzegovina, Kosovo, Greece, Turkey, Cyprus
2014
Saturn V Flight Manual: Astronaut's Guide to the Apollo Moon Rocket Saturn V Flight Manual: Astronaut's Guide to the Apollo Moon Rocket
2011