Monday, July 14, 2025
  • About us
    • Write for us
    • Disclaimer
    • Terms of use
    • Privacy Policy
  • RSS Feeds
  • Advertise with us
  • Contact us
DefenceTalk
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
DefenceTalk
No Result
View All Result
Home Defence & Military News Technology News

Carter Unveils New DOD Cyber Strategy In Silicon Valley

by US Department of Defense
April 27, 2015
in Technology News
5 min read
0
Are Taxpayers Paying for Independent Cost Analysis to Be Ignored?
14
VIEWS

Defense Secretary Ash Carter today unveiled the Defense Department’s second cyber strategy to guide the development of DoD’s cyber forces and to strengthen its cyber defenses and its posture on cyber deterrence.

Carter discussed the new strategy — an update to the original strategy released in 2011 — before an audience at Stanford University on the first day of a two-day trip to Silicon Valley in California.

At Stanford, he delivered the annual Drell Lecture, and afterward he was scheduled to visit the Facebook campus in Menlo Park. Tomorrow, the secretary will meet with executives at the $4 billon venture-capital firm Andreessen Horowitz.

A Complex Challenge
“While we in DoD are an attractive target, the cyber threat is one we all face as institutions and as individuals,” Carter said at Stanford.

In response to one of the world’s most complex challenges, the Defense Department has three missions in the cyber domain, he added.

The first is to defend DoD networks, systems and information. The second is to defend the U.S. homeland and U.S. national interests against cyberattacks of significant consequence, and

The third is to provide integrated cyber capabilities to support military operations and contingency plans.

“In some ways, what we’re doing about this threat is similar to what we do about more conventional threats,” Carter said.

Deterrence is Key
“We like to deter malicious action before it happens and we like to be able to defend against incoming attacks as well as pinpoint where an attack came from,” the secretary said. Stronger partnerships throughout the government and stronger private-sector security researchers such as FireEye, Crowdstrike, HP and others have improved the department’s ability to respond, he added.

Deterrence is a key part of the new cyber strategy, which describes the department’s contributions to a broader national set of capabilities to deter adversaries from conducting cyberattacks, according to a fact sheet about the strategy.

The department assumes that the totality of U.S. actions — including declaratory policy, substantial indications and warning capabilities, defensive posture, response procedures and resilient U.S. networks and systems –- will deter cyberattacks on U.S. interests, the fact sheet added.

Action, Defensive or Otherwise
“Still,” Carter said, “adversaries should know that our preference for deterrence and our defensive posture don’t diminish our willingness to use cyber options if necessary.”

When the nation does take action, defensive or otherwise, conventionally or in cyberspace, he added, it operates under rules of engagement that comply with international and domestic law.

The approach reflects two goals, the secretary said: “keeping the Internet open, secure and prosperous, and assuring that the nation continues to respect and protect the freedoms of expression, association and privacy that reflect who we are as a nation.”

Dozens of militaries are developing cyber forces, Carter said, and because stability depends on avoiding miscalculation that could lead to escalation, militaries must talk to each other and understand each other’s abilities.

Shedding Light on Cyber
DoD must do its part, the secretary said, to shed more light on cyber capabilities that historically have been developed in the shadows.

Carter shared with the audience an incident that was recently declassified to help illustrate the cyber threat facing the department and how it responds.

The incident “has never been publicly reported,” he said, “and it shows how rapidly DoD can detect, attribute and expel an intruder” from its military networks.

Earlier this year, he said, the sensors that guard DoD’s unclassified networks detected Russian hackers accessing one of DoD’s networks who had discovered an unpatched vulnerability in a legacy network.

Hunting Down Intruders
“While it’s worrisome they achieved some unauthorized access to our unclassified network, we quickly identified the compromise and had a team of incident responders hunting down the intruders within 24 hours,” Carter explained.

After discerning valuable information about the hackers’ tactics, experts analyzed the network activity, associated it with Russia, then kicked them off the network in a way that minimized their chances of returning, he added.

The episode illustrates a step in the right direction, Carter said, and he told the audience about the department’s new cyber strategy, which he said begins with the department’s people.

The strategy’s first strategic goal is building and training the department’s Cyber Mission Forces, he said.

Keeping Systems Secure
“These are talented individuals who hunt down intruders, red-team our networks and perform the forensics that help keep our systems secure,” Carter added, noting that their skill and knowledge makes them more valuable than the technology they use.

Another goal, the secretary said, is to be better prepared to build and defend DoD information networks, secure data and mitigate risks to military missions.

“We do this in part through deterrence by denial, in line with today’s best-in-class cybersecurity practices, building a single security architecture that’s more easily defendable and able to adapt and evolve to mitigate current and future cyber threats,” Carter said.

Consolidating DoD IT
DoD also will strengthen network defense command and control to synchronize across thousands of DoD networks, and conduct exercises in resilience, he said, so that if a cyberattack degrades capabilities, the department still can mobilize, deploy and operate forces in all other domains.

“Just this week I directed that we consolidate DoD’s IT services in the Pentagon and throughout the capital region,” Carter said, noting that this will help improve cybersecurity and save millions of dollars.

A primary aspect of the strategy is working with partners in the private sector, across the government and around the world, the secretary said. And because U.S. businesses own, operate and see about 90 percent of national networks, the private sector must be a key partner, he added.

“The U.S. government has a unique suite of cyber tools and capabilities, but we need the private sector to take its own steps to protect its data and networks,” Carter said.

Helping When Possible
“We want to help where we can,” the secretary added, “but if companies themselves don’t invest, our country’s collective cybersecurity posture is weakened and our ability to augment that protection is limited.”

To build the cyber force, Carter said, “we’re going to need to use new ways to attract talent through new private-sector exchange programs, … and to ensure that our people have the right tools to execute their missions, we’re going to [increase] our fundamental research and development … with established and emerging private-sector partners in cyber.”

With these partners, he added, cyber capabilities can be created that can both help DoD and then spin off into the wider U.S. marketplace.

To ensure that the department’s cyber operations are appropriate and effective, Carter said, “we’re going to work more closely with our law-enforcement partners at FBI, with Homeland Security, and elsewhere.”

Clear lines of authority dictate who can work where, the secretary said, so as adversaries jump from foreign to U.S. networks, defenders must coordinate with the government to operate seamlessly.

Serious Business
“I’m determined that the Department of Defense be a cooperative partner with law enforcement and with Homeland Security,” Carter said.

The department has already begun practicing with its FBI partners, he added, “and we’re going to be exercising much more going forward. It’s important that we work together and that we all behave in a way that is lawful and appropriate.”

This is serious business, Carter told the audience, and it requires collaboration.

“But in addition to the dangers there are great opportunities to be seized through a new level of partnership between the Pentagon and Silicon Valley,” he added, “opportunities that we can only realize together.”

Tags: Cyber Strategycyber warfareDefensenetwork securitysecuritysilicon valleystrategy
Previous Post

Heckler & Koch G36: The Rifle Held In All the Wrong Places

Next Post

US Army works toward common fire control across weapons platforms

Related Posts

Air Force Research Lab Announces MUOS Satellite Communications Testing in Antarctica

Trojan Horses in Space: Cyber Threats Hidden in Satellite Networks

April 8, 2025

Most of us like satellites. They power our televisions. Allow us to find our way home from anywhere on the...

Chatbot vs national security? Why DeepSeek is raising concerns

Chatbot vs national security? Why DeepSeek is raising concerns

February 17, 2025

Chinese AI chatbot DeepSeek upended the global industry and wiped billions off US tech stocks when it unveiled its R1...

Next Post
US Army works toward common fire control across weapons platforms

US Army works toward common fire control across weapons platforms

Latest Defense News

Britain, Germany jointly developing missiles: ministers

Britain, Germany jointly developing missiles: ministers

May 17, 2025
Trump announces ‘full and immediate’ India-Pakistan ceasefire

Trump announces ‘full and immediate’ India-Pakistan ceasefire

May 10, 2025
Pakistan says Indian missiles strike air bases as conflict spirals

Pakistan says Indian missiles strike air bases as conflict spirals

May 10, 2025
J-10C fighter jet

Pakistan says India has brought neighbours ‘closer to major conflict’

May 9, 2025
North Korea fires multiple suspected cruise missiles

North Korea fires flurry of short-range ballistic missiles

May 9, 2025
China says ‘closely watching’ Ukraine situation after Russian attack

China vows to stand with Russia in face of ‘hegemonic bullying’

May 9, 2025

Defense Forum Discussions

  • Russian Air Force News & Discussion
  • Indian Military Aviation; News, Updates & Discussions
  • The Russian-Ukrainian War Thread
  • Russia - General Discussion.
  • Royal Australian Navy Discussions and Updates 2.0
  • US Navy News and updates
  • General Aviation Thread
  • Indonesian Aero News
  • General Naval News
  • Japan, Koreas, China and Taiwan regional issues
DefenceTalk

© 2003-2020 DefenceTalk.com

Navigate Site

  • Defence Forum
  • Military Photos
  • RSS Feeds
  • About us
  • Advertise with us
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports

© 2003-2020 DefenceTalk.com