Avatar feed
Responses: 3
Maj Director Of Operations
2
2
0
I have so many thoughts on this topic that I can't/won't discuss here.
(2)
Comment
(0)
MGySgt Civil Military Operations Senior Enlisted Advisor
MGySgt (Join to see)
>1 y
Tough when you're in the weeds to speak generically on a topic.
(1)
Reply
(0)
Maj Director Of Operations
Maj (Join to see)
>1 y
MGySgt (Join to see) - that and per classification guidance information about vulnerabilities/weaknesses in DoD infrastructure is S//NF at a minimum.
(1)
Reply
(0)
MGySgt Civil Military Operations Senior Enlisted Advisor
MGySgt (Join to see)
>1 y
Maj (Join to see) - Only when said vulnerability is associated to a specific asset.
(0)
Reply
(0)
Avatar small
Maj Kevin "Mac" McLaughlin
2
2
0
The biggest problem unfortunately in cyberspace is the interpretation and even the application of the law. Regardless of the fact that private ISPs create the transport infrastructure of the Internet, I still say it is public domain, fully susceptible to observation and a certain amount of regulation by the appropriate government agency. But the law also affects who responds to what and how. The military has limits, the intelligence community has limits, and law enforcement has limits, all within a domain that in many ways, has no easily discernible logical boundaries. We need a way to look at this differently, and/or treat it differently. If we don't find a way to bridge the legal gap between the government's role to protect this nation and private ownership of a national infrastructure, I'm afraid the government will eventually be compelled to take complete ownership after a cyber version of a Pearl Harbor or 9/11.

Gen Alexander is correct, but he also noted many of the new capabilities coming our way. Cyber Protection Teams are still in their infancy and trying to get their hands around the scope of the problem. While they are maturing, I fully believe this will eventually this will lead to improved ways of chipping away at the enemy's capabilities. We've come a long way in the 23+ years I've served in cyber operations. I recall a time when much less sophisticated hackers could cause significant harm to DoD networks then they can now.

Finally, the answer for cyber defense might come from adding laws which enable the best from each of the agencies and the private sector to form a separate agency, which is not defined simply as military, intelligence, or law enforcement. One that does not fit the nomenclature specified by the Constitution when it comes to defending the US infrastructure. This isn't to say there shouldn't be limits, but they need to be different than those which define the world outside cyberspace. Who knows?
(2)
Comment
(0)
MGySgt Civil Military Operations Senior Enlisted Advisor
MGySgt (Join to see)
>1 y
Sir, I concur with all.
(1)
Reply
(0)
Avatar small
LTC John Shaw
2
2
0
MSgt John Flaherty
Who is the owner, first responder in the cyberspace arena - Wow, we can argue that for months and no action will be taken. That is the critical issue, who defines the actions to be taken and what right looks like.
My head hurts even trying to get in to frame up the questions with all the Commands involved and the minimum clearances required to have the right conversations.
(2)
Comment
(0)
MGySgt Civil Military Operations Senior Enlisted Advisor
MGySgt (Join to see)
>1 y
Concur, LTC John Shaw . The most realistic approach is for CYBERCOM to provide guidance and hold Services and Agencies responsible for creating policy. It can be accomplished, it just needs to be done well. The ADM that was dual-hatted as the NSA and USCYBERCOM Commander had a great head on his shoulders for this.
(1)
Reply
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close