Research & Development World

  • R&D World Home
  • Topics
    • Aerospace
    • Automotive
    • Biotech
    • Careers
    • Chemistry
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Software
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
    • Semiconductors
  • R&D Market Pulse
  • R&D 100
    • Call for Nominations: The 2025 R&D 100 Awards
    • R&D 100 Awards Event
    • R&D 100 Submissions
    • Winner Archive
    • Explore the 2024 R&D 100 award winners and finalists
  • Resources
    • Research Reports
    • Digital Issues
    • Educational Assets
    • R&D Index
    • Subscribe
    • Video
    • Webinars
  • Global Funding Forecast
  • Top Labs
  • Advertise
  • SUBSCRIBE

New Pentagon Strategy Warns of Cyberwar Capabilities

By R&D Editors | April 24, 2015

Defense Secretary Ash Carter said one way the Defense Department is responding is to be more transparent about cybersecurity, and that includes a new cybersecurity strategy that is far more open about the Pentagon's cyber missions. Courtesy of Greg WestPALO ALTO, CA (AP) — A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyberwarfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department “should be able to use cyber operations to disrupt an adversary’s command and control networks, military-related critical infrastructure and weapons capabilities.”

And on April 23, 2015, Defense Secretary Ash Carter revealed for the first time that the Pentagon uncovered a breach by Russian hackers into an unclassified defense computer network earlier this year, but officials were able to identify the intruders within 24 hours and kicked them out.

In remarks prepared for delivery at Stanford University, Carter said that the breach response shows the department is moving in the right direction, but, he added “still I worry about what we don’t know. Because this was only one attack.”

He said one way the department is responding is to be more transparent about cybersecurity, and that includes a new cybersecurity strategy that is far more open about the Pentagon’s cyber missions.

The strategy is the second done by the Pentagon. The previous strategy, which was publicly released in 2011, made little reference to the Pentagon’s offensive cyber capabilities, although U.S. officials have spoken quietly about the issue.

The new document takes a more open approach in part because officials said the Pentagon wants more transparency in its cyber mission — and because it could provide some deterrence to adversaries.

“I think it will be useful to us for the world to know that, first of all, we’re going to protect ourselves, we’re going to defend ourselves,” Defense Secretary Ash Carter told reporters traveling with him to California. He added that the new strategy is “more clear and more specific about everything, including (U.S.) offense.”

The strategy also, for the first time, includes a small section on U.S. concerns about continued cyberespionage by China against U.S. companies and agencies. It says the U.S. will continue to try to work with Beijing to bring greater understanding and transparency of each nation’s cyber missions to “reduce the risks of misperception and miscalculation.”

Carter was in Silicon Valley to reach out to high-tech companies and experts and seek their help in countering the growing cybersecurity threat and ensuring that America’s military has the cutting-edge technologies it needs.

Cyberattacks against U.S. government and industry have grown increasingly more severe and sophisticated. The new strategy says, “During heightened tensions or outright hostilities, DOD must be able to provide the president with a wide range of options for managing conflict escalation.”

It adds that, as part of those options, the military must have cyber capabilities that can “achieve key security objectives with precision, and to minimize loss of life and destruction of property.”

The announcements come on the heels of President Barack Obama’s decision earlier this month to authorize financial sanctions against malicious overseas hackers or companies that use cyberespionage to steal U.S. trade secrets. Those companies could include state-owned corporations in Russia, China or other countries that have long been named as cyber adversaries.

Copyright 2015 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Related Articles Read More >

R&D 100 winner of the day: Electromagnetic spectrum management system (ESMS)
Claude computer use
AI agents could begin transforming how we work in 2025
refinery
AI takes center stage in Honeywell-Chevron collaboration
Firefly blurred lines between a human and machine researcher 72875
Copyleaks CEO: OpenAI’s o1 emergence could blur the lines between human researcher and AI assistant
rd newsletter
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, trends, and strategies in Research & Development.
RD 25 Power Index

R&D World Digital Issues

Fall 2024 issue

Browse the most current issue of R&D World and back issues in an easy to use high quality format. Clip, share and download with the leading R&D magazine today.

Research & Development World
  • Subscribe to R&D World Magazine
  • Enews Sign Up
  • Contact Us
  • About Us
  • Drug Discovery & Development
  • Pharmaceutical Processing
  • Global Funding Forecast

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search R&D World

  • R&D World Home
  • Topics
    • Aerospace
    • Automotive
    • Biotech
    • Careers
    • Chemistry
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Software
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
    • Semiconductors
  • R&D Market Pulse
  • R&D 100
    • Call for Nominations: The 2025 R&D 100 Awards
    • R&D 100 Awards Event
    • R&D 100 Submissions
    • Winner Archive
    • Explore the 2024 R&D 100 award winners and finalists
  • Resources
    • Research Reports
    • Digital Issues
    • Educational Assets
    • R&D Index
    • Subscribe
    • Video
    • Webinars
  • Global Funding Forecast
  • Top Labs
  • Advertise
  • SUBSCRIBE