Research & Development World

  • R&D World Home
  • Topics
    • Aerospace
    • Automotive
    • Biotech
    • Careers
    • Chemistry
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Software
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
    • Semiconductors
  • R&D Market Pulse
  • R&D 100
    • 2025 R&D 100 Award Winners
    • 2025 Professional Award Winners
    • 2025 Special Recognition Winners
    • R&D 100 Awards Event
    • R&D 100 Submissions
    • Winner Archive
  • Resources
    • Research Reports
    • Digital Issues
    • Educational Assets
    • R&D Index
    • Subscribe
    • Video
    • Webinars
    • Content submission guidelines for R&D World
  • Global Funding Forecast
  • Top Labs
  • Advertise
  • SUBSCRIBE

Pentagon publishes strategy for cyberspace wars

By R&D Editors | July 14, 2011

CyberWar1

In this Feb. 12, 2009 file photo, the Pentagon is seen from Air Force One, with President Barack Obama on board, shortly after taking off from Andrews Air Force Base in Maryland. President Barack Obama has signed executive orders that lay out how far military commanders around the globe can go in using cyberattacks and other computer-based operations against enemies and as part of routine espionage in other countries. (AP Photo/Charles Dharapak, File)

WASHINGTON
(AP) — Facing escalating risks of cyberattacks by hackers, criminals,
and other nations, the Pentagon is developing more resilient computer
networks so the military can continue to operate if critical systems are
breached or taken down.

In
a broad new cybersecurity strategy to be released Thursday (July 14, 2011), the Defense
Department lays out its vulnerabilities to attack from both outside and
within its own workforce. Formally declaring cyberspace a new warfare
domain, much like air, land, and sea, the new strategy stresses the need
for the military to continue to operate if its computer systems are
attacked and degraded.

The Associated Press reviewed a draft copy of the 12-page, unclassified summary of the strategy released by the Pentagon.

The
strategy is the final step in the administration’s effort to map out
how to handle the escalating threat of destructive cyberattacks,
including potential assaults on critical infrastructure such as the
electrical grid, financial networks, or power plants.

Details
about how the military would respond to a cyberattack or discussion of
any offensive cyberspace operations by the U.S. are not included in the
summary. That information is in classified documents and directives. The
classified version of the Pentagon strategy is about 40 pages.

In
an interview with a group of reporters Thursday before release of the
document, Marine Gen. James Cartwright said the new strategy is focused
on defending against attack, but he believes the U.S. government broadly
and the Pentagon in particular need to develop offensive approaches
that reduce incentives to attack U.S. computer systems. Cartwright is
vice chairman of the Joint Chiefs of Staff.

“If
it’s OK to attack me and I’m not going to do anything other than
improve my defenses every time you attack me, it’s difficult” to stop
that cycle, Cartwright said.

He
said the Pentagon currently focuses 90% of its cybersecurity
effort on defense and 10% on offense. A better balance for the
U.S. government as a whole would be 50-50, he said.

Earlier
this year, President Barack Obama signed executive orders that lay out
how far military commanders around the globe can go in using
cyberattacks and other computer-based operations against enemies and as
part of routine espionage in other countries.

The
orders detail when the military must seek presidential approval for a
specific cyberattack on an enemy, defense officials, and cybersecurity
experts told the AP.

The
orders and the new strategy cap a two-year Pentagon effort to draft
U.S. rules of the road for cyberspace warfare, and come as the U.S.
begins to work with allies on global ground rules.

Noting
that Defense Department systems are vulnerable, the strategy says the
Pentagon must develop resilient networks that can detect and fend off
attacks. At the same time, the military must have multiple networks and
be able to shift its operations from one system to another in order to
keep operating while under assault.

That research is ongoing.

The
strategy also warns that theft of intellectual property is the “most
pervasive cyber threat.” And it calls for more significant efforts to
ensure the integrity of the supply chain, so that new software doesn’t
arrive with vulnerabilities that allow hackers to infiltrate.

AP National Security Writer Robert Burns contributed to this report.

White House cyberspace strategy, released in May

Department of Defense Strategy for Operating in Cyberspace

SOURCE: The Associated Press

Related Articles Read More >

Lab automation is “vaporizing”: Why the hottest innovation is invisible
Maryland set for first subsea internet cable: AWS’s 320+ Tbps “Fastnet” to Ireland
Google on how AI will extend researchers
2025 R&D layoffs tracker: hardware and chips lead the year’s biggest cuts while biopharma pares pipelines
rd newsletter
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, trends, and strategies in Research & Development.
RD 25 Power Index

R&D World Digital Issues

Fall 2024 issue

Browse the most current issue of R&D World and back issues in an easy to use high quality format. Clip, share and download with the leading R&D magazine today.

Research & Development World
  • Subscribe to R&D World Magazine
  • Sign up for R&D World’s newsletter
  • Contact Us
  • About Us
  • Drug Discovery & Development
  • Pharmaceutical Processing
  • Global Funding Forecast

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search R&D World

  • R&D World Home
  • Topics
    • Aerospace
    • Automotive
    • Biotech
    • Careers
    • Chemistry
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Software
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
    • Semiconductors
  • R&D Market Pulse
  • R&D 100
    • 2025 R&D 100 Award Winners
    • 2025 Professional Award Winners
    • 2025 Special Recognition Winners
    • R&D 100 Awards Event
    • R&D 100 Submissions
    • Winner Archive
  • Resources
    • Research Reports
    • Digital Issues
    • Educational Assets
    • R&D Index
    • Subscribe
    • Video
    • Webinars
    • Content submission guidelines for R&D World
  • Global Funding Forecast
  • Top Labs
  • Advertise
  • SUBSCRIBE