Defense Area

2 views
Skip to first unread message

Ronald Nemes

unread,
Mar 8, 2013, 7:08:40 PM3/8/13
to status-qu...@googlegroups.com
Just a little bit of Spitballing here not sure if the document shared

Ron Nemes
Cyber 622 Project Defense Ideas/ Scenarios for 2025

1.     All Defense computers are taken off of the NIPR (unclassified) network

a.     Communication is all secret

b.     How would this work with allies (CENTRIX)

c.      Good – more secure ?

d.     Bad – difficult to establish, heightened security, is everyone clearable ?

e.     How to validate new people entering the network (this could also expand broadly to the internet and attribution, i.e. if you what to join our network, show yourself)

2.     Defense continues and expands use of commercial software and hardware

a.     Supply Chain management – false parts

b.     Possibly less secure

c.      Giving up security for cost

d.     More available

3.     UAV / Comms security

a.     Can our UAVs be compromised or taken over

b.     How would attribution be figured out

c.      Mixes cyber with kinetic attack

4.     Attribution

a.     Will there be better ways ?

                                              i. If so what does that mean for our cyber capabilities
                                             ii. Can we attack nation states with cyber / kinect in retaliation
                                           iii. What about non-state actors
                                           iv. Can we respond quick enough.

b.     No better ways

                                              i. Policies may tie our hands
                                             ii. Difficult to retaliate
5.     Rules of Engagement (Could tie into Attribution)

a.     DoD has implemented rules of engagement for the operation and defense of its networks. In current operations that occur in designated Areas of Hostilities, specific rules of engagement have been approved to govern and guide DoD operations in all domains. DoD’s cyber capabilities are integrated into planning and operations under existing policy and legal regimes. (http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf )

6.     Allies (Could be Foreign Governments and US Commercial sector companies also)

a.     Launching attacks from multiple nations

b.     Coming to their defense

c.      What capabilities do we share ?

7.     Definition / Look of War

a.     No more Tanks and large armies

b.     Smaller brigade style groups

c.      Mobile cyber cells ?

Reply all
Reply to author
Forward
0 new messages