a. Communication is all secret
b. How would this work with allies (CENTRIX)
c. Good – more secure ?
d. Bad – difficult to establish, heightened security, is everyone clearable ?
e. How to validate new people entering the network (this could also expand broadly to the internet and attribution, i.e. if you what to join our network, show yourself)
2. Defense continues and expands use of commercial software and hardwarea. Supply Chain management – false parts
b. Possibly less secure
c. Giving up security for cost
d. More available
3. UAV / Comms securitya. Can our UAVs be compromised or taken over
b. How would attribution be figured out
c. Mixes cyber with kinetic attack
4. Attributiona. Will there be better ways ?
i. If so what does that mean for our cyber capabilitiesb. No better ways
i. Policies may tie our handsa. DoD has implemented rules of engagement for the operation and defense of its networks. In current operations that occur in designated Areas of Hostilities, specific rules of engagement have been approved to govern and guide DoD operations in all domains. DoD’s cyber capabilities are integrated into planning and operations under existing policy and legal regimes. (http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf )
6. Allies (Could be Foreign Governments and US Commercial sector companies also)a. Launching attacks from multiple nations
b. Coming to their defense
c. What capabilities do we share ?
7. Definition / Look of Wara. No more Tanks and large armies
b. Smaller brigade style groups
c. Mobile cyber cells ?