Éditoriaux Défense Sécurité Terrorisme Zones de conflits Logistique Livres de référence Liens
Terre Air Mer Gendarmerie Renseignement Infoguerre Cyber Recherche

DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks By Cheryl Pellerin DoD News

DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks

By Cheryl Pellerin, DoD News, Defense Media Activity.
Washington D.C. — (DOD News) — July 15, 2016 — When assessing whether a cyber incident constitutes an armed attack on the nation, Defense Department leaders take the incidents case by case and consider a range of factors, the deputy assistant secretary of defense for cyber policy told a House panel this week.

Aaron Hughes testified during a July 13 hearing titled, “Digital Acts of War” before the subcommittees on information technology and national security of the House Committee on Oversight and Reform.

Uniformed and civilian cyber and military intelligence specialists monitor Army networks

Other witnesses included Chris Painter, coordinator for cyber issues at the State Department.

Case by Case

“When determining whether a cyber incident constitutes an armed attack, the U.S. government considers a broad range of factors, including the nature and extent of injury or death to persons and the destruction of or damage to property,” Hughes said.

“Cyber incidents are reviewed on a case-by-case basis,” he added, “… and the national security leadership and the president will make a determination if it's an armed attack.”

If a cyber incident were found to be equivalent to an armed attack, Hughes said the nation would use a whole-of-government approach to responding and deterring future malicious activities in cyberspace.

“The United States has been clear,” Painter said, “that it believes that cyber activities may in certain circumstances constitute an armed attack that triggers our inherent right to self-defense as recognized by Article 51 of the U.N. Charter.”

But even if the cyber incident is below that threshold, he added, “we still have a number of ways to respond. It could be kinetic. It could be through cyber means. It could be through economic means and sanctions. It could be through diplomacy. It could be through indictments and law enforcement actions.”

Defense, Offense, Deterrence

Since the updated DoD Cyber Strategy was signed in April 2015, Hughes said, “the department has devoted considerable resources to implementing its goals and objectives.”

When Defense Secretary Ash Carter signed the strategy, Hughes added, he directed the department to focus on three primary missions in cyberspace -- defending DoD networks, defending the nation against consequential cyberattacks and providing integrated cyber capabilities to support military operations and contingency plans.

DoD also supports a whole-of-government cyber deterrence strategy, he said, and deterrence is a key part of the cyber strategy.

The strategy describes DoD contributions to a broader national set of capabilities to deter adversaries from conducting cyberattacks.

The document also says the department assumes that cyberattacks on U.S. interests will be achieved through “the totality of U.S. actions, including declaratory policy, substantial indications and warning capabilities, defensive posture, effective response procedures, and the overall resiliency of U.S. networks and systems.”

States have not sought to define precisely or state conclusively what situations would constitute armed attacks in other domains,” Painter said, “and there is no reason cyberspace should be different.”

“In fact, he added, “strategic ambiguity could very well deter most states from getting close to the threshold of an armed attack.”

Working with Partners

The United States and the department face diverse and persistent threats in cyberspace from state and non-state actors that can’t be defeated through the efforts of any single organization, Hughes told the panel.

The DoD Cyber Strategy directs that the department work with its interagency partners, the private sector and allied and partner nations to deter and if necessary defeat cyberattacks of significant consequence on the U.S. homeland and U.S. interests.

Painter said that, unlike in previous years, today there is a very strong interagency process in place to share cyber information.

“All of the different interagency colleagues do talk about these threats, talk about possible responses, and in the end it's up to the national security staff and the president,” he said.

An increasingly wired and interconnected world has brought prosperity and economic gain to the United States while the nation’s dependence on these systems has left it vulnerable to evolving threats posed by malicious cyber activity, Hughes said.

DoD maintains and uses robust and unique cyber capabilities to defend its networks and the nation, but that isn’t enough, he added.

“Securing our systems and networks is everyone's responsibility and requires close collaboration with other federal departments, our allies and partners internationally and the private sector to improve our nation's cybersecurity posture, and to ensure that DoD has the ability to operate in any environment at any time,” Hughes said.
(Follow Cheryl Pellerin on Twitter: @PellerinDoDNews)

Derniers articles

Verdun 2016 : La légende de la « tranchée des baïonnettes »
Eyes in the Dark: Navy Dive Helmet Display Emerges as Game-Changer
OIR Official: Captured Info Describes ISIL Operations in Manbij
Cyber, Space, Middle East Join Nuclear Triad Topics at Deterrence Meeting
Carter Opens Second DoD Innovation Hub in Boston
Triomphe de St-Cyr : le Vietnam sur les rangs
Dwight D. Eisenhower Conducts First OIR Missions from Arabian Gulf
L’amiral Prazuck prend la manœuvre de la Marine
Airmen Practice Rescuing Downed Pilots in Pacific Thunder 16-2
On ne lutte pas contre les moustiques avec une Kalachnikov...
Enemy Mine: Underwater Drones Hunt Buried Targets, Save Lives
Daesh Publications Are Translated Into Eleven Languages
Opération Chammal : 10 000 heures de vol en opération pour les Mirage 2000 basés en Jordanie
Le Drian : Daech : une réponse à plusieurs niveaux
Carter: Defense Ministers Agree on Next Steps in Counter-ISIL Fight
Carter Convenes Counter-ISIL Coalition Meeting at Andrews
Carter Welcomes France’s Increased Counter-ISIL Support
100-Plus Aircraft Fly in for Exercise Red Flag 16-3
Growlers Soar With B-1s Around Ellsworth AFB
A-10s Deploy to Slovakia for Cross-Border Training
We Don’t Fight Against Mosquitoes With a Kalashnikov
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge
Chiefs of US and Chinese Navies Agree on Need for Cooperation
DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks
Vice Adm. Tighe Takes Charge of Information Warfare, Naval Intelligence
Truman Strike Group Completes Eight-Month Deployment
KC-46 Completes Milestone by Refueling Fighter Jet, Cargo Plane
Air Dominance and the Critical Role of Fifth Generation Fighters
Une nation est une âme
The Challenges of Ungoverned Spaces
Carter Salutes Iraqi Forces, Announces 560 U.S. Troops to Deploy to Iraq
Obama: U.S. Commitment to European Security is Unwavering in Pivotal Time for NATO
International Court to Decide Sovereignty Issue in South China Sea
La SPA 75 est centenaire !
U.S. to Deploy THAAD Missile Battery to South Korea
Maintien en condition des matériels : reprendre l’initiative
La veste « léopard », premier uniforme militaire de camouflage
Océan Indien 2016 : Opérations & Coopération
Truman Transits Strait of Gibraltar
Navy Unveils National Museum of the American Sailor
New Navy, Old Tar
Marcel Dassault parrain de la nouvelle promotion d’officiers de l’École de l’Air
RIMPAC 2016 : Ravitaillement à la mer pour le Prairial avant l’arrivée à Hawaii
Bataille de la Somme, l’oubliée
U.S., Iceland Sign Security Cooperation Agreement
Cléopatra : la frégate Jean Bart entre dans l’histoire du BPC Gamal Abdel Nasser
Surveiller l’espace maritime français aussi par satellite
America's Navy-Marine Corps Team Fuse for RIMPAC 2016
Stratégie France : Plaidoyer pour une véritable coopération franco-allemande
La lumière du Droit rayonne au bout du chemin

Directeur de la publication : Joël-François Dumont
Comité de rédaction : Jacques de Lestapis, Hugues Dumont, François de Vries (Bruxelles), Hans-Ulrich Helfer (Suisse), Michael Hellerforth (Allemagne).
Comité militaire : VAE Guy Labouérie (†), GAA François Mermet (2S), CF Patrice Théry (Asie).