• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Saturday, April 11, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » U.S. Department of Defense Outlines Cyberspace Strategy

U.S. Department of Defense Outlines Cyberspace Strategy

July 13, 2011
in All
A A

The United States must be prepared to respond to hostile acts in cyberspace, said Deputy Secretary of Defense William J. Lynn, III, speaking at the National Defense University, Washington, D.C., and “reserves the right, under the laws of armed conflict, to respond to serious cyber attacks with a proportional and justified military response at the time and place of our choosing.”

Lynn confirmed that in a single intrusion this March, cyber attackers stole 24,000 military files, including data on aircraft avionics, surveillance technologies, satellite communications systems, and network security protocols. He said the cyber exploitation being perpetrated against the defense industry cuts across a wide swath of crucial military hardware, extending from missile tracking systems and satellite navigation devices to UAVs and the Joint Strike Fighter.

Lynn outlined the DoD’s first ever Strategy for Operating in Cyberspace centered around the goal of denying or at least minimizing the benefit of an cyber attack. The five pillars of this strategy include:

1. The Defense Department is treating cyberspace as an operational domain, like land, air, sea, and space.

2. DoD networks will implement active cyber defenses. These active defenses use sensors, software, and signatures to detect and stop malicious code before it affects operations.

3. The DoD will recognize the interconnectedness of cyberspace and the diversity of uses to which it is put, by individuals, in our economies, and across nations. The third pillar specifically recognizes that a number of non-military networks support important military functions — including the power grid, transportation system, and financial sector. The DoD will work with the Department of Homeland Security and the private sector to protect the nation’s critical infrastructure.

4. The logic of interconnectedness will be extended to allies and international partners. Our goal with them is to build collective cyber defenses. Collective cyber defenses will help expand our awareness of malicious activity and speed our ability to defend against ongoing attacks.

5. The DoD will aim to shift the technological landscape of cyber security to reduce the advantages the attacker presently enjoys relative to the defender on the Internet.

Over the past year, the DoD has committed half a billion dollars in R&D funds to accelerate research on advanced defensive technologies.

“The cyber threats we face are urgent, sometimes uncertain and potentially devastating as adversaries constantly search for vulnerabilities,” said Deputy Secretary of Defense William J. Lynn III. “Our infrastructure, logistics network and business systems are heavily computerized. With 15,000 networks and more than seven million computing devices, DoD continues to be a target in cyberspace for malicious activity.”

“Strong partnerships with other U.S. government departments and agencies, the private sector and foreign nations are crucial,” said Lynn. “Our success in cyberspace depends on a robust public/private partnership. The defense of the military will matter little unless our civilian critical infrastructure is also able to withstand attacks.” http://www.defense.govhttp://www.defense.gov/speeches/speech.aspx?speechid=1593

Tags: Blueprint columnsService Providers
ShareTweetShare
Previous Post

ZTE Claims 24 x 1.3 Tbps WDM Record

Next Post

ABI Research: 539 Million Fiber Broadband Subscriptions Worldwide

Staff

Staff

Related Posts

Blueprint: Brazil looks to municipal Wi-Fi 6E
Blueprints

Blueprint: Brazil looks to municipal Wi-Fi 6E

February 21, 2023
Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
BT trials C-RAN in Leeds
All

BT trials C-RAN in Leeds

December 19, 2022
T-Mobile builds cloud native 5G converged core with Cisco
All

T-Mobile builds cloud native 5G converged core with Cisco

December 15, 2022
Meta halts data center expansion construction in Denmark
All

Meta halts data center expansion construction in Denmark

December 15, 2022
Next Post

Harris Delivers Wideband Falcon III Tactical Radio Network for Army Test

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version