SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Military Strategy Board

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
From: The Ox1/9/2018 1:21:18 PM
   of 20404
 
cco.ndu.edu

Battlefield Geometry in our Digital Age: From Flash to Bang in 22 Milliseconds By Robert Allardice and George Topic | PRISM Volume 7, No 2 | December 21, 2017

This year has been tough for cybersecurity programs. Every month in the first six months of 2017, the world experienced a major cyber event. Open-source attacks included attacks on critical infrastructure, banks, intelligence services, and significant commercial and government entities. Indeed, reflecting on the scope and depth of most publically acknowledged compromises, uncovers the reality of the tremendous and growing risks the country faces nearly two decades into the 21stcentury. Everything seems to have changed. Virtually every organization within the Department of Defense (DOD) has, sometimes reluctantly, come to embrace digital age technology, to the point that they are completely dependent on it. The result is a shocking degree of paralysis when our access to the services we now rely upon is disrupted.

The paradox DOD faces is that the asymmetric advantage delivered by application of digital age tools can easily become an asymmetric disadvantage. That is, the very advantage gained through the speed, connectivity, and non-linear impacts delivered by leveraging the benefits of cyberspace, may be disrupted or denied with counter levers delivered by adversaries through the same medium. Is the United States, and more specifically DOD, prepared to deal with this?

(more at above link)


Center for Complex Operations - News Archive 2017
cco.ndu.edu
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext