Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

Topics

  • Climate Change
  • Cybersecurity and Technology
    • Cybersecurity
    • Data Governance
    • Intellectual Property
    • Intelligence, Surveillance, and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Energy, Climate Change, and Environmental Impacts
    • Energy and Geopolitics
    • Energy Innovation
    • Energy Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Building Sustainable and Inclusive Democracy
    • Business and Human Rights
    • Responding to Egregious Human Rights Abuses
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Human Mobility
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
Critical Questions
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

2015 DOD Cyber Strategy

April 24, 2015

The U.S. Department of Defense (DOD) released a new strategy on April 23, 2015, to rewire the Pentagon for cyber operations. The 33-page document includes five key strategic goals, ranging from workforce and human capital development to full integration of cyber capabilities into military operations and deterrence.

Q1: What makes the 2015 DOD Cyber Strategy different from the 2011 cyber strategy?

A1: The 2015 DOD Cyber Strategy is a more comprehensive and detailed articulation of the 2011 strategy, of DOD’s role in defending the United States against cyber attacks, and of how DOD will integrate cyber capabilities into military operations.

The new strategy serves as guidance for the development and deployment of DOD’s Cyber Mission Force structure, which will include 6,200 cyber operators divided into three missions: (1) defense of the department’s own computer networks; (2) protection of the U.S. homeland and U.S. vital interests against significant cyber attacks; and (3) provision of full-spectrum cyber capabilities for military operations.

DOD wanted to be more transparent about U.S. military doctrine, policy, roles, and missions in cyberspace, both to better inform the public debate and expand declaratory policy for cyber conflict. In contrast, the 2011 DOD Strategy for Operating in Cyberspace made little reference to the Pentagon’s operational or offensive cyber capabilities, although U.S. officials have spoken about the issue, and there are leaked classified documents that outlined U.S. policy and planning for offensive cyber operations.

Improved attribution capabilities is another key element. The new cyber strategy emphasizes the importance of attribution for deterrence and discusses the need to continued collaboration with intelligence agencies and private companies to attribute cyber attacks.

There is also a new emphasis on international alliances and partnerships to defend against and deter cyber attacks, and the strategy specifically names the Middle East, the Asia Pacific, and key NATO allies as areas where it will focus such efforts.

Q2: What types of cyber technologies will DOD invest in building?

A2: Currently, the development of cyber capabilities across the military is relatively uncoordinated, with each military service branch building its own cyber platforms and tools. The result is redundant systems not well aligned with mission needs and requirements. The new cyber strategy outlines an initiative to develop a unified platform for cyber operations that will integrate disparate cyber platforms and capabilities. This will require significant investments in building interoperable and scalable architectures and tools that can be deployed in a range of different operational environments.

Integrating cyber capabilities into military planning and operations will also require improvements in command and control technologies for cyber operations, as well as network modeling and simulation tools and predictive analytics to test, evaluate, and improve cyber plans before execution. Technologies to improve early detection of cyber threats, network resilience, and data recovery are other areas where DOD will focus development efforts.

Q3: How will DOD build new cyber capabilities?

A3: The Pentagon is hoping to accelerate research and development of cyber capabilities, including basic and applied research to develop leap-ahead cyber technologies. In his speech at Stanford University where the new cyber strategy was unveiled, Secretary of Defense Ashton Carter announced forthcoming exchange programs designed to attract talented researchers from industry and academia to work on cyber-related research and development at DOD.

Denise E. Zheng is a senior fellow and deputy director of the Strategic Technologies Program at the Center for Strategic and International Studies in Washington, D.C.

 

Critical Questions is produced by the Center for Strategic and International Studies (CSIS), a private, tax-exempt institution focusing on international public policy issues. Its research is nonpartisan and nonproprietary. CSIS does not take specific policy positions. Accordingly, all views, positions, and conclusions expressed in this publication should be understood to be solely those of the author(s).

 

© 2015 by the Center for Strategic and International Studies. All rights reserved.

Denise E. Zheng
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Paige Montfort
Media Relations Coordinator, External Relations
Tel: 202.775.3173
Related
Cybersecurity, Cybersecurity and Technology, Defense Strategy and Capabilities, Defense and Security, Military Technology, Strategic Technologies Program
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Paige Montfort
Media Relations Coordinator, External Relations
Tel: 202.775.3173

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Subscribe to CSIS Newsletters

Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2022. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions