DoD Cyber Strategy - 2018

DoD Cyber Strategy – 2018

Cyber Strategy: Summary, 2018
U.S. Department of Defense

“American prosperity, liberty, and security depend upon open and reliable access to information.  The Internet empowers us and enriches our lives by providing ever-greater access to new knowledge, businesses, and services.  Computers and network technologies underpin U.S. military warfighting superiority by enabling the Joint Force to gain the information advantage, strike at long distance, and exercise global command and control.”

DoD Cyber Strategy – 2018 Read More
The Perfect Weapon

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

Published by Penguin Random House, June 19, 2018
By David E. Sanger

“The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists.”

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age Read More
Dawn of the Code War

Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat

“The inside story of how America’s enemies launched a cyber war against us-and how we’ve learned to fight back…”

Includes links to:

  • “The Lawfare Podcast: John Carlin on ‘Dawn of the Code War’“ by Jen Patja Howell. Saturday, November 24, 2018.

  • A discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15, 2019 at the Center for Strategic & International Studies.

  • John Carlin on “Stay Tuned with Preet” Dec. 4, 2018.

Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat Read More