Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
DoD hammering out cyber rules of cyberspace
Friday - 10/21/2011, 12:28pm EDT
The doctrine includes: the definition of cyber war, reasonable responses to cyber attack and who — if anyone — has the authority to shut down the Internet.
The Joint Staff is reviewing the doctrine, which should define when the military can go on the cyber offensive. Once it is approved, Cyber Command will put out guidance and tailor its training accordingly.
Gen. Keith Alexander, the head of U.S. Cyber Command, told the International Systems Security Association Conference that the doctrine, laws, policy and standing rules of engagement will shape how the military trains its cyber warriors.
This story is part of Federal News Radio's daily DoD Report. For more defense news, click here.