Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Cyberspace links traditional military domains
Tuesday - 11/1/2011, 11:00am EDT
Federal News Radio
The Defense Department has declared cyberspace to be a fifth domain — alongside the more traditional sectors of land, sea, air and space.
While the Pentagon has recognized cybersecurity in the same vein as those more traditional areas, the approach taken by the military in cyberspace will be anything but traditional.
Col. Steve Zotti, the chief of staff for Marine Forces Cyber Command, told the Federal Drive with Tom Temin and Amy Morris that cyberspace links together nearly all the other domains.
"With the advent of information technologies and computers and virtual communications, now you have something that bridges all those spaces ... Both from the physical space and then the virtual, intellectual, cognitive space," Zotti said.
While there's a "unique blending" with the other domains, Zotti said, the mission for DoD is to also capture the cyber realm's distinctions in terms of training, organizing and equipping.
Zotti said there are two facets to the cyber threat faced by the military and the government.
"The top threat for us — those of us in uniform, in the government and places that are critical to us in the commercial realm — is the insider threat," he said, which he defined as "the folks who through malicious intent or ignorance do things that make the system more vulnerable."
The problem, which spans everything from careless use of flash drives to deliberate leaking a la WikiLeaks, has been on DoD's "front-burner" since about 2008, he added.
The outside threat comes in the form of rapidly proliferating technologies, Zotti said.
"It doesn't take huge industrial-base support to leverage threats and weapons in cyberspace," he explained."The threats that come to us can come from very many places," and might not fit the standard nation-state form, he added.