Experts Respond to Defense Department Cyber Strategy

The U.S. Department of Defense recently unveiled declassified portions of its long-awaited strategy for handling cyberattacks, declaring publicly for the first time that it would treat cyberspace -- just as land, sea, and air -- as an "operational domain."

While the department's five-pronged approach to combating cyber threats signaled an important first step in the development of a national cyberwarfare strategy, it also raised many unanswered questions, including policy issues such as how the U.S. could use the Internet to respond to a cyber threat.

Three experts from the Indiana University Center for Applied Cybersecurity Research (CACR) offered brief insight into the plan. Each is available for further comment.

FRED H. CATE, CACR director and Distinguished Professor, IU Maurer School of Law: This is an important first step; it is the first time this has ever been done by the Department of Defense. But it's still a very traditional and not particularly innovative approach. There are critical legal questions that aren't asked or answered. For example: When does a cyber attack constitute an act of war and when is a kinetic response justified? What are the limits of DoD involvement in the proposed partnerships with industry and civilian government agencies? How are civil liberties to be protected? We should care, and the Defense Department should care, about the answers, but at least in the unclassified section of the report, it doesn't ask the questions, most likely because it doesn't want the department's hands tied.

DAVID P. FIDLER, CACR Fellow, James P. Calamaras Professor of Law: The five pillars of the new DoD strategy consolidate existing thinking and practice rather than break new policy ground. The central tension in this strategy is the contrast between the announced scaling up of U.S. military activities in cyberspace with repeated reassurances that these increased and intensified activities do not portend the militarization of cyberspace. The openness and interconnectedness of the Internet suggest that containing rapidly expanding military interest, initiatives, and influence in cyberspace will be a very difficult policy challenge -- especially if cybersecurity failures continue in civilian contexts. Stronger moves by the U.S. military in cyberspace will prompt similar moves by other countries, producing a collective militarization creep in cyberspace that might threaten, ultimately, the Internet freedom agenda the Obama administration is championing.

SCOTT SHACKELFORD, CACR Fellow, professor of business law and ethics, IU Kelley School of Business: The strategy states that sophisticated cyber capabilities reside with nations, allowing the U.S. to respond with military force if threatened. But it fails to note how the U.S. will be able to attribute attacks quickly and accurately, or how the U.S. will respond to state-sponsored cyberattacks launched by non-state actors. What will the burden of proof be? The strategy is interesting, but did little to change the overall dynamic or address fundamental legal and technical questions of securing cyberspace.

The Center for Applied Cybersecurity Research has been designated a National Center of Academic Excellence in both Information Assurance Education and Research. CACR is part of the Pervasive Technology Institute at Indiana University.

Featured

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.