Advertisement

Cyberspace Policy For Critical Infrastructures

  • Dorsey Wilkin
  • Richard Raines
  • Paul Williams
  • Kenneth Hopkinson
Conference paper
  • 963 Downloads
Part of the The International Federation for Information Processing book series (IFIPAICT, volume 290)

The first step in preparing any battlespace is to define the domain for attack and maneuver. The various military service components have directed authority to focus their efforts in specific domains of operations (e.g., naval operations are mainly in the maritime domain). However, cyberspace operations pose challenges because they span multiple operational domains. This paper focuses on U.S. cyberspace policy related to defending and exploiting critical infrastructure assets. Also, it examines the issues involved in delineating responsibility for U.S. defensive and offensive operations related to critical infrastructures.

Keywords

Critical infrastructure cyberspace operations policy 

References

  1. 1.
    BBC News, On this Day (11 June 1976): Mercenaries trial begins in Angola, London, United Kingdom, (news.bbc.co.uk/onthisday/hi/dates/stor ies/june/11/newsid.2510000/2510947.stm).Google Scholar
  2. 2.
    G. Bush, Executive Order 13228: Establishing the Office of Homeland Security and the Homeland Security Council, The White House, Washington, DC (fas.org/irp/offdocs/eo/eo-13228.htm), October 8, 2001.Google Scholar
  3. 3.
    G. Bush, Executive Order 13231: Critical Infrastructure Protection in the Information Age, The White House, Washington, DC (fas.org/irp/offdocs /eo/eo-13231.htm), October 16, 2001.Google Scholar
  4. 4.
    G. Bush, Homeland Security Presidential Directive (HSPD) 7, The White House, Washington, DC (www.whitehouse.gov/news/releases/2003/12/20 031217-5.html), December 17, 2003.Google Scholar
  5. 5.
    J. Cartwright, Statement of General James E. Cartwright, Commander, United States Strategic Command on the United States Strategic Command, House Armed Services Committee, U.S. House of Representatives, Washington, DC (armedservices.house.gov/pdfs/FC032107 /Cartwright_Testimony032007.pdf), March 21, 2007.Google Scholar
  6. 6.
    W. Clinton, Executive Order 13010: Critical Infrastructure Protection, The White House, Washington, DC (www.fas.org/irp/offdocs/eo13010.htm), July 15, 1996.Google Scholar
  7. 7.
    W. Clinton, Presidential Decision Directive 63, The White House, Washington, DC (fas.org/irp/offdocs/pdd/pdd-63.htm), May 22, 1998.Google Scholar
  8. 8.
    G. England, DoD Directive 3020.40, Defense Critical Infrastructure Program, Department of Defense, Washington, DC (www.dtic.mil/whs/dir ectives/corres/pdf/302040p.pdf), August 19, 2005.Google Scholar
  9. 9.
    M. Gettle, Air Force releases new mission statement, Air Force Link, U.S. Air Force, Washington, DC (www.af.mil/news/story.asp?storyID= 123013440), December 8, 2005.Google Scholar
  10. 10.
    J. Moteff and P. Parfomak, Critical Infrastructure and Key Assets: Definition and Identification, Congressional Research Service, The Library of Congress, Washington, DC (www.fas.org/sgp/crs/RL32631.pdf), 2004.Google Scholar
  11. 11.
    Office of Homeland Security, National Strategy for Homeland Security, The White House, Washington, DC (www.whitehouse.gov/homeland/book /natstrat_hls.pdf), 2002.Google Scholar
  12. 12.
    Office of the United Nations High Commissioner for Human Rights, Protocol additional to the Geneva Conventions of 12 August 1949 and relating to the protection of victims of international armed conflicts (Protocol I), Geneva, Switzerland (www.unhchr.ch/html/menu3/b/93.htm), June 8, 1977.
  13. 13.
    President's Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America's Infrastructures, The White House, Washington, DC (chnm.gmu.edu/cipdigitalarchive/files/5_CriticalFound ationsPCCIP.pdf), 1997.Google Scholar
  14. 14.
    President's Critical Infrastructure Protection Board, The National Strategy to Secure Cyberspace, The White House, Washington, DC (www.whitehouse.gov/pcipb/cyberspace_strategy.pdf), 2003.Google Scholar
  15. 15.
    D. Rumsfeld, Information Operations Roadmap (declassfied in 2006), Department of Defense, Washington, DC (www.gwu.edu/?nsarchiv/NSAE BB/NSAEBB177/info_ops_roadmap.pdf),2003.Google Scholar
  16. 16.
    Sandia National Laboratories, Information Design Assurance Red Team (IDART), Albuquerque, New Mexico (www.idart.sandia.gov).Google Scholar
  17. 17.
    U.S. Congress (107th Congress), Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, Public Law 107-56, Government Printing Office, Washington, DC (frwebgate.access.gpo.gov/cgi-bin/get doc.cgi?dbname=107_cong_public_laws&docid=f:publ056.107.pdf), October 26, 2001.Google Scholar
  18. 18.
    WGBH Educational Foundation, Frontline: Rumsfeld's War: The Military's Struggles and Evolution, Boston, Massachusetts (www.pbs.org /wgbh/pages/frontline/shows/pentagon/etc/cronagon.html), 2004.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Dorsey Wilkin
    • 1
  • Richard Raines
    • 1
  • Paul Williams
    • 1
  • Kenneth Hopkinson
    • 1
  1. 1.Air Force Institute of TechnologyOhioUSA

Personalised recommendations