Perhaps the best starting point for those looking to “borrow” a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence—due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy—among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America’s borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace.
The Consortium for Homeland Defense and Security in America - consisting of the United States Army War College's Center for Strategic Leadership (CSL); George Washington University's Homeland Security Policy Institute (HSPI); the Center for Strategic and International Studies (CSIS); and the Heritage Foundation - held its annual symposium to examine pressing issues of shared concern to the domestic security of the United States and its allies. This year's event was constructed around the challenges of achieving Unity of Effort in preparing for and responding to catastrophic events.
Despite leaps in technological advancements made in computing system hardware and software areas, we still hear about massive cyberattacks that result in enormous data losses. Cyberattacks in 2015 included: sophisticated attacks that targeted Ashley Madison, the U.S. Office of Personnel Management (OPM), the White House, and Anthem; and in 2014, cyberattacks were directed at Sony Pictures Entertainment, Home Depot, J.P. Morgan Chase, a German steel factory, a South Korean nuclear plant, eBay, and others. These attacks and many others highlight the continued vulnerability of various cyber infrastructures and the critical need for strong cyber infrastructure protection (CIP). This book addresses critical issues in cybersecurity. Topics discussed include: a cooperative international deterrence capability as an essential tool in cybersecurity; an estimation of the costs of cybercrime; the impact of prosecuting spammers on fraud and malware contained in email spam; cybersecurity and privacy in smart cities; smart cities demand smart security; and, a smart grid vulnerability assessment using national testbed networks.
The authors advocate the integration of process improvement methods into future Defense Support of Civil Authorities (DSCA) operations. They briefly discuss alternative process improvement strategies and their current state of employment in a variety of DoD programs. Methods discussed include Lean Six Sigma, Total Quality Management, and Capability Maturity Models, the utility of such methods is demonstrated, and the value in applying process improvement methods to DSCA operations is articulated. Three recommendations are given to demonstrate how a usable process maturity model can be built and employed for future operations. The monograph concludes by reaffirming the inherent utility of, and advocating for, process improvement techniques as a way to mature future DSCA operations using the dual status commander arrangement.
Part I of the 2014-2015 Army War College’s Key Strategic Issues List (KSIL)—Army Priorities for Strategic Analysis—asks: “Given the growing importance of homeland defense, what would be the benefits and drawbacks of realigning the [National] Guard under the department of Homeland Security to enhance domestic security and disaster response, while retaining utility for overseas missions in support of the Department of Defense?” (pg. 10). This monograph details our efforts to research and evaluate the perceived benefits and drawbacks of realigning the National Guard under the Department of Homeland Security (DHS). We begin with a brief review of the relevant literature shaping the current policy and doctrinal approach to military civil support (CS) operations, including a summary of laws and strategic guidance relevant to the discussion. We then note the important distinctions between homeland security (HS) and homeland defense (HD) and the military role in each context. The seam between HS and HD provides a conceptual basis for discussing the roles and responsibilities of the National Guard, the DHS, and the Department of Defense (DoD) within domestic security and disaster response operations. After evaluating the National Guard’s role in each of the above contexts, we briefly discuss the realignment of the United States Coast Guard (USCG) within the DHS as a proxy for comparison of a similar realignment of a military-style entity under the DHS. The study concludes by listing and discussing the potential benefits and drawbacks of a National Guard realignment under the DHS and then makes five short recommendations in summary of the research effort.