Article contents
Remarks by Col. Gary Corn
Published online by Cambridge University Press: 28 March 2018
Extract
First, I should note that I am speaking today in my personal capacity only, and my views do not represent those of the U.S. government, the Department of Defense, or U.S. Cyber Command. At the outset, let me provide a brief overview of U.S. Cyber Command. It is a relatively new command within the Department of Defense. Established about seven years ago as a subunified command, it is an operational headquarters at the strategic level but at the moment subordinate to U.S. Strategic Command, one of the combatant commands within the Department of Defense. The 2017 National Defense Authorization Act included a provision stating that there shall be established a combatant command known as U.S. Cyber Command. As a result, there is now a lot of movement afoot to see how we will meet that legislative intent. In all likelihood, U.S. Cyber Command will elevate at some time in the future as a full combatant command.
- Type
- International Law and Cyberspace: Challenges for and by Non-State Actors
- Information
- Copyright
- Copyright © by The American Society of International Law 2018
References
1 Memorandum from the Co-Chairs, Defense Science Board Task Force to the Chairman, Defense Science Board, Subject: Final Report of the Defense Science Board (DSB) Task Force on Cyber Deterrence (Feb. 2017), in Dep't of Defense, Defense Science Board, Task Force on Cyber Deterrence (Feb. 2017).
2 General Martin E. Dempsey, Joint Integrated Air and Missile Defense: Vision 2020 (Dec. 5, 2013). See also Riki Ellison, Left of Launch, Missile Defense Advocacy Alliance (Mar. 16, 2015), available at http://missiledefenseadvocacy.org/alert/3132/ (“The Strategy is based on a preemptive strike with new non kinetic technologies, such as electromagnetic propagation, cyber as well as offensive force to defeat nuclear ballistic missile threats before they are launched, known as ‘left of launch.’ The strategy is to attach by electronic embedment or through the electronic radar signatures of the threat's command and control systems and the targeting systems of the threatening ballistic missiles.”).
- 1
- Cited by