Contents: (1) Overview; (2) Strategic Approach: The Strategic Environment ¿ The World as It Is; The Strategic Approach; Pursuing Comprehensive Engagement; Promoting a Just and Sustainable International Order; Strengthening Nat. Capacity; (3) Advancing Our Interests: Strengthen Security and Resilience at Home; Disrupt, Dismantle, and Defeat Al-Qa¿ida and Its Violent Extremist Affiliates in Afghanistan, Pakistan, and Around the World; Reverse the Spread of Nuclear and Biological Weapons and Secure Nuclear Materials; Secure Cyberspace; Achieve Balanced and Sustainable Growth; Accelerate Sustainable Development; Values: Promote Democracy and Human Rights Abroad; International Order. (4) Conclusion.
Along with the rest of the U.S. government, the Department of Defense (DoD) depends on cyberspace to function. DoD operates over 15,000 networks and seven million computing devices across hundreds of installations in dozens of countries around the globe. DoD uses cyberspace to enable its military, intelligence, and business operations, including the movement of personnel and material and the command and control of the full spectrum of military operations. The Department and the nation have vulnerabilities in cyberspace. Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity -- the security of the technologies that we use each day. Moreover, the continuing growth of networked systems, devices, and platforms means that cyberspace is embedded into an increasing number of capabilities upon which DoD relies to complete its mission. Today, many foreign nations are working to exploit DoD unclassified and classified networks, and some foreign intelligence organizations have already acquired the capacity to disrupt elements of DoD's information infrastructure. Moreover, non-state actors increasingly threaten to penetrate and disrupt DoD networks and systems. DoD, working with its interagency and international partners, seeks to mitigate the risks posed to U.S. and allied cyberspace capabilities, while protecting and respecting the principles of privacy and civil liberties, free expression, and innovation that have made cyberspace an integral part of U.S. prosperity and security. How the Department leverages the opportunities of cyberspace, while managing inherent uncertainties and reducing vulnerabilities, will significantly impact U.S. defensive readiness and national security for years to come.
"The architecture of the Nation's digital infrastructure, based largely upon the Internet, is not secure or resilient." It's a horrifying wakeup call that bluntly opens this report on one of the most serious national security and economic threats the United States-and, indeed, the world-faces in the 21st century. And it sets the stage for the national dialogue on cybersecurity it hopes to launch. Prepared by the U.S. National Security Council-which was founded by President Harry S. Truman to advise the Oval Office on national security and foreign policy-this official government account explores: the vulnerabilities of the digital infrastructure of the United States what we can do to protect it against cybercrime and cyberterrorism how to protect civil liberties and personal privacy in cyberspace why a citizenry educated about and aware of cybersecurity risks is vital the shape of the public-private partnership all these efforts will require Just as the United States took the lead in creating the open, flexible structures of the early Internet, it must now take the initiative in ensuring that our digital networks are as secure as they can be, without stifling the unprecedented freedom of opportunity and access the information revolution has afforded us all. This report is the roadmap for making that happen, and it is required reading for anyone who works or plays in the 21st-century digital world: that is, all of us.
The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks. To support security, innovation, growth, and the free flow of information, the Task Force recommends that the United States and its partners work to build a cyber alliance, make the free flow of information a part of all future trade agreements, and articulate an inclusive and robust vision of Internet governance.
You can read books purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.