US strategy in cybercrime

The United States has made progress in coordinating cybercrime operations, however, creating a coherent national strategy for support and deterrence is far from available.

As soon as he was elected president of the United States, Barack Obama put information security at the top of his agenda and tried to make significant improvements to cyber defense and security. Of course, in the governments ahead of him, there were plans and innovative initiatives to enhance the capabilities of services and agencies in this area, which was reaffirmed in the Obama administration.
The first cornerstone of the Obama era in 2009 was the provision of a “Strategic Review of Cyberspace”, to strengthen the cyber-security intelligence architecture. Since then, there have been other documents and reports on specific aspects of the development of information, including the issue of identity support, but in the first document there were key findings that were the founders of subsequent American projects.

Each of the various ministries, services and agencies of varying degrees are required to provide security related areas for their skills. The former government has been monitoring the division of activities in this area since 2003 by overseeing all cyber-security intelligence activities and coordinating the actions of all agencies with the US Department of Homeland Security, thereby securing public infrastructure And public, provided support.

In January 2008, the United States decided to expand the coordination spectrum of measures by adding “inclusive national cybersecurity action” by adding intelligence and invasive dimensions. In late 2009, the US government mandated the Department of Homeland Security to set up a national center for follow-up and monitoring of cyber-security activities. The center is named “Integrated National Cyber ​​Security Communications and Security Center”, and its mission is to provide a common operational view of the state of cyberspace to all of the federal services. All US services, including the Pentagon, the National Security Agency and the FBI, are involved in equipping this permanent operational center. In addition, a memorandum of understanding was signed between the Department of Homeland Security and the Department of Defense, which, at the time of approval of the center, allowed the merger of a group of “National Security Agency” into the organization.

Following the publication of the Strategic Review Document 2009, the US president appointed a national interface in the executive branch and assigned two responsibilities:

  1. Develop a coherent strategy at the level of ministries, agencies and services.
  2. Enhance national security with the private sector.

International aspects are another Obama administration’s priority in the field of cyber-security intelligence. The 2009 Strategic Review document presents a plan for developing an international strategy that emphasizes the development of a judicial staffing and strengthening partnerships with US allies. The plan also refers to the need to improve relations with emerging countries in order to develop a multifaceted norm and transnational equipment to respond to cyber-security threats.

However, it is a question of what level of intervention (nature, severity, frequency, and purpose) is considered as a warrant. In fact, by highlighting this risk, experts point out that red lines, which may be easily and simply violated, reduce the credibility of deterrence. Such a situation will not only reduce the threshold for a counter-attack response to an attack, but may even create a risk that makes managing progress with potential attackers difficult.

However, cooperation with all actors in this area is essential, but does not exempt the government from its security duties. In fact, the 2009 Strategic Review document emphasizes the need to develop new links with the private and participatory sectors, but also notes that in the event of significant accidents, the White House will be responsible for coordinating and implementing a response.

In addition to national reflections, at the heart of the US Department of Defense, measures are being taken to better coordinate military and service interventions, as well as to create a strategic cadre for cybercrime operations. Similarly, in 2008, Starter Com’s command published a concept of cybercrime operations. Finally, the 2010 Quartet Defense Review Document cites the ability to operate in cyberspace as one of the priorities of the Department of Defense and US forces to support defense equipment and systems and outstrip other rivals in this, The field is taking place.

Sajad Abedi
Sajad Abedi
National Security and Defense Think Tank