An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Home : News
NEWS | Nov. 1, 2016

The Most Governed Ungoverned Space: Legal and Policy Constraints on Military Operations in Cyberspace

By Dr. Aaron F. Brantly

Winning wars in cyberspace might sound easy: the click of a mouse or the press of the enter key on a keyboard. Yet, the web of networks that constitutes cyberspace is imbued with challenges. Seemingly every day there is a new story of a government, business, or individual, suffering from a serious hack. These hacks are often attributed to state actors or transnational criminal organizations. Combined, the almost daily revelations of serious incidents compound a common misperception that cyberspace is an ungoverned space. The reality of cyberspace, however, is far different and constitutes a complex environment of overlapping jurisdictions. The overlapping geographic, legal, and technical boundaries affect everything from the freedom of information to the decision to engage in military operations. Technical specifications as well as laws and policies established by local and national governments, international institutions, non-governmental organizations, and corporations form the decision-making framework for national policy-makers and military commanders. Understanding how all the elements of cyberspace interact provides context for when, why and how the United States engages in military operations in cyberspace. This paper examines the complexities of the environment and their impact on the decisions of states (with emphasis placed on the United States) to engage in offensive cyber operations, cyber exploitation,1 and defensive cyber operations against other states and non-state actors. Moreover, it examines the important role that overlapping governmental and non-governmental organizations have in affecting the types of behaviors that occur within cyberspace.

 

READ MORE

 

PUBLICATIONS
What Does the Future Hold for Jack Voltaic Cyber Exercise?
September 25, 2024

Data Privacy and Security as a National Security Imperative
October 30, 2023

Command by intent can ensure command post survivability
August 29, 2023

The Tipping Point for Army Distributed Command and Control
August 1, 2023

Acknowledging the Realities of the Cyber Workforce
July 20, 2023

The Buzz About Electromagnetic Pulse Weapons
July 19, 2023

Book review: ‘On Disinformation’ by Lee McIntyre
July 19, 2023

IRREGULAR WARFARE PODCAST: EXPLORING CYBER POLICY IN THE DEPARTMENT OF DEFENSE
June 20, 2023

ARE WE ASKING TOO MUCH OF CYBER?
May 3, 2023

West Point hosts Joint Service Academy Cybersecurity Summit as industry, government collaborate to defend against cyber threats
April 13, 2023