ABSTRACT

In small group policy meetings, the solitary cyber expert often sounds like "Rain Man" to the policy wonks in the room after the third or fourth sentence. It is far easier to learn about physical threats from US government agencies than it is to learn about cyber threats. In the popular culture, the availability of 10,000 applications for smart phone is viewed as an unalloyed good. It is not—since each represents a potential vulnerability. US Cyber Command has been in existence for more than a year, and no one familiar with the command or its mission believes our policy, law, or doctrine is adequate to our needs or our capabilities.