This piece is the first in a series that I will be posting over the course of the coming week, in which I will provide my own take on the DOD cyberspace strategy.
In my last post, I noted that the DOD strategy is based on flawed assumptions about the nature of both cyberspace and information, the result of which is a narrow focus on threats to technological infrastructure above all else.
Yet, to my knowledge, today we have no similar safeguards in place to what the DOD had during the Cold War years to check on the influence of foreign powers on American institutions.