This piece is the first in a series that I will be posting over the course of the coming week, in which I will provide my own take on the DOD cyberspace strategy.
In my last post, I noted that the DOD strategy is based on flawed assumptions about the nature of both cyberspace and information, the result of which is a narrow focus on threats to technological infrastructure above all else.