A framework for synthesizing the United States Code in support of cyberspace operations
Stonehouse, Joshua C.
MetadataShow full item record
In recent years, federal agencies and organizations have witnessed their jurisdictions converge in a number of areas that support U.S. national security. For operations that rely heavily upon information technology, the complexity associated with clarifying statutory authority has been met with inconsistent responses. Attempts to comprehend the technological implications of these operations has been accompanied by a shift in seeing the United States Code (U.S.C.) as providing mutually exclusive authorities to government entities operating in cyberspace. While many recognize that cyberspace poses new and unique challenges to inter-title operations, it is unclear whether this de facto shift in the application of U.S.C. statutes is necessary. The U.S.C. has a limited number of exclusionary distinctions de jure, which is attested to by a long history of inter-title cooperation that efficiently and effectively supports government operations. Most of the concerns over the United States Code can be appropriately categorized in terms of oversight and compliance requirements, fiscal controls, and statutory responsibilities. This thesis addresses these statutory concerns and culminates with a planning framework that can be used to enable military and other government agencies to support multiple title authorities cooperating seamlessly to effectively plan and execute cyberspace operations.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Kujawski, Andrzej V. (Monterey, California: Naval Postgraduate School, 2016-06);This work addresses the insufficiency of United States Department of Defense joint doctrine for incorporating cyberspace operations into counterinsurgency (COIN) campaigns. This insufficiency is addressed through the use ...
Frye, Heath W. (Monterey, California. Naval Postgraduate School, 2010-12);Due to recent vulnerabilities of Department of Defense (DoD) networks, along with the rising importance of cyberspace and cyberspace warfare endeavors among competing great powers, the DoD is quickly recognizing the ...
Peng, Leisheng; Wijesekera, Duminda; Wingfield, Thomas C.; Michael, James B. (Monterey, California: Naval Postgraduate School., 2006);Purpose – This paper aims to assist investigators and attorneys addressing the legal aspects of cyber incidents, and allow them to determine the legality of a response to cyber attacks by using the Worldwide web ...