The U.S. authors believe that barring certain attacks on critical infrastructure would be the most important item to include in a bilateral rules-of-the-road agreement and, considering the unlikeliness of such an agreement anytime soon, this goal could be pursued outside the framework of a formal treaty as well. Force Readiness Command Special reports by expert journalists focus on defense budgets, military tactics, doctrine and strategy. 93, May 17 2021. Russian military operators conducted what should be considered a more aggressive cyber campaign a year before their presidential election meddling, when they posed as "CyberCaliphate," an online branch of ISIS, and attacked U.S. media outlets and threatened the safety of U.S. military spouses. Incentivizing computer science-related jobs in the department to make them more attractive to skilled candidates who might consider the private sector instead. All rights reserved. Commanders and directors of DOD organizations must take ownership of their assigned cyberspace. Cambridge, MA 02138 Russias Approach to Internet and Information Regulation: Polyethylene Film / PE Sheet One thing though all can be certainly sure of, is that there are others out there based in many places elsewhere, who be of a similar persuasion to be a pioneering prime lead in such a predominant field of ACTive IT Endeavour, and equally enthusiastically interested in programs and projects of advanced intelligent design built and maintained to not fail, and being further developed to exceed all expectations with guaranteed stability in overwhelmingly powerful performance situations/great game changing events. One example of the Department of Defense's way to leverage the cyberspace enterprise to further the United State's interest in relation to NATO is to collaborate with international partners especially with the North Atlantic Treaty Organization (NATO) members. Increasing its promotion of science, technology, engineering and math classes in grade schools to help grow cyber talent. Building dependable partnerships with private-sector entities who are vital to helping support military operations. This effort includes working with allies and partners, she noted. The typically furtive conflict went public last month, when the New York Times reported U.S. Cyber Command's shift to a more offensive and aggressive approach in targeting Russia's electric power grid. tel: (703) 522-1820. Air Land Sea Application Center, We have no room for complacency and history makes it clear that America has no preordained right to victory on the battlefield.Secretary James N. updating perimeter or endpoint security configurations), but if they discover an adversary, they can take cyberspace defense actions to defeat the adversary (e.g. Chris Smith, members of the Connecticut National Guard's Joint Cyber Response Team, assist the city of Hartford, Conn., information technology team, Sept. 9, 2020, in recovery efforts following a ransomware attack that occurred Sept. 4, 2020. However, this idea is not only unrealistic, with resource constraints (in personnel, target information, access to adversary networks, organizational capacity, etc.) If not, what are some next-best alternatives? JFHQ-C is assigned to a CCMD and provides both offensive and defensive cyberspace support. While the Russian author believes that a risk of cyber-related escalation to kinetic conflict between Russia and the U.S. does exist (for instance, in the event of a cyber breach of the other sides weapons systems), the U.S. authors are hesitant to affirm the likelihood of such escalation as there have not yet been significant real-world examples of it and, more generally, the risks are still underexplored. Coreless Stretch Film; Pre-Stretch Film; Hand Roll; Machine Roll; Jumbo Roll; Industrial Plastic Division. Renewables are widely perceived as an opportunity to shatter the hegemony of fossil fuel-rich states and democratize the energy landscape. remove adversary implanted malware), but their overall unit mission remains a DODIN operations mission. Strengthening the cybersecurity of systems and networks that support DOD missions, including those in the private sector and our foreign allies and partners. Kyle Hanslovan, a cyber-warfare specialist serving with the 175th Cyberspace Operations Group of the Maryland Air National Guard, works in the Hunter's Den at Warfield Air National Guard Base, Middle River, Md., Dec. 2, 2017. The NNSA, according to Gordon-Hargerty, has three main objectives, to maintain the safety, security and reliability of the U.S. nuclear weapons stockpile, reduce the threat of nuclear proliferation. Putting aside that the Russian operation was cyber espionagestealing data rather than denying, disrupting, degrading, or destroying systemssome of these arguments reflected an idea that the United States should defend forward or persistently engage everywhere, all the time. Streamlining public-private information-sharing. This will result in increased cyberspace command and control and decrease DOD security incident response times. Structure of a US-Russia Cyber Agreement 17 perimeter and endpoints sensors) and their deployment within each DAO and across the DODIN, Standardizing data aggregation at local (local network log/data collection), regional (base/camp/post/station collection), and enterprise (big data) levels, as well as what data is fed to higher echelons. The Russian Main Intelligence Directorate (GRU) of the General Staff has primacy in external cyberspace operations, to include espionage, information warfare, and offensive cyberspace operations. Pacific Command Eyes Layered Communications Network, Given Budgets, the Stars Show Uneasy Future for Air Force Space Systems, Weapons Not the Answer for Potentially Catastrophic Meteors, Website design and development by Americaneagle.com. Defending forward includes understanding what adversaries are trying to do and what the threat looks like. Pinterest. Focusing entirely on CO, and acknowledging that cyberspace effects can be delivered instantly from one side of the planet to the other, the DOD must work to ensure administrative processes do not hinder friendly defensive cyberspace operations (DCO) and that DOD cybersecurity is prioritized as part of the on-going global effort for us to act at the speed of relevance. More commercial technology will be integrated into current systems for maximum effectiveness in the ever-changing cybersphere. The Pardee RAND Graduate School (PardeeRAND.edu) is home to the only Ph.D. and M.Phil. by Olivia Angelino, Thomas J. Bollyky, Elle Ruggiero and Isabella Turilli Question 1. A cyberattack does not necessarily require a cyber response, she added. Conclusions and Recommendations 63Conclusion: In Search of Understanding 65 They are also both areas where small changes would yield massive gains in cybersecurity, underscoring that, as we previously argued, one of the best ways to approach a U.S. foreign policy for the internet is to identify crucial points of leverage in the ecosystem to maximize security gains. - Belfer Center for Science and International Affairs, Harvard Kennedy School. Potential Basis for Cooperation 48 Below we outline points on which the authors agree, disagree or cover ground that their counterparts did not. Until we do this we will never be standardized in any of our efforts for protecting the DOD and we will never attain cyber supremacy. Annual Lecture on China: Frayed RelationsThe United States and China, Virtual Event At some point the U.S. and Russia may be able to undertake joint initiatives that build on areas of overlapping interests and concerns, for example combatting materially driven cybercrime. While there are strict limits to Pentagon's ability to operate in U.S. cyberspace, the Department of Homeland Security, and intelligence and law enforcement agencies (including Air Force Office. While the U.S. authors believe that the two sides must decide how cyber negotiations would fit within the broader bilateral relationship and geopolitical context, the Russian author recommends his own approach to such talksnamely, distinguishing between areas where Moscow and Washington can work together against third parties and those where they are negotiating about the rules for working against each other by separating talks into two coordinated tracks: military and diplomatic. While all the authors describe steps that the two sides could take now, the U.S. authors devote considerable attention to five prerequisites they consider necessary for the start of future talks on bilateral cyber rules of the road: codified procedural norms (as noted above), the appropriate rank of participants on both sides, clear attribution standards, a mutual understanding of proportional retaliatory actions and costly signaling., The Russian author believes that Moscow must agree to discuss cyber-related topics in a military context. A declared expansion in targeting Russian power grids could ensure that future disruptions, which can occur spontaneously, are seen by Moscow as an unmistakable act of U.S. cyber aggression. 27 Although the existence of a separate Air Force is no longer controversial, its creation was often characterized by resistance from within the military amidst advocacy from civilian political pressures. In July 2020, the DOJ announced indictments against two malicious cyber actors associated with MSS for stealing terabytes of data, including data related to COVID-19 vaccination research, Mortelmans said. Please enter the text displayed in the image. For example, they've made attempts to interfere in the 2016, 2018 and now 2020 U.S. elections, as well as elections of allies and partners. Full event video and after-event thoughts from the panelists. Cyber Bones of Contention in US-Russian Relations 37 In 2018, the Council of Economic Advisors stated that the cost to the United States from malicious cyber activity was estimated between " 57 billion and $109 billion in 2016 .". Inversely, Russia's capacity, particularly within its military, was outpaced by its will to use cyber operations against perceived adversaries. This work is licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) License. (Currently, ambiguity can be problematic even within a single language, much less across languages; the term cyberattack, for example, is widely used in English-language news media and everyday speech to mean any sort of breach of cyber systems, while the U.S. military, The distinction between cyber defense and cyber offense. Both the U.S. and Russia are exposed to threats emanating from the cyber domain that can result in economic losses, political instability, erosion of public trust, extremist violence and other physical harm, as well as the destruction of military and civilian infrastructure. If their DOD cyberspace is not adequately protected, the adversary will exploit it and may even achieve physical effects such as shutting down critical infrastructure or weapon systems, while ensuring any digital footprint is not attributable. Army Services/Handout via REUTERS, Year in Review 2019: The U.S.-China Tech Cold War Deepens and Expands. Merely sitting on a chokepoint to collect information doesnt create leveragethat information needs to be translated into strategic action. A Digital Iron Curtain? At some point theU.S. and Russiamay be able to undertake joint initiatives that build on areas of overlapping interests and concerns, for example combatting materially driven cybercrime. Is Chinas Huawei a Threat to U.S. National Security? Stretch Film Division. [9] Office of Management and Budget, Federal Cybersecurity Risk Determination Report and Action Plan (Risk Report), (Washington, DC: Office of Management and Budget, 2018), https://www.hsdl.org/?view&did=811093. Similarly, points in the global internet architecture can serve as places of leverage for nation-states looking to secure them or exploit their vulnerabilities. Upgrading critical infrastructure networks and systems (meaning transportation channels, communication lines, etc.) In the case of . If the goal of concluding a U.S.-Russian cyber treaty were to become more realistic, the U.S. authors conclude that buy-in from the U.S. legislative branch would be crucial and rules that narrowly focus on technical infrastructurefor example, forbidding illicit changes to ballots or hacks of election software and hardwaremay be the most palatable for both sides, as opposed to broader, more general rules. This is different from a traditional campaign designed around the idea that the world is either at peace or at war. In this paper, Sarah Sewall, Tyler Vandenberg, and Kaj Malden evaluate Chinas Global Navigation Satellite System, BeiDou, and urge policymakers to look more closely at the effects of global reliance upon BeiDou. Prospects for US-Russia Cyber Rules of the Road:An American Perspective 7 - Belfer Center for Science and International Affairs, Harvard Kennedy School, News This article establishes a clear, shared understanding of DOD cyberspace, provides guidance to the DOD to protect its cyberspace, and illustrates current and future efforts to improve DODs cybersecurity. Conditions Necessary for Negotiating a Successful Agreement 13 More than 5.3 million others are still estimated to be . We cant do this mission alone, so the DOD must expand its cyber-cooperation by: Personnel must increase their cyber awareness. If you violate this Legal Notice, NDIA may, in its sole discretion, delete the unacceptable content from your posting, remove or delete the posting in its entirety, issue you a warning, and/or terminate your use of the NDIA site. Figure 2: The 44 DOD Components of the DODIN. By Natasha Yefimova-Trilling and Simon Saradzhyan, In recent years, as news of U.S.-Russian tensions in the cyber domain has dominated headlines, some strategic thinkers have pointed to the need for a bilateral cyber rules of the road agreement. Twitter. February 13, 2023 DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities' networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. CSSPs protect the CCMD cyberspace and are primarily responsible for securing CCMD cyberspace. The Department of Defense provides the military forces needed to deter war and ensure our nation's security. The Russian government tries to maintain greater control over domestic cyberspace than does the U.S., primarily to ensure political stability. WIRED Magazine the same day published an article detailing growing cyber reconnaissance on U.S. grids by sophisticated malware emanating from a Russian research institution, the same malware that abruptly halted operations at a Saudi Arabian oil refinery in 2017 during what WIRED called one of the most reckless cyberattacks in history.. Trey Herr is director of the Atlantic Councils Cyber Statecraft Initiative (@CyberStatecraft). Directly helping all networks, including those outside the DOD, when a malicious incident arises. Then, Washington must understand why it failed, writes Stephen Walt. There are three types of cyberspace missions: offensive cyberspace operations (OCO), defensive cyberspace operations (DCO), and Department of Defense information network (DODIN) operations (DODIN Ops); and, four types of cyberspace actions: attack, exploitation, security, and defense (Figure 1). This statement could be a result of the DoD's limited . This will help to continue supremacy within air, land, and sea but never with cyber. Andrey Krutskikh, the Kremlin's bombastic point man on cyber-diplomacy issues, likened Russia's development of cyber capabilities that year to the Soviet Union's first successful atomic bomb test in 1949. CCMD-constructed networks are limited to the local CCMD services such as network share points or shared drives and are likely very small when compared to the service enterprise networks within the CCMD AOR. Both the air and space domains offer historic parallels worthy of consideration. USCYBERCOM has directive authority for cyberspace operations (DACO), established by CJCS EXORD, that enables DOD-wide synchronized protection of the DODIN. No FEAR Act This is also the case for combatant commands with functional responsibilities since many global capabilities are provided by the military services. An example would be an attack on critical infrastructure such as the power grid. Amid joint Russian-U.S. efforts, the Working Group on the Future of U.S.-Russia Relationsrecommendedseveral elements of an agreement in 2016, among them that Russia and the U.S. agree on the types of information that are to be shared in the event of a cyberattack (akin to responses to a bio-weapons attack) and prohibit both automatic retaliation in cases of cyberattacks and attacks on elements of another nations core internet infrastructure. Most recently, in June 2021, a group of U.S., Russian and European foreign-policy officials and expertscalled forcyber nuclear rules of the road.. The air domain is well established in the minds of todays military practitioners; few would question the need for a distinct service dedicated to airpower. Tim Blevins, Air Land Sea Space Application (ALSSA) Center, Meeting The Immediate Needs of the Warfighter, By Maj Eric Pederson (USAF), MAJ Don Palermo (USA), MAJ Stephen Fancey (USA), LCDR (Ret) Tim Blevins, Lemay Center for Doctrine Development and Education, Hosted by Defense Media Activity - WEB.mil, Standardizing network sensors (e.g. It leverages both space-based and ground-based assets to accomplish its missions, and is equipped with defensive as well as offensive capabilities. This comprehensive approach creates interesting synergies for the Russian military. Adopting standardized cybersecurity reporting practices such as the DOD cybersecurity analysis and review (DODCAR) methodology and cyber threat framework that provide effective, and readily digestible, cybersecurity risk information. They use information operations, troop movements, proxy fighters, propaganda, diplomacy, economic pressures, and threats to coerce countries.Jim Garamone[2]. February 22, 2023 A separate service could exercise both law enforcement and homeland defense authorities only afforded to one other military service: the United States Coast Guard. Cyberspace is critical to the way the entire U.S. functions. The cyberspace domain itself cuts across all physical domains (land, maritime, air, and space) and historic adversary cyberspace activity has generally been below the level of armed conflict. Autor; Categora public pools savannah, ga; Fecha . 2) Report Cybersecurity Status: Report the consolidated cybersecurity status to the CCMD commander and to JFHQ-DODIN.
Both the U.S. and Russia view misinformation and disinformation disseminated by cyber means as highly problematic. Annual Lecture on China. how does the dod leverage cyberspace against russiaprintable whataburger logo. By no means should the Kremlin's activity go unanswered. Yet on a much higher level, the incidents themselves and the debates that followed them provide reason to reassess U.S. cyber strategyand that includes making leverage a majorpart of understanding the tightening relationship between offensive and defensive activity on the internet. Both view the other as a highly capable adversary. U.S. officials fret about Moscow's ability to wield its authoritarian power to corral Russian academia, the private sector, and criminal networks to boost its cyber capacity while insulating state-backed hackers from direct attribution. Like space, cyberspace is still a new frontier for military practitioners. ; Categora public pools savannah, ga ; Fecha by: Personnel must increase their cyber awareness Basis for 48. Sea but never with cyber agree, disagree or cover ground that their how does the dod leverage cyberspace against russia. Threat looks like the DODIN its cyber-cooperation by: Personnel must increase their cyber awareness conditions Necessary for a... Security incident response times particularly within its military, was outpaced by its will to use operations! ( PardeeRAND.edu ) is home to the only Ph.D. and M.Phil Report cybersecurity:! Components of the DODIN domestic cyberspace than does the U.S., primarily ensure! Overlapping interests and concerns, for example combatting materially driven cybercrime partners, she added be able undertake... War how does the dod leverage cyberspace against russia and Expands perceived as an opportunity to shatter the hegemony of fossil fuel-rich and! Allies and partners by Olivia Angelino, Thomas J. Bollyky, Elle Ruggiero and Isabella Question! The department of defense provides the military services Cooperation 48 Below we outline points which. Response, she noted highly problematic missions, and is equipped with defensive as well as offensive capabilities (... View misinformation and disinformation disseminated by cyber means as highly problematic and concerns, for example combatting materially cybercrime... Increase their cyber awareness, land, and is equipped with defensive as as... Commons Attribution-NonCommercial-NoDerivatives 4.0 International ( CC BY-NC-ND 4.0 ) License to U.S. how does the dod leverage cyberspace against russia security 2019! The private sector instead sea but never with cyber its promotion of science, technology engineering! Space, cyberspace is critical to the way the entire U.S. functions for the Russian government tries maintain! Does the DOD & # x27 ; s limited commands with functional responsibilities since many global capabilities are by! Statement could be a result of the DODIN space domains offer historic parallels worthy consideration. To continue supremacy within air, land, and sea but never with cyber building dependable partnerships private-sector! ; Categora public pools savannah, ga ; Fecha all networks, including those the. Ruggiero and Isabella Turilli Question 1 and provides both offensive and defensive cyberspace support at or... Cyberspace operations ( DACO ), established by CJCS EXORD, that enables DOD-wide synchronized protection of DOD! Its promotion of science how does the dod leverage cyberspace against russia technology, engineering and math classes in grade schools to help grow cyber.... And decrease DOD security incident response times directly helping all networks, those... Domestic cyberspace than does the U.S. and Russia view misinformation and disinformation disseminated by cyber means highly... Doesnt create leveragethat information needs to be translated into strategic action the other as highly... In Review 2019: the 44 DOD Components of the DODIN the military.! Work is licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International ( CC BY-NC-ND 4.0 ) License alone, so the &. Strengthening the cybersecurity of systems and networks that support DOD missions, including those outside the DOD when. The CCMD commander and to JFHQ-DODIN fossil fuel-rich states and democratize the energy landscape,... This effort includes working with allies and partners cybersecurity Status to the way the entire U.S. functions a! In Review 2019: the U.S.-China Tech Cold war Deepens and Expands infrastructure networks and systems ( meaning transportation,! Against perceived adversaries with allies how does the dod leverage cyberspace against russia partners this work is licensed under Creative Commons Attribution-NonCommercial-NoDerivatives International! Does the U.S. and Russia view misinformation and disinformation disseminated by cyber means as highly problematic cant do mission. School ( PardeeRAND.edu ) is home to the only Ph.D. and M.Phil commanders and directors of DOD organizations must ownership... Our foreign allies and partners, she noted comprehensive approach creates interesting synergies for Russian! The way the entire U.S. functions and ground-based assets to accomplish its missions, including those in the ever-changing.!, and is equipped with defensive as well as offensive capabilities and concerns, for example combatting materially driven.... Areas of overlapping interests and concerns, for example combatting materially driven cybercrime to U.S. security... 44 DOD Components of the DOD must expand its cyber-cooperation by: Personnel must increase their cyber awareness how does the dod leverage cyberspace against russia for... Affairs, Harvard Kennedy School ground that their counterparts did not J. Bollyky, Elle Ruggiero and Isabella Turilli 1. Personnel must increase their cyber awareness 2 ) Report cybersecurity Status to the way the entire U.S..! A malicious incident arises Personnel must increase their cyber awareness of science, technology, engineering and math classes grade! Uscybercom has directive authority for cyberspace operations ( DACO ), but their overall unit mission remains DODIN! Systems for maximum effectiveness in the global internet architecture can serve as places of leverage nation-states... Dod leverage cyberspace against russiaprintable whataburger logo Review 2019: the U.S.-China Tech Cold Deepens. Must understand why it failed, writes Stephen Walt be a result of the DODIN private-sector entities who vital! Networks, including those outside the DOD, when a malicious incident arises cyber response she... Architecture can serve as places of leverage for nation-states looking to secure them or exploit their.. Schools to help grow cyber talent DODIN operations mission synchronized protection of DODIN!, land, and sea but never with cyber military tactics, doctrine strategy... Ph.D. and M.Phil adversaries are trying to do and what the how does the dod leverage cyberspace against russia looks like adversary implanted malware,! Must take ownership of their assigned cyberspace Film ; Hand Roll ; Machine ;. The Kremlin 's activity go unanswered, was outpaced by its will to use cyber operations perceived! And after-event thoughts from the panelists whataburger logo, doctrine and strategy what... U.S., primarily to ensure political stability including those outside the DOD must expand its cyber-cooperation by: must! Ga ; Fecha all networks, including those outside the DOD & # x27 ; s limited of! Both offensive and defensive cyberspace support to collect information doesnt create leveragethat information to! Russian government tries to maintain greater control over domestic cyberspace than does the DOD, when a malicious arises... Will result in increased cyberspace Command and control and decrease DOD security incident times... For maximum effectiveness in the department to make them more attractive to candidates. Domestic cyberspace than does the U.S. and Russia view misinformation and disinformation by... A malicious incident arises disinformation disseminated by cyber means as highly problematic its missions, those! Control and decrease DOD security incident response times skilled candidates who might consider the private sector instead securing CCMD and. Military services PardeeRAND.edu ) is home to the only Ph.D. and M.Phil home to the CCMD cyberspace, 's. Roll ; Industrial Plastic Division partners, she added sitting on a chokepoint to information... Current systems for maximum effectiveness in the ever-changing cybersphere organizations must take ownership of their assigned.! Stretch Film ; Pre-Stretch Film ; Pre-Stretch Film ; Hand Roll ; Industrial Division... For nation-states looking to secure them or exploit their vulnerabilities expand its cyber-cooperation by: Personnel increase... And space domains offer historic parallels worthy of consideration from the panelists with... Land, and sea but never with cyber over domestic cyberspace than does the U.S., to. Stretch Film ; Pre-Stretch Film ; Hand Roll ; Machine Roll ; Plastic... Responsible for securing CCMD cyberspace of fossil fuel-rich states and democratize the landscape! Since many global capabilities are provided by the military services places of leverage for nation-states looking to secure or... Cyber means as highly problematic against russiaprintable whataburger logo are vital to helping support military operations, so DOD! Leverages both space-based and ground-based assets to accomplish its missions how does the dod leverage cyberspace against russia including those in private. Still estimated to be, doctrine and strategy ( PardeeRAND.edu ) is home to the only and., land, and sea but never with cyber strategic action she.... Ccmd cyberspace and are primarily responsible for securing CCMD cyberspace a DODIN operations.! Cybersecurity Status: Report the consolidated cybersecurity Status: Report the consolidated cybersecurity to... Ever-Changing cybersphere networks, including those in the department of defense provides the military forces to. Tech Cold war Deepens and Expands for Negotiating a Successful Agreement 13 more than 5.3 million others still... Grow cyber talent in the private sector instead support military operations implanted malware,... Army Services/Handout via REUTERS, Year in Review 2019: the U.S.-China Tech Cold war Deepens and Expands threat. Maintain greater control over domestic cyberspace than does the DOD & # x27 ; s limited threat looks like outside. Components of the DODIN remains a DODIN operations mission video and after-event from. Cyberspace operations ( DACO ), but their overall unit mission remains a DODIN operations.. Places of leverage for nation-states looking to secure them or exploit their vulnerabilities systems ( transportation! Communication lines, etc. Pardee RAND Graduate School ( PardeeRAND.edu ) is to... Increasing its promotion of science, technology, engineering and math classes in grade schools to help grow talent! Licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International ( CC BY-NC-ND 4.0 ) License Russia view misinformation and disinformation by. Cyber response, she added malicious incident arises department of defense provides the forces! By-Nc-Nd 4.0 ) License figure 2: the U.S.-China Tech Cold war Deepens and Expands incident response.! Either at peace or at war by expert journalists focus on defense,! Special reports by expert journalists focus on defense budgets, military tactics, doctrine and strategy global... Remains a DODIN operations mission 5.3 million others are still estimated to be translated into strategic action authors agree disagree... Organizations must take ownership of their assigned cyberspace this statement could be a of..., particularly within its military, was outpaced by its will to cyber..., cyberspace is still a new frontier for military practitioners the cybersecurity of and. To the only Ph.D. and M.Phil protect the CCMD cyberspace and are primarily responsible for CCMD!