Continuity and Change in US Cyber Security Strategy from 2009 to 2024
DOI:
https://doi.org/10.30907/jcopolicy.vi69.819Keywords:
Cybersecurity, United States, Strategy, U.S. National SecurityAbstract
This study aims to analyze the continuity and change in U.S. cybersecurity strategy from 2009 to 2024, with a focus on evaluating why these strategies have been largely ineffective despite the United States' technological prominence. The study also seeks to understand the impact of cyber challenges on U.S. national security and to assess the extent to which adopted strategies have succeeded in achieving national objectives. The central problem addressed is that, despite the U.S. possessing advanced technological capabilities in cybersecurity, and despite successive administrations, particularly under Obama and Trump, recognizing the risks posed by cyber threats, the country continues to experience major breaches that threaten its national security.
The research employs an analytical approach to study the dimensions and determinants of U.S. cybersecurity strategy, alongside a case study method to use the U.S. model as a framework for understanding its successes and failures. A comparative approach is also used to analyze the evolution of cybersecurity strategies across different administrations, beginning with Obama, followed by Trump, and up to Biden.
The study concludes with several key findings, most notably that the lack of coordination among U.S. cybersecurity institutions has undermined the effectiveness of strategic responses. The study also highlights shifts in priorities across different administrations. It recommends strengthening interagency coordination to unify efforts and enhance emergency response capabilities. Moreover, it emphasizes the need to develop integrated strategies that link cybersecurity directly with national security.
References
احمد، سيد احمد. 2020. "في دلالات الهجوم الالكتروني على أمريكا". الاهرام، 2020.
https://gate.ahram.org.eg/News/2547973.aspx.
إسكندر، ماجد. 2020."تهديدات الفضاء السيبراني للأمن القومي: دراسة في أنماط التوظيف السياسي للهجمات السيبرانية." أطروحة دكتوراه.، جامعة القاهرة/ كلية الاقتصاد والعلوم السياسية.
الرفيعي، علي محمد إمنيف. 2018. "تحديات الأمن في الفضاء السيبراني الأمريكي." مجلة دراسات دولية، عدد .85 (ابريل): 291-314
https://www.iraqoaj.net/iasj/download/c2750450086aa82a
الكعود، إسراء شريف. 2022. "التأثير السيبراني في الامن القومي للدول الفاعلة (الولايات المتحدة الامريكية) نموذجاً." مجلة العلوم السياسية، عدد. 64 (ديسمبر): 1-18.
https://doi.org/10.30907/jcopolicy.vi64.628
لامية، طالة. 2021. "التهديدات والجرائم السيبرانية: تأثيرها على الأمن القومي للدول واستراتيجيات مكافحتها." معالم للدراسات القانونية والسياسية، عدد .2 (ديسمبر): 69-56.
https://asjp.cerist.dz/en/downArticle/520/4/2/138496
دحماني، سليم. 2018. "أثر التهديدات السيبرانية على الأمن القومي: الولايات المتحدة نموذجًا (2001-2017)." أطروحة دكتوراه.، جامعة محمد بوضياف/كلية الحقوق والعلوم السياسية.
عبد العاطي، عمرو. 2018. استراتيجية أمريكية هجومية ضد التهديدات السيبرانية. مصر: المركز المصري للفكر والدراسات الاستراتيجية.
عبد الصادق، عادل .2022. "صراع السيادة السيبرانية بين التوجهات الأمريكية والروسية". المركز العربي لأبحاث الفضاء الإلكتروني. .2022
عبد الحميد، محمود مدحت مختار. 2020. "الأبعاد الأمنية الحديثة والأمن القومي للدول: دراسة حالة إستراتيجية الأمن القومي للولايات المتحدة الأمريكية في عهد الرئيس دونالد ترامب 2017". المركز الديمقراطي العربي. 16أغسطس، 2020.
https://democraticac.de/?p=68983
علاء الدين، إيمان. 2021. "الأمن السيبراني: المفهوم والتداعيات في السياسة العالمية". مركز الحضارة للدراسات والبحوث. 1ابريل،2021.
علام، مها محمد محمد. 2014."ثورة المعلومات والأمن القومي: دراسة حالة الولايات المتحدة الأمريكية." رسالة ماجستير.، جامعة القاهرة/ كلية الاقتصاد والعلوم السياسية.
فرج، كرار عباس متعب. 2021. "الحرب السيبرانية: دراسة في الهجمات السيبرانية بين الولايات المتحدة وإيران." مجلة حمورابي للدراسات، عدد. 40: 195-223.
https://hamm-journal.org/index.php/HJS/article/view/231/175
فودة، محمود سعودي علي. 2023. "الأمن السيبراني والعلاقات الأمريكية الصينية: بين التعاون والتنافس." أطروحة دكتوراه.، جامعة القاهرة/ كلية الاقتصاد والعلوم السياسية.
هارت، ليدل. 2000. الإستراتيجية وتاريخها في العالم. ترجمة الهيثم الأيوبي. بيروت: دار الطليعة للطباعة والنشر.
List of Reference:
Ahmed, Sayed Ahmed. 2020. "On the Implications of the Cyber Attack on America." Al-Ahram, 2020.https://gate.ahram.org.eg/News/2547973. (in Arabic)
Alaa El-Din, Iman. 2021. “Cybersecurity: Concept and Implications in Global Politics.” Hadara Center for Studies and Research, April 1, 2021.https://hadaracenter.com/%D8%A7%D9%84%D8%A3%D9%85%D9%86-%D8%A7%D9%84%D8%B3%D9%8A%D8%A8%D8%B1%D8%A7%D9%86%D9%8A-%D8%A7%D9%84%D9%85%D9%81%D9%87%D9%88%D9%85-%D9%88%D8%A7%D9%84%D8%AA%D8%AF%D8%A7%D8%B9%D9%8A%D8%A7%D8%AA-%D9%81 (in Arabic)
Azmi, Riza, William Tibben, and khin Than Win. 2016. Motives Behind Cyber Security Strategy Development. Wollongong: Australasian Conference on Information Systems. https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1051&context=acis2016
Atkinson, Wade H., Jr. 2020. “A Review of the Trump Administration’s National Cyber Strategy: Need for Renewal and Rethinking of the Public-Private Partnership in U.S. National Security Policy.” lnstitute World politics. October 22, 2020. https://www.iwp.edu/active-measures/2020/10/22/a-review-of-the-trump-administrations-national-cyber-strategy-need-for-renewal-and-rethinking-of-the-public-private-partnership-in-u-s-national-security-policy/.
Al-Kaoud, Israa Sharif. 2022. “Cyber Impact on National Security of Active States (United States of America) as a Model.” Political Science Journal, No. 64:) December:( 1-18. https://doi.org/10.30907/jcopolicy.vi64.628 .(in Arabic)
Allam, Maha Mohammed Mohammed. 2014. “The Information Revolution and National Security: A Case Study of the United States of America.” Master’s Thesis., Cairo University/ Faculty of Economics and Political Science.(in Arabic)
Al-Rafii, Ali Muhammad Imanif. 2018. “Security Challenges in American Cyberspace.” Journal of International Studies, No. 85: )April:( 291-314. https://www.iraqoaj.net/iasj/download/c2750450086aa82e. (in Arabic)
Abdel Hamid, Mahmoud Medhat Mokhtar. 2020. “Modern Security Dimensions and National Security of States: A Case Study of the National Security Strategy of the United States of America under President Donald Trump 2017.” Arab Democratic Center. August 16, 2020.https://democraticac.de/?p=68983. (in Arabic)
Abdel Sadek, Adel. 2022. “The Struggle for Cyber Sovereignty between American and Russian Trends.” Arab Center for Cyberspace Research. 2022.https://accronline.com/article_detail.aspx?id=32528&srsltid=AfmBOoq8jetVFawJ3_R0U_lHZxmQLjdQpj2YCSUKC5YVAsIL_AMo0MdV. (in Arabic)
Abdel-Ati, Amr. 2018. America’s Offensive Strategy Against Cyber Threats. Egypt: Egyptian Center for Thought and Strategic Studies. https://ecss.com.eg/2077. (in Arabic)
Caton, Jeffrey L. 2017. Evaluation of the 2015 DOD Cyber Strategy: Mild Progress in a Complex and Dynamic Military Domain. Strategic Studies Institute, US Army War College. https://apps.dtic.mil/sti/pdfs/AD1056843.pdf.
Dahmani, Salim. 2018. “The Impact of Cyber Threats on National Security: The United States as a Model (2001-2017).” Master’s Thesis., Mohamed Boudiaf University/ Faculty of Law and Political Science. (in Arabic)
Farag, Karar Abbas Mutab. 2021. “Cyberwar: A Study of Cyberattacks between the United States and Iran.” Hammurabi Journal of Studies, No .40: 195-223. https://hamm-journal.org/index.php/HJS/article/view/231/175 (in Arabic)
Fouda, Mahmoud Saoudi Ali. 2023. “Cybersecurity and US-China Relations: Between Cooperation and Competition.” Master’s Thesis., Cairo University/ Faculty of Economics and Political Science. (in Arabic)
Hart, Liddell. 2000. Strategy and its History in the World. Translated by Al-Haitham Al-Ayyubi. Beirut: Al-Tali’ah Printing and Publishing House. (in Arabic)
Iskandar, Majed. 2020. “Cyberspace Threats to National Security: A Study of the Patterns of Political Employment of Cyber Attacks.” Master’s Thesis., Cairo University/ Faculty of Economics and Political Science. (in Arabic)
Lonergan, Erica D, and Jacquelyn Schneider. 2023. “The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation.” Journal of Cybersecurity9, No.1: (March 31): 1-10. https://doi.org/10.1093/cybsec/tyad006.
Lostri, Eugenia, and Stephanie Pell. 2023. “The Biden Administration’s Implementation Plan for the National Security Strategy.” September 19, 2023. https://www.lawfaremedia.org/article/the-biden-administration-s-implementation-plan-for-the-national-cybersecurity-strategy.
Lamia, Tala. 2021. "Cyber Threats and Crimes: Their Impact on National Security and Strategies to Combat Them." Landmarks for Legal and Political Studies 4, No. 2 (December): 69-56. https://asjp.cerist.dz/en/downArticle/520/4/2/138496 (in Arabic)
National Security Strategy of the United States of America. 2010. The White House. May, 2010. https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/national_security_strategy.pdf
National Security Strategy of the United States of America. 2015. The White House. February, 2015. https://obamawhitehouse.archives.gov/sites/default/files/docs/2015_national_security_strategy_2.pdf
National Security Strategy of the United States of Americ. 2018. The White House. September, 2018. https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
Sanger, David E. 2023. “New Biden Cyber Security Strategy Assigns Responsibility to Tech Firms.” The New York Times. March 2, 2023. https://www.nytimes.com/2023/03/02/us/politics/biden-cybersecurity-strategy.html
Sanger, David E. 2015. “Pentagon Announces New Strategy for Cyber Warfare.” The New York Times. April 1, 2015. http://www.nytimes.com/2015/04/24/us/politics/pentagon-announces-new-cyberwarfare-strategy.
The White House. 2023. “Background Press Call by Senior Administration Officials Previewing the Biden-Harris Administration’s National Cyber Strategy.” MARCH 2, 2023. https://bidenwhitehouse.archives.gov/briefing-room/press-briefings/2023/03/02/background-press-call-by-senior-administration-officials-previewing-the-biden-harris-administrations-national-cyber-strategy/
Downloads
Published
Issue
Section
License
Copyright (c) 2025 تامر سعيد عبد اللطيف محمود

This work is licensed under a Creative Commons Attribution 4.0 International License.