Chapter 3: Historical Legacy and Methodology

HISTORICAL LEGACY:

Strategic Cyber Ventures
2 min readJun 9, 2020

If the name of this report sounds familiar, it could be because it draws inspiration from President Dwight D Eisenhower’s Project Solarium. Created in 1953 in response to the looming Soviet Union threat, Eisenhower tasked his national security team with designing a long-term competitive strategy that would outlast his presidency.

Then came the Ware Report. At the RAND Corporation in the 1960s, Willis Ware began to conceptualize a gathering threat unique to emerging computer networks. Recognizing that the advance of computer networking was unstoppable, Ware set out to create a theory of security in the cyber domain. In 1970, Ware published the Ware Report (earlier known as “Security Controls for Computer Systems”), which argued that information must be secured through a comprehensive set of ‘hardware, software, communication, physical, personnel, and administrative safeguards’. Many of the vulnerabilities foreseen in the report are still fundamental cybersecurity concerns 50 years later.

Similar to the original Solarium effort, the world is also currently living through a period of strategic adjustment, with the US specifically struggling to defend its interests in cyberspace. For the past 25 years, each presidential administration has reached out to academics, business leaders, and innovators to develop new ideas to solve this problem, but has consistently fallen short.

METHODOLOGY:

The Cyberspace Solarium Commission used a multi-method approach to produce this report, including:

  • 200+ meetings with industry experts
  • 25+ meetings with academics
  • 50+ meetings with federal, state, and local officials
  • 10+ seminars/roundtables hosted by think tanks
  • 20+ meetings with officials from international organizations/foreign countries

Unlike the original Solarium, this was not top-secret, but rather an open and collaborative process created by Congress and the executive branch, allowing the Commission to evaluate competing perspectives to create a strategy to best secure American interests in cyberspace.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Strategic Cyber Ventures
Strategic Cyber Ventures

Written by Strategic Cyber Ventures

VC's investing in the future of cybersecurity.

No responses yet

Write a response