This paradigm has enabled adversaries of the U.S. to sidestep the military supremacy of the U.S and conduct asymmetric cyber-attacks against the less secured private sector of America. Adopting this approach nullifies the ability of the U.S. to respond militarily as there is no definitive redline that an adversary cannot cross in which military action would be warranted. As a result of this nexus, the private and public networked sectors have become the new front line of twenty-first century warfare (Adams, 2001). As the U.S. entered into the twenty-first century, it became clear that the lack of a U.S. cyber strategy would only exacerbate the persistent threats to the private sector, the nervous system of the U.S. economy, and the threat it presented to the information technologies that have defined contemporary U.S. military supremacy.
As stated previously, modern infrastructure is so interdependent on information technologies that it has become a defining characteristic of contemporary life and arguably the nervous system of both the U.S. economy and military. The rate in which cyberspace has invaded virtually every aspect of daily life has been extraordinary. From 2000 to 2010, global internet usage increased from 360 million to over 2 billion people (QDR, 2010). This rate of expansion has largely outpaced the rate of much needed cybersecurity efforts. This disparity initially created a large gap between the United States’ level of dependency on cyberspace or information technologies and its level of cybersecurity. As a result, foreign nations and non-state actors have worked persistently to exploit this capabilities gap by attempting and sometimes gaining access to both classified and unclassified networks, to include the D...
... middle of paper ...
... New Concern. National Strategy Forum Review, Winter 2000.
International Strategy for Cyberspace: Prosperity, Security and Openness in a Networked World. (2011). Retrieved from http://www.whitehouse.gov/international_strategy_for_cyberspace.pdf.
National Security Strategy. (2010). Retrieved from http://www.whitehouse.gov/national_security_strategy.pdf
Quadrennial Defense Review Report. (2010). Retrieved from http://www.defense.gov/qdr/pdf.
Rathbone, A. E., & Rowley, C.K. (2002). Terrorism. Public Choice, 112, (3-4), 215-224.
Singer, P. W., Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press, New York, New York.
Snow, D. M. (2014). National Security for a New Era (5th ed.). Pearson. Upper Saddle River, New Jersey.
Tucker, J. B. (1999). Asymmetric Warfare. Forum for Applied Research and Public Policy, 14, (2), 32-38.
Barnet, Richard J. “The Ideology of the National Security State”. The Massachusetts Review, Vol. 26, No. 4. 1985, pp. 483-500
At this juncture, it may be somewhat difficult to accept the proposition that a threat to the telecommunications grid, both wired and wireless, in the United States could potentially be subject to a catastrophic cyber attack. After careful research on the subject, it appears the potentiality of an event of such magnitude, which either disrupts one or the other grids for a long period or destroys either, is both theoretically and realistically impossible. It may be that proponents—those who advance such theories—equate such “doomsday” scenarios as if a cyber attack would or could be of the same magnitude as a conventional or nuclear military strike. Terms such as “cyber Pearl Harbor,” “cyber 9/11” and “cyber Vietnam” have been used to describes potential catastrophic cyber attacks and yet, “Though many have posited notions on what a ‘real’ cyber war would be like, we lack the understanding of how such conflicts will be conducted and evolve.” (Rattray & Healey, 2010, p. 77). Yet, the U.S. government continues to focus on such events, as if the plausibility of small-scale cyber attacks were not as pressing.
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
Terrorism represents a continuing threat to the United States. It is the most significant threat to our national security. Terrorist attacks have definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism.
President Obama has realized the seriousness of the upcoming threats and turned the government focus more toward defending the information and communications infrastructure and In May 2009, he issued a request from top to bottom review of the current situation. The report titled the Cyberspace Policy Review includes strategy, policy, and standards regarding the security of and operations in cyberspace. According the white house’s cybersecurity foreign policy, the Cyberspace Policy Review highlighted two objectives and ten near-term actions to support the cybersecurity strategy.
It is difficult to define cyberculture because its boundaries are uncertain and applications to certain circumstances can often be disputed. The common threads of defining cyberculture is a culture which has evolved and continues to evolve from the use of computer networks and the internet and is guided by social and cultural movements reflective of advancements in scientific and technological information. It is not a unified culture but rather a culture that exists in cyberspace and is a compilation of numerous new technologies and capabilities, used by diverse people in diverse real – world locations. Cyberculture, a twentieth century phenomenon, has brought challenges unlike any other that the United States has seen in the areas of cyber security and its impact on our most critical institutions. This presentation will focus on the aforementioned three entities where national security is in jeopardy, in part due to cyberculture and its intentional use for disruptive and destructive purposes.
Wendt, Alexander. “Constructing International Politics.” International Security. Cambridge: President and Fellows of Harvard College and the Massachusetts Institute of Technology, 1995. 71-81. Print.
Although an act of cyberterrorism has yet to occur, officials and scholars continuously study the possibilities of such an attack. As our physical and virtual worlds continue to intertwine the risk of such an event rapidly increases. Everything from our transportation systems to pharmaceutical manufacturing are computer controlled. The closest the world has come to an act of cyberterrorism was in 2000. Known as the Maroochy Shire case in Queensland, Australia was committed by Vitek Boden. Boden was an engineer for Pacific Paradise, a sewage pumping in Australia. He was able to successful hack into a control system modifying the operations and dumping millions of litres of raw sewage into the local waterways. Boden’s motivation was the only reason the act was not classified as cyberterrorism was his motivation. It was personal rather than political or religious in nature (Sharp Parker, 2009). The only reason this wasn’t the first act of cyberterrorism was motivation. As companies invest in upgrading their technological capabilities, they too need to invest in security structure to protect their systems and the public from threats of terrorism. Our government must also decide how to address public safety in regards to cyberterrorism. On September 11th, 2001 America was reminded how vulnerable we are when it comes to acts of terrorism. The sheer complexity and varying design of attacks often makes it very difficult to create a catch-all defense in fighting terrorism. To improve the disruption of terrorist activities by government agencies in the United States many laws needed to be updated to include the latest areas of electronic communications.
USCYBERCOM unifies the command of the cyberspace efforts and units of the United States military. The United States Department of Defense also has outlined the principles that form its cyber defense strategy, building and maintaining ready forces and capabilities to conduct cyberspace operations, defend the DoD information network, secure DoD data, and mitigate risks to DoD missions. Be prepared to defend the U.S. homeland and U.S. vital interests from disruptive or destructive cyberattacks of significant consequence. Build and maintain viable cyber options and plan to use those options to control conflict escalation and to shape the conflict environments at all stages. Build and maintain robust international alliances and partnerships to deter shared threats and increase international security and stability. The five pillars of cyber security, confidentiality, integrity, availability, non-repudiation, and authentication. Protecting information from disclosure to unauthorized individuals, systems or entities, Protect information, systems, and services from unauthorized modification or destruction, Timely, reliable access to data and information services by authorized users, the ability to correlate a recorded action with its originating individual or entity, and the ability to verify the identity of an individual or entity
Paisley. "The Impact of a Cyber War." Defense Tech RSS. N.p., 16 Jan. 2008. Web. 21 Nov. 2013. (Source H)
It is unrealistic to imagine that the copious amount of departments responsible for cybersecurity are able to adequately protect the country; therefore, the government needs to form one department that can be responsible for all cybersecurity problems and cyberattacks. When forming this new department, resources from other groups that currently share responsibility can be moved in order to decrease the amount of resources needed for the new group. But, it is also unfathomable for the government to be responsible for all cybersecurity as “... the reality is that while the lion’s share of the cybersecurity expertise lies in the federal government, more than 90 percent of the physical infrastructure of the Web is owned by private industry” (McConnell 4). Therefore the government must collaborate with the private sector. This cooperation can be utilized to help form the new government group as “there is also an opportunity for the new agency to be formed in a more deliberate way, drawing on leadership from the private economy to promote efficiency and cost-effectiveness” (Cohen 2). By working with the private sector, the new agency can reduce costs of personnel and equipment, increase performance, and maintain diverse cybersecurity plans. Once a
Gonchar, Michael. “What Is More Important: Our Privacy or National Security?” New York Times. New York Times, 17 Sept. 2013. Web. 22 Feb. 2014.
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
Olender, Michael. “Keeping Pace with Cyber Power, Defense, and Warfare.” Journal of International and Global Studies 6.2 (2015): 55+. Academic OneFile. Web. 5 Oct. 2015.
My strong curiosity towards the field of Cybersecurity dates back to my pre-university days when I started reading sci-fi novels. Digital Fortress, a techno-thriller novel written by Dan Brown, explored the theme of government surveillance, security and civil liberties. This theme is brought out in the book by portraying cryptographic techniques, security policies and implications of these policies. This gravitated me towards the field of security. With little programming experience, I was eager to begin my nascent adventure in the field of Cybersecurity. Although I’ve gained exposure in the field of security during the course of my Bachelor’s degree, I believe pursuing a master’s degree in Cybersecurity will allow me to explore the field of security in greater depth and utilize it effectively to address more real-world challenges.