Energy News  
New Cyber Threats Part Nine

disclaimer: image is for illustration purposes only
by James Jay Carafano | Eric Sayers
Washington (UPI), April 7, 2009
Cybersecurity vulnerability should be the primary responsibility of the partner that owns, manages and uses the information technology infrastructure of the United States.

It is largely the U.S. private sector's duty to address vulnerability by taking reasonable precautions in much the same way that society expects the private sector to take reasonable measures for safety and environmental protection. These relations and the nature of the responsibilities that are involved are explored in the Heritage Foundation study "Resiliency and Public-Private Partnerships to Enhance Homeland Security" by James Jay Carafano.

It is essential that the new Obama administration in the United States recognizes clearly the cybersecurity agenda facing it.

The first step in implementing this agenda must be to facilitate cross talk. There is a plethora of ongoing cybersecurity and cyber-warfare initiatives. The tendency of any new U.S. administration in Washington is to conduct grand reviews of existing efforts, issue sweeping strategies, centralize management, and reorganize operations and responsibilities.

That is a mistake. Such moves are as likely to stunt momentum and slow innovation as they are to achieve any efficiencies of operation. Instead, the Obama administration's first priority must be to facilitate cross talk among the members of the national "cyber team."

Today, those responsible for offensive cybersecurity measures -- for example, identifying and countering malicious actors -- have little contact, familiarity or collaboration with those working on "defensive" measures, and vice versa.

Likewise, agencies and organizations conducting covert activities have scant interaction with those engaged in public programs.

This must change. To close gaps, minimize duplication and overlap, facilitate joint action and build trust and confidence among members of the public-private team, establishing routine and consistent dialogue must be an immediate priority. This is a vital first step in building a community of professional cyber-strategic leaders.

The second step in implementing a truly effective cybersecurity strategy has to be research, research, research.

Building cyber-strategic leaders will be like building castles on sand unless the knowledge and skills imparted to them is based on comprehensive, practical and unbiased research. However, as a 2007 Computer Science and Telecommunications Board research report, "Toward a Safer and More Secure Cyberspace," concluded, the national research and development program is wholly inadequate, and both traditional and unorthodox approaches will be necessary.

Part 10: Lessons of the report for closing the knowledge gap in U.S. government and private-sector cybersecurity

(James Jay Carafano, Ph.D., is assistant director of the Kathryn and Shelby Cullom Davis Institute for International Studies and senior research fellow for national security and homeland security in the Douglas and Sarah Allison Center for Foreign Policy Studies, a division of the Davis Institute, at the Heritage Foundation. Eric Sayers is a research assistant in the Allison Center for Foreign Policy Studies at the Heritage Foundation.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


New Cyber Threats Part Eight
Washington, April 6, 2009
Only U.S. government security programs that establish clear tasks, conditions and standards -- and ensure that they are rigorously applied -- will keep pace with determined and willful efforts to overcome security efforts. This is especially true in the cyber domain, where the center of gravity is persistently shifting as the rapid evolution of technology and skills pull it in new directions.







  • Unique Approach For Splitting Water Into Hydrogen And Oxygen
  • Analysis: Energy Dept. stimulus grants
  • Analysis: Oil and Gas Pipeline Watch
  • Germany's Linde unveils new Chinese joint venture

  • Kazakhstan may host nuclear fuel bank: president
  • GEH And India Nuclear Companies Sign Project Development Agreements
  • EMCOR Group Subsidiary Awarded Contracts For Bruce Nuclear Generator Station
  • Calvert Cliffs Nuclear Plant Unit 2 Returns To Full Power

  • Iridescent Ice Clouds From Aircraft Wings
  • Deep-Sea Rocks Point To Early Oxygen On Earth
  • Australia issues warning on Hong Kong's dirty air
  • Rendezvous With HALO

  • Some tree seeds are longtime survivors
  • Indonesia should drop forest carbon credit plan: Greenpeace
  • UN climate talks: Save the forests -- but how?
  • Ecuador tops in protecting rain forest

  • Wine producers pin hopes on China in tough times
  • Flame Retardants Affecting US Coastal Ecosystems
  • Can Organic Cropping Systems Be As Profitable As Conventional Systems
  • Gutsy Germs Succumb To Baby Broccoli

  • Beijing extends post-Olympics car rules: report
  • Netherlands to introduce car trade-in bonus
  • New Storage System Design Brings Hydrogen Cars Closer To Reality
  • New car hydrogen storage system created

  • Airlines fear failure of global climate talks
  • State takes control of China's first private airline: report
  • Troubled private Chinese airline says president missing
  • Cathay Pacific lost 1.1 billion dollars in 2008

  • Nuclear Power In Space - Part 2
  • Nuclear Power In Space
  • Outside View: Nuclear future in space

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement