Energy News  
The Ten Billion Dollar Cyber Defense Initiative - Part Eight

Despite the growing array of problems associated with using and securing Internet-style networks, virtually nobody in the U.S. government thinks it is desirable to return to a pre-Internet way of doing business.
by Loren B. Thompson
Washington (UPI) Jan 12, 2009
In 2008, the Bush administration during its last year in office began a Comprehensive National Cybersecurity Initiative that eventually will spend more than $10 billion strengthening defenses of U.S. government networks.

During the 2008 U.S. presidential campaign, Sen. John McCain of Arizona, the Republican presidential nominee, noted the growing military role of information operations, while the victorious Democratic presidential nominee, Sen. Barack Obama of Illinois, stated the U.S. government needed to build "the capacity to identify, isolate and respond to any cyberattack."

It appears, therefore, that U.S. national leaders do grasp the importance of network security and information assurance. But seeing the problem is not the same thing as solving it. Before that can occur, there are eight basic questions the incoming administration of President-elect Barack Obama needs to answer.

First, do current trends in cyber threats indicate the United States faces a real crisis of confidence in its networks, or are efforts like the comprehensive cybersecurity initiative sufficient to deal with the challenge?

Second, given how important global connectivity is to information superiority, is it possible to secure essential U.S. government networks while still maintaining links to the anarchic and anonymous Internet?

Third, will the Internet in its current form ever permit users to trace sophisticated attacks to their sources, so that abuses can be effectively deterred and/or defeated?

Fourth, what legal authorities are required so that the U.S. government can overcome barriers to dealing with attacks on critical private-sector networks and establish consistent security standards?

Fifth, what is the proper relationship within the U.S. government between network defense and offensive information operations in formulating an integrated cybersecurity posture?

Sixth, how can the U.S. government encourage a holistic, enterprise-wide understanding of its network resources and challenges, so that solutions are developed in a truly comprehensive rather than piecemeal fashion?

Seventh, is the U.S. Department of Homeland Security an appropriate vehicle for managing government-wide cybersecurity efforts, or is a more focused organization better suited to the task?

Eighth, if the U.S. government is too slow or decentralized to keep up with the rapid proliferation of cyber threats, how can it tap more agile suppliers of network security in the marketplace?

These questions need to be answered before the United States suffers the digital equivalent of a Sept. 11, 2001, attack that so many experts have been predicting.

Despite the growing array of problems associated with using and securing Internet-style networks, virtually nobody in the U.S. government thinks it is desirable to return to a pre-Internet way of doing business. So the real issue policymakers face in meeting the cybersecurity challenge is not whether they can live without digital networks, but how they prevent the enemies of the United States from using those networks against it.

(Loren B. Thompson is chief executive officer of the Lexington Institute, an Arlington, Va.-based think tank that supports democracy and the free market.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Cyber Warfare Doctrines 2009 - Part Seven
Arlington, Va. (UPI) Jan 9, 2009
Within the U.S. federal government, most of the funding allocated to information security and offensive cyber operations is spent by agencies of the Department of Defense.







  • Analysis: The Gazprom-Ukraine dispute
  • Analysis: Central Asian energy in 2009
  • Analysis: African oil faces challenges
  • New technique 'banks' wind farm energy

  • Slovakia tests EU's patience with nuclear plant relaunch plan
  • Bratislava restarts nuclear reactor to avoid blackout
  • Slovaks show 'readiness' with nuke power relaunch: Czech PM
  • Philippines revisits nuclear energy option at 'white elephant' plant

  • Does Global Warming Lead To A Change In Upper Atmospheric Transport
  • Greenhouse gas emissions study released
  • Research Into Fair-Weather Clouds Important In Climate Predictions
  • ESA Tests Laser To Measure Atmospheric Carbon Dioxide

  • Experts plead to save tropical forests in peril
  • Canada's forests not helping environment
  • Scam artists sell 'forest' lands in barren northern China
  • Real Christmas trees 'greener' than fakes

  • Chinese Food Economy Benefits Small, Poor Farmers
  • China steps up food inspections ahead of Spring Festival
  • Myanmar rat infestation causing food crisis: NGO
  • China says 296,000 children fell ill from tainted milk

  • No flying cars at this year's Detroit auto show
  • China's BYD to bring plug-in hybrid, electric cars to US in 2011
  • Recession got you down? Buy a hybrid
  • China 2008 auto sales growth slows to eight percent: state media

  • Protesters buy land earmarked for Heathrow expansion
  • NASA Balloon Mission Tunes In To A Cosmic Radio Mystery
  • Boeing Ends 2008 With 662 Commercial Airplane Orders
  • China moves to bail out aviation industry amid global crisis

  • Nuclear Power In Space - Part 2
  • Nuclear Power In Space
  • Outside View: Nuclear future in space

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement