Report 1
10/10/2014
Luke Weyrauch
ICS 382 – 01 Fall 2014
Faisal Kaleem
Metropolitan State University
Background
Cyberattacks have both the potential to devastate and intimidate. They can disable national infrastructure, disrupt communication systems, or even destroy nuclear reactors.
Cybersecurity is a thought-provoking and interesting issue. The use of cyberattacks in US as a tool of policy is not sufficiently deliberated by policy makers but it’s of utmost importance to the nation. The policy issues facing the acquisition and use of cyberattacks in US remains a riddle among many policymakers in the US and the world at large. “Lifting the Veil on Cyber Offense” is an article based on the National Research Council, 2009. The article
…show more content…
Summary of the issues raised
The pertinent issues presented in the article are majorly based on the ways the National
Research Council can protect the US against cyberattacks. The article affirms that cybersecurity is both a delicate and sensitive issue that requires deliberate monitoring before taking any action.
However, most of the studies carried out have been based mostly on the cyberdefense side rather than the cyber offense side. This gap, therefore, acts as a motivation towards carrying out this particular research in trying to unveil some of the issues that remain untouched.
The current state of cyberattacks in many countries including the US is one filled with dilemma and misunderstanding. Proper institutions and policies have not been set in place to ensure that the policies formulated are in line with both national and international interests. Some of the problems existing include difficulty in identification of parties responsible for cyberattacks, strategic and tactical implications of cyberattacks, and lack of comprehensive strategic policies in the US, among many others (Lin, 2009). These problems exist because cyber related crimes have no boundaries nor proper
The existence of cyberterrorism has been around since the 1980’s, but defining cyberterrorism has proven to be difficult especially within the United States. Devising a common terminology has been extremely difficult because there have been various published definitions from agencies such as the Federal Bureau of Investigation (FBI), the Department of Defense (DoD), The Department of Homeland Security (DHS) and the Department of Justice (DOJ). Each agency has there own distinct understanding of what cyberterrorism means and because of the lack of a more unified definition, the area of cyberterrorism suffers from a limited source base to draw upon based on variables that are not so easily identified.
This memorandum is written to reveal the vulnerabilities of the current state of the United States’ cyber security. It will also specify policy options that can be taken in order to improve the current policy. Cyber security focuses on protecting computers, networks, databases, and programs from unauthorized access or change. Changes need to be made in cyber security as soon as possible if the United States wants to be secure.
The critical front line in the counter terror battle will most certainly be cyberspace. It will also be the most volatile one ,to be sure, homegrown, lone-wolf terrorists will still exist. Some of these attacks can be devastatingly destructive, or at least profoundly embarrassing, as Sony Pictures recently learned. Whether or not the Pyongyang government was actually responsible for the Sony hack, experts worry that regular computer geeks are now able to mount similarly intrusive attacks. And that poses a near-infinite range of potentially serious threats to governments, commercial entities, and
cyber policy has embraced this idea. “The Plan declared that in order for it to succeed, government and the private sector must work together in a partnership. However since the regulation has been in place it has failed to provide the security necessary to protect U.S. critical infrastructure from a cyber attack. Even Congress has been slow to act regarding almost all aspects of cyber policy (Wolf, J. 12 July, 2012).” One of the problems facing a comprehensive cyber security bill is that computers have become so omnipresent in our daily lives that they cross every sector of the economy. It is not surprising that application of the laws of war to cyber attacks has recently been a popular topic in politics. Some have even analyzed whether a cyber attack can constitute an armed attack, it can but, whether a cyber attack with a specified effect constitutes a use of force. An example, if the U.S. could prove that Iran absolute sent a computer virus that infected a Wall Street, would dropping a bomb on Iran be justify? A responsible nation must always consider the possibilities of collateral damage in deciding whether an act of self defense is justified, be it cyber or kinetic. While the United States must undoubtedly increase its cyber defense capabilities, the nation cannot retreat behind a Line of firewalls. As in the fight against terrorism, the United States must be vigilant and aggressive in the face of both cyber attacks and
As the aforementioned economic sphere requires international cooperation, so does the military sphere, as cybersecurity attacks on military targets are non-geographical. This causes territorial division of responsibility to wither in importance. The US must cooperate with foreign law enforcement agencies to resolve cybersecurity concerns (Harknett & Stever, 2011, p. 456). Therefore, the US cannot rely solely on domestic policy formation to address cybersecurity vulnerabilities.
Cyber warfare is part of the American defense military strategy of proactive cyber defense and the use of cyber warfare as a means of attack. According to the United States military cyber attack is a form of ancient act of war. In 2013 Cyber warfare was, for the first time, perceived as a major threat than terrorist or Al Qaeda, according to U.S. intelligence officials. Representative Rogers Mike the leader of the U.S House permanent select committee on Intelligence, He said July 2013 that majority of Americans could not realized that the United States was under the middle of a cyber war. Cyber Warfare is an impending threat to the United States homeland security. Technology has been integrated in virtually every sphere of life in the form of computer technology including security. The modernization and revolution of the information technology has awakened to a new down of information warfare, a threat that stubbornly dogs the United States Homeland Security in form of cyber terrorism. The threat is an invisible war with weapons of automation yet with detrimental intent to espionage and sabotage security. This research paper intends to investigate the history of cyber terrorism, why cyber terrorism has flourished means of making the internet safer.
Direct and aggressive cyber security attacks against the United States of America from a foreign country, provides a strong case for the justification of mandating cyber security controls. Recent government reports and news releases implicate foreign countries in targeting government entities, individuals, and corporations with hopes of compromising important information. One example of a country specifically targeting the United States’ information pool is the People’s Republic of China. The 2009 Report to Congress
These days cyber-attacks are one of the top crimes in the world. We all connected online in some way. I have personally been a victim of a cyber hack when my bank card was stolen and sold on the dark web. In a matter of minutes my card made multiple purchases in several different states. This has made me more aware of my digital footprint. Based on my own actions and the actions of the institutes I choose to occupy. Cyber security and surveillance has become a constant challenge for any person, company, institution and country. Even our own government has taken measures to protect the nation’s information.
Cyberterrorism, is an explosive and heavily volatile act that threatens the very fabric of networking operations of their intended target/s, and guess what, the United States “cyberspace” platform has provided a means of accessing our most secretive, sensitive, including, military tactical operations data. Successful attacks upon the US networking infrastructure would obviously impede governmental operation, more importantly; accessing a wealth of potentially destructive information would have profound implications, thus, Cybersecurity policies must be implemented. Cybersecurity policies create levels and barriers of networking security as their standards, guidelines, and response to potential threats, vulnerabilities, and
Whether it is Iran targeting American banks or casinos, China hacking into the federal government 's network, criminals attacking companies like Target, North Korea punishing Sony or Russia hacking President Obama’s email, cyber security is a major source of anxiety for the U.S. government and private sector. In a survey, 84% of global financial institutions ranked cyber-risk as one of their top five concerns.
Cybersecurity is an aspect of security that has shaped the way we as a people think and live our everyday lives. For the past 10 years and even before then, this trend of cybersecurity has been a constant topic of both discussion and protection of our data and of our financial assets as well. There have been numerous attacks on companies and federal organizations from big name Fortune 500 companies such as Visa, Target, etc. to big name federal agencies such as National Security Agency (NSA), and Federal Bureau of Investigation (FBI) just to name a couple. This principle of cybersecurity will continue to be something that will always remain a factor in all that we do. According to Bradley (2016), “Unfortunately, we don’t really have a clear vision from any of the candidates of how they intend to address the cybersecurity landscape or cyber threats against the United States if elected”. In 2016, the presidential election has come into full swing, cybersecurity has been something that has come to the forefront of candidates’ campaigns and speeches, the constant question of how can we continue to protect ourselves from cyber espionage.
Protecting US citizens and important infrastructure which have impact on national security, economic security or public health and safety from cyber-attacks is one of the recent congressional interests and the internet protection is also needed. Initial there was an approach to ensure the operations of critical infrastructure and larger economy regulatory framework is needed. There came an argument that these regulatory schemes may not improve cybersecurity and it increases the costs to business and this leads to additional liability if they fail to meet cybersecurity standards.
When people talk about how fast technology is evolving in our world today, an important factor that has come into play because of the way people exploit technology is cybersecurity. There are several directions that cybersecurity has gone in affecting the world. Most recent the past election and how another country determined the outcome of that election by gaining online contact. There are several flaws that have happened with current cybersecurity, but it can still be a good thing if better solutions are put into place, and if more cybersecurity analyst take their responsibilities more seriously. Those responsibilities can range from dealing with an incoming cyber-attack, and setting up protection for businesses that have important data.
In fact, the threat of an attack has grown significantly throughout cyberspace to where cyberspace has emerged as an arena for war similar to that of land, sea, air and space, with the emergent possibility to harm the national security of nation-states, as exemplified by the 2007 cyber warfare that plagued Estonia.
Cyber-attacks are constantly becoming a critical issue for government systems and for businesses around the world. In fact, the cyber challenges that we see today play a huge political factor for government sectors. The U.S is constantly facing these cyber security threats that jeopardize America’s critical infrastructure and the freedoms that many Americans express online (Bucci, S., Rosenzweig, P., & Inserra, D. 2013). These challenges that are taking a political factor can also be seen in other countries as well and governments need to cooperate together to mitigate these challenges. In addition, cybersecurity challenges can also play a social factor as well for the world. With the increasing amount of devices connecting to the internet, cyber criminals are able to cause massive harm to users around the world. In fact, “21% of internet users have had an email or social networking account compromised or taken over by someone else without permission” (Ranine, L., Kiesler, S., Kang, R., & Madden, M. 2013). It is important for people to cooperate with each other by being more aware and enforce good security practices when they are on the web. There is also one more cybersecurity challenge that plays an economical factor in today’s world. In fact, the average total cost of a data breach increased by 23% with a total of $3.93 million (Ponemon, L. 2015). It is important to have a global cooperation about these cyber challenges so that we can address these challenges in a smart