GPS News  
The Ten Billion Dollar Cyber Defense Initiative - Part Eight

Despite the growing array of problems associated with using and securing Internet-style networks, virtually nobody in the U.S. government thinks it is desirable to return to a pre-Internet way of doing business.
by Loren B. Thompson
Washington (UPI) Jan 12, 2009
In 2008, the Bush administration during its last year in office began a Comprehensive National Cybersecurity Initiative that eventually will spend more than $10 billion strengthening defenses of U.S. government networks.

During the 2008 U.S. presidential campaign, Sen. John McCain of Arizona, the Republican presidential nominee, noted the growing military role of information operations, while the victorious Democratic presidential nominee, Sen. Barack Obama of Illinois, stated the U.S. government needed to build "the capacity to identify, isolate and respond to any cyberattack."

It appears, therefore, that U.S. national leaders do grasp the importance of network security and information assurance. But seeing the problem is not the same thing as solving it. Before that can occur, there are eight basic questions the incoming administration of President-elect Barack Obama needs to answer.

First, do current trends in cyber threats indicate the United States faces a real crisis of confidence in its networks, or are efforts like the comprehensive cybersecurity initiative sufficient to deal with the challenge?

Second, given how important global connectivity is to information superiority, is it possible to secure essential U.S. government networks while still maintaining links to the anarchic and anonymous Internet?

Third, will the Internet in its current form ever permit users to trace sophisticated attacks to their sources, so that abuses can be effectively deterred and/or defeated?

Fourth, what legal authorities are required so that the U.S. government can overcome barriers to dealing with attacks on critical private-sector networks and establish consistent security standards?

Fifth, what is the proper relationship within the U.S. government between network defense and offensive information operations in formulating an integrated cybersecurity posture?

Sixth, how can the U.S. government encourage a holistic, enterprise-wide understanding of its network resources and challenges, so that solutions are developed in a truly comprehensive rather than piecemeal fashion?

Seventh, is the U.S. Department of Homeland Security an appropriate vehicle for managing government-wide cybersecurity efforts, or is a more focused organization better suited to the task?

Eighth, if the U.S. government is too slow or decentralized to keep up with the rapid proliferation of cyber threats, how can it tap more agile suppliers of network security in the marketplace?

These questions need to be answered before the United States suffers the digital equivalent of a Sept. 11, 2001, attack that so many experts have been predicting.

Despite the growing array of problems associated with using and securing Internet-style networks, virtually nobody in the U.S. government thinks it is desirable to return to a pre-Internet way of doing business. So the real issue policymakers face in meeting the cybersecurity challenge is not whether they can live without digital networks, but how they prevent the enemies of the United States from using those networks against it.

(Loren B. Thompson is chief executive officer of the Lexington Institute, an Arlington, Va.-based think tank that supports democracy and the free market.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Cyber Warfare Doctrines 2009 - Part Seven
Arlington, Va. (UPI) Jan 9, 2009
Within the U.S. federal government, most of the funding allocated to information security and offensive cyber operations is spent by agencies of the Department of Defense.







  • NASA Balloon Mission Tunes In To A Cosmic Radio Mystery
  • China moves to bail out aviation industry amid global crisis
  • Boeing Ends 2008 With 662 Commercial Airplane Orders
  • Cathay Pacific books 7.6 billion HK dollar loss over oil hedging

  • Toyota to introduce electric car to US by 2012
  • China's Foton to form 930-mln-dlr truck partnership with Daimler
  • Traffic fatalities in China fall to 73,500 in 2008: report
  • Japan races to build a zero-emission car

  • Boeing Increases Capability Of On-Orbit US Navy Satellite
  • Boeing Develops Common Software To Reduce Risk For TSAT
  • USAF Tests Battlespace Information Solution On AC-130 Gunship
  • Harris Awarded Contract For USAF Satellite Control Network Program

  • Pentagon denies missile defense sales talks with India
  • BMD Watch: New missile for S-400 Triumf
  • What Motivates Iran And Russia On The S-300 Deal Part Two
  • Moscow Says Offer To On Joint Radar Use Still Stands

  • WWF blasts Greek plans for bluefin tuna-fattening farm
  • Ladybugs a sign of healthy olive trees
  • Half the planet could be hit by food crisis by 2100: study
  • China has arrested 60 over tainted milk scandal: police

  • Emergency declared in Fiji as six feared dead in severe storm, floods
  • Search halted, dozens still missing after deadly Guatemala landslide
  • More than 20 jailed over 2007 China bridge collapse: state media
  • Blasts at China fireworks factories kill 14: state media

  • Solving The Mysteries Of Metallic Glass
  • Princeton Researchers Discover New Type Of Laser
  • Brazil Begins Mechanical Tests On Satellites
  • ThalesRaytheonSystems To Upgrade US Army Firefinder Radar

  • Japan researchers unveil robot suit for farmers
  • Will GI Roboman Replace GI Joe
  • Marshall Sponsors Four Student Teams In FIRST Robotics Competitions
  • Jump Like A Grasshopper

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement