GPS News  
Unleashing Hurricanes In Cyberspace Part Five

disclaimer: image is for illustration purposes only
by Loren B. Thompson
Washington (UPI) Jan 2, 2009
One expert has compared the failure of the information infrastructure to the simultaneous arrival of 50 major hurricanes in terms of how disruptive it would be to the national economy.

Against this backdrop, the rapid proliferation of cyber threats and the apparent adoption by some countries of information warfare as a national strategy is very troubling. Most of the nation's economic infrastructure, including the information grids, is privately owned, and there are legal barriers to determining precisely how vulnerable parts of it may be.

Experiments conducted by the Department of Homeland Security have demonstrated how Internet predators might penetrate utilities and shut them down, but no one really knows the degree to which potential adversaries are already poised to do so. Even when it can be proven that electronic attacks on domestic networks were launched from places like China, there is no sure way of knowing where they actually originated.

The challenge of guarding networks supporting the national economy is exacerbated by the myriad ways in which digital operating systems and applications might be compromised. Malicious software is being generated and disseminated on such a vast scale that even when it is detected, there often is no immediate remedy for the problem.

The Internet is so ubiquitous and anonymous that there is no practical way of suppressing such software without severely impairing the functionality of the whole system, which itself could become a significant burden to the economy. Nonetheless, many experts fear it is just a matter of time before cyber predators do serious damage to the national economy, and some contend that is already happening today.

Finding lasting solutions to the danger posed by cyber threats is an extremely complicated challenge. The threats take many forms, and are constantly evolving. The cyberspace domain in which they unfold is anarchic and anonymous, sprawling across political and geographical boundaries in a manner that defies regulation. Many of the remedies proposed to limit abuses also limit the freedom of users. However, if the federal government cannot find a workable approach to deterring and defeating cyber threats, then the United States may be unable to sustain its military and economic edge in the information age.

Most experts agree that a few basic principles are central to any effective defense. First, users must be aware of the danger and trained to avoid creating vulnerabilities that can be exploited by predators.

Second, access to sensitive networks must be controlled by limiting points of entry, blocking or filtering traffic through those points, and instituting rigorous authentication procedures for legitimate users.

(In Part 6: The problems of preparing properly to defend against cyber attacks)

(Loren B. Thompson is chief executive officer of the Lexington Institute, an Arlington, Va.-based think tank that supports democracy and the free market.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Tough sentences in China over huge piracy ring, Microsoft says
Beijing (AFP) Jan 1, 2009
A Chinese court has issued tough sentences to members of a huge software counterfeiting ring, which distributed more than two billion dollars' worth of fake Microsoft goods, the company said.







  • China Eastern says bailout increased to one billion dollars
  • Britain's environment minister concerned by Heathrow plan
  • Climate protesters cause chaos at British airport
  • Thompson Files: Protect U.S. aerospace

  • China's Foton says clean energy car factory opened in Beijing
  • Thompson Files: Wisdom on the bailout
  • China plans to avert US-style auto crisis: report
  • China opens road tunnel under Yangtze: state media

  • Boeing Develops Common Software To Reduce Risk For TSAT
  • USAF Tests Battlespace Information Solution On AC-130 Gunship
  • Harris Awarded Contract For USAF Satellite Control Network Program
  • LockMart Delivers Key Hardware For US Navy's Mobile User Objective System

  • BMD Watch: New missile for S-400 Triumf
  • What Motivates Iran And Russia On The S-300 Deal Part Two
  • Moscow Says Offer To On Joint Radar Use Still Stands
  • BMD Focus: Russia's S-300s boost Iran

  • Chinese melamine victims call for help in hastily-arranged briefing
  • China milk boss admits delay in reporting danger: state media
  • China releases parents of melamine children: lawyer
  • New Zealand partner rejects China's contaminated milk 'confession': report

  • Five die in China chemical plant explosion: state media
  • Some China quake relief funds misused: state media
  • Natural disasters killed over 220,000 in 2008: reinsurer
  • Avalanches kill at least six in Canada

  • Brazil Begins Mechanical Tests On Satellites
  • ThalesRaytheonSystems To Upgrade US Army Firefinder Radar
  • Lockheed Martin SBIRS Team Delivers Major Subsystems For Second GEO Satellite
  • New polymer coatings prevent corrosion

  • Marshall Sponsors Four Student Teams In FIRST Robotics Competitions
  • Jump Like A Grasshopper
  • Rescue Robot Exercise Brings Together Robots, Developers, First Responders
  • Honda unveils leg assist machine for elderly

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement