. Military Space News .
New Cyber Threats Part Eight

disclaimer: image is for illustration purposes only
by James Jay Carafano | Eric Sayers
Washington, April 6, 2009
Only U.S. government security programs that establish clear tasks, conditions and standards -- and ensure that they are rigorously applied -- will keep pace with determined and willful efforts to overcome security efforts. This is especially true in the cyber domain, where the center of gravity is persistently shifting as the rapid evolution of technology and skills pull it in new directions.

It is essential to understand the need for effective interagency and public-private cooperation to implement effective cybersecurity. Properly understanding the performance of the interagency process requires dividing it into three components.

First is policy, which is the highest level of the interagency process. At this level, policymakers make broad agreements about how they will support overall U.S. policy. Improvements in this area require a renewed focus on the qualities and competencies of executive leadership and an intelligence capability and information-sharing culture that allows leaders to obtain the highest-quality information available so that they are positioned to make the best-informed decisions.

Second is operations. It is at this level where the record of the U.S. government is mixed. The U.S. Department of Defense's Unified Combatant Command structure has proven itself capable of managing military operations at the regional level. However, there are very few other established bodies that are able to monitor and manage operations over a geographical area.

Third is field activities. U.S. government interagency cooperation on the ground has generally been effective. The country teams led by U.S. ambassadors around the world offer a strong example. However, when challenges grow beyond the control of the local government apparatus, robust support mechanisms are normally lacking.

Attention to improved doctrine, including how to best conduct joint planning and response during a cyber crisis, sufficient investment in human capital and appropriate decision-making are required in such situations.

Effective interagency cooperation does not begin at the policy level but requires a more responsive operational environment that can meet the challenges of local leadership. This issue is explored in James Jay Carafano's paper, "Managing Mayhem: The Future of Interagency," published March 1, 2008, at heritage.org/press/commentary/ed030308b.cfm.

It is the responsibility of government to prevent terrorist attacks, but determining the criticality of assets should be a shared public-private activity. This starts by establishing a common appreciation of roles and responsibilities for the public-private partnership.

Vulnerability should be the primary responsibility of the partner that owns, manages and uses the infrastructure.

Part 9: Presenting a new cybersecurity agenda for the Obama administration

(James Jay Carafano, Ph.D., is assistant director of the Kathryn and Shelby Cullom Davis Institute for International Studies and senior research fellow for national security and homeland security in the Douglas and Sarah Allison Center for Foreign Policy Studies, a division of the Davis Institute, at the Heritage Foundation. Eric Sayers is a research assistant in the Allison Center for Foreign Policy Studies at the Heritage Foundation.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


New Cyber Threats Part Seven
Washington (UPI) April 3, 2009
It is important that U.S. policymakers learn to think strategically in planning to combat cybersecurity threats to the nation. There are many "first-order" questions that deserve serious thought as the United States considers the next steps in keeping the cyber commons open to the free flow of services and ideas while thwarting the activities of malicious actors.







  • Russia's Growing Arctic Power Play
  • Obama passes NATO test, but questions remain
  • Old Russia, role tenions still haunt NATO: experts
  • Analysis: France rejoins NATO

  • NKorea rocket launch rattles Japan
  • Pyongyang Wants More Launches, As Seoul Reviews Missile Technology
  • Mousavi vows to change Iran's 'extremist image'
  • BMD Focus: N. Korea's ICBM fails

  • Raytheon Standard Missile-2 Destroys Target
  • Indian tests cruise missile: official
  • US says warships deployed before NKorea launch
  • NKorea may launch several missiles: US general

  • BMD Watch: China targets U.S. carriers
  • Czechs don't expect US to scrap missile shield plans
  • Israeli Very-Short-Range Anti-Ballistic Missile Interceptor System Fails Part Four
  • US, SKorea, Japan coordinate on NKorea launch

  • Airlines fear failure of global climate talks
  • State takes control of China's first private airline: report
  • Troubled private Chinese airline says president missing
  • Cathay Pacific lost 1.1 billion dollars in 2008

  • Pakistan to discuss drone attacks with US envoy: spokesman
  • NKorea threatens US spy planes monitoring rocket
  • Israeli drones attacked Iranian convoys in Sudan: report
  • Washington plans new drone attacks on Pakistan: report

  • Dogs of War: Immunity, what immunity?
  • Iraq improving, but challenges remain
  • US, Iraq race to keep extremism at bay in north
  • Analysis: New terror-group tactics in Iraq

  • Thompson Files: Marines triumph with EFV
  • Outside View: Why F-22 is vital -- Part 14
  • Why The F-22 Is Vital Part 13
  • Why The F-22 Is Vital Part 12

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement