. Military Space News .
New Cyber Threats Part Nine

disclaimer: image is for illustration purposes only
by James Jay Carafano | Eric Sayers
Washington (UPI), April 7, 2009
Cybersecurity vulnerability should be the primary responsibility of the partner that owns, manages and uses the information technology infrastructure of the United States.

It is largely the U.S. private sector's duty to address vulnerability by taking reasonable precautions in much the same way that society expects the private sector to take reasonable measures for safety and environmental protection. These relations and the nature of the responsibilities that are involved are explored in the Heritage Foundation study "Resiliency and Public-Private Partnerships to Enhance Homeland Security" by James Jay Carafano.

It is essential that the new Obama administration in the United States recognizes clearly the cybersecurity agenda facing it.

The first step in implementing this agenda must be to facilitate cross talk. There is a plethora of ongoing cybersecurity and cyber-warfare initiatives. The tendency of any new U.S. administration in Washington is to conduct grand reviews of existing efforts, issue sweeping strategies, centralize management, and reorganize operations and responsibilities.

That is a mistake. Such moves are as likely to stunt momentum and slow innovation as they are to achieve any efficiencies of operation. Instead, the Obama administration's first priority must be to facilitate cross talk among the members of the national "cyber team."

Today, those responsible for offensive cybersecurity measures -- for example, identifying and countering malicious actors -- have little contact, familiarity or collaboration with those working on "defensive" measures, and vice versa.

Likewise, agencies and organizations conducting covert activities have scant interaction with those engaged in public programs.

This must change. To close gaps, minimize duplication and overlap, facilitate joint action and build trust and confidence among members of the public-private team, establishing routine and consistent dialogue must be an immediate priority. This is a vital first step in building a community of professional cyber-strategic leaders.

The second step in implementing a truly effective cybersecurity strategy has to be research, research, research.

Building cyber-strategic leaders will be like building castles on sand unless the knowledge and skills imparted to them is based on comprehensive, practical and unbiased research. However, as a 2007 Computer Science and Telecommunications Board research report, "Toward a Safer and More Secure Cyberspace," concluded, the national research and development program is wholly inadequate, and both traditional and unorthodox approaches will be necessary.

Part 10: Lessons of the report for closing the knowledge gap in U.S. government and private-sector cybersecurity

(James Jay Carafano, Ph.D., is assistant director of the Kathryn and Shelby Cullom Davis Institute for International Studies and senior research fellow for national security and homeland security in the Douglas and Sarah Allison Center for Foreign Policy Studies, a division of the Davis Institute, at the Heritage Foundation. Eric Sayers is a research assistant in the Allison Center for Foreign Policy Studies at the Heritage Foundation.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


New Cyber Threats Part Eight
Washington, April 6, 2009
Only U.S. government security programs that establish clear tasks, conditions and standards -- and ensure that they are rigorously applied -- will keep pace with determined and willful efforts to overcome security efforts. This is especially true in the cyber domain, where the center of gravity is persistently shifting as the rapid evolution of technology and skills pull it in new directions.







  • Russia's Growing Arctic Power Play
  • China wary of 'G2' with US: analysts
  • Obama passes NATO test, but questions remain
  • Old Russia, role tenions still haunt NATO: experts

  • Russia Says Iran No Threat To Us As New Sanctions Imposed
  • NKorea to exploit launch to bolster regime: analysts
  • NKorea-China border trade resumes
  • BMD Focus: N. Korea's ICBM fails

  • Raytheon Standard Missile-2 Destroys Target
  • Indian tests cruise missile: official
  • US says warships deployed before NKorea launch
  • NKorea may launch several missiles: US general

  • Israel tests Arrow interceptor missile
  • BMD Watch: China targets U.S. carriers
  • Czechs don't expect US to scrap missile shield plans
  • Israeli Very-Short-Range Anti-Ballistic Missile Interceptor System Fails Part Four

  • Airlines fear failure of global climate talks
  • State takes control of China's first private airline: report
  • Troubled private Chinese airline says president missing
  • Cathay Pacific lost 1.1 billion dollars in 2008

  • Pakistan highlights 'gap' with US over drone attacks
  • Russia buys unmanned drones from Israel: report
  • Pakistan to discuss drone attacks with US envoy: spokesman
  • NKorea threatens US spy planes monitoring rocket

  • Obama tells Maliki US will pull out troops on time
  • Dogs of War: Immunity, what immunity?
  • Iraq improving, but challenges remain
  • US, Iraq race to keep extremism at bay in north

  • Vietnam Agent Orange victims vow to fight on
  • Thompson Files: Marines triumph with EFV
  • Outside View: Why F-22 is vital -- Part 14
  • Why The F-22 Is Vital Part 13

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement