. Military Space News .
New cyber threats Part 10 and 11

disclaimer: image is for illustration purposes only
by James Jay Carafano | Eric Sayers
Washington DC (UPI) Apr 10, 2009
In 2007 a U.S. Computer Science and Telecommunications Board research report titled "Toward A Safer and More Secure Cyberspace" concluded that the U.S. research and development program to ensure national cybersecurity was still wholly inadequate.

"Both traditional and unorthodox approaches will be necessary," the report warned. "Traditional research is problem-specific, and there are many cybersecurity problems for which good solutions are not known. ... Research is and will be needed to address these problems."

However, it continued, "Problem-by-problem solutions, or even problem-class by problem-class solutions, are highly unlikely to be sufficient to close the gap by themselves.

"Unorthodox, clean-slate approaches will also be needed to deal with what might be called a structural problem in cybersecurity research now, and these approaches will entail the development of new ideas and new points of view that revisit the basic foundations and implicit assumptions of security research," the Computer Science and Telecommunications Board research report said.

"Addressing both of these reasons for the lack of security in cyberspace is important, but it is the second -- closing the knowledge gap -- that is the primary goal of cybersecurity research," it concluded.

The Computer Science and Telecommunications Board report goes on to lay out an appropriate research agenda including such issues as deterring would-be attackers and managing the degradation and reconstitution of systems in the face of concerted attacks.

A further step in implementing any truly effective national cybersecurity strategy for the United States must be to "get safe."

Encouraging innovation is perhaps the quickest and most effective way to promote public-private engagement and build a national ability to mitigate and respond to cyber threats. Providing liability protection is one proven means of promoting private-sector innovation.

Since the terrorist attacks of Sept. 11, 2001, the U.S. Congress has acted decisively and to good effect in one area of liability protection: The Support Anti-Terrorism by Fostering Effective Technologies Act lowered the liability risks of manufacturers that provide products and services used in combating terrorism.

The act, passed in 2002 and known as the SAFETY Act, protects the incentive to produce products that the secretary of homeland security designates as Qualified Anti-Terrorism Technologies. The Department of Homeland Security has made a concerted effort to implement the program, and about 200 companies have obtained SAFETY Act certification.

earlier related report
How the 2002 SAFETY Act should be further used
As we have previously noted, since the terrorist attacks on the United States of Sept. 11, 2001, the U.S. Congress has acted decisively and to good effect in one area of liability protection.

The Support Anti-Terrorism by Fostering Effective Technologies Act lowered the liability risks of manufacturers that provide products and services used in combating terrorism.

The act, passed in 2002, protects the incentive to produce products that the secretary of homeland security designates as Qualified Anti-Terrorism Technologies. The Department of Homeland Security has made a concerted effort to implement the program, and about 200 companies have obtained SAFETY Act certification. This process is explored in the Heritage Foundation paper "Fighting Terrorism, Addressing Liability: A Global Proposal" by James Jay Carafano, Backgrounder No. 2138, published May 21, 2008. It is available online.

This SAFETY Act-generated program should be used to accelerate the fielding of commercial products and services for U.S. national cybersecurity.

It is also essential to implement the National Security Professional Development program. The Obama administration should build on this program, a process to educate, certify and track national-security professionals. This program was launched by President George W. Bush in an executive order in May 2007. It is available online.

The National Security Professional Development program should be modified based on the experience of the last two years in attempting to implement the program and be used to develop leaders skilled in cyber-strategic leadership and other critical national-security missions. This process is explored in James Jay Carafano's paper, "Missing Pieces in Homeland Security: Interagency Education, Assignments, and Professional Accreditation," Executive Memorandum No. 1013, published October 16, 2006. It is available at heritage.org/Research/HomelandSecurity/em1013.cfm.

Taking these cumulative steps to advance U.S. national cybersecurity are only the first steps on a long road.

Efforts to use the cyber domain for malicious purposes have matured in scope and sophistication over the past two decades. This threat will only intensify as terrorists continue to embrace its low costs to entry and states operationalize its power as a new domain of 21st-century warfare.

Meeting this challenge in both the public and private sectors will require careful planning and consideration in the coming years. Initiating a professional-development, cyber-strategic leadership program to begin training future leaders in the complexities of the cyberspace arena is imperative to the future security of America's cyber infrastructure.

(James Jay Carafano, Ph.D., is assistant director of the Kathryn and Shelby Cullom Davis Institute for International Studies and senior research fellow for national security and homeland security in the Douglas and Sarah Allison Center for Foreign Policy Studies, a division of the Davis Institute, at the Heritage Foundation. Eric Sayers is a research assistant in the Allison Center for Foreign Policy Studies at the Heritage Foundation.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Chinese, Russian hackers probing US power grid: report
Washington (AFP) April 8, 2009
Chinese and Russian hackers are attempting to seed viruses in the US power grid that could one day plunge major cities into chaos, a report warned Wednesday.







  • Analysis: Obama's European scorecard
  • Russia's Growing Arctic Power Play
  • China wary of 'G2' with US: analysts
  • Obama passes NATO test, but questions remain

  • Kim And Mahmoud And ICBM Envy
  • World powers must accept a nuclear Iran: Larijani
  • Iraq to create nuclear energy commission
  • France Unmoved By Obama Nuclear Doctrine As Russia Modernises Strageic Forces

  • Raytheon Standard Missile-2 Destroys Target
  • Indian tests cruise missile: official
  • US says warships deployed before NKorea launch
  • NKorea may launch several missiles: US general

  • Raytheon SM-3 Could Replace Arrow-3 Anti Missile Program
  • Japan may need missile early warning satellite: minister
  • Israel tests Arrow interceptor missile
  • BMD Watch: China targets U.S. carriers

  • Airlines fear failure of global climate talks
  • State takes control of China's first private airline: report
  • Troubled private Chinese airline says president missing
  • Cathay Pacific lost 1.1 billion dollars in 2008

  • Pakistan highlights 'gap' with US over drone attacks
  • Russia buys unmanned drones from Israel: report
  • Pakistan to discuss drone attacks with US envoy: spokesman
  • NKorea threatens US spy planes monitoring rocket

  • Dogs of War: Contractors with no names - Final Part
  • Obama tells Maliki US will pull out troops on time
  • Dogs of War: Immunity, what immunity?
  • Iraq improving, but challenges remain

  • Vietnam Agent Orange victims vow to fight on
  • Thompson Files: Marines triumph with EFV
  • Outside View: Why F-22 is vital -- Part 14
  • Why The F-22 Is Vital Part 13

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement