Space Industry and Business News  
The Ten Billion Dollar Cyber Defense Initiative - Part Eight

Despite the growing array of problems associated with using and securing Internet-style networks, virtually nobody in the U.S. government thinks it is desirable to return to a pre-Internet way of doing business.
by Loren B. Thompson
Washington (UPI) Jan 12, 2009
In 2008, the Bush administration during its last year in office began a Comprehensive National Cybersecurity Initiative that eventually will spend more than $10 billion strengthening defenses of U.S. government networks.

During the 2008 U.S. presidential campaign, Sen. John McCain of Arizona, the Republican presidential nominee, noted the growing military role of information operations, while the victorious Democratic presidential nominee, Sen. Barack Obama of Illinois, stated the U.S. government needed to build "the capacity to identify, isolate and respond to any cyberattack."

It appears, therefore, that U.S. national leaders do grasp the importance of network security and information assurance. But seeing the problem is not the same thing as solving it. Before that can occur, there are eight basic questions the incoming administration of President-elect Barack Obama needs to answer.

First, do current trends in cyber threats indicate the United States faces a real crisis of confidence in its networks, or are efforts like the comprehensive cybersecurity initiative sufficient to deal with the challenge?

Second, given how important global connectivity is to information superiority, is it possible to secure essential U.S. government networks while still maintaining links to the anarchic and anonymous Internet?

Third, will the Internet in its current form ever permit users to trace sophisticated attacks to their sources, so that abuses can be effectively deterred and/or defeated?

Fourth, what legal authorities are required so that the U.S. government can overcome barriers to dealing with attacks on critical private-sector networks and establish consistent security standards?

Fifth, what is the proper relationship within the U.S. government between network defense and offensive information operations in formulating an integrated cybersecurity posture?

Sixth, how can the U.S. government encourage a holistic, enterprise-wide understanding of its network resources and challenges, so that solutions are developed in a truly comprehensive rather than piecemeal fashion?

Seventh, is the U.S. Department of Homeland Security an appropriate vehicle for managing government-wide cybersecurity efforts, or is a more focused organization better suited to the task?

Eighth, if the U.S. government is too slow or decentralized to keep up with the rapid proliferation of cyber threats, how can it tap more agile suppliers of network security in the marketplace?

These questions need to be answered before the United States suffers the digital equivalent of a Sept. 11, 2001, attack that so many experts have been predicting.

Despite the growing array of problems associated with using and securing Internet-style networks, virtually nobody in the U.S. government thinks it is desirable to return to a pre-Internet way of doing business. So the real issue policymakers face in meeting the cybersecurity challenge is not whether they can live without digital networks, but how they prevent the enemies of the United States from using those networks against it.

(Loren B. Thompson is chief executive officer of the Lexington Institute, an Arlington, Va.-based think tank that supports democracy and the free market.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Cyber Warfare Doctrines 2009 - Part Seven
Arlington, Va. (UPI) Jan 9, 2009
Within the U.S. federal government, most of the funding allocated to information security and offensive cyber operations is spent by agencies of the Department of Defense.







  • Shortcovers turns iPhones into electronic books
  • Wall crumbling between televisions and computers
  • Windows 7 beta available worldwide on Friday
  • Sony debuts pocket-sized notebook computer

  • Hot Bird 10 Delivered For Multi-Payload Ariane 5 February Liftoff
  • Ariancespace Celebrates Year Of Successes
  • ISRO To Launch Four Foreign Satellites This Year
  • Arianespace To Launch Egyptian Satellite Nilesat 201

  • NASA Balloon Mission Tunes In To A Cosmic Radio Mystery
  • Boeing Ends 2008 With 662 Commercial Airplane Orders
  • China moves to bail out aviation industry amid global crisis
  • Cathay Pacific books 7.6 billion HK dollar loss over oil hedging

  • Boeing Increases Capability Of On-Orbit US Navy Satellite
  • Boeing Develops Common Software To Reduce Risk For TSAT
  • USAF Tests Battlespace Information Solution On AC-130 Gunship
  • Harris Awarded Contract For USAF Satellite Control Network Program

  • Princeton Researchers Discover New Type Of Laser
  • Solving The Mysteries Of Metallic Glass
  • Brazil Begins Mechanical Tests On Satellites
  • Lockheed Martin SBIRS Team Delivers Major Subsystems For Second GEO Satellite

  • Berndt Feuerbacher New President Of IAU
  • Orbital Appoints Frank Culbertson And Mark Pieczynski To Management
  • Chris Smith Named Director Of Cerro Tololo Inter-American Observatory
  • AsiaSat Appoints New General Manager China

  • DMCii and DynAgra Help Farmers Control Costs And Boost Yields
  • Malaysia uses satellite to fight illegal logging: report
  • India To Launch Own Online Earth Browser Dubbed Bhuvan
  • New Satellite Data Reveal Impact Of Olympic Pollution Controls

  • Raytheon Team Completes Final Major Milestones On Next-Generation GPS Control Segment
  • ESRI Announces Grant Program For CCIM Institute Members
  • Boeing Receives JDAM And SDB Production Contracts
  • Savi Wins Role On DoD RFID III Contract Vehicle

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement