In just three decades cyber security has risen to the forefront of discussion due to its use as an informational substrate that fosters industrial and economic growth. However, in this short amount of time is has also became a predominate domain of conflict to the United States government. Cyber space is notably worrisome because it withholds the ability to obscure identity because it lacks physical existence and instead is composed of software architecture. Furthermore, it increases the volume and range of immediate communicatory abilities to both individuals and other actors. The cyber realm creates a great paradox, as the level of interconnectedness facilitates commercial opportunities, as well as a strong civil society. However, as our society progresses into a predominantly technological realm, scientists must adapt to all dimensions of connectivity, which involves many channels for new threats. Cyber opportunities creates potential for strategic cyber war actions which are arguable very difficult to defend and deter. Cyber war represents both inter-state, and terrorism tactics. Throughout this paper I will outline in what ways policy makers use analogical reasoning and metaphors in order to create public policy regarding the complexities of cyber security. Furthermore, I will define the predominant analogies used, while explaining their strengths, failures, and vitality. The protection, and availability of cyber networks is a rather new political realm which can be understood better by linking the unknown to elements such as war, public health and possession. In what ways are policy makers using analogical reasoning and metaphors in order to create public policy regarding the complexities of cyber security?
Analogies As a ...
... middle of paper ...
...t of current international groups such as NATO, and the UN who hold the power to impose sanctions and other processes in order to convince states to revoke certain policies. Unfortunately, the United Nations were previously deemed ‘politically incapable’ of enforcing treaties regarding international cyber security. Currently the Council of Europe Convention on Cybercrime is the main standing organization which is designed specifically for this cause. Issues at hand would include a host of issues including; sovereignty, technological standards, legal regulations, and territorial rights. The realities listed above have engendered dominant metaphors that have both negative and positive abilities to channel thinking and policy making. In order to create a foundation of proper policy, states must engage in a system that promote normative transparency and accountability.
At this juncture, it may be somewhat difficult to accept the proposition that a threat to the telecommunications grid, both wired and wireless, in the United States could potentially be subject to a catastrophic cyber attack. After careful research on the subject, it appears the potentiality of an event of such magnitude, which either disrupts one or the other grids for a long period or destroys either, is both theoretically and realistically impossible. It may be that proponents—those who advance such theories—equate such “doomsday” scenarios as if a cyber attack would or could be of the same magnitude as a conventional or nuclear military strike. Terms such as “cyber Pearl Harbor,” “cyber 9/11” and “cyber Vietnam” have been used to describes potential catastrophic cyber attacks and yet, “Though many have posited notions on what a ‘real’ cyber war would be like, we lack the understanding of how such conflicts will be conducted and evolve.” (Rattray & Healey, 2010, p. 77). Yet, the U.S. government continues to focus on such events, as if the plausibility of small-scale cyber attacks were not as pressing.
The convention, put into place in 2001, gives the 39 signatory countries guidelines to develop national legislation to combat cybercrimes and is also used as a framework for international co-operation between the countries who have signed (Government of Canada, “Cybercrime”). Furthermore, it demands that countries implementing the convention to give permission to law enforcement to order Internet service providers to monitor citizens’ online activities as well as outlaw discrimination based on religion or race, such as racism and xenophobia (Connolly). In 2015, the government of Canada ratified the convention, which strengthens Canada’s capacity to cooperate with international partners to fight cyber criminality by making it easier for the country to ask for help and assist other countries in their fight against cybercrimes (Connolly). Additionally, computer crimes generate new challenges for legislators and law enforcement agencies, such as the CSIS or local police station, that they have to face in order to keep Canada’s population secure (Valiquet).
Australia is dependent on technology, everything from state security, economics and information collaboration is more accessible resulting in an increased reliance on digital networks. The rapid increase in cyber activity has a symbiotic relationship with cyber crime. The evolving nature of cyber crimes are constantly leaving counter measures obsolete in the face of these new technologies. Australia takes insufficient action against cyber crime, inaction is based on Australia’s previous focus on counter-terrorism. This study will use the Australia’s National Security Strategy 2013 to show the increasing trend towards cyber security. Unfortunately the Australia Government is lacking in the presence of this growing phenomenon. Recently cyber crimes including attacks from Anonymous and Wiki-leaks prove that no network is completely secure. This study will conclude that the exponential growth of the Internet has resulted in an inability to properly manage regardless of the governmental strategies being implemented.
About 15 million United States residents have their identities and information used fraudulently each year. Along the use of their identities, they also had a combined financial loss totaling up to almost $50 billion. Major companies such as Apple, Verizon, Target, Sony, and many more have been victims of consumer information hacking. In each of the cases, millions of consumers’ personal information has been breached. In the article “Home Depot 's 56 Million Card Breach Bigger Than Target 's” on September 18, 2014, 56 million cards were breached due to cyber attackers. Before the Home Depot attack, Target had 40 million cards breached. Company’s information is constantly being breached and the consumers’ are the ones who end up having to pay the price. If a company cannot protect the information it takes, then it should not collect the information.
The term “cyber terrorism” refers to the use of the Internet as a medium in which an attack can be launched such as hacking into electrical grids, security systems, and vital information networks. Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause. Instantaneous and unpredictable, the technological advantages these terrorists have obtained from using the Internet includes
Retrieved October 3, 2009, from http://www.latimes.com/news/opinion/commentary/la-oe-. delgadillo18-2008aug18,0,3286181. Government Technology. a. The adage of the adage of Global Law Enforcement Solidarity to Combat Cyber Crime.
President Obama has realized the seriousness of the upcoming threats and turned the government focus more toward defending the information and communications infrastructure and In May 2009, he issued a request from top to bottom review of the current situation. The report titled the Cyberspace Policy Review includes strategy, policy, and standards regarding the security of and operations in cyberspace. According the white house’s cybersecurity foreign policy, the Cyberspace Policy Review highlighted two objectives and ten near-term actions to support the cybersecurity strategy.
In recent years, many possible plans to enact government regulation to improve cybersecurity have been suggested. Most recently, in 2017, then U.S. president Barack Obama implemented the Cybersecurity National Action Plan (CNAP). The plan would have invested $19 billion in cybersecurity by gathering experts to make recommendations in regards to cyber security, help secure the government IT group, and encourage more advanced security measures (Daniel 1). However, while CNAP does present a way to solve the problem, it just adds another program that attempts to enhance cybersecurity: “It is the multiplicity of programs and division of responsibility that diminishes their effectiveness. At least eleven federal agencies bear significant responsibility for cybersecurity” (Cohen 1). Every so often, another cybersecurity program will be established, but former plans are seldom removed. This leads to a large amount of departments to share responsibility, which creates general confusion and limits each department’s power. Furthermore, widespread government regulation may weaken cybersecurity. Many fear that any regulation would not be flexible enough and would instead allow easier hacking (Ridge 3). If every system in the entire nation had the same security measures, it would be much easier to break into as by breaking into one system, a hacker a could break into everything.
There is a lot of complexity in understanding risk management and its correlation to homeland security. Risk management is a way to approach the fact that securing the homeland is not certain and there are unknown variables in every aspect of life; risk management is a way to narrow down the focus based on quantifiable information determining probability against capability. Risk management plays and integral role in homeland security. Risk management is employed using a formula described in the NIPP for establishing a narrow scope to make the best decision about protecting infrastructure. The risk management formula lays down the foundation to make the most reasonable determination based on the potential consequences, vulnerability, and
Cybersecurity is the technology that protects computers and networks from unauthorized personnel. Ever since computers have expanded to homes and the workplace; the need for cyber security has grown exponentially. Millions of people around the world have access to the internet at a given time, and this allows for predators to attack, scam, hack, and intrude on personal and government information. Cybersecurity is designed to counteract these attempts to ultimately allow for safe networks and computers.
What is border security? The United States Customs and Border Protection define border security as a “top priority is to keep terrorists and their weapons from entering the U.S. while welcoming all legitimate travelers and commerce. CBP officers and agents enforce all applicable U.S. laws, including against illegal immigration, narcotics smuggling and illegal importation. Therefore, in order for the United States to be successful in securing the nation’s border, there is an essential need for border security. This has not been an easy challenge but it is something that has to be done otherwise imagine how great a disaster our nation would be. For over 86 years, the United States' approach to securing its border with Mexico has seen many changes and improvements, all of which have contributed positively to the prevention of illegal immigration, drug trafficking, and potential terrorism.
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
The world is in another cold war, except this time countries are battling for cyber supremacy. Cyberspace is a massive land of ever-changing technology and personal interaction (McGuffin and Mitchell 1). Cyberspace is not only a place where people post pictures and update their profile, but it also plays an enormous role in running a country. Advanced countries use computers to guide their military, keep track of citizens, run their power grids, and hold plans for nuclear devices and nuclear power. Risks to commercial and government concerns are now being noticed and many countries are taking actions to prevent such threats (McGuffin and Mitchell 1).
It is difficult to define cyberculture because its boundaries are uncertain and applications to certain circumstances can often be disputed. The common threads of defining cyberculture is a culture which has evolved and continues to evolve from the use of computer networks and the internet and is guided by social and cultural movements reflective of advancements in scientific and technological information. It is not a unified culture but rather a culture that exists in cyberspace and is a compilation of numerous new technologies and capabilities, used by diverse people in diverse real – world locations. Cyberculture, a twentieth century phenomenon, has brought challenges unlike any other that the United States has seen in the areas of cyber security and its impact on our most critical institutions. This presentation will focus on the aforementioned three entities where national security is in jeopardy, in part due to cyberculture and its intentional use for disruptive and destructive purposes.
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side from an individual citizen, to small groups, businesses, and the government, to the countries of the world. There are different groups from law enforcement agencies to the U.S. Secret Service, that are attempting to combat the problem through cooperation and preemptive efforts. If these groups combined with the public to protect themselves and the country from criminals that commit cybercrime, the nation’s network and technology servers would be much safer for technology users. Clearly, cybercrime is a problem because it puts internet users at risk of being taken advantage of or harmed.