Skip to main content

To The Next President: Get A National Cybersecurity Strategy

In the first presidential debate, since cybersecurity is rarely a topic for political debate, I was surprised when moderator Lester Holt questioned the candidates about cybersecurity strategy. Specifically, Holt asked, “We want to start with a 21st century war happening every day in this country. Our institutions are under cyber-attack, and our secrets are being stolen. So my question is, who’s behind it? And how do we fight it?” 

 The first couple of sentences of Hillary Clinton’s response sounded as if she was going to establish a position on cyber-attacks, but then she segued into an attack on Donald Trump, and her answer just fell apart. The most coherent part of Clinton’s statement was: “…. We need to make it very clear — whether it’s Russia, China, Iran or anybody else — the United States has much greater capacity. And we are not going to sit idly by and permit state actors to go after our information, our private-sector information or our public-sector information.” 

That statement sounded as though she was advocating a strategy to hack back, or counter-attack, but then she said: “And we’re going to have to make it clear that we don’t want to use the kinds of tools that we have. We don’t want to engage in a different kind of warfare. But we will defend the citizens of this country.” So – maybe she would hit back, maybe she would not. Who knows? As far as Trump’s position, once he got past his own counter-attack on Clinton, he also failed to outline a specific plan, 

“We should be better than anybody else, and perhaps we’re not…. So we have to get very, very tough on cyber and cyber warfare. It is — it is a huge problem…. The security aspect of cyber is very, very tough. And maybe it’s hardly doable.” I am not surprised the candidates could not state coherent positions for responding to cyber-attacks or on cyber warfare. Physical warfare is as old as mankind; we have had a really long time to develop strategies and positions there. Even with more modern types of warfare, such as air, space, nuclear, and bio-chemical warfare, in the twentieth century, we developed strategies and regimes of treaties and international agreements.

 However, until now there has not been a major war where offensive cyber power was as dominant an element as land, sea, or air power. We have certainly been getting close though. As early as 1999 in the Kosovo war, cyber-attacks on Serbia’s air defense systems may have been used to enhance the effects of the NATO bombing campaign. In 2010, the world’s first documented digital weapon, Stuxnet, began its systematic destruction of Iranian nuclear enrichment capabilities.

 In June 2015, it was revealed that Chinese hackers had accessed over 20 million personnel records and security clearance data at the U.S. Office of Personnel Management, and the director of national intelligence testified that the hack led the CIA to pull personnel from Beijing. On December 23, 2015, Russian hackers shutdown portions of the power grid in the Ukraine, leaving 1.4 million people without power for up to six hours. 

And in recent months, Russian hackers have hacked state voter databases and emails from the Democratic National Committee, perhaps with the goal of seeding uncertainty in the electoral process in the minds of voters ahead of the American presidential election.. 

These attacks illustrate a shift in nation-state cyber strategies, from spying and surveillance to active use of offensive capabilities to attack critical infrastructure, national security assets, and even the political system itself.


Popular posts from this blog

5 must-dos for SEO novices

5 must-dos for SEO novices 

In case you're new to SEO, or on the off chance that it isn't your essential concentration, you may disregard strategies that will truly move the needle. Donor Jordan Kasteler traces 5 things you ought to do and shares instruments to enable you to achieve these errands. 
You may dissent, yet I see Search Engine Optimization as both a workmanship and a science. You should be imaginative in your ways to deal with please web crawlers and outmaneuver contenders while additionally applying strong research and examination based techniques. 
To do this, you have to utilize an assortment of procedures and apparatuses. Lamentably, be that as it may, a great many people tend to stick to what they know. That can be unsafe in the quickly developing SEO space, as the web crawlers constantly alter what they're searching for and how they show comes about. 
Following are a portion of the critical — yet in some cases overlooked — levers you can draw to upgrade y…

Article Directory Mega List

This is a list of working article directories that have produced results for me. It took me almost a year to research and join all of these directories! 
You will also find that there are a lot of niche specific directories which can be a good source of traffic. You can use the submitter that comes with this report to submit to all of these directories and you will get massive backlinks and propel your articles to the top of the search engines! It will take some time, however, to join them all and set them up in the submitter. A lot of them are already in the submitter's database, but you will need to add many of them. 

However, the time it takes to do this will pay off in the end. 
Directory List  Ezine Articles - 
Go Articles - 
Articles Base - 
Article Snatch - 
Buzzle - 
Pub Articles - 
Amazines - 
Dashboard - http://artic…

Buying Triggers: 100 Mind-Altering Selling Tools!

This publication is designed to provide accurate and authoritative information with regard to the subject matter covered. It is sold with the understanding that the author, and the publisher is not engaged in rendering legal, accounting, or other professional advice. If legal advice or other professional assistance is required, the services of a competent professional should be sought. Larry Dotson and L.D. Publishing does not accept any responsibility for any liabilities resulting from the actions of any parties involved.
Note: This is not a free ebook. It is for your own use. Don't give it away to others.
1 Tell your target audience you were in their current position. Next, tell them how your product pulled you out of that position. For example, you could say in your ad copy, "Don't worry, I used to be just like you. I was way over my head in debt. But I decided to create a financial formula so no one else would ever go through all the pain and humiliation of bankruptcy…