Enable breadcrumbs token at /includes/pageheader.html.twig

Cyber Measures Could Ensure Security but Compromise Freedom

The key to providing greatly enhanced cyber security may be at hand, but it may also eliminate one of the Internet's greatest characteristics, and a middle ground may be hard to achieve. Carter Bullard, president and chief executive officer, QoSient, told the audience at a MILCOM 2010 Wednesday afternoon panel on cyber security that technologies are needed for three elements-attribution, mitigation and deterrence. Attaining attribution and mitigation will lead to deterrence, he maintained. A key means of attribution is non-repudiation, which he described as having the potential to go after the entire threat matrix. This discipline would provide comprehensive accountability that prevents any interloper from concealing that they attacked, thus creating the concept that a hacker can get caught. Bullard bemoaned the fact that no one is building technology for non-repudiation, calling it "the most misunderstood countermeasure." However, one of his fellow panelists raised an alarm about its incorporation. Elliot Proebstel, on the technical staff of Sandia National Laboratories, warned that building in non-repudiation might threaten valued Internet freedoms. The existing anonymity that every Internet user takes for granted might disappear as every user could be identified. This would be a boon to dictatorships that seek to identify and stifle Internet users opposed to their regimes, he offered.

Comment

Permalink

The United States has lost terabytes of sensitive intellectual property (Krekel 2009, 51-53) and millions of dollars to cyber theft via its corporate, private, and government network infrastructure. The time has come for full on response to attacks on American property through cyber domain. Every available weapon in the security arsenal should be used, especially those that are backed by what is already known, and by plain common sense. Casual internet users, American moms, dads, students, and kids, do not believe they are using the internet anonymously. Professional hackers and cyber forces can use the internet anonymously and operate in it unimpeded because so far, no one has stopped them. The cost is already too high. Let's get cracking. Reference list: Krekel, Byron, with George Bakos and Christopher Barnett, Northrup Grumman. 2009. "Capabilities of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation" (Washington DC: US-China Economic and Security Review Commission, 2009), pp. 68-74, http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_ApprovedReport_16Oct2009.pdf

Comments

The content of this field is kept private and will not be shown publicly.

Plain text

  • No HTML tags allowed.
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.