
Last month, the new U.S. Cyber Command was created underneath Strategic Command. The head of the National Security Agency, General Keith Alexander, has been put in charge of the new Cybercomm which is responsible for offensive and defensive cyber security. However, the new system protects only parts of the federal government, let alone civilian and private-sector infrastructure. President Obama, when announcing the new Cyber Command, remarked that the military cannot monitor the civilian Internet, but can only defend itself. One commentator remarked that is “like telling the military if there’s another 9/11 to protect the Pentagon but not the World Trade Center.” The Department of Homeland Security is supposed to defend the private-sector, but DHS does not have anywhere near the capability that the military has. Many civilian agencies, state and local governments, the White House, Congress, contractors, and businesses also need help securing sensitive information. Private businesses, including contractors, have been a huge target for cyber espionage and if the U.S. does not want to lose its technological advantage then private companies need to be protected as well.
The military, which includes the NSA, clearly has better capabilities than DHS. They would likely do the best job of defending the country in cyber space. However, many Americans are wary of the NSA and its history of domestic espionage, but where is the line between foreign and domestic in cyberspace? The U.S. would just create duplication and wasteful spending by creating separate cyber defenses. Americans need to adjust their expectation of “reasonable privacy” to permit the military operate in “domestic” and “civilian” cyberspace in order to prevent catastrophic harm. The divide between foreign and domestic intelligence contributed to the intelligence failure of 9/11. Such a divide would be huge in cyberspace where everything happens much faster. The U.S. needs to come up with a coherent cyber defense plan or it will remain extremely vulnerable to cyber attacks and espionage.
No comments:
Post a Comment