Brown presents the nuances of cyberespionage versus cyberattacks that are becoming more pervasive in the national security context. He defines the differences between the two, and proposes a method of analyzing cyberspace operations to properly categorize them. Then, using an extended hypothetical and several real-life examples, Brown illustrates how dangerous cyber operations can be, and… Continue reading Spying & Fighting in Cyberspace: What is Which?
Tag: Cyberespionage
Virtual Checkpoints and Cyber-Terry Stops: Digital Scans To Protect the Nation’s Critical Infrastructure and Key Resources
The cybersecurity risks to the nation’s critical infrastructure and key resources are significant and increasing every day. While a sound legal basis exists for the government to use computer intrusion detection technology to protect its own networks, critical infrastructure and key resources, primarily owned by the private sector, are governed by a different set of constitutional principles and laws. This article… Continue reading Virtual Checkpoints and Cyber-Terry Stops: Digital Scans To Protect the Nation’s Critical Infrastructure and Key Resources
Foundational Questions Regarding the Federal Role in Cybersecurity
During the last two years of the Bush administration, the senior leadership at the U.S. Department of Homeland Security (DHS) spent substantial time and effort in first helping to craft, and then attempting to implement, Homeland Security Presidential Directive 23/National Security Presidential Directive 54 (HSPD 23/NSPD 54), Cyber Security and Monitoring.