Cybersecurity has become a national imperative and a government priority. Increased cybersecurity will help protect consumers and businesses, ensure the availability of critical infrastructures on which our economy depends, and strengthen national security. However, cybersecurity efforts must be carefully tailored in order to preserve privacy, liberty, innovation, and the open nature of the Internet.2 To design an effective and balanced cybersecurity strategy, each part of the country’s critical infrastructure3 must be considered separately. Solutions that may be appropriate for the power grid or financial networks may not be suitable for securing the public portions of the Internet that constitute the very architecture for free speech essential to our democracy. Policy toward government systems can be much more prescriptive than policy toward private systems. The characteristics that have made the Internet such a success – its openness, its decentralized and user-controlled nature, and its support for innovation and free expression – may be put at risk if heavy-handed policies are enacted…
Debate continues as to the transformations in terrorism evidenced by the September 11 attacks and since that time. Some, including the former U.S. President, point to changes in the nature of terrorism and argue that September 11 constituted a wholly new form of terrorism that demanded a novel response. Given the prior events of the World Trade Center bombing in 1993 and the East African embassy bombings in 1998, it would appear more appropriate to depict a transformation in scale and tactics rather than nature.
This article seeks to explore a third perspective. It accepts the fact that there have been transformations in terrorism, but it focuses on the actors rather than on their actions. It suggests that one’s neighbor has become a potential foe and that this trend became apparent only gradually after September 11. There are important consequences for law enforcement beyond the major adaptations already incurred. The move toward neighbor terrorism has perhaps been masked by the other more brutal changes, but it is this trend that has the potential to cause the most lasting and insidious impact on everyone’s lives.
For more than 30 years, our country has struggled to delineate the boundaries of domestic intelligence operations. Americans tend to regard those government components exercising national security powers within the borders of the United States (whether under clear authority or not) with an inherent suspicion bolstered by historical experience.
We tolerate the existence of such components but insist that they be highly regulated, particularly with respect to any activities that impinge upon civil society. Historical circumstances influence, but never erase, this regulatory imperative. Despite this imperative, components may occasionally escape regulation – at least for a time – because they are unknown, their missions remain mysterious or only partially understood, or because (intentionally or not) a convincing illusion of sufficient regulation is presented to the examining eye.