Professional Documents
Culture Documents
Theophilus 2013-2014
1. Private companies
Private companies should not take charge of going on the offense in cyber security;
private companies may not be able to handle the consequences possible.
What is the Governments Cybersecurity Role?, published by Brian Finch on
December 4, 2013
There are some that argue that private companies should have the right to strike back at
their attackers. The problem in the cyberattack world is that you often dont know who is
attacking you. Blindly striking back could easily result in attacking innocent targets, or
worse yet, a foreign military. Instead, this mission is, and should be, the province of the
government. It is equipped to strike back at our enemies, and can deal with the
consequences of doing so. Fighting other nations is of course a basic role of the federal
governmentwhen Nazi submarines appeared off of the Atlantic Coast, President
Roosevelt didnt expect the local yacht club to take them on; it was a job for the Navy
and the Coast Guard. The same thing applies to cyber offense.
http://www.foxbusiness.com/technology/2013/12/04/what-is-governments-cybersecurity-rule/
Brian Finch- was an attorney with a Washington, DC law firm and worked as a legal intern with the Office
of Chief Counsel of the Drug Enforcement Administration, U.S. Department of Justice. He also was a
member of the Heritage Foundation/Center for Strategic and International Studies Task Force for
Examining the Roles, Missions, and Organization of the Department of Homeland Security.
NSA protects us from terrorism while private sector does what it what with
information
From What About Private Sector Data Collection? By Daniel J. Gallington, published
by U.S.news On Jan. 6, 2014
So the practical recommendation here is for a parallel look at the private information
and communications sector. After all, the NSA does what it does to protect us from
terrorism within carefully defined boundaries, while the private information sector does
what it does to make money, and with little limitation and oversight. In fact, when one
compares NSA's limited collection authorities to that of the private sector, the private
sector's ability to invade our privacy is virtually unlimited.
http://www.usnews.com/opinion/blogs/world-report/2014/01/06/compared-to-private-sector-datacollection-nsa-surveillance-is-nothing
Daniel Gallington is the senior policy and program adviser at the George C. Marshall Institute. He served
in senior national security policy positions in the Office of the Secretary of Defense, the Department of
Justice and as general counsel for the U.S. Senate Select Committee on Intelligence.
Cyber Security
Theophilus 2013-2014
2. Secret Tech.
The NSAs secret technology has covered inconsistencies that adversaries could
exploit to cause nation-wide harm.
N.S.A. Devises Radio Pathway Into Computers, published by David E. Sanger and
Thom Shanker on January 14, 2014
While most of the software is inserted by gaining access to computer networks, the
N.S.A. has increasingly made use of a secret technology that enables it to enter and alter
data in computers even if they are not connected to the Internet, according to N.S.A.
documents, computer experts and American officials. The technology, which the agency
has used since at least 2008, relies on a covert channel of radio waves that can be
transmitted from tiny circuit boards and USB cards inserted surreptitiously into the
computers. In some cases, they are sent to a briefcase-size relay station that intelligence
agencies can set up miles away from the target. The radio frequency technology has
helped solve one of the biggest problems facing American intelligence agencies for years:
getting into computers that adversaries, and some American partners, have tried to make
impervious to spying or cyberattack. In most cases, the radio frequency hardware must be
physically inserted by a spy, a manufacturer or an unwitting user.
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?
_r=0
Cyber Security
Theophilus 2013-2014
David Sanger- Chief Washington correspondent of The New York Times. Twice he has been a member of
Times reporting teams that won the Pulitzer Prize.
Thom Shanker- Pentagon correspondent for The New York Times. He joined The Times in 1997, and was
assistant Washington editor, responsible for managing the newspaper's coverage of foreign policy, national
security and economics from the Washington bureau, before being named Pentagon correspondent in May
of 2001.