You are on page 1of 3

Cyber Security

Theophilus 2013-2014

1. Private companies .. pg. 1-2


2. Secret Tech. ....pg. 2-3
3. Expansion of cyber security pg 3
4. Disadvantage.pg. 3

1. Private companies
Private companies should not take charge of going on the offense in cyber security;
private companies may not be able to handle the consequences possible.
What is the Governments Cybersecurity Role?, published by Brian Finch on
December 4, 2013
There are some that argue that private companies should have the right to strike back at
their attackers. The problem in the cyberattack world is that you often dont know who is
attacking you. Blindly striking back could easily result in attacking innocent targets, or
worse yet, a foreign military. Instead, this mission is, and should be, the province of the
government. It is equipped to strike back at our enemies, and can deal with the
consequences of doing so. Fighting other nations is of course a basic role of the federal
governmentwhen Nazi submarines appeared off of the Atlantic Coast, President
Roosevelt didnt expect the local yacht club to take them on; it was a job for the Navy
and the Coast Guard. The same thing applies to cyber offense.
http://www.foxbusiness.com/technology/2013/12/04/what-is-governments-cybersecurity-rule/
Brian Finch- was an attorney with a Washington, DC law firm and worked as a legal intern with the Office
of Chief Counsel of the Drug Enforcement Administration, U.S. Department of Justice. He also was a
member of the Heritage Foundation/Center for Strategic and International Studies Task Force for
Examining the Roles, Missions, and Organization of the Department of Homeland Security.

NSA protects us from terrorism while private sector does what it what with
information
From What About Private Sector Data Collection? By Daniel J. Gallington, published
by U.S.news On Jan. 6, 2014
So the practical recommendation here is for a parallel look at the private information
and communications sector. After all, the NSA does what it does to protect us from
terrorism within carefully defined boundaries, while the private information sector does
what it does to make money, and with little limitation and oversight. In fact, when one
compares NSA's limited collection authorities to that of the private sector, the private
sector's ability to invade our privacy is virtually unlimited.
http://www.usnews.com/opinion/blogs/world-report/2014/01/06/compared-to-private-sector-datacollection-nsa-surveillance-is-nothing
Daniel Gallington is the senior policy and program adviser at the George C. Marshall Institute. He served
in senior national security policy positions in the Office of the Secretary of Defense, the Department of
Justice and as general counsel for the U.S. Senate Select Committee on Intelligence.

Cyber Security

Theophilus 2013-2014

NSA has limits on collection, private sector does not


From What About
Private Sector Data Collection? By Daniel J. Gallington, published by U.S.news On Jan.
6, 2014
As a result of our preference for private sector ownership, our government can get
access to our communications data only within a carefully defined and limited statutory
structure, and under comprehensive oversight by the executive, legislative and judicial
branches. However, there are virtually no such limits for the private sector.
http://www.usnews.com/opinion/blogs/world-report/2014/01/06/compared-to-privatesector-data-collection-nsa-surveillance-is-nothing
Daniel Gallington is the senior policy and program adviser at the George C. Marshall Institute. He served
in senior national security policy positions in the Office of the Secretary of Defense, the Department of
Justice and as general counsel for the U.S. Senate Select Committee on Intelligence.

What does the private sector do with your personal information?


From What About Private Sector Data Collection? By Daniel J. Gallington, published
by U.S.news On Jan. 6, 2014
In fact, if one were to list the realities and objectives of "big" private sector
communications and data, it would be to: (1)Corner the information data transmission
and storage market; (2)Collect as much personal/consumer information about users as
possible; (3)Store as much marketable data for as long as possible; Aggressively sell
personal data; (4)Perfect/develop/sell the storage of data that is "perfectly secure" i.e.,
unavailable to anyone, except the owner, who has the only key.
http://www.usnews.com/opinion/blogs/world-report/2014/01/06/compared-to-private-sector-datacollection-nsa-surveillance-is-nothing
Daniel Gallington is the senior policy and program adviser at the George C. Marshall Institute. He served
in senior national security policy positions in the Office of the Secretary of Defense, the Department of
Justice and as general counsel for the U.S. Senate Select Committee on Intelligence.

2. Secret Tech.
The NSAs secret technology has covered inconsistencies that adversaries could
exploit to cause nation-wide harm.
N.S.A. Devises Radio Pathway Into Computers, published by David E. Sanger and
Thom Shanker on January 14, 2014
While most of the software is inserted by gaining access to computer networks, the
N.S.A. has increasingly made use of a secret technology that enables it to enter and alter
data in computers even if they are not connected to the Internet, according to N.S.A.
documents, computer experts and American officials. The technology, which the agency
has used since at least 2008, relies on a covert channel of radio waves that can be
transmitted from tiny circuit boards and USB cards inserted surreptitiously into the
computers. In some cases, they are sent to a briefcase-size relay station that intelligence
agencies can set up miles away from the target. The radio frequency technology has
helped solve one of the biggest problems facing American intelligence agencies for years:
getting into computers that adversaries, and some American partners, have tried to make
impervious to spying or cyberattack. In most cases, the radio frequency hardware must be
physically inserted by a spy, a manufacturer or an unwitting user.
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?
_r=0

Cyber Security

Theophilus 2013-2014

David Sanger- Chief Washington correspondent of The New York Times. Twice he has been a member of
Times reporting teams that won the Pulitzer Prize.
Thom Shanker- Pentagon correspondent for The New York Times. He joined The Times in 1997, and was
assistant Washington editor, responsible for managing the newspaper's coverage of foreign policy, national
security and economics from the Washington bureau, before being named Pentagon correspondent in May
of 2001.

3. Expansion of cyber security


The government has a goal of working to eliminate hostile activities in cyberspace.
The Comprehensive National Cybersecurity Initiative, published on the White House
website taken on March 2, 2014
To strengthen the future cybersecurity environment by expanding cyber education;
coordinating and redirecting research and development efforts across the Federal
Government; and working to define and develop strategies to deter hostile or malicious
activity in cyberspace.
http://www.whitehouse.gov/issues/foreign-policy/cybersecurity/national-initiative

Major Expansion of its Cybersecurity Force


Pentagon to boost cybersecurity force By Ellen Nakashima Published By the Washington
Post January 27 2013
The Pentagon has approved a major expansion of its cybersecurity force over the next
several years, increasing its size more than fivefold to bolster the nations ability to
defend critical computer systems and conduct offensive computer operations against
foreign adversaries, according to U.S. officials.
http://www.washingtonpost.com/world/national-security/pentagon-to-boost-cybersecurityforce/2013/01/19/d87d9dc2-5fec-11e2-b05a-605528f6b712_story.html
Ellen Nakashima is a national security reporter for The Washington Post.

4. Disadvantage Job loss


Expansion of Defense Departments Cyber Command
Pentagon Expanding Cybersecurity Force to Protect Networks Against Attacks
Elisabeth Bumiller, By The New York Times, January 28, 2013
The expansion would increase the Defense Departments Cyber Command by more than
4,000 people, up from the current 900, an American official said. Defense officials
acknowledged that a formidable challenge in the growth of the command would be
finding, training and holding onto such a large number of qualified people.
http://www.nytimes.com/2013/01/28/us/pentagon-to-beef-up-cybersecurity-force-to-counter-attacks.html
Bumiller was the Times' White House correspondent. She is a 1977 graduate of Northwestern University
and in 1979 of the Columbia University Graduate School of Journalism.

You might also like