Professional Documents
Culture Documents
Tracie White
Introduction
The internet has completely changed the way we live, work, and communicate. Because
of the internet, we can communicate to another person on the other side of the world; we can
look for the menu of a local restaurant, or get directions and traffic information with the touch of
a few buttons. The internet has leveled the playing field between large corporations and small
businesses. Global communication and online collaboration are possible because of the internet.
The internet has an abundance of benefits; however, we dont often think about the dark side of
the internet. The internet has opened the door to cyber-attacks and cyber-criminals, and now we
must consider the cybersecurity of our nation. Questions such as these must be considered: Can
someone hack into my bank and steal my identity? Can someone hack into a business database
and steal personal information? Can someone from another country hack into a national airport
control room? Can the internet be used to manipulate individuals, groups, or countries to commit
violent crimes of hate? Can the internet be used for espionage, illegal transactions, and
terrorism? Can the internet be used to attack our country? Sadly, the answer to these questions
Literature Review
National cybersecurity has been a topic of interest since the 1990s. Information
technology analysts have stated cyberspace could be the next domain used for warfare.
especially the Internet (Cyberspace, 2017). The Department of Defense defines cyberspace as
a global domain within the information environment consisting of the interdependent network
In 1998 President Clinton signed the Presidential Decision Directive 63. The directive
was to establish a structure to coordinate action to take all necessary measures to swiftly
eliminate any significant vulnerability to both physical and cyber-attacks on our critical
infrastructures, including especially our cyber systems (Reveron, 2012). In 2008, the National
Defense Strategy stated individual hackers or groups of politically motived hackers, also called
hacktivists, can attack vulnerable points in cyberspace and disrupt commerce and daily life in
the United States, causing economic damage, compromising sensitive information and materials,
and interrupting critical services such as power and information networks (National Defense
Strategy, 2008). Cyber warfare can level the playing field when it comes to nations. Smaller
nations without a large military force, tanks, and aircraft, can have an advantage in cyberspace.
In 2010, NATO stated, cyber warfare is one of the most serious threats to the alliance and the
countries that are part of it. (Heickero, 2013). According to the 2010 Quadrennial Defense
Review, cyberspace is now a domain like land, air, sea, and space that can be used in
warfare. David Fidler, a legal scholar, refers to cyberspace as a new dimension (Reveron,
2012)
The first time cyberspace was used to attack a nations security was 2008. Russia used
cyber-warfare during the invasion of Georgia in 2008. The result of the cyber-attack was not
devastating, however, it added to the chaos of the physical attack. In 2010, the Stuxnet worm was
created for the specific purpose of targeting an industrial computer system that would attack
power plants, communication systems, and factories to disrupt Irans nuclear program (Reveron,
2012). Although, no person, group, or nation admitted to creating the Stuxnet worm. Experts
propose Stuxnet was created by a joint effort between the United States and Israel (Heickero,
2013)
CYBERSECURITY AND NATIONAL SECURITY 4
Cybercrimes are growing exponentially in many countries, including the United States.
Crimes like industrial espionage, fraud, theft of information and money, cyber-terrorism,
laundering are on the rise. Cyber warfare is just one small step away.
The United States has started to prepare to use cyberspace in warfare. United States
Cyber Command (USCYBERCOM) was created in 2010 to be the cyber support for the Army,
Navy, Airforce, and Marines. In 2011, the Department of Defense Strategy for Operating in
Cyberspace was drafted and included the following initiatives (Reveron, 2012):
Strategic Initiative 2: Employ new defense operating concepts to protect DoD networks
and systems
Strategic Initiative 3: Partner with other U.S. government departments and agencies and
Strategic Initiative 4: Build robust relationships with U.S. allies and international partners
In 2016 President Obama released a FACT SHEET: Cybersecurity National Action Plan
(CNAP). The primary purpose of the CNAP was to protect the United States in cyberspace the
new cyber domain. More specifically the CNAP addressed the need to increase the level of
cybersecurity for the United States and its citizens, increase online privacy, improve the security
technology, deter malicious activity in cyberspace, improve cyber incident response, protect the
Modernize government information technology and manage national security with the
Information Technology Modernization Fund and to create a position for a Federal Chief
the commission members were chosen by the party leaders from the Senate and the House of
cybersecurity, national security, research and development, higher education, law enforcement,
and US policies and procedures. Some of the members were leaders of global corporations, and
Security, 2016).
The Commission on Enhancing National Security report was released in December 2016
following the directive by the Cybersecurity National Action Plan. The commission recognized
the value of cyberspace for global communication, social change, and economic prosperity. The
commission also recognized the necessity in protecting cyberspace, and the United States
citizens privacy, public safety, economic and national security, while continually fostering the
development of new technology solutions. The commission addressed the need for cybersecurity
at all levels for individuals, small businesses, large corporations, non-profit organizations, and
CYBERSECURITY AND NATIONAL SECURITY 6
governments. The Commission on Enhancing National Security report included the following six
networks
2. Innovate and accelerate investment for the security and growth of digital
5. Better equip government to function effectively and securely in the digital age
recommendations and 53 action items. In the final section of the report the commission
communicated the need for urgency. National cybersecurity should be a top priority for everyone
agencies at all levels, and the new President and his administration. The commission firmly
stated the need for cooperation between government agencies and organizations in the private
sector. They also recommended measuring the outcomes for each one of the action plans. The
Conclusion
dimension for criminals, terrorists, and warfare. We must meet this new challenge with a strong
CYBERSECURITY AND NATIONAL SECURITY 7
unified front and a definitive plan of action. We need to look beyond the numerous benefits of
cybersecurity, and prepare to protect our nation from the dark side of cyberspace. Implementing
good and strong beginning. We need to come together as a country and be part of the solution.
As long as cyberspace and information technology grows, we must meet that growth with
References
Commission on enhancing national cybersecurity: Report on securing and growing the digital
https://www.nist.gov/sites/default/files/documents/2016/12/02/cybersecurity-
commission-report-final-post.pdf
Fact sheet: cybersecurity national action plan. (2016, February 9). Retrieved from
https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-
cybersecurity-national-action-plan
Heickero, R. (2013). The Dark Sides of the Internet: On Cyber Threats and Information Warfare.
https://libcatalog.atu.edu:443/login?url=http://search.ebscohost.com/login.aspx?direct=tr
ue&db=nlebk&AN=542525&site=ehost-live&scope=site
https://www.defense.gov/Portals/1/features/defenseReviews/QDR/2008_National_Defens
e_Strategy.pdf
Reveron, D. S. (2012). Cyberspace and National Security: Threats, Opportunities, and Power in
https://libcatalog.atu.edu:443/login?url=http://search.ebscohost.com/login.aspx?direct=tr
ue&db=nlebk&AN=491171&site=ehost-live&scope=site