Report Urges Government Not to Spend a Lot on Cyberdefense
October 9, 2009 2:20 PM
comment(s) - last by
Should our nation spend more money to safeguard us against nations like China that are reportedly grooming legions of military hackers and striking out at the U.S. and other nations? A new report argues the opposite, saying cyberdefense is confusing and should not be a spending priority. It advocates focusing existing resources on military networks.
(Source: Fox News)
A new study recommends a cautious approach when defending the nation against cyberterrorism
Be ready for both defense and offense. Cover all routes of attack. Practice careful surveillance. All of these would seemingly be logical paradigms for
our nation's cybersecurity efforts
. However, a
takes a different bent and says that the nation shouldn't make cybersecurity its top priority and instead should focus on reallocating limited resources to defence of critical infrastructure.
The new report from the RAND Corporation says that
, telephone service, banking, and military command and control in the U.S. are all accessible and able to be attacked from the internet. That makes them open to attack, according to the report. RAND's press release describes, "Working against connected but weakly protected computer systems, hackers can steal information, make the systems malfunction by sending them false commands and corrupt the systems with bogus information."
Martin C. Libicki, the report's lead author and senior management scientist at RAND, a nonprofit research organization, adds, "Adversaries in future wars are likely to go after each other's information systems using computer hacking. The lessons from traditional warfare cannot be adapted to apply to attacks on computer networks. Cyberspace must be addressed in its own terms."
The report says that estimates of current cyberwarfare damage to our nation aren't consistent and cite anything from several billion yearly to hundreds of billions.
According to the report, military networks should be top priority when it comes to defense, as attacks on military networks are potentially the most potent. They describe a hypothetical scenario in which an enemy could silence missile defenses of a nation and then pound its critical targets with rockets.
The report says that offensive cyberwarfare is largely useless as it tends to bother, but not generally disarm adversaries. Further, Libicki warns that cyberattacks are amorphous and
determining the identity of attackers
is largely guesswork. Attempts at counterattacks are thus largely futile, according to the report. States Libicki, "This is not an enterprise where means and ends can be calibrated to one another. As a result, it is ill-suited for strategic warfare."
Rather than try to target nations or launch counterattacks, the study suggests a focus on diplomatic, economic and prosecutorial efforts against cyber attackers. However, the report suggest that such efforts not be made a priority in the nation's spending. Reads the release, "Libicki does not recommend the United States make strategic cyber warfare a priority investment."
Other recent reports have taken a different bent, advocating more funding. They have argued that the U.S. is
woefully unprepared for cyberattack
. They also point to nations like China that are grooming legions of computer-savvy troops to launch cyberstrikes.
The RAND study was federally financed, with the goal of offering independent policy alternatives for the U.S. Air Force.
This article is over a month old, voting and posting comments is disabled
RE: Identify your enemy
10/10/2009 5:17:35 AM
I saw the 9/11 LIVE- NOT ON TV- I was there at the scene.
If those terrorist had chosen the right targets-from the white house to major airports to nuclear power stations & other sensitive locations (to create maximum havoc/damage)....god forbid what would have happened to you & the whole world.
China/Russia did not do it,but a bunch of terrorist living in the USA.
The terrorist have nothing to loose ! but only to gain by executing a cyber attack - whilst China/Russia need the USA just as much as any other friendly country in the world needs it.
Identify your enemy !
The terrorist exposed a major weakness-
If you want to hit/attack the USA - do it from inside the USA - much easier & effective.
"It looks like the iPhone 4 might be their Vista, and I'm okay with that." -- Microsoft COO Kevin Turner
Cyber Assault Lays Waste to U.S. Gov't Websites, North Korea Suspected
July 8, 2009, 9:23 AM
US Military Creates Cyber Defense Department
June 24, 2009, 4:09 PM
Report: Foreign Cyberspies Attack Electrical Grid
April 9, 2009, 8:44 AM
War Games Show U.S. to Be Soft, Unprepared for Cyber Attack
December 22, 2008, 5:22 PM
Bitcoin King's American Accounts Get Frozen
March 13, 2014, 3:00 AM
Time Warner Cable CEO Says Merger with Comcast is a "Dream Combination", Will Increase Innovation
March 12, 2014, 2:37 PM
North Carolina-based Company to Offer Gigabit Internet Before Google
March 12, 2014, 2:31 PM
Tim Berners-Lee Talks Free and Open Web on Its 25th Birthday
March 12, 2014, 9:33 AM
"Bitcoin COO" Explains Bitcoin to Conan O'Brien in Layman's Terms
March 11, 2014, 9:53 AM
Comcast Paying Millions to Congress to Solidify Time Warner Cable Acquisition
March 10, 2014, 8:25 PM
Most Popular Articles
Bitcoin King Pt. II: Mt. Gox's Dictator Karpelès Proves Tragically Flawed
March 7, 2014, 1:12 PM
Windows 8.1 Update 1 Leaked Early
March 7, 2014, 9:30 AM
Apple Won't Let UK Sons Unlock Their Deceased Mother's iPad
March 6, 2014, 12:44 PM
Hack Reveals Fallen Bitcoin CEO's Posh Tokyo Penthouse
March 10, 2014, 4:28 PM
Lt. Gen. Davis Says Next Gen USAF Bomber Will "Of Course" Surpass $550M/Unit
March 6, 2014, 9:45 AM
Latest Blog Posts
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
Is The Period Becoming an Expression of Anger?
Nov 26, 2013, 2:02 PM
NSA and Congress -- You Will Never Kill the Constitution, It's an Idea
Nov 10, 2013, 2:00 PM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information