4 Military Cybersecurity Governance



With the dawn of the U.S. Cyber Space Command a new era has been ushered into our collective.  It is no longer safe to assume that our enemies only threaten us with conventional weapons.  No.  The new weapon of choice by many nations are found in the cyber space realm.  These weapons, or tools rather, can be used to deceive, manipulate and extract information in order to give foreign governments a perceived advantage over us.  Military leaders face many challenges in combating threats from cyber space.  None more challenging than the thorough understanding of the actual threat.
In order to understand the threat, one must appreciate that not all threats are equal in nature nor motivated by the same ideals.  Threats may be espionage, subversion, sabotage, cybercrime, and to an extent cyberwar.  Differences between these threats are minimal once inside a system and amount to nothing more than a few different keystrokes.  However noting the differences is important in regards to choosing the proper response to a threat.  In all cases, a military response may not be warranted over a legal one.  It’s the using a bazooka to kill a fly scenario.
The structure of the military makes it appealing for governments to allow for the governance of cybersecurity and use of military response.  Sometimes this may not be the best case though.  The over-dependence in the military may de-incentivize the private sector to come up with long term solutions.  Furthermore, the military should be collaborated with in regards to cybersecurity with the understanding that the primary mission is to defend the nation from physical attacks and invasions.
Militarizing cyber security defenses would also bring about negative consequences.  It would hand over complete control of the country to the one entity that private citizens could not over throw.  Fully in charge of all things cyber related, the military would have carte blanche to do as they pleased in regards to surveillance on the private sector as well as other nations.  A democratic system of checks and balances also bodes well in cyber space.

Comments

Popular posts from this blog

11 The Summary

10 Air Force IDS Testing Pioneers

1 Fitzgerald and McCain investigation show zero cyber intrusion possibilities