4 Military Cybersecurity Governance
With
the dawn of the U.S. Cyber Space Command a new era has been ushered into our
collective. It is no longer safe to
assume that our enemies only threaten us with conventional weapons. No.
The new weapon of choice by many nations are found in the cyber space
realm. These weapons, or tools rather,
can be used to deceive, manipulate and extract information in order to give
foreign governments a perceived advantage over us. Military leaders face many challenges in
combating threats from cyber space. None
more challenging than the thorough understanding of the actual threat.
In
order to understand the threat, one must appreciate that not all threats are
equal in nature nor motivated by the same ideals. Threats may be espionage, subversion,
sabotage, cybercrime, and to an extent cyberwar. Differences between these threats are minimal
once inside a system and amount to nothing more than a few different
keystrokes. However noting the
differences is important in regards to choosing the proper response to a
threat. In all cases, a military
response may not be warranted over a legal one.
It’s the using a bazooka to kill a fly scenario.
The
structure of the military makes it appealing for governments to allow for the
governance of cybersecurity and use of military response. Sometimes this may not be the best case
though. The over-dependence in the
military may de-incentivize the private sector to come up with long term
solutions. Furthermore, the military
should be collaborated with in regards to cybersecurity with the understanding
that the primary mission is to defend the nation from physical attacks and
invasions.
Militarizing
cyber security defenses would also bring about negative consequences. It would hand over complete control of the
country to the one entity that private citizens could not over throw. Fully in charge of all things cyber related,
the military would have carte blanche to do as they pleased in regards to
surveillance on the private sector as well as other nations. A democratic system of checks and balances
also bodes well in cyber space.
Comments
Post a Comment