Greater transparency needed in development of US policy on cyber attackApril 30th, 2009 - 3:20 pm ICT by ANI
Washington, April 30 (ANI): A new report from the National Research Council has determined that the current policy and legal framework regulating use of cyber attack by the US is ill-formed, undeveloped, and highly uncertain.
The United States should establish clear national policy on the use of cyberattack, while also continuing to develop its technological capabilities in this area, it says.
The US policy should be informed by open national debate on the technological, policy, legal, and ethical issues of cyberwarfare, according to the committee that wrote the report.
“Cyber attack is too important a subject for the nation to be discussed only behind closed doors,” said Admiral William Owens, former vice chairman of the Joint Chiefs of Staff and former vice chairman and CEO of Nortel Corp., and Kenneth Dam, Max Pam Professor Emeritus of American and Foreign Law at the University of Chicago School of Law, who co-chaired the committee.
Cyber attacks - actions taken against computer systems or networks - are often complex to plan and execute but relatively inexpensive, and the technology needed is widely available.
Defenses against such attacks are discussed, but questions on the potential for, and the ramifications of, the United States’ use of cyber attack as a component of its military and intelligence arsenal have not been the subject of much public debate.
Although the policy and organizational issues raised by the use of cyberattack are significant, the report says, “neither government nor society at large is organized or prepared to handle issues related to cyber attack, let alone to make broadly informed decisions.”
The U.S. could use cyber attack either defensively, in response to a cyber attack from another nation, or offensively to support military missions or covert actions, the report says.
Cyber attacks can be conducted anonymously or falsely attributed to another party relatively easily, making it difficult to reliably identify the originator of the attack, it added.
Clear national policy regarding the use of cyber attack should be developed through open debate within the US government and diplomatic discussion with other nations, the report says.
The U.S. policy should make it clear why, when, and how a cyberattack would be authorized, and require a periodic accounting of any attacks that are conducted, to be made available to the executive branch and to Congress. (ANI)
- Israeli military admits to cyber-warfare - Jun 04, 2012
- Proactive defence can deter cyber-attacks - Jun 28, 2011
- 'Link cyber terrorism to India's overall counter-terror capabilities' - May 16, 2012
- India creating architecture to ensure cyber security: NSA - May 16, 2012
- How an all-out cyberwar between US, China in 2020 might look like - Mar 24, 2011
- South Africa's new policy to combat cyber crime - Mar 13, 2012
- Hackers say they obtained US police information - Aug 08, 2011
- Unprecedented cyber attack on Canada linked to China - Feb 17, 2011
- India, Kazakhstan sign seven bilateral agreements (update) - Apr 16, 2011
- Obama denies allegations over White House leaks - Jun 09, 2012
- Soon, computers with immune system like humans to avert cyber-attacks - Apr 24, 2011
- US faces prospect of losing all out cyberwar - Feb 25, 2010
- BlackBerry to bid for Nortel patents to stop Google - Apr 19, 2011
- Google announces they will no longer censor results in China - Jan 13, 2010
- US cyber command chief says military computer networks vulnerable to attack - Jun 04, 2010
Tags: admiral william owens, ceo of nortel, chairman of the joint chiefs, chairman of the joint chiefs of staff, chiefs of staff, closed doors, covert actions, cyber attack, cyber attacks, cyberattack, cyberwarfare, joint chiefs of staff, max pam, military missions, national debate, professor emeritus, technological capabilities, technological policy, university of chicago school, vice chairman of the joint chiefs of staff