Op-Eds & Commentaries
Read the full article here
Read full article here
Commentators have rushed to weigh in on the political and economic implications of the Brexit referendum. But the potential security effects are just as important. At risk are operational matters such as data and intelligence sharing. But also in question is something more fundamental: the relationships that allow security services to live and breathe. The United Kingdom, EU, and other partners will now have to redefine their security and intelligence relationships.
A network-attack analogue to the manhunting Joint Special Operations Command would allow cyber warriors to decide, deconflict, and execute more effectively.
In a tragic example of foreshadowing, French Minister of the Interior Bernard Cazeneuve stated in remarks at the George Washington University earlier this month that the terrorist threat level had never been so high. Last week’s attacks in Brussels plainly reinforce the point while begging the question of how they were possible.
Spending more on cybersecurity is a start but it's certainly no panacea. President Obama's new spending plans should come with policy proposals and organizational initiatives that stand in the way of protecting US networks from malicious hackers.
Estonia packs a punch in the cyber domain. The country is a world leader in cyber-related innovation, and it has charted that course without compromising security. Estonia initially gained global attention as a cyber-target, seeking to overcome a series of organized attacks in 2007 widely attributed to Russian groups. Estonia emerged energetically from those attacks, going beyond devising a coherent and expansive cyber-strategy calibrated defensively, to being one of the most wired countries in the world.
If the United States and our allies are to reclaim the cyber battlefield from the Islamic State, we need a playbook for pushback, just as we would prepare battle plans to prosecute a war kinetically. First, we must collect online information and intelligence necessary to understand and ultimately defeat the adversary. Second, we must shut down the most noxious sources that amplify the most violent voices. Third, we must push back on ISIS’s narrative, expose its myths and falsehoods, and provide a credible and constructive alternative.
PARIS INSIGHTS contains the reflections of key decision-makers and subject matter experts on three dimensions of the terrorist attacks in Paris on November 13, 2015: The implications of the Paris attacks, what they mean for the U.S. homeland in particular, and thoughts on the way forward.
A British intelligence agency warned this week that cyberattacks threatening the United Kingdom’s security doubled in a year, and similar challenges face every nation with digital infrastructure, leading policymakers to pursue the development of new norms of behavior in cyberspace. What has already been achieved in the area, and what obstacles stand in the way of further progress?
By 2020, billions of devices will be connected online. The possibilities within this Internet of Everything are innovative, extensive, and valuable. Think driverless cars, “smart” houses and cities, and critical healthcare delivered virtually to remote locations. But these developments also have a dark side. With opportunity comes challenge, in the form of vulnerability.