Featured Research

from universities, journals, and other organizations

What should be the US role in cybersecurity and cyber-spying?

Date:
February 24, 2011
Source:
Rice University
Summary:
A new article calls on the intelligence community to jointly create a policy on cybersecurity and determine the degree to which the US should protect intellectual property and national infrastructure of other nations. The author also comments on how aggressive the United States should be in its proactive cyber-spying activities.

A new article written by a fellow at Rice University's Baker Institute for Public Policy calls on the intelligence community to jointly create a policy on cybersecurity and determine the degree to which the U.S. should protect intellectual property and national infrastructure of other nations. The author also comments on how aggressive the United States should be in its proactive cyber-spying activities.

"Treasure Trove or Trouble: Cyber-Enabled Intelligence and International Politics" was authored by Chris Bronk, a fellow of information technology policy at the Baker Institute and a former U.S. State Department diplomat. The report was published this week in the National Military Intelligence Association's American Intelligence Journal.

"America wants a secure cyberspace, but its intelligence agencies have found enormous utility in using their own computer hacking capabilities to collect confidential information from foreign adversaries," Bronk said. "This raises the question of how the U.S. government can push for global cybersecurity while at the same time using cyber means to collect intelligence on potentially threatening regimes such as Iran."

Bronk kick-starts the debate on how altruistic the United States can be on a secure cyberspace when it may benefit enormously from the insecurity of others' information networks.

This week, U.S. Senator Joseph Lieberman is again introducing a comprehensive cybersecurity bill with the issue of protecting the vitally important digital networks that make so much of the national infrastructure work.

"There remains an enormous vacuum in policy as to how America's intelligence agencies, many of whom are charged with roles is securing cyberspace under the Lieberman bill, can continue to use clandestine cyber means in collecting intelligence, or even engaging in covert action against other countries and transnational groups," Bronk said. "This is an issue that needs consideration and input not just within Washington political circles, but far beyond the Beltway, including firms in Silicon Valley and other tech centers around the U.S."


Story Source:

The above story is based on materials provided by Rice University. Note: Materials may be edited for content and length.


Journal Reference:

  1. Chris Bronk. Treasure Trove or Trouble: Cyber-Enabled Intelligence and International Politics. American Intelligence Journal, Vol 28, No 2

Cite This Page:

Rice University. "What should be the US role in cybersecurity and cyber-spying?." ScienceDaily. ScienceDaily, 24 February 2011. <www.sciencedaily.com/releases/2011/02/110224121938.htm>.
Rice University. (2011, February 24). What should be the US role in cybersecurity and cyber-spying?. ScienceDaily. Retrieved August 29, 2014 from www.sciencedaily.com/releases/2011/02/110224121938.htm
Rice University. "What should be the US role in cybersecurity and cyber-spying?." ScienceDaily. www.sciencedaily.com/releases/2011/02/110224121938.htm (accessed August 29, 2014).

Share This




More Science & Society News

Friday, August 29, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Who Could Be Burnt by WHO's E-Cigs Move?

Who Could Be Burnt by WHO's E-Cigs Move?

Reuters - Business Video Online (Aug. 28, 2014) The World Health Organisation has called for the regulation of electronic cigarettes as both tobacco and medical products. Ciara Lee looks at the impact of the move on the tobacco industry. Video provided by Reuters
Powered by NewsLook.com
JPMorgan Chase Confirms Possible Cyber Attack

JPMorgan Chase Confirms Possible Cyber Attack

Reuters - US Online Video (Aug. 28, 2014) Attackers stole checking and savings account information and lots of other data from JPMorgan Chase, according to the New York Times. Other banks are believed to be victims as well. Fred Katayama reports. Video provided by Reuters
Powered by NewsLook.com
CDC Director On Ebola Outbreak: 'It's Worse Than I Feared'

CDC Director On Ebola Outbreak: 'It's Worse Than I Feared'

Newsy (Aug. 28, 2014) CDC director Tom Frieden says the Ebola outbreak is even worse than he feared. But he also said there's still hope to contain it. Video provided by Newsy
Powered by NewsLook.com
UN: Ebola Cases Could Eventually Reach 20,000

UN: Ebola Cases Could Eventually Reach 20,000

AP (Aug. 28, 2014) The Ebola outbreak in West Africa eventually could exceed 20,000 cases, more than six times as many as are known now, the World Health Organization said as the US announced plans to test an experimental Ebola vaccine. (Aug. 28) Video provided by AP
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins