Fact: if the NSA were to detect the presence of a malicious worm or destructive virus on a U.S. Internet server targeted at a bank, perhaps stealing money from that bank, it could do nothing but warn the bank. The bank, most likely, does not have the capacity to deal with the worm itself; the NSA does not have the legal authority to employ methods to screen out the bad code, even though it has the technological capability. You can employ any type of thought of experiment you want here. Entities like utility companies and banks often rely on overtaxed communications networks to assess their performance; those communications networks are extraordinarily vulnerable because they rely on vulnerable machines -- machines that are old and were built with technology that, in many instances, originated elsewhere. The backbone of the Internet itself is very fragile; the VeriSign corporation, which essentially runs the Net, deals with thousands of attacks per day, some of them harmless, some of them dangerous, some of them from state actors (like China), others from well-funded and savvy techno-terrorists.
This is a tech problem and a law problem. Congress is trying to come up with ways to designate certain types of corporations that are responsible for large segments of some major activity -- power generation, money transferring, information sharing -- as, essentially, too big to fail -- or be shut down -- by cyber intruders. The idea, in essence, would be to require these entities to submit to a cyber audit. In the event of a major attack, the government (actually, the Department of Homeland Security, using NSA technology) would have the authority to quarantine the problem until it was removed. As you might imagine, this approach raises hackles with a lot of people. The corporations resist the idea of government intrusion. Their CFOs don't see the risk, so they're not interested in spending money to preemptively solve the problem. Civil libertarians properly ask about oversight; who's going to watch the watchers? Technologists wonder whether there aren't other ways to protect the nation's information grid from systemic threats.
(cont.)
Sunday, December 13
"The Exceptionally Tough Politics of Cyber Security"
Ambers explores:
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2009
(1987)
-
▼
December
(65)
- Antibody 'F77' kills prostate cancer in mice
- Greedy private investors resist government redistr...
- Airborne terror by the numbers
- Stranger than fiction
- The decade in viral videos
- The Obama Way
- Nihilism only goes so far
- Cultural fairy tale bustin'
- France to ban head scarves in all public places
- Liquid flouride thorium reactors
- Reason editor suggests his own magazine is lying
- Photo of the day
- Bullish on Obama
- It might be a redneck Christmas if...
- Critique of The Phantom Menace
- Play them stereotypes
- WTF Snowe?
- [Take 2] Barad-dûr was an inside job
- War
- The decade in news photographs
- How far we've come
- Proposition 420
- Handbell strikeforce
- Religious debates of old
- "The Exceptionally Tough Politics of Cyber Security"
- Quote of the day
- SR-71 groundspeed check
- Boobies!
- One-sided thinking
- How Newt Gingrich broke congress
- Sentences to ponder
- Fixed.
- Deep thought
- A response to Climategate
- No Medicare buy-in?
- Good news: we're still a center-right nation!
- "Take away their shovels and give them spoons"
- Why did we divert so much capital into housing?
- Chart of the day
- Types of global warming skepticism
- Quote of the day
- Climategate: was data faked? [updated]
- Game theory on innovation
- Photos of the day
- The Gatekeeper
- Take the logic further
- Data presentation
- Copenhagen dispatch
- Show them the money
- Hallelujah (Jeff Buckley)
- Atheist cat
- Financial regulation
- Artificial
- Australia, unfree
- Internet-enabled atheism
- In god we trust
- Sunday viewings
- Available labor rate increases to 10.2%
- Energy efficiency and the Age of Petroleum
- Twenty years for a download
- I see dumb people
- Government cost control is a joke
- The view from Pakistan
- Sentences to ponder
- The limits of good vs. evil thinking
-
▼
December
(65)


No comments:
Post a Comment