[Infowarrior] - Cyber-equivalent of Monroe Doctrine
Richard Forno
rforno at infowarrior.org
Wed Mar 11 12:31:05 UTC 2009
http://lastwatchdog.com/cyber-equivalent-monroe-doctrine-needed-repel/
Cyber-equivalent of Monroe Doctrine needed to repel Internet attacks
on Internet security by Byron Acohido
March 10, 2009
President Obama ought to invoke the cyber equivalent of the
Monroe Doctrine to repel rising Internet attacks against
America.
So testified Oracle's tough-talking Chief Security Officer,
Mary Ann Davidson, at a Congressional hearing today.
History refresher: Back in 1823, President James Monroe
decreed that any attempt to extend foreign political systems
onto U.S. soil would be considered an act of aggression
requiring U.S. intervention. Simple as that. Monroe sought to
repel European imperialists bent on colonizing chunks of the
tenuously-governed Americas.
It worked. The Monroe Doctrine became a key tenet of U.S.
foreign policy invoked by Calvin Coolidge, Herbert Hoover and
John F. Kennedy.
Substitute foreign cybercrime lords bent on colonizing U.S.
computers and networks -- and the tenuous state of cyber
defenses -- and the parallel is riveting
"We are in a conflict, some would call it war," Davidson
testified before the House Subcommittee on Emerging Threats,
Cybersecurity, Science & Technology. "Let's call it what it
is. Given the diversity of potentially hostile entities
building cadres of cyberwarriors, probing our systems for
weakness, infiltrating government networks and making similar
attempts against businesses and critical industries,
including our defense systems, is there any other conclusion
to be reached?"
A call to defend U.S `cyberturf `
The hearing was held to get a mid-way status report of a
60-day review of U.S. cybersecurity policy being conducted by
management collaboration expert, Melissa Hathaway.
"The advantages of invoking a Monroe-like Doctrine in
cyberspace would be to put the world on notice that the US
has cyberturf, and that we will defend our turf," Davidson
testified. "We need to do both -- now."
Davidson's call to arms was reinforced by testimony from
David Powner, GAO's director of IT management issues; Scott
Charney, Microsoft Vice President of Trustworthy Computing;
Jim Lewis, director of the Center for Strategic and
International Studies; and Amit Yoran CEO of security firm
NetWitness.
The experts delivered a wide range of proof points showing
how the U.S. citizens, businesses and governments have been
under rising cyberattacks for several years.
Yoran, a former senior official in the Department of Homeland
Security, testified that the the U.S. has been "experiencing
a 9/11 in cyber attacks" for a number of years. "Because
there is no visible catastrophic outcome, we lie in bed at
night asleep without realizing how much damage is being
done."
Underscoring this Last Watchdog investigation of corporate
intrusions, the GAO's Powner noted that foreign nations and
criminals are targeting organizations "to gain a competitive
advantage and potentially disrupt or destroy them," and also
pointed out "that terrorist groups have expressed a desire to
use cyberattacks as a means to target the United States."
Truly comprehensive plan needed
The experts agreed that there is a dire need for a truly
comprehensive cyber security plan - one that involves
public/private partnerships and global cooperation.
One of the top recommendations of the CSIS bi-partisan
committee that spend more than a year culling cybersecurity
ideas to deliver to the 44th president was a call for
regulation. The private sector "will never deliver adequate
security and the government must establish regulatory
thresholds for critical infrastructure," testified Lewis,
CSIS director and senior fellow.
Charney, the Microsoft executive and a co-chair of the CSIS
bi-partisan committee, cautioned that regulation must be
carefully "tailored."
"Finding the required balance will be difficult," said
Charney. "But if we fail to use regulation to improve our
national cybersecurity, if we do not identify mandatory
actions to secure the digital infrastructure, the Obama
administration will have no more success than any of its
predecessors."
The experts also were unanimous about there being a singular
entity best-suited to shaping and implementing such a plan:
the White House.
"Only the White House has the authority to bring many large
and powerful agencies to follow a common agenda and to
coordinate with each other," said Lewis. "The White House and
only the White House can set strategy and policy, ensure that
agencies are following them and resolve agency disputes."
Beckstrom acknowledged
Attending the hearing was Rod A. Beckstrom, who just resigned
from a key cybersecurity post in the Department of Homeland
Security. Co-author of a best-selling management book, The
Starfish and the Spider, Beckstrom could not escape
smothering controls put on him by the National Security
Agency.
Rep. Bennie Thompson D-Miss., and Rep. Yvette Clarke D-New
York, acknowledged Beckstrom. Clarke called Beckstrom's
resignation "an unfortunate loss." Thompson made note of
"ineffective leadership, unclear organizational structure and
poorly defined roles" demonstrated by federal agencies and
corporations trying futilely to put up a cyber defense.
"I along with many of my colleagues were optimistic when Mr.
Beckstrom was brought on to lead the National Cyber Security
Center," said Thompson. "He has organizational expertise. He
has worked extensively with the private sector. But Mr.
Beckstrom did not have experience working miracles. "
-Byron Acohido
More information about the Infowarrior
mailing list