• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • cyber

    Obama's Next Executive Order: Planning for the Sake of Planning Not the Answer

    In the world of cybersecurity, all eyes are on the White House as experts speculate on President Obama’s plans to issue an executive order to secure the cyber sector by administrative fiat. Yet, according to drafts circulating Washington, Obama’s executive order wouldn’t be focused on cybersecurity alone. Instead, the Administration’s … More

    Congressional Cybersecurity Funding Clarified

    In an Issue Brief published yesterday, Heritage raised some questions about the wording of funding language in the continuing resolution (CR) pending before the House of Representatives that might permit President Obama to fund the implementation of his proposed cybersecurity executive order, instead of more clearly necessary and appropriate activities, … More

    A Cybersecurity Executive Order Could Harm Security

    With reports of a draft executive order on cybersecurity being circulated, it now seems likely that President Obama will go forward with this flawed approach. The peculiar thing is that the order does not seem to add anything new. If that is true, why is the President expending political capital … More

    Executive Orders in Cybersecurity Result in Incomplete and Empty Solutions

    Over the weekend, a draft of a cybersecurity executive order was shown to members of the press. Leaked reports of secretive decision making are what the U.S. gets when the President decides to ignore the democratic process and implement rules by executive fiat. The U.S. also gets policies that are … More

    A Cybersecurity Executive Fiat Is a Very Bad Idea

    There are reports circulating that the White House has drafted an executive order to implement cybersecurity regulations. Congress—the representatives of the people— could not come to a sufficient level of agreement needed by the Constitution to pass the Cybersecurity Act of 2012. Now, a few Senators say they know better … More

    Secretary Clinton Declares U.S. and China Equal as Cyber Victims

    During her visit to China, Secretary of State Hillary Clinton made an inexcusable public declaration. She stated that America and China were both “victims of cyber attacks” and needed to act in partnership. Suggesting moral equivalence between America and China in the cyber realm is as preposterous as Elliot Ness … More

    Tactical Cyber Offensive Is In Play

    In a rare, open moment for a senior cyber official, Marine Lieutenant General Richard P. Mills recently discussed cyber operations that can only be labeled tactical and offensive. Given the ongoing debate about any cyber operations beyond pure defense (even so-called “active defense” is seen by some as a non-starter), … More

    Newest Hacker Target: Larger Systems That Run Everything Else

    The “systems that control our systems” are now among the most lucrative targets for hackers. Control systems are the computer programs that run and manage other computer programs. They manage water treatment plants, they run the D.C. Metro system, and they run the multitude of systems in hospitals. About a … More

    Let the User Beware: You're Responsible for Your Cybersecurity

    It is said that a wise man learns from the mistakes of others. If that is the case, the U.S. would be wise to learn from the scary story of Mat Honan, a senior writer at the technology news publication Wired. Honan is a technologically savvy guy, but with only … More

    Syrian Hackers Undermine Media Integrity

    On August 3, the Syrian Electronic Army hacked into Reuters’s blogging site and published a fake interview with a Syrian rebel leader, saying his troops were withdrawing from the city of Aleppo following devastating loss of life. As Aleppo has been a center of the struggle between the Syrian military … More