• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • cyber

    A Cybersecurity Executive Order Could Harm Security

    With reports of a draft executive order on cybersecurity being circulated, it now seems likely that President Obama will go forward with this flawed approach. The peculiar thing is that the order does not seem to add anything new. If that is true, why is the President expending political capital … More

    Executive Orders in Cybersecurity Result in Incomplete and Empty Solutions

    Over the weekend, a draft of a cybersecurity executive order was shown to members of the press. Leaked reports of secretive decision making are what the U.S. gets when the President decides to ignore the democratic process and implement rules by executive fiat. The U.S. also gets policies that are … More

    A Cybersecurity Executive Fiat Is a Very Bad Idea

    There are reports circulating that the White House has drafted an executive order to implement cybersecurity regulations. Congress—the representatives of the people— could not come to a sufficient level of agreement needed by the Constitution to pass the Cybersecurity Act of 2012. Now, a few Senators say they know better … More

    Secretary Clinton Declares U.S. and China Equal as Cyber Victims

    During her visit to China, Secretary of State Hillary Clinton made an inexcusable public declaration. She stated that America and China were both “victims of cyber attacks” and needed to act in partnership. Suggesting moral equivalence between America and China in the cyber realm is as preposterous as Elliot Ness … More

    Tactical Cyber Offensive Is In Play

    In a rare, open moment for a senior cyber official, Marine Lieutenant General Richard P. Mills recently discussed cyber operations that can only be labeled tactical and offensive. Given the ongoing debate about any cyber operations beyond pure defense (even so-called “active defense” is seen by some as a non-starter), … More

    Newest Hacker Target: Larger Systems That Run Everything Else

    The “systems that control our systems” are now among the most lucrative targets for hackers. Control systems are the computer programs that run and manage other computer programs. They manage water treatment plants, they run the D.C. Metro system, and they run the multitude of systems in hospitals. About a … More

    Let the User Beware: You're Responsible for Your Cybersecurity

    It is said that a wise man learns from the mistakes of others. If that is the case, the U.S. would be wise to learn from the scary story of Mat Honan, a senior writer at the technology news publication Wired. Honan is a technologically savvy guy, but with only … More

    Syrian Hackers Undermine Media Integrity

    On August 3, the Syrian Electronic Army hacked into Reuters’s blogging site and published a fake interview with a Syrian rebel leader, saying his troops were withdrawing from the city of Aleppo following devastating loss of life. As Aleppo has been a center of the struggle between the Syrian military … More

    The President Shouldn't Override the Congress on Cybersecurity

    The attempt to pass a comprehensive cybersecurity bill before the summer recess failed today in the Senate, 52–46. The Cybersecurity Act of 2012 was still not ready for prime time, despite several tries at moderating its more objectionable aspects. With this vote, cybersecurity legislation is not likely to move any … More

    Senate Cybersecurity Bill Gets Worse the More You Read It

    There will likely be a vote in the near future on the Cybersecurity Act of 2012 (CSA), led by sponsors Senators Joe Lieberman (I–CT) and Susan Collins (R–ME). As the Senate considers the CSA, it should pay close attention to the deficiencies of the bill. Indeed, as one digs deeper … More