User login

Join The Debate

Cast your vote and join the conversation.

Membership is free.

Get Started

The Cyber War Threat Has Been Grossly Exaggerated

The BriefGet Up To Speed

It could be the greatest strategic irony of the last twenty years: the American lead in digital technologies '€“ upon which our financial, communications and defense systems are built, and on which they depend '€“ may also represent a serious American Achilles heel. The sophistication of our mobile phone networks, of the GPS system that guides air traffic, even of the networked command-and-control that drives our power grids, may be without rival. But it also provides one great big and sprawling target to enemies determined to discover the choke points that can cripple us in a time of war. At least that'€™s the scenario as described in various, and increasingly alarmed media accounts, especially in the wake of incidents like the hacking of Google last year, by digital assailants often described (without clear confirmation) as being based in China. It'€™s indeed alarming, to contemplate fighting the next war with both hands tied behind our backs because a canny enemy figured out how to shut us down electronically. Alarming '€“ but possibly, also, alarmist? Can we really be that vulnerable? Is our digital undergirding really that exposed, especially given that the Internet itself '€“ the foundation of all this critical connectedness '€“ was itself initially developed as a military undertaking? Even if our enemies '€“ state enemies or terrorists '€“ manage to cause damage in one corner of American cyberspace, don'€™t we have enough redundancy built in to protect us? As one technology writer has put it, this is one of those topics where the internet press likes to get worked up into a lot of '€œheavy breathing.'€ So which is it? Are we at existential risk in the event of a well coordinated cyber attack, and if so, are we taking measures to protect ourselves? Or will the first cyber war be a war we are already positioned not only to survive, but to win?

Defining Cyber war/Parameters
Tuesday, March 1, 2016
Stratfor Global Intelligence March 1
Wednesday, May 12, 2010
William Jackson
Respect Human Rights
Saturday, December 6, 2008
Wednesday, May 12, 2010
Tuesday, April 28, 2009
David E. Sanger
Wednesday, April 14, 2010
Lolita Baldor
The Threat Has Been Exaggerated
Saturday, May 8, 2010
Evgeny Morozov
Wednesday, December 31, 1969
James Andrew Lewis
Thursday, March 4, 2010
Ryan Singel
Monday, March 1, 2010
Ryan Singel
Sunday, June 24, 2007
John Schwartz
Tuesday, March 1, 2016
Irving Lachow and Courtney Richardson
We Are Unprepared
Thursday, April 29, 2010
Fred Kaplan
Wednesday, April 8, 2009
Siobhan Gorman
Wednesday, April 7, 2010
Tom Gjelten
Tuesday, February 2, 2010
Dennis C. Blair
Thursday, December 1, 2016
Richard Clarke
Saturday, November 14, 2009
Shane Harris
Sunday, June 20, 2010
Ulf Laessing
Privacy and Public-Private Issues
Thursday, July 2, 2009
Jack Goldsmith
Wednesday, May 6, 2009
Yochi J. Dreazen and Siobhan Gorman
Friday, January 1, 2016
Noah Shachtman
Thursday, September 3, 2009
Marleah Blades
Saturday, May 30, 2009
Arik Hesssedahl
Position of the White House
Cyber Shockwave Simulation
Wednesday, May 19, 2010
Bipartisan Policy Center
Tuesday, February 17, 2009
Richard Adhikari
Saturday, February 20, 2010
Transcript of CNN Special
Cyber Incidents
Tuesday, March 1, 2016
January 29
Friday, February 19, 2010
Brian Krebs
Cyber Terrorism and China
Friday, February 19, 2010
John Markoff and David Barboza
Friday, February 19, 2010
Richard Adhikari
Thursday, February 4, 2010
Ellen Nakashima
Saturday, January 23, 2010
Bruce Schneier
Wednesday, May 21, 2008
Shane Harris
Monday, June 2, 2008
Bruce Schneier
Friday, March 5, 2010
Friday, March 5, 2010
Federal Energy Regulatory Commission
Cyber Terrorism and North Korea
Monday, July 13, 2009
Bruce Schneier
Wednesday, July 8, 2009
Chris Lefkow
Friday, December 18, 2009
Justin McCurry
Cyber Terrorism and Brazil
Wednesday, November 11, 2009
Andrew Downie
Tuesday, November 10, 2009
Shane Harris
Monday, November 9, 2009
Marcelo Soares
Cyber Terrorism and Georgia
Cyber Terrorism and Estonia
Friday, January 25, 2008
Thomas Claburn
Wednesday, August 22, 2007
Kevin Poulsen
Saturday, May 19, 2007
Peter Finn
Thursday, May 17, 2007
Adrian Blomfield
Tuesday, March 23, 2010
Tony Romm
Wednesday, March 24, 2010
Jaikumar Vijayan
Tuesday, March 1, 2016
Introduced April 29
Tuesday, March 1, 2016
Passed February 4
Tuesday, March 1, 2016
Introduced April 1
Tuesday, March 1, 2016
Introduced July 10
Tuesday, March 1, 2016
Introduced April 28
Tuesday, March 1, 2016
Passed House December 8
CRS Report to Congress
Thursday, December 1, 2016
Report of the CSIS Commission
Wednesday, April 14, 2010
Tom Shanker
Monday, May 10, 2010
Marjorie Censer and Tom Temin
Sunday, February 15, 2009
John Markoff
Global Cyber Deterrence