WASHINGTON, June 30, 2011 – The Federalist Society convened Tuesday to discuss the complex and interconnected legal and policy issues of cyber security in relation to the law of armed conflict, privacy and legislative action.
Morning and afternoon panels comprised of national security and economic security experts presented to the legal society the difficulties of applying the law of armed conflict towards cyber threats. The new threat conditions introduced by cyber intrusions and attacks do not fit the old paradigm of doing warfare. Panelists agreed, however, that the new rules should not be determined before major cyber conflicts have taken place.
“It is not in the United States’ interests to preempt how it will develop,” said Steven Bradbury, former Acting Assistant Attorney General for the Office of Legal Counsel.
“International law does not necessarily apply to cyber warfare,” said Bradbury, “it is largely a policy for the president, not lawyers, to decide the exercise of our national security.”
Panelists focused largely on the conflicts between nation states, but state-sponsored cyber threats are not always the issue. The conflict is asymmetric in nature: the majority of threat actors being organized crime groups targeting private networks and infrastructure systems, and the perpetrators are anonymous and invisible to their targets.
“This administration is the first of three to really try to grapple with this,” said Michael Vatis, founding Director for National Infrastructure Protection at the FBI.
The other panelists also acknowledged the Administration’s attempts to handle the problem, despite the posture of government and industry to be largely defensive in nature due to the anonymity of attackers and the sole legal authority of the government to enact justice.
Still, it is easier to attack than defend, said panelists. Laws and security measures designed to counteract network attacks are often obsolete by the time that they are implemented.
“The enthusiasm for the offense has overwhelmed planning for the defense,” said Stewart Baker, former Assistant Secretary for Policy at the Department of Homeland Security.
According to Baker, “The problem is not that they do not have the [legal] tools, they just can’t find the guys.”
Yesterday, a defense spokesperson also told BroadbandBreakfast.com to expect the Pentagon’s cyber strategy announcement in mid-July, although an exact date was still unclear.
- Federal Communications Commission Grants First Licenses for Tribal Radio Frequencies During Priority Window
- National Rural Education Association Advocates For Universal Home Broadband Access to Assist Rural Students
- Evidence-Based Policy Making is Particularly Important in Managing Radio Frequency Spectrum
- Policymakers Urge Better Broadband Maps, Seek Funding for ‘Rip and Replace,’ and Tout Open Radio Networks
- Breakfast Media Minute: October 23, 2020
Signup for Broadband Breakfast
Broadband Roundup1 month ago
Nathan Simington is Trump’s New Man for FCC, New Speed Test, Challenges for State Net Neutrality
Artificial Intelligence4 months ago
U.S. State Department Employing Artificial Intelligence Against COVID-19 Misinformation
Broadband's Impact3 months ago
Broadband Breakfast Live Online Launches Weekly Series Featuring ‘Champions of Broadband’
Infrastructure4 months ago
Michigan Broadband Cooperative Calls Report Saying Municipal Broadband Has an Unfair Advantage ‘Laughable’
Fiber2 months ago
Ubiquitous Fiber Infrastructure is Essential to Maximize the Advantages of 5G, According to WIA Report
Broadband Roundup4 months ago
Artificial Intelligence Task Force, State Cybersecurity, ADTRAN Offers Rural Funding Guidance
Open Access3 months ago
In Danville, Virginia, an Early Adopter of Open Access Seeks to Prove the Business Model
5G4 months ago
Verizon CEO Hans Vestberg Describes 5G-to-the-Home Vision, Claiming U.S. Leads in 5G Deployment