25.07.2019 Views

International Cyber Terrorism

International Cyber Terrorism

International Cyber Terrorism

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Current Status<br />

Information Warfare is an emergent reality that comes from a self-organization process<br />

that has never seen before. The problem is that we talk about it using terms that have<br />

well-known connotations. And it is difficult to talk about something completely new using<br />

words that bring with them specific understanding and expectancies.<br />

The early period of the automobile faced a similar situation. At one time it was called a<br />

"horseless carriage" as this was the only way to define its essential quality. The car is<br />

more than a carriage without a horse. This is the dilemma we face when we discuss<br />

Information Warfare. The danger is that the uses of familiar words misrepresent and<br />

mask the true extend of the revolution that will have to take place if we are to be able to<br />

retain a military capacity in a new physical, social and cognitive space."<br />

— Dr. Robert Garigue in Information Warfare, 1994.<br />

The National Strategy to Secure <strong>Cyber</strong>space was published in February 2003 to outline<br />

an initial framework for both organizing and prioritizing efforts to secure the cyberspace.<br />

It highlighted the necessity for public-private partnerships. Proactive threads include the<br />

call to deter malicious activity and prevent cyber attacks against America's critical<br />

infrastructures.<br />

The notion of "proactive defense" has a rich history. The hype of "proactive cyber<br />

defense" reached its zenith around 1994. This period was marked by intense "hype"<br />

discussions under the auspices of Information Warfare. Much of the current doctrine<br />

related to proactive cyber defense was fully developed by 1995. A number of programs<br />

were initiated then, and advanced to full operation by 2005 including those of hostile<br />

states. Meanwhile, the public discussions diminished until the most recent resurgence in<br />

Page 77 of 174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!