MeriTalk
  • Home
  • News
  • Events
  • Research
  • Sponsored Content
    • AI
    • Cloud
    • Cyber
    • Data
  • Opinion
  • LinkedIn
  • Twitter
Smarter Gov Tech, Stronger MerITocracy
Menu

Cybersecurity: The Next Geopolitical Battleground

By: Kirsten Bay
Blogs
Guest Commentary
Feb 7, 2018 | 10:21 am
Share This Story

We tend to think of international cyber attacks as a new phenomenon: threats only created by recent mass digitalization. But, in reality, they have been around since the Cold War. Back in 1982, the CIA accessed the control system for a Soviet gas pipeline and triggered a massive explosion. At the time, such events were known as ‘logic bombs’.

The difference today is that awareness of cyber attacks has grown, and so has their scale and frequency. For example, last year it was revealed that Russian hackers had infiltrated U.S. voter databases and software across 39 states during the presidential race; placing the entire electoral system in jeopardy. In 2016, Federal agencies reported no fewer than 30,899 information security breaches, 16 of which were considered “major incidents.”

Clearly, the cyber world has now become the next geopolitical battleground.

This brings us to one vital question: with Federal, business, and media interests dependent on robust digital security, how should the government be fighting the hackers?

Intra-Governmental Cooperation

Compared to modern hacking operations, the cyber exploits of the 1980s were small-time. In the current digital landscape, security organizations must contend with extensive attacks launched by national players such as the Russian Internet Research Agency or, potentially, the Korean Lazarus Group–which means disjointed cyber defenses are no longer enough.

The government has already recognized and made several changes to resolve this issue. In 2005, the office of Director of National Intelligence was established to consolidate information gathered by different agencies and bolster defenses after the events of September 11, 2001. In 2016, it increased cybersecurity spend by $5 billion and created the first Federal Privacy Council to improve communication between privacy officials and data usage guidelines. The Department of Homeland Security (DHS) has also continuously been working to safeguard government departments and share intelligence with states and global partners.

While these efforts enhance U.S. defensive abilities, greater internal unity is still needed. Inconsistent security processes continue to leave systems vulnerable: see the infamous 2015 Office of Personnel Management breach, caused by stalled authorization activity. A report on 552 local, state, and Federal organizations found erratic software updates, patching, and IP address protection leave multiple systems at risk.

To combat increasingly well-resourced hacker cells, departments must deploy a centralized approach to applying protective measures and distributing information. In other words, the government must build a cohesive security structure that has the muscle required to take on attackers.

Leveraging Enterprise Expertise 

As data have become integral to everyday business functions–from delivering utilities such as electricity and gas, to running social media networks–the importance of protecting it has increased. Consequently, many companies in the private sector have built up a vast pool of knowledge about cyber safety: insight that could be a valuable asset for the government.

By strengthening relationships with influential enterprises, Federal departments can harness lessons they have learned about identifying, isolating, and removing threats to inform their security strategy, and avoid similar issues. Moreover, they can also replicate the techniques developed by private companies to reduce and highlight cyber crime.

For example, amid the spate of fake content in 2017, Facebook built a tool that allowed users to check whether they had unwittingly liked Russian propaganda. With perpetrators posing as American users, employing names such as ‘Being Patriotic’ and ‘Heart of Texas’, distinguishing between real or bogus posts was a tough task. Analyzing activity against known fraudulent accounts, Facebook was able to identify those linked to Russia’s Internet Research Agency and help audiences steer clear. The tool, which was shared with congress, has been heralded as a “serious response” to requests for increased transparency and provides a strong example of assets the government can gain from the private sector.

Bringing Order to State-Level Chaos

The complexity of U.S. security and privacy regulation is not news to workers in the Federal IT sector: most already know that the existing legislative framework is a convoluted web of state-specific rules. But the effect this has on national safety is unacknowledged. With every state following its own policies and benchmarks, security levels across America are hugely varied as is the government’s ability to protect against attacks.

For example, in Virginia, judges have ruled that the frequency of hacking and volume of data collected by internet service providers means individuals should not expect computer usage to stay private; i.e. immune to searches by security agencies. While states such as California take a different view. Ranked as the highest protector of privacy in America–with a rating of almost 86 percent–California recently introduced a bill that would require Internet of Things (IoT) device manufacturers to build security and data protection processes into all products.

With a single set of universal laws about how information should be collected and protected, the government can provide robust security and make better agreements with corporations concerning data sharing. Not to mention negating costly legal battles, such as the notorious Federal case against Apple.

Fortifying International Bonds

Cyber hacks are not just a U.S. issue; late last year the UK was also hit by a Russian hack that breached multiple email accounts. Once national discrepancies have been resolved, the U.S. would also do well to consider improving links outside its borders: after all, closer global ties can facilitate access to vital insight and improve combined power to defeat attackers.

Of course, international bonds have been forged before. The U.S. has previously made informal agreements with countries such as China, and participated in discussions at global events, including the Council of Europe Convention on cyber crime. Yet discord regarding the way intelligence is leveraged has also caused friction: in 2013 Brazil’s President Rousseff cancelled a visit due to apprehension about international monitoring activity and Germany’s

Chancellor Merkel made statements against electronic possible espionage.

By establishing clearly defined and formalized agreements for cyber security, including frameworks such as Privacy Shield–which protects data in transit between the U.S., EU, and Switzerland–the government can avoid international confusion, while creating a culture of mutual cyber support. In short, creating an alliance of the world versus cyber criminals.

International attacks may not be an innovation of the digital age, but it has spawned hackers who are better equipped and more powerful than ever. To keep them at bay, the government needs to pool resources both at home and overseas. By unifying internal processes and national rules, as well as enhancing business and global relations, the U.S. can ensure victory on the new cyber-focused geopolitical battlefront.

As President and CEO of security firm Cyber adAPT, Kirsten Bay leverages more than 25 years of experience of risk intelligence, information management, and policy expertise. Her career has seen her sit on a U.S. congressional committee; assist in developing policies for the White House; and, in the UK, share her insight with a parliamentary subcommittee on recreating trust in the global economy.

 

Share This Story
By: Kirsten Bay | Feb 7, 2018 | 10:21 am
Tags: Cyber AdAPT, Cybersecurity, Homeland Security, Kirsten Bay

Archives

  • May 2025 (2)
  • April 2025 (3)
  • March 2025 (2)
  • December 2024 (1)
  • August 2024 (3)
  • July 2024 (1)
  • June 2024 (5)
  • May 2024 (1)
  • March 2024 (1)
  • December 2023 (2)
  • September 2023 (2)
  • August 2023 (2)
  • June 2023 (2)
  • May 2023 (2)
  • April 2023 (1)
  • March 2023 (2)
  • February 2023 (2)
  • January 2023 (1)
  • December 2022 (2)
  • November 2022 (2)
  • October 2022 (6)
  • September 2022 (7)
  • August 2022 (1)
  • June 2022 (3)
  • April 2022 (2)
  • March 2022 (6)
  • February 2022 (3)
  • January 2022 (1)
  • December 2021 (3)
  • November 2021 (5)
  • October 2021 (2)
  • September 2021 (2)
  • August 2021 (7)
  • July 2021 (2)
  • June 2021 (3)
  • May 2021 (3)
  • April 2021 (4)
  • March 2021 (1)
  • February 2021 (1)
  • December 2020 (1)
  • November 2020 (1)
  • October 2020 (5)
  • September 2020 (1)
  • July 2020 (3)
  • June 2020 (3)
  • May 2020 (2)
  • April 2020 (1)
  • March 2020 (1)
  • February 2020 (2)
  • January 2020 (3)
  • November 2019 (1)
  • October 2019 (1)
  • July 2019 (2)
  • April 2019 (1)
  • February 2018 (1)
  • December 2017 (1)
  • November 2017 (2)
  • October 2017 (1)
  • September 2017 (5)
  • July 2017 (1)
  • June 2017 (2)
  • March 2017 (2)
  • November 2016 (1)
  • October 2016 (5)
  • September 2016 (3)
  • August 2016 (1)
  • July 2016 (2)
  • June 2016 (1)
  • May 2016 (1)
  • April 2016 (2)
  • March 2016 (3)
  • January 2016 (1)
  • December 2015 (1)
  • November 2015 (1)
  • September 2015 (2)
  • August 2015 (2)
  • July 2015 (3)
  • May 2014 (1)
  • November 2013 (1)
  • August 2013 (1)
Connect with MeriTalk
  • Twitter
  • LinkedIn
921 King St., Alexandria, Virginia 22314
info@meritalk.com
  • Home
  • News
  • Events
  • Research
  • Opinion
  • MeriTV
  • Podcasts
  • Awards
  • State & Local
  • FITARA
  • About
  • Advertise
  • Contact
  • Privacy
TRUSTe
Subscribe
  • This field is for validation purposes and should be left unchanged.

168 queries. 0.656 seconds.
We may use cookies and other tracking technologies to improve your browsing experience on our website, to show you personalized content and targeted ads, to analyze our website traffic, and to understand where our visitors are coming from. By browsing our website, you consent to our use of cookies and other tracking technologies.
Do not sell my personal information.
Cookie SettingsAccept All
Cookies

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
AWSALBCORS7 daysAmazon Web Services set this cookie for load balancing.
cookielawinfo-checkbox-advertisement1 yearSet by the GDPR Cookie Consent plugin, this cookie records the user consent for the cookies in the "Advertisement" category.
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
CookieLawInfoConsent1 yearCookieYes sets this cookie to record the default button state of the corresponding category and the status of CCPA. It works only in coordination with the primary cookie.
JSESSIONIDsessionNew Relic uses this cookie to store a session identifier so that New Relic can monitor session counts for an application.
PHPSESSIDsessionThis cookie is native to PHP applications. The cookie stores and identifies a user's unique session ID to manage user sessions on the website. The cookie is a session cookie and will be deleted when all the browser windows are closed.
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
_pxhd1 yearPerimeterX sets this cookie for server-side bot detection, which helps identify malicious bots on the site.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
CookieDurationDescription
lidc1 dayLinkedIn sets the lidc cookie to facilitate data center selection.
li_gc5 months 27 daysLinkedin set this cookie for storing visitor's consent regarding using cookies for non-essential purposes.
UserMatchHistory1 monthLinkedIn sets this cookie for LinkedIn Ads ID syncing.
__cf_bm30 minutesCloudflare set the cookie to support Cloudflare Bot Management.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
CookieDurationDescription
AWSALB7 daysAWSALB is an application load balancer cookie set by Amazon Web Services to map the session to the target.
_gat1 minuteGoogle Universal Analytics sets this cookie to restrain request rate and thus limit data collection on high-traffic sites.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
AnalyticsSyncHistory1 monthLinkedin set this cookie to store information about the time a sync took place with the lms_analytics cookie.
CONSENT2 yearsYouTube sets this cookie via embedded YouTube videos and registers anonymous statistical data.
ln_or1 dayLinkedin sets this cookie to registers statistical data on users' behaviour on the website for internal analytics.
pardotpastThe pardot cookie is set while the visitor is logged in as a Pardot user. The cookie indicates an active session and is not used for tracking.
UID1 year 1 month 4 daysScorecard Research sets this cookie for browser behaviour research.
vuid1 year 1 month 4 daysVimeo installs this cookie to collect tracking information by setting a unique ID to embed videos on the website.
_ga1 year 1 month 4 daysGoogle Analytics sets this cookie to calculate visitor, session and campaign data and track site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognise unique visitors.
_ga_*1 year 1 month 4 daysGoogle Analytics sets this cookie to store and count page views.
_gcl_au3 monthsGoogle Tag Manager sets the cookie to experiment advertisement efficiency of websites using their services.
_gid1 dayGoogle Analytics sets this cookie to store information on how visitors use a website while also creating an analytics report of the website's performance. Some of the collected data includes the number of visitors, their source, and the pages they visit anonymously.
__gads1 year 24 daysGoogle sets this cookie under the DoubleClick domain, tracks the number of times users see an advert, measures the campaign's success, and calculates its revenue. This cookie can only be read from the domain they are currently on and will not track any data while they are browsing other sites.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
CookieDurationDescription
anj3 monthsAppNexus sets the anj cookie that contains data stating whether a cookie ID is synced with partners.
bcookie1 yearLinkedIn sets this cookie from LinkedIn share buttons and ad tags to recognize browser IDs.
bscookie1 yearLinkedIn sets this cookie to store performed actions on the website.
GoogleAdServingTestsessionGoogle sets this cookie to determine what ads have been shown to the website visitor.
IDE1 year 24 daysGoogle DoubleClick IDE cookies store information about how the user uses the website to present them with relevant ads according to the user profile.
li_sugr3 monthsLinkedIn sets this cookie to collect user behaviour data to optimise the website and make advertisements on the website more relevant.
muc_ads1 year 1 month 4 daysTwitter sets this cookie to collect user behaviour and interaction data to optimize the website.
personalization_id1 year 1 month 4 daysTwitter sets this cookie to integrate and share features for social media and also store information about how the user uses the website, for tracking and targeting.
test_cookie15 minutesdoubleclick.net sets this cookie to determine if the user's browser supports cookies.
uuid23 monthsThe uuid2 cookie is set by AppNexus and records information that helps differentiate between devices and browsers. This information is used to pick out ads delivered by the platform and assess the ad performance and its attribute payment.
VISITOR_INFO1_LIVE5 months 27 daysYouTube sets this cookie to measure bandwidth, determining whether the user gets the new or old player interface.
YSCsessionYoutube sets this cookie to track the views of embedded videos on Youtube pages.
yt-remote-connected-devicesneverYouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
yt-remote-device-idneverYouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
yt.innertube::nextIdneverYouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.
yt.innertube::requestsneverYouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.
_mkto_trk1 year 1 month 4 daysThis cookie, provided by Marketo, has information (such as a unique user ID) that is used to track the user's site usage. The cookies set by Marketo are readable only by Marketo.
__gpi1 year 24 daysGoogle Ads Service uses this cookie to collect information about from multiple websites for retargeting ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
CookieDurationDescription
AB1 yearDescription is currently not available.
ays_popup_cookie_1less than a minuteDescription is currently not available.
FTR_Cache_StatussessionDescription is currently not available.
FTR_Country_CodesessionNo description available.
isEUsessionNo description available.
jallery_uid1 year 1 month 4 daysDescription is currently not available.
loglevelneverNo description available.
visitor-id1 yearNo description available.
_bit5 months 27 daysNo description available.
Save & Accept