Baker Institute policy report looks at cybersecurity

Feb 24, 2011

A new article written by a fellow at Rice University's Baker Institute for Public Policy calls on the intelligence community to jointly create a policy on cybersecurity and determine the degree to which the U.S. should protect intellectual property and national infrastructure of other nations. The author also comments on how aggressive the United States should be in its proactive cyber-spying activities.

"Treasure Trove or Trouble: Cyber-Enabled Intelligence and International Politics" was authored by Chris Bronk, a fellow of information technology at the Baker Institute and a former U.S. State Department diplomat. The report was published this week in the National Military Intelligence Association's American Intelligence Journal, a leading magazine for intelligence professionals.

"America wants a secure cyberspace, but its intelligence agencies have found enormous utility in using their own capabilities to collect confidential information from foreign adversaries," Bronk said. "This raises the question of how the U.S. government can push for global cybersecurity while at the same time using cyber means to collect intelligence on potentially threatening regimes such as Iran."

Bronk kick-starts the debate on how altruistic the United States can be on a secure cyberspace when it may benefit enormously from the insecurity of others' information networks.

This week, U.S. Senator Joseph Lieberman is again introducing a comprehensive cybersecurity bill with the issue of protecting the vitally important digital networks that make so much of the national infrastructure work.

"There remains an enormous vacuum in policy as to how America's , many of whom are charged with roles is securing cyberspace under the Lieberman bill, can continue to use clandestine cyber means in collecting intelligence, or even engaging in covert action against other countries and transnational groups," Bronk said. "This is an issue that needs consideration and input not just within Washington political circles, but far beyond the Beltway, including firms in Silicon Valley and other tech centers around the U.S."

Explore further: Big data may be fashion industry's next must-have accessory

More information: To read the full article, visit www.bakerinstitute.org/publica… eTroveAIJ-022211.pdf

add to favorites email to friend print save as pdf

Related Stories

Scientist urges new look at government 'Web-tapping'

Dec 02, 2008

The technology of government surveillance has changed dramatically, and the rules governing surveillance should be changed accordingly. Chris Bronk, a fellow in technology, society and public policy at Rice University's Baker ...

US senators call for cybersecurity czar

Apr 01, 2009

Two US senators introduced legislation on Wednesday aimed at creating a powerful national cybersecurity advisor who would report directly to the president.

US adviser says cybersecurity must be joint effort

Apr 23, 2009

(AP) -- The challenge of protecting the government's computer networks is too big for any one agency to handle alone, a top adviser to President Barack Obama said Wednesday. That suggests the administration doesn't intend ...

Recommended for you

Cloud computing helps make sense of cloud forests

23 hours ago

The forests that surround Campos do Jordao are among the foggiest places on Earth. With a canopy shrouded in mist much of time, these are the renowned cloud forests of the Brazilian state of São Paulo. It is here that researchers ...

Teaching robots to see

Dec 15, 2014

Syed Saud Naqvi, a PhD student from Pakistan, is working on an algorithm to help computer programmes and robots to view static images in a way that is closer to how humans see.

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.