Documents/RPP2012/69: American Exceptionalism/69.7: Cybersecurity

69.7: Cybersecurity

Other Information:

A Twenty-First Century Threat: The Cybersecurity Danger -- The frequency, sophistication, and intensity of cyber-related incidents within the United States have increased steadily over the past decade and will continue to do so until it is made clear that a cyber attack against the United States will not be tolerated. The current Administration’s cyber security policies have failed to curb malicious actions by our adversaries, and no wonder, for there is no active deterrence protocol. The current deterrence framework is overly reliant on the development of defensive capabilities and has been unsuccessful in dissuading cyber-related aggression. The U.S. cannot afford to risk the cyber-equivalent of Pearl Harbor. The government and private sector must work together to address the cyberthreats posed to the United States, help the free flow of information between network managers, and encourage innovation and investment in cybersecurity. The government must do a better job of protecting its own systems, which contain some of the most sensitive data and control some of our most important facilities. As such, we encourage an immediate update of the law that was drafted a decade ago to improve the security of government information systems. Additionally, we must invest in continuing research to develop cutting-edge cybersecurity technologies to protect the U.S. However, we acknowledge that the most effective way of combating potential cybersecurity threats is sharing cyberthreat information between the government and industry, as well as protecting the free flow of information within the private sector. The current Administration’s laws and policies undermine what should be a collaborative relationship and put both the government and private entities at a severe disadvantage in proactively identifying potential cyberthreats. The costly and heavy-handed regulatory approach by the current Administration will increase the size and cost of the federal bureaucracy and harm innovation in cybersecurity. The government collects valuable information about potential threats that can and should be shared with private entities without compromising national security. We believe that companies should be free from legal and regulatory barriers that prevent or deter them from voluntarily sharing cyberthreat information with their government partners.

Indicator(s):