{"id":302,"date":"2009-11-02T09:24:45","date_gmt":"2009-11-02T16:24:45","guid":{"rendered":"http:\/\/www.harvardnsj.com\/?p=302"},"modified":"2009-11-02T09:24:45","modified_gmt":"2009-11-02T16:24:45","slug":"cybersecurity-experts-discuss-cyberterrorist-threat-at-hls","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/nsj\/2009\/11\/cybersecurity-experts-discuss-cyberterrorist-threat-at-hls\/","title":{"rendered":"HLS Hosted Panel of Cybersecurity Experts Discuss Cyberterrorist Threat"},"content":{"rendered":"<p><strong>By Mat Trachok,<\/strong> HLS 2012 NSJ Staff Writer<strong><br \/>\n<\/strong><\/p>\n<p>What exactly is the nature of the cyberterrorist threat?\u00a0 How realistic is the prospect of nation-to-nation cyberwarfare?\u00a0 How should the government respond to and protect against such threats?\u00a0 What role should the law play in fighting cyberterrorism?\u00a0 On Wednesday, October 28<sup>th<\/sup>, the Harvard Law School National Security &amp; Law Association and the Journal on Law &amp; Technology co-hosted a panel discussion moderated by HLS Professor Phil Malone that sought to answer these questions.\u00a0 The panel brought together experts from both inside and outside the U.S. government, including Leonard Bailey, cyberterrorism expert in the Department of Justice National Security Division; Dr. Andrew Colarik, cyberterrorism expert and author; and Kim Taipale, executive director of the Center for Advanced Studies in Science and Technology Policy.<\/p>\n<p><!--more--><br \/>\nThe panelists first addressed how technology has made the United States more vulnerable to terrorists operating in cyberspace.\u00a0 Taipale identified two main weaknesses.\u00a0 He first posited that advances in technology encourage the United States to pursue greater efficiency in the operation of its information systems.\u00a0 Improved efficiency, however, has made the country\u2019s infrastructure more fragile:\u00a0 the United States has removed redundancies and created single points of failure in its essential systems.\u00a0 Second, current technology allows small groups and individuals to leverage power that previously could only be leveraged by nation-states.\u00a0 Colarik agreed, saying that cyber attacks offer terrorists and nations the opportunity to inflict extraordinary damage at minimal cost.\u00a0 Indeed, cyberterrorists could cheaply exert control over many essential components of the national infrastructure, including traffic lights, electrical grids, navigation systems, the electronic financial system, and even hospital blood-type registries.\u00a0 Such attacks could not only inflict casualties, but also create widespread chaos by undermining confidence in those systems.<\/p>\n<p>The panelists also discussed how the United States could better protect itself from cyber attacks.\u00a0 Bailey focused on the need to create a lexicon with which to discuss cyber threats, since the inability to discuss them in a uniform way hampers the United States\u2019 response capacity.\u00a0 For instance, Bailey pointed out that there is no consensus as to whether a cyber attack carried out exclusively over computer systems is a use of force that triggers Article 51 of the United Nations Charter.\u00a0 Taipale argued for an update to the national security command structure.\u00a0 He maintained that responses to national security threats remain bifurcated even as the threats themselves are becoming increasingly unbounded.\u00a0 Taipale further pointed out that while many approach national security through either a military or a criminal paradigm, most modern threats involve both military and civilian infrastructure (e.g., telephone and missile systems often run through the same systems).<\/p>\n<p>One point of disagreement among the panelists was over Colarik\u2019s idea to institute a two-year statutory shelf life on personal data.\u00a0 Currently, personal information is stored on the Internet indefinitely and is often easily available to terrorists who use it to assume new identities and move with ease across borders.\u00a0 By putting a shelf life on personal information, Colarik argued, it would be more difficult for terrorists to access and use that information.\u00a0 Taipale and Bailey said that while such a measure might improve security, it would necessarily infringe upon the ability of web sites like Google to provide access to a wealth of information, an undesirable consequence.<\/p>\n<p>President Obama named October to be the National Cybersecurity Awareness Month, with the launch of the new U.S. Cyber Command and the <a href=\"http:\/\/www.dhs.gov\/ynews\/releases\/pr_1256914923094.shtm\">opening of the National Cybersecurity and Communications Integration Center (NCCIC)<\/a>.\u00a0 For more on the debate over U.S. cybersecurity measures, see the <a href=\"http:\/\/voices.washingtonpost.com\/federal-eye\/2009\/11\/eye_opener_the_cyber_security.html?hpid=news-col-blog\">proposals being discussed today at a symposium<\/a> hosted by George Washington University&#8217;s Homeland Security Policy Institute and the Intelligence and National Security Alliance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Mat Trachok, HLS 2012 NSJ Staff Writer What exactly is the nature of the cyberterrorist threat?\u00a0 How realistic is the prospect of nation-to-nation cyberwarfare?\u00a0 How should the government respond to and protect against such threats?\u00a0 What role should the law play in fighting cyberterrorism?\u00a0 On Wednesday, October 28th, the Harvard Law School National Security &amp; Law Association and the Journal on Law &amp; Technology co-hosted a panel discussion moderated by HLS Professor Phil Malone that sought to answer these questions.\u00a0 The panel brought together experts from both inside and outside the U.S. government, including Leonard Bailey, cyberterrorism expert in [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[1],"tags":[],"class_list":["post-302","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/peZtUX-4S","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=302"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/302\/revisions"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/categories?post=302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/tags?post=302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}