• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Recent Interviews
    • Events
      • Coming Events
    • Radio
    • Television
    • Rumble / Youtube
  • Publications
    • All Posts Archive
    • ACD Presentations
    • Articles
    • Books
    • Papers
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • FREE SPEECH Act Celebration, U.S. Senate, September 20, 2010
      • Some Congressional Testimonies
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / ACD/EWI Blog / It’s Getting Late in the Cyber War

It’s Getting Late in the Cyber War

June 11, 2015 by Rachel Ehrenfeld

Promises to increase the United States cyber defenses are nothing new, though lately they are made more frequently.

On June 9, 2015, just one day after President Obama vowed to “aggressively bolster” our cyber defenses, the U.S. Army official website was hacked and defaced, apparently by a hacktivist group, supporting Bashar Assad, the “Syrian Electronic Army,” while the massive attack on the Office and Personal Management has been attributed to China.

The official statement after massive cyber breaches tends to blame the intruders and promise to fix cyber security. But warning of threats to the United States digital communications date back to the February 1970 report on Security Controls for Computer Systems by the Defense Science Board. It took eighteen years and the spread of the Morris worm throughout the Internet to “wake-up” the DoD to create computer security response teams, giving birth to a reactive, instead of protective policy.

That is when the Community Emergency Response Team (CERT) was established by the Software Engineering Institute (SEI) at Carnegie Mellon University. But only after the Oklahoma City bombing in 1995, the Critical Infrastructure Working Group (CIWG) identified the vulnerability posed by the growing interdependency among government, as well as private sector networks, and new task forces and government agencies were created to study the problems, encourage information sharing and analysis and develop computer defenses. More attacks were followed by Congressional testimonies, conferences “to raise the awareness” and task forces “to study the problems.”

According to McKinsey, government and businesses with “delayed or lost technological innovation—problems resulting in part from how thoroughly companies are screening technology investments for their potential impact on the cyberrisk, profile,” often excuse the continuing cyber vulnerability to growing number of attacks. But cyber security expert Winn Schwartau puts the blame on “the security industry [that] has been unable to provide much more than products and a wing and a prayer to accomplish” their task.

Since there is little doubt that cyber attacks threaten the U.S. national security and its economy, perhaps instead of patching up a broken system, the government should allocate whatever is needed for the best and the brightest in academia and private industry to partner in fast track “Manhattan Project”-like research and development for a different encrypted system to replace the Internet as the main venue to store and transfer information.

In the meantime, new laws to hold both the government and the private sector legally responsible for damages caused by insufficiently secure computer systems (such as from identity theft) should be enacted. Insurance companies, which would deny policies to non-complying customers, making it cost effective to install top security measures, could be used to further enforce such laws and help direct spending to develop new methods of secure communication, as well as better vetting those who have access to their systems.

Filed Under: ACD/EWI Blog, ACD/EWI Exclusive, CERT, China, Cyber, Cyber security, CyberAttacks, DHS

Primary Sidebar

Spotlight

website capture islamist incitement quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise winning the cyberwar gps concepts and misconceptions libel tourism

Search ACD

Recent Appearances

[9/29/2025] The Shilling Show

[9/2/2025] Wake Up Patriots

[8/29/2025] Decoding Soros

[5/1/2025] National Talk Radio with Shawn Moore

[3/11/2025] Shaun Thompson Interview

[3/10/2025] Larry Conners Interviews Rachel Ehrenfeld

[2/3/2025] The Truth About George Soros - Grey Matter Podcast

[1/22/2025] Fighting Terrorism Funding - SAM Podcast

[1/8/2025] COUNTER NARRATIVE Interview on PATRIOT.TV

[10/2/2024] The Shaun Thompson Show: Dr. Rachel Ehrenfeld

[9/30/2024] Counter Narrative: Soros Power Grab: Media Takeover & Election Manipulation |

See All Appearances

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...
ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims NCCM Norman Bailey Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US USA women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2025 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.