• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Recent Interviews
    • Events
      • Coming Events
    • Radio
    • Television
    • Rumble / Youtube
  • Publications
    • All Posts Archive
    • ACD Presentations
    • Articles
    • Books
    • Papers
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • FREE SPEECH Act Celebration, U.S. Senate, September 20, 2010
      • Some Congressional Testimonies
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / ACD/EWI Blog / U.S. CyberSpace Vulnerabilities

U.S. CyberSpace Vulnerabilities

May 20, 2014 by Rachel Ehrenfeld

Cisco Systems’ CEO John Chambers’s letter asking President Obama to personally intervene to stop the National Security Agency from intercepting and planting surveillance software in the company’s equipment before it is shipped to customers around the world is likely to further curtail the agency’s spying capabilities.

This letter overshadowed the news of charges against Chinese military hackers who will never be brought to justice in the U.S. The indictments will do nothing to increase the U.S. cybersecurity. On the contrary, together with Chambers’s letter they are likely to be used to incite more attacks on U.S. cyberspace.

While there is a growing concern about the cyber hacking and theft of immeasurable quantities of intellectual property harming our economy, we also face growing threats of purposeful interferences such as spoofing or jamming to  our communication systems and devices dependent upon the U.S. Global Positioning System. Yet, a large number of radio frequency jamming devices are advertised and sold in the U.S. despite the 1934 Communications Act that strictly forbids the manufacturing, marketing and importation of jamming devices into the U.S. Apparently, the Federal Communications Commission’s enforcement efforts are not enough to curtail this problem.

Moreover, there is little, if any, public concern regarding possible interference with Coordinated Universal Time (UTC), which provides the essential synchronization critical to every large or small digital system and device that our critical infrastructures have become dependent upon.

The rapid pace at which cyber-related architectures and wireless technologies are evolving and integrating makes us more efficient and more vulnerable at the same time. Our military services , for example, have grown increasingly reliant upon vulnerable terrestrial and space-based wireless technologies, increasing the risk to our nation’s military logistics and actual war fighting abilities.

The National Institute of Science and Technology (NIST), at the Department of Commerce, is the federal agency in charge of communicating UTC to critical systems and all other networks.  Earlier this month, NIST released the latest draft of its Guide to Industrial Control Systems (ICS) Security, seeking public comments.

Indeed, well-defined standards governing cyber-defense methodologies, whether mandated or voluntary, would greatly simplify today’s confusing muddle. For example, while there is worry about the vulnerability of the electric grid and communication systems, we are slow to put in place dedicated, individual systems and backup, as well as the most advanced communication security applications, such as physics-based Quantum Cryptology, which was developed by scientists at Los Alamos National Laboratory.

STRATCOM leads the Purposeful Interference Response Team as the only U.S. government multi-agency coordination body for cases of suspected purposeful interference with space systems of federal interest.  Because purposeful interference can pose an existential risk to our military preparedness and operations, as well as our civilian critical infrastructure — communication, first responders, transportation, finance and more, there is an immediate need for Congress to demand an assessment of the nation’s current abilities to identify, assess, and remedy purposeful interference events, which are likely to increase as the NSA’s capabilities are likely to be curtailed.

Filed Under: ACD/EWI Blog, China, Cyber, Purposeful Interference, U.S. Policy

Primary Sidebar

Spotlight

website capture islamist incitement quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise winning the cyberwar gps concepts and misconceptions libel tourism

Search ACD

Recent Appearances

[9/29/2025] The Shilling Show

[9/2/2025] Wake Up Patriots

[8/29/2025] Decoding Soros

[5/1/2025] National Talk Radio with Shawn Moore

[3/11/2025] Shaun Thompson Interview

[3/10/2025] Larry Conners Interviews Rachel Ehrenfeld

[2/3/2025] The Truth About George Soros - Grey Matter Podcast

[1/22/2025] Fighting Terrorism Funding - SAM Podcast

[1/8/2025] COUNTER NARRATIVE Interview on PATRIOT.TV

[10/2/2024] The Shaun Thompson Show: Dr. Rachel Ehrenfeld

[9/30/2024] Counter Narrative: Soros Power Grab: Media Takeover & Election Manipulation |

See All Appearances

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...
ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims NCCM Norman Bailey Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US USA women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2025 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.