Skip to content
charmnailspa

charmnailspa

Technological development

Primary Menu
  • Computer & Technology
  • internet marketing
  • Web Design
  • Technology
  • computer
  • Business
  • About Us
    • Advertise Here
    • Contact Us
    • Privacy Policy
    • Sitemap
  • Home
  • America led the internet’s creation 30 years ago. Today our foreign policy must confront what it has become
  • internet

America led the internet’s creation 30 years ago. Today our foreign policy must confront what it has become

Lisa H. Shelton July 17, 2022

[ad_1]

NEWYou can now listen to Fox News articles!

An internet era that that started with promise and potential has come to an end. Roughly 30 years after the United States served as the principal catalyst for the creation of the internet, the global network has experienced a profound transformation. 

Originally characterized as being open, secure, reliable and largely apolitical, the contemporary internet is now fragmented and distorted, and increasingly manipulated as an instrument of repressive governments, cyber criminals, and a disparate spectrum of malicious actors. 

The time has come for American foreign policy to confront this disruptive new reality and implement strategies to help protect our increasingly entwined national security, geopolitical, and economic interests in cyberspace.

THE RUSSIAN CYBER THREAT IS HERE TO STAY AND NATO NEEDS TO UNDERSTAND IT

The internet was launched with a benign and, for some, a utopian vision. It was intended be an engine for innovation, free expression, secure communication, and entrepreneurial creativity. 

America is at an inflection point. The risks in cyberspace are growing while incumbent strategies to address an expanding crisis are failing.

The United States largely believed this concept of the internet would be embraced by countries around the world. It was not. In the past seven years, sixty nations have temporarily shut down the internet within their borders more than 900 times.

The internet remains a central backbone for critical civilian infrastructure, the main artery of global digital trade, and an indispensable resource for billions of people around the globe. Yet the dangers of the modern internet are now manifold and undeniable.

Malicious actors have penetrated and exploited social media platforms, launched sophisticated disinformation campaigns, utilized diverse tactics to sway political elections and policy outcomes, engendered violence against vulnerable minorities, fomented toxic forms of civic division, and attacked critical infrastructure including hospitals, schools, energy pipelines, and electrical grids. 

AS RUSSIAN CYBERATTACK LOOMS, CYBERSPACE IS ’21ST CENTURY BATTLEGROUND’: EXPERTS

Cybercrime—ranging from prosaic phishing attacks to highly sophisticated ransomware exploits—is a daily occurrence. In recent years cyber espionage aimed at political and commercial targets has been rampant. 

In a widely publicized breach, an estimated 250,000 Microsoft Exchange Servers fell victim to a Chinese hack, and Russian hackers added malicious code to software developed by the company SolarWinds and widely used in the government and private sectors. The hackers targeted Microsoft, Cisco, and Intel as well as the Pentagon, the Department of Homeland Security, the State Department, the Department of Energy, the National Nuclear Security Administration, and the Treasury. 

The WannaCry ransomware attack, believed to be the work of North Korean hackers, remains among the most damaging in history. And recently Microsoft reported that since the launch of the war in Ukraine, Russia, with an uneven record of success, has launched 128 network intrusions in 42 countries.

The United States must urgently and imaginatively revisit inherited patterns of ineffectual performance on cyber strategy, an enterprise that must be applied across all dimensions of our government. 

Private companies, some based here and in allied countries like Israel, sell sophisticated surveillance technologies that have been used to target opposition politicians and human rights activists.

Exacerbating an accelerating threat, the so-called Internet of Things will connect tens of billions of devices ranging from refrigerators and pacemakers to automobiles and military aircraft. Increased digitization will increase vulnerability, as nearly every aspect of business and statecraft is exposed to disruption, theft, or manipulation. 

The United States has struggled to deter or effectively defend against these incursions. Most cyberattacks remain below the threshold for the use of force or armed attack. The effort to identify individual foreign antagonists and impose legal sanctions against them has been a mostly marginal and failed effort. 

FBI DISRUPTS RUSSIAN MILITARY HACKERS, PREVENTING BOTNET AMID UKRAINE WAR

America is at an inflection point. The risks in cyberspace are growing while incumbent strategies to address an expanding crisis are failing. Our new bipartisan consensus Task Force report, produced by the Council of Foreign Relations, outlines a new cyber foreign policy that is grounded in reality and is based on three pillars.

First, the United States should consolidate a coalition of allies and friends around a vision of the internet that preserves—to the greatest degree possible—a trusted and protected international communications platform, even if it is limited to participating countries. 

Such a cohort of nations would not necessarily be an alliance of democracies but rather agree to a digital architecture promoting the trusted flow of data and embracing transparent international standards. For its part, the U.S. government should adopt a policy on digital privacy that is interoperable with Europe’s General Data Protection Regulation (GDPR). 

This coalition of trusted states should build an international cybercrime center, support cyber capacity development in developing economies, and cooperate on technological innovation in sectors critical to offensive and defensive cyber operations.

CLICK HERE TO GET THE OPINION NEWSLETTER

Second, the United States must seek to build a consensus among both its allies and adversaries on limitations to certain cyber operations that are particularly disruptive and destructive, such as attacks on state financial and electoral systems. 

Despite the potential difficulties of achieving agreement, America should nonetheless pursue talks with Russia and China to preclude threats to strategic stability posed by cyberattacks on nuclear command and control systems, limiting the risk of misperception and miscalculation among nuclear powers that could lead to catastrophic outcomes. 

In addition, the United States and its coalition partners should apply meaningful costs on states that deliberately provide cybercriminal safe havens.

Third, America needs to put its domestic house in order, prioritizing enhanced international digital competitiveness across the various components of its national security strategy. All of the government’s seventeen intelligence agencies should be tasked to enumerate and help to mitigate cybersecurity risks. 

Finally, the U.S. government should actively encourage the flow of cybersecurity talent among coalition partners and develop the expertise required to conduct a multifaceted program of U.S. cyber foreign policy.

CLICK HERE TO GET THE FOX NEWS APP

The United States must urgently and imaginatively revisit inherited patterns of ineffectual performance on cyber strategy, an enterprise that must be applied across all dimensions of our government. 

Failure to act boldly in response to this seminal twenty-first century challenge will profoundly degrade American national security, geopolitical, and economic interests.

Adam Segal serves as director, and Gordon Goldstein as deputy director of the Council on Foreign Relations-sponsored Independent Task Force on Cybersecurity.

Jami Miscik serves as co-chair of the Council on Foreign Relations-sponsored Independent Task Force on Cybersecurity.

[ad_2]

Source link

Table of Contents

Toggle
  • About the Author
    • Lisa H. Shelton

About the Author

Lisa H. Shelton

Administrator

Visit Website View All Posts

Post navigation

Previous: 5 Things To Have In Mind If You’re Starting An Online Store
Next: What is next for influencer marketing? Well, the metaverse for one thing

Related News

Toastmasters adopts AI-powered speech analytics technology from Seattle startup Yoodli – GeekWire
  • internet

Toastmasters adopts AI-powered speech analytics technology from Seattle startup Yoodli – GeekWire

Lisa H. Shelton August 7, 2024
10 trailers from The Game Awards that left us wanting more
  • internet

10 trailers from The Game Awards that left us wanting more

Lisa H. Shelton August 4, 2024
Best VPN Deals – Cheap VPNs for Macs, iPhones and iPads
  • internet

Best VPN Deals – Cheap VPNs for Macs, iPhones and iPads

Lisa H. Shelton July 31, 2024
November 2025
M T W T F S S
 12
3456789
10111213141516
17181920212223
24252627282930
« Sep    

Archives

  • September 2025
  • May 2025
  • April 2025
  • March 2025
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • March 2020
  • February 2020
  • November 2018
  • October 2018
  • January 2017

Categories

  • Business
  • computer
  • Computer & Technology
  • internet
  • internet marketing
  • Technology
  • Web Design

Recent Posts

  • Wigs for Patients Designed for Natural Beauty
  • Aluminum Fence Installation Port St. Lucie: Elegance, Security, and Lasting Durability
  • The Changing Job Roles in Silicon Valley with AI
  • Is AI Really Replacing Jobs in Silicon Valley?
  • The Impact of Natural Language Processing on AI

Fiverr

Fiverr Logo   

BL

Seedbl

Seedbacklink

Tags

2021 Acura Rdx Technology Package 2021 Acura Tlx Technology Package 2022 Acura Mdx Technology Package Align Technology Stock Applied Racing Technology Artificial Intelligence Technology Solutions Inc Assisted Reproductive Technology Battery Technology Stocks Benjamin Franklin Institute Of Technology Chief Technology Officer Color Star Technology Craft Design Technology Definition Of Technology Definitive Technology Speakers Element Materials Technology Health Information Technology Salary Ice Mortgage Technology Information Technology Definition Information Technology Degree Information Technology Salary Interactive Response Technology International Game Technology Lacrosse Technology Atomic Clock La Crosse Technology Weather Station Luokung Technology Stock Marvell Technology Stock Price Maytag Commercial Technology Washer Microchip Technology Stock Micron Technology Stock Price Mrna Technology History Mrna Vaccine Technology Nyc College Of Technology Penn College Of Technology Recombinant Dna Technology Rlx Technology Stock Robert Half Technology Science And Technology Sharif University Of Technology Smart Home Technology Stevens Institute Of Technology Ranking Symphony Technology Group Technology In The Classroom Technology Readiness Level Technology Stores Near Me Thaddeus Stevens College Of Technology
theramaxx
digitrano

PONDOK

obatmurah
velourette

PL

gearecho
bizbrisk

You may have missed

Wigs for Patients Designed for Natural Beauty
  • Technology

Wigs for Patients Designed for Natural Beauty

Lisa H. Shelton September 9, 2025
Aluminum Fence Installation Port St. Lucie: Elegance, Security, and Lasting Durability
  • Technology

Aluminum Fence Installation Port St. Lucie: Elegance, Security, and Lasting Durability

Lisa H. Shelton September 3, 2025
The Changing Job Roles in Silicon Valley with AI
  • Computer & Technology

The Changing Job Roles in Silicon Valley with AI

Lisa H. Shelton May 20, 2025
Is AI Really Replacing Jobs in Silicon Valley?
  • Computer & Technology

Is AI Really Replacing Jobs in Silicon Valley?

Lisa H. Shelton May 13, 2025
charmnailspa.com | MoreNews by AF themes.

WhatsApp us