There are many reasons why cyber conflict is considered an awkward and destabilizing national security problem. One of the more overlooked is the gap between the technical elite and senior politicians and policymakers, a disconnect that could become tragic during fast-moving cyber conflicts. While this gap is shrinking in the United States, the United Kingdom, and Russia, it still is very significant elsewhere. China in particular needs to create better ways to connect their national security decision-makers with their technical incident responders – linking geeks and wonks – to help ensure technical incidents do not escalate out of political control.
July 20, 2011
Hackers Linking Geeks and Wonks to Respond to National Security Incidents | Atlantic Council
By gatoMalo
About gatoMalo
I am a veteran served on the USS Saratoga. After the military I worked on computers for the last 30 or so years. I worked as a hardware, software, network, email, groupware developer and security dude. I am now an abuelo. I belive in guarding the guards. We are all citizen warriors for our country the 5th battlefield is Cyber Space so here I am.
Later,
quis custodiet ipsos custodes?
View all posts by gatoMalo
This entry was posted on Wednesday, July 20th, 2011 at 1:23 pm and posted in cyber attacks, Cyber Intelligence, cyber-command, White Hat. You can follow any responses to this entry through the RSS 2.0 feed.
GatoMalo
Support our Work
Donate - Visit US-Cyber-Labs and help the cause -Blogroll
- China Cyber Timeline 1994 – 2011 China Cyber Timeline 1994 – Present
- CrowdMap Cyber Storm Mapping the Cyber Storm
- Cyber Information NoteBook My NoteBook
- Cyber NoteBook
- Hacktivist – The Birth Documenting Hacktivist – The Birth and Future
- US Cyber Labs – Donate
Time has Come Today
Looking Around
Section:
- Anonymous (1)
- APT -Attacks (2)
- Banks (3)
- Black Hats (14)
- china (4)
- China – Google (1)
- China – India (7)
- China – Vietnam (3)
- China -Follow the Money (6)
- China -Japan (7)
- China -Korea (6)
- China -Taiwan (2)
- China -UK (3)
- China -USA (20)
- Boeing – Space (1)
- Chamber of Commerce (1)
- DOD (2)
- Ford Corporation (1)
- GM – (1)
- China Attacks (37)
- China Australia (1)
- china cyber (32)
- China Cyber Timeline (6)
- China dissident (8)
- china espionage (56)
- China Hack (34)
- China Intelligence (23)
- China Jinan (8)
- Sichuan Province (1)
- China Military PLA (18)
- China Mobile (1)
- China PLA (3)
- China security (44)
- China Weakness (18)
- Chinese Goverment (79)
- Chinese University (7)
- cyber attacks (5)
- Cyber Blue Team (23)
- Cyber Cheat (1)
- Cyber Competition (1)
- Cyber Criminals (11)
- Cyber Dissident (6)
- Cyber Espionage (45)
- Cyber Intelligence (41)
- cyber Job (1)
- Cyber Polocies (18)
- Cyber Reputation (6)
- Cyber Revenue (3)
- Cyber Study (19)
- Cyber Warfare (26)
- cyber-command (3)
- cyber-spies (4)
- cyber-thieves (2)
- DDOS (4)
- Goverment (42)
- Hackers (24)
- Hacktivist (20)
- human rights (17)
- Internet -Player (7)
- Korea Cyber (4)
- LulzSec (1)
- Notes to Myself (8)
- Power Grid (2)
- SCADA (1)
- Sri Lankan (1)
- Stuxnet (1)
- US- D.Homeland Security (17)
- US State Department (11)
- Web -Ware (4)
- White Hat (12)
-
Join 8 other subscribers
Cloud Map
Black Hats China -USA China Attacks china cyber China dissident china espionage China Hack China Intelligence China Jinan China Military PLA China security China Weakness Chinese Goverment Chinese University Cyber Blue Team Cyber Criminals Cyber Espionage Cyber Intelligence Cyber Polocies Cyber Study Cyber Warfare Goverment Hackers Hacktivist human rights Internet -Player Notes to Myself US- D.Homeland Security US State Department White HatBlogroll
US Cyber Labs Feed
Cyber Notebook
- An error has occurred; the feed is probably down. Try again later.
Leave a comment