Sp Server Startup

Government Seeks Cybersecurity, Superiority in Mostly Lawless Domain

The typical IT department must concern itself with all sorts of threats: Spyware and cookies that hop on users’ computers after a seemingly harmless click on a banner ad; malware that unwitting e-mailers save to their hard drives in pursuit of a fun e-card from a friend; and malicious codes that save themselves to your hard drive after inserting a flash drive. All of these things could cripple the enterprise’s network infrastructure, making it quite difficult to continue with business as usual.

But what about when that business is the U.S. government? Not only is its network more critical, but it’s also sustains a great many more threats: Last year, Defense Department systems alone sustained about six million assaults a day. And government networks run everything from the nation’s power grids to software on fighter jets, meaning a successful attack could have far-reaching, devastating consequences.

“Our government needs to be aware of what’s happening out there, how are these attacks occurring, whether our entire financial critical infrastructure [could be] at risk,” said Ed Jaehne, chief strategy officer at cybersecurity firm KEYW.

That pro-active approach is part of the government, Defense Department and intelligence services’ goal to bolster not just their cybersecurity but also their cyber superiority, the ability not only to defend critical assets but also to extract key information – about foreign companies, intelligence services or defense operations, for example – from cyberspace. Cyber superiority also focuses on using such information-gathering tactics to create a “decision advantage” for the country’s leadership. “We need to be ready to shift into an attack mode if that is authorized and required. Importantly, need to understand how attacks against us can be conducted,” Jaehne said.

In a recently released paper, Rice University’s IT policy fellow Chris Bronk argues that the United States employs a double standard when it seeks to use cyber tools to affect other nations – swiping intellectual property or messing with critical infrastructure, for example – but raises a cry when other entities reach into U.S. networks

“I hear a lot in the United States about how bad it is for other countries to try to steal intellectual property and other stuff from us and from other countries. I think it’s a form of hypocrisy for the U.S. to say that, because that’s what we’re doing,” Bronk said in an interview.

At the same time, he said, that doesn’t mean that the federal government shouldn’t simply ignore the Internet’s ability to bolster the nation’s security.

“I’m not saying that we shouldn’t use information technology to spy on Iran’s nuclear program or to keep tabs on Hezbollah; both of those seem like a great idea,” Bronk said. “But we can’t then go and point our finger at other world powers and say, ‘You’re spying on our companies. That’s bad.’”

But what exactly the government is saying about its cybersecurity policy is a bit unclear. It has no publicized policy on securing cyberspace, and both Bronk and Jaehne said it has quite a bit of work to do to be able to secure all its assets.

“The state of policy is substantially behind the threat,” Jaehne said. “It is something that has a lot of attention, but there’s a lot more attention and a lot more in the way of meetings than there is in the way of action on the policy level.”

Bronk said that he would like to see the United States develop a cybersecurity policy that seeks to “play by the rules” – but that a major issue internationally is the dearth of agreements governing the domain. Though much of the world follows the European Union’s Convention on Cybercrime, those regulations address only criminal behavior – identity theft, stealing, money laundering – and fail to prescribe anything for those that carry out cyber attacks.

“There’s all this other nastiness going on,” Bronk said. “Why isn’t there an international agreement on banning denial of service attacks?”

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report: 2025 Video Surveillance Market Set to Grow After Small Decline in 2024

    Novaira Insights has unveiled its latest report, “World Market for Video Surveillance Hardware and Software – 2025 Edition.” The research indicates that the global market for video surveillance hardware and software experienced a slight decline of 0.3% in 2024. This performance fell short of previous forecasts, primarily due to a significant decrease of 7.8% in the Chinese market. Conversely, the rest of the world saw a growth of 4.9%. The global market for video surveillance equipment was estimated to be worth $25.0 billion in 2024. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.