Cyber Deterrence1[01-20][05-06]
Cyber Deterrence1[01-20][05-06]
26
Siobhan Gorman, Bush Looks to Beef Up ProtectionAgainst Cyberattacks, WALL ST. J., Jan. 28, 2008,
at A9.
9 COMM'N ON CYBERSECURITY FOR THE 44TH PRESIDENCY, CTR. FOR STRATEGIC & INT'L STUDIES,
SECURING CYBERSPACE FOR THE 44TH PRESIDENCY 12-13 (2008).
10 Ellen Nakashima, Large Worldide Cyber Attack Uncovered, WASH. POST, Feb. 18, 2010, at A3.
' See id.
12 William Matthews, Cyber War's 'Front Lines' May Be in Private Hands, DEF. NEWS, Dec. 7, 2009, at
38, available at 2009 WLNR 25655553; see DEP'T OF DEF., supra note 4, at 4 (stating that "[e]very year, an
amount of intellectual property larger than that contained in the Library of Congress is stolen from networks
maintained by U.S. businesses, universities, and governmental departments and agencies."). The United States
is not alone in this area. According to recent reports, China is suffering from severe criminal activity that is
causing serious domestic problems. "The annual worth of China's 'hacker industry' is now over 238 million
yuan (about $34.8 million), causing upwards of 7.6 billion yuan (about $1.1 billion) in losses .... The number
of computers in China controlled by 'botnets' tops the list worldwide." Tang Lan & Zhang Xin, The Viewfron
China: Can Cyber Deterrence Work?, in GLOBAL CYBER DETERRENCE: VIEWS FROM CHINA, THE U.S.,
RUSSIA, INDIA, AND NORWAY 1, 2 (Andrew Nagorski ed. 2010) [hereinafter GLOBAL CYBER DETERRENCE]. But
2012] CYBER DETERRENCE 777
is more than the annual Gross Domestic Product of all but the top nineteen
countries in the world.13
Among the most worrisome of hacking incidents are those focused on
critical national infrastructure.14 This infrastructure is the backbone of United
States' transportation and economic systems. 5 The cost of downtime alone
from major attacks on critical national infrastructure "exceeds . . . $6 million
per day."1 6 The attacks have caused President Barack Obama to recently state,
From now on, our digital infrastructure-the networks and computers
we depend on every day-will be treated as they should be: as a
strategic national asset. Protecting this infrastructure will be a
national security priority. We will ensure that these networks are
secure, trustworthy and resilient. We will deter, prevent, detect, and
defend a gainst attacks and recover quickly from any disruptions or
damage.
President Obama's recognition of the role and importance of deterring
malicious cyber operations, including cyber attacks, incorporates the
traditional notions of deterrence to this modern risk to national security.
see Robert Vamosi, The Myth of that $1 Trillion Cybercrime Figure, SECURITYWEEK (Aug. 3, 2012), http:/
www.securityweek.com/myth-1-trillion-cybercrime-figure.
13 CIA, Country Comparison: GDP (Purchasing Poiwer Parity), CIA WORLD
FACTBOOK,
https://www.cia.gov/library/publications/the-world-factbooldrankorder/2001rank.html (based on 2011
estimates) (last visited Nov. 16, 2012).
14 As defined in the Critical Infrastructures Protection Act of 2001, critical national infrastructure "means
systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction
of such systems and assets would have a debilitating impact on security, national economic security, national
public health or safety, or any combination of those matters." 42 U.S.C. § 5195c(e) (2006); see also DEP'T OF
DEF., DEPARTMENT OF DEFENSE DIRECTIVE No. 3020.40, DoD POLICY AND RESPONSIBILITIES FOR CRITICAL
INFRASTRUCTURE 19, 20 (2010); ExEc. OFFICE OF THE PRESIDENT, PRESIDENTIAL DECISION DIRECTIVE 63,
CRITICAL INFRASTRUCTURE PROTECTION (1998).
15 42U.S.C. §5195c(b).
16 STEWART BAKER ET AL., IN THE CROSSFIRE: CRITICAL INFRASTRUCTURE IN THE AGE OF CYBER WAR
3
(2010).
17 Barack Obama, Remarks by the President on Securing Our Nation's Cyber Infrastructure
(May 29,
2009), available at http://www.whitehouse.gov/the_press office/Remarks-by-the-President-on-Securing-Our-
Nations-Cyber-Infrastructure. This sentiment was echoed by U.S. Cyber Command's General Alexander,
"[t]his increased inter-connectedness of our information systems, combined with the growing sophistication of
cyber criminals and foreign intelligence actors, has increased our risk. Our inter-connectedness is now a
national security issue." Budget Request for Information Technology and Cyber Operations Programs:
Hearing on the National Defense Authorization Act for Fiscal Year 20/3 and Oversight of Previously
Authorized Programs,Before the Subcomm. on Emerging Threats and Capabilitiesof the H. Comm on Armed
Services, 112th Cong. 6 (March 20, 2012) [hereinafter Budget Request for Information Technology and Cyber
Operations Programs] (statement of General Keith B. Alexander, Commander, United States Cyber
Command).