3. Despite its inherent advantages, this dependence on information technologyhas also made state and society much more vulnerable to attacks such as com-puter intrusions, scrambling software programs, undetected insiders within
computer rewalls, or cyber terrorists. The Internet is inherently insecure asit was designed as a benign enterprise of information exchange, a decentral
-ized patchwork of systems that ensures relative anonymity. It is ill-equippedto trace perpetrators or to prevent them from abusing the intrinsic openness
of the cyber domain. In this context, the key national security dilemma of the
Information Age is how to create an effective and transparent government,which, at the same time, is also able to protect its citizens and vital national in-
terests. Furthermore, in this Information Age, the North Atlantic Alliance faces
a dilemma of how to maintain cohesion in the environment where sharinginformation with Allies increases information security risks, but where with-holding it undermines the relevance and capabilities of the Alliance.
4. It is a critical time for the NATO Parliamentary Assembly (NATO PA) to
discuss cyber security, as the Alliance is working on a comprehensive cyberstrategy to be announced in June 2011. The Rapporteur hopes that some of the
questions discussed in this report will be addressed by this forthcoming NATO
document.5. This report will focus on three facets of the linkage between InformationAge and national security. First, it will discuss the changing notion of secrecyin international relations. This issue was brought to prominence by the so-
called “Cablegate” scandal. While the publication of classied diplomatic cor
-respondence was not a result of a cyber attack, it is nevertheless directly linkedto the information revolution: remarkable advances in data storage technologyallowed one person to easily download colossal volumes of data that has takenthe print media months, and possibly years, to digest and to publish.3. Insiders: Does the rapporteur mean intruders? Insider is a spy or a mole butintruder someone that hacks in a system.Who has the legitimacy to claim who is a cyber terrorist and who isn’t?
The Nato security system is a state of the art system that has not been the
victim of any serious leaks. The reason for leaks has more to do with the cul-ture of everything being secret by default rather then the systems. We need toreverse it into culture of transparency Respect for the Freedom of Information
Act (FOIA) in the USA would for example eliminate the need for leaks.It is important for NATO member states nations to upgrade their freedom of information, expression and speech laws in order to ensure the transparency
mentioned in this article.Lumping security and government together convolutes any debate of transpar-ency. This is a faulty premise and is a different legal circumstance in everycountry. The value and criticality of transparency is ignored. Only the mis-uses are mentioned. These “misuses” are all aspects of a free and open society
and not a sufcient argument against transparency.4. See my rst amendment to the draft report.
5. This issue was brought to light prior to Cablegate: with the release of theAfghan and Iraq war logs.The problem is not only because of different technology but also the fact thatmany more people have access to the documents as a result of 911.