Professional Documents
Culture Documents
Butler 2021
1/19/21
Cybersecurity
When people refer to cybersecurity, they are typically speaking on the practice of defending
against cyberattacks, or on a larger scale, cyberwarfare. Every couple of weeks it appears that
there is some sensitivity, whether it be in the private sector or in the government, with an
information system and passwords may have gotten leaked. We think of computer science
teachers telling freshmen and sophomores that it is safest to constantly change passwords
because of the constant threat posed by those who cybersecurity directly targets. What they
typically do not think of is the massive amounts of security systems within more authoritarian
governments that inhibit the freedom of internet access for the benefit of safety of valuable
information systems. For example, China is a known censor of large portions of the internet
simply because it is either a known risk factor or they use that justification to hide ulterior
motives. Although these security measures are certainly far more powerful than the ones
currently in the US and UK, they also inhibit one of the core tenants of democracy: liberty in all
ensure that it is not done in such a hostile fashion as to develop an environment that would
There is a difference in certain cybersecurity measures. Some can be considered more offensive
in nature, and some would be considered primarily defensive. Mike Fleckenstein, a prominent
author in the field of data science, writes, “Data defense, the authors argue, is about minimizing
risk and is focused on data management areas such as data privacy, data security, data quality,
and data governance. Alternatively, data offense focuses on increasing the organization's
competitive position” (SciTech Lawyer 8). This difference in different methods of securing data
is a prime example of the need to develop cybersecurity methods further in order to properly
prepare for the innovative ways that hackers will attempt to use to attack sensitive databanks in
the future. In a world filled with people who will do an incredible amount to get what they want,
including attacking fragile and sensitive systems that can shatter with little effort, it is important
to understand the difference between the implications of data defense and data offense. While
data defense is the one that is primarily used by major technology companies and even the
government when protecting sensitive information, there is a rising and concerning trend
emerging in recent years, in the aptly named information era, that offensive methods begin to
become more popular. This popularity mostly comes in the form in cybersecurity’s increasing
importance in warfare, and how it is already being used in both the past and the modern day to
In the week of January 23rd, 2020, government documents were released that detailed the first
offensive cybersecurity measure taken and acknowledged by the US. The documents were
released to the public by the George Washington University’s National Security Archive after
they had requested the information from the government to make public. The documents detailed
events that the US took against ISIS in which they launched a cyberattack intended to
significantly reduce the amount of propaganda that was being output. This was done by taking
ISIS drives and servers offline, and this had the added benefit of gathering intelligence. Although
this was done with the intention to stop hate, it is important to take a step back and look at the
wider picture. It is a moment in which information, one of the most vital pieces of defining
freedom and the freedom to think and learn, was put under scrutiny and used against another
group. ISIS is a group that deserved this sort of treatment, but where is the line drawn? If there
are domestic groups speaking out against the government’s actions, will the government then
have just clause to take down their internet access and take their information? Although, yes, this
sort of issue may seem like a hyperbolic paranoia, it still will have merit in the years to come
during this particularly sensitive time within American history and is a discussion that is better
The fear of complete and utter domination of the internet by a government is not an unfounded
one. There are many instances, particularly in more authoritarian countries than that of the US or
of the UK, like China, or even Russia in a less extreme way. This domination of the internet, as
well as the rise of more offensive methods of cybersecurity, is an existentially terrifying one that
appears closer to becoming real as each day passes. Laura Rosenberger, the director of the
alliance for securing democracy, has written about this very topic and the way it threatens the
democratic process; she writes aptly, “Democratic countries view information as an empowering
force in the hands of people: the free and open flow of ideas, news, and opinion fuels
deliberative democracy. Authoritarian systems see this model as a threat, viewing information as
a danger to their regimes and something the state must control and shape” (Foreign Affairs).
Later, Rosenberger would talk specifically about instances in which said authoritarian countries
had exhibited this sort of domination onto the process, such as the potential Russian interference
in the 2016 US election, or the Chinese censorship of a lot of the Hong Kong protests on social
media. In the case of the Hong Kong protests, it is a direct result of the increased cybersecurity
measures taken by China to suppress the number of threats to their national integrity and had
then led to the very suppression of the freedoms we still debate and argue over today. Although
this does not, and hopefully will not, apply to the US, it is important to note as we step into an
unknown era, with little history to help create informed decisions. It is up to the people to decide
the power the government should have when it comes to the internet, and it depends to the years
of arguing ahead in if access to the internet is something that should be protected by the
government. However, it is reasonable to believe that there is an intrisic nature to the internet
which allows a new way to practice the freedoms of the past, making it an important thing to
protect, no matter if it is never explicitly mentioned within the constitution or bill of rights.
Although we have a pretty good idea of the limitations we currently have, it is difficult to see
how future ways of thinking could affect the thought process of getting around these limitations.
This makes seeing the future ahead an insurmountably difficult task and means that we should
address present concerns so that we can establish that baseline of understanding. This includes
looking at the potential risks that come with future development, including the potential that the
technologies take over our original way of thinking entirely. This obsession with development
and the need for safety already justifies the stripping of liberty that we hold so dear, making this
threat much worse unaddressed. However extreme it may seem, there are already instances of
this happening, in authoritarian countries like China or Russia. At what point does the US or UK
become just like that? That is the question we must ask ourselves. When are we finished
unseen by the masses which is a definitive cause for concern, and a need of awareness.
Works Consulted
Baksh, Mariam. "FBI Director: Feeding DOD's Cyber Offense Operations Is Crucial..." SIRS
Issues Researcher, 2020 Sep 24,
explore.proquest.com/sirsissuesresearcher/document/2452184093?accountid=231.
Bowcott, Owen. "Cybercrime Laws Need Urgent Reform to Protect UK, Says Report." The
Guardian (Online), 2020 Jan 22. SIRS Issues Researcher,
explore.proquest.com/sirsissuesresearcher/document/2365744064?accountid=231.
Fleckenstein, Mike. "Ingredients of a Data Strategy." Scitech Lawyer, Spring 2020, p. 8. SIRS
Issues Researcher, explore.proquest.com/sirsissuesresearcher/document/2382863820?
accountid=231.
"Newly Released Government Documents Detail U.S. Cyberoffensive on ISIS." SIRS Issues
Researcher, 2020 Jan 23, explore.proquest.com/sirsissuesresearcher/document/2353759239?
accountid=231.
Rosenberger, Laura. "Making Cyberspace Safe for Democracy." Foreign Affairs, Jan. May. SIRS
Issues Researcher, explore.proquest.com/sirsissuesresearcher/document/2415558640?
accountid=231.
Sabbagh, Dan. "Britain Has Offensive Cyberwar Capability, Top General Admits." The
Guardian (Online), 2020 Sep 25. SIRS Issues Researcher,
explore.proquest.com/sirsissuesresearcher/document/2465507984?accountid=231.