Professional Documents
Culture Documents
Amos N. Guiora
First published 2017
by Routledge
2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN
and by Routledge
711 Third Avenue, New York, NY 10017
Routledge is an imprint of the Taylor & Francis Group, an informa business
© 2017 Amos N. Guiora
The right of Amos N. Guiora to be identified as author of this work has been
asserted by her in accordance with sections 77 and 78 of the Copyright, Designs
and Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced or
utilized in any form or by any electronic, mechanical, or other means, now
known or hereafter invented, including photocopying and recording, or in
any information storage or retrieval system, without permission in writing
from the publishers.
Trademark notice: Product or corporate names may be trademarks or
registered trademarks, and are used only for identification and explanation
without intent to infringe.
British Library Cataloguing in Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
Names: Guiora, Amos N., 1957- author.
Title: Cybersecurity : geopolitics, law, and policy / Amos N. Guiora.
Other titles: Cybersecurity
Description: Boca Raton, FL : Routledge, 2017. | Includes bibliographical
references and index.
Identifiers: LCCN 2016041237| ISBN 9781498729116 (hardback) | ISBN
9781138033290 (pbk.) | ISBN 9781315370231 (ebook)
Subjects: LCSH: Computer networks--Security measures--Government policy. |
Computer security--Government policy. | Computer crimes--Prevention. |
Technology and international relations.
Classification: LCC TK5105.59 .G85 2017 | DDC 005.8--dc23
LC record available at https://lccn.loc.gov/2016041237
ISBN: 978-1-498-72911-6 (hbk)
ISBN: 978-1-138-03329-0 (pbk)
ISBN: 978-1-315-37023-1 (ebk)
Typeset in Sabon
by Taylor & Francis Books
Contents
* http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1090328.
8 Cybersecurity
competing rights interests. The following Figure 1.2 depicts the immi-
nent continuum graphically. The threat of a terrorist attack is listed
from left to right, progressing from imminent to uncertain. The verti-
cal column on the left lists seven factors that counterterrorism mea-
sures must balance in considering these threats. The balancing factors
include collateral damage, civil liberties, valid intelligence, frequency
of reporting, fiscal responsibility, geopolitical concerns, and the rule of
law. Understanding these factors is crucial; detailed explanations are
outlined below the chart. The triangular bars in the body of the graph
represent the relative priority placed on each of these factors in the event
of an imminent, foreseeable, long-range, or uncertain threat of a terror-
ist attack. The thicker the triangular bar, the greater the importance of
the corresponding factor. For example, the triangular bar representing
the first factor, collateral damage, is thicker for an imminent threat and
becomes thinner as it reaches an uncertain threat. This bar indicates
that collateral damage is more likely for imminent counterterrorism
measures than for foreseeable, long-range, or uncertain measures.
The key is to understand the significance of how balancing compet-
ing factors determines effectiveness (Figures 1.2 and 1.3).
In many ways, my conversation with the local law official was
integral to my undertaking this book project. The second impetus was
an invitation from the not-for-profit National Cyber Partnership to
teach a course, global perspectives on cybercrime and cyberterrorism,
as part of their groundbreaking, fast track training program targeting
transitioning military and veterans seeking jobs in the cyber industry.
Focusing on the legal and policy aspects of cybersecurity, I sought
to highlight important issues that would serve as discussion points
for my four intended audiences: corporate leaders, law enforcement
officials, policy makers, and the general public. No one audience is
more salient or relevant than another. In many ways, all four audiences
need to understand how cyber impacts both itself and the other three
audiences.
Threat
Balancing
factors Collateral damage
Preserve
Collateral
damage Civil liberties
Civil liberties
Validate
Valid Intelligence
intelligence Frequency of
reporting
Frequency of Exercise
reporting
Fiscal responsibility
Fiscal
responsibility
Appease
Geopolitical concerns
Geopolitical
concerns
Follow the
Rule of law
Rule of law
Corporations large and small are subject to hackers and are clearly
being attacked, if not on a daily basis, but very regularly. Some of the
attacks are enormous, affecting tens of millions of customers whose
An introduction to cybersecurity 13
privacy is clearly violated. Their personal information is hacked; they
are vulnerable, exposed, and concerned, if not angry.
How corporations respond to cybersecurity is critical. The
extraordinary importance cuts across tactical and strategic con-
siderations. It is not an exaggeration to suggest that cyber threats
are the primary focal point of corporations today. If they are
not, then that reflects a serious misreading of a clear and pres-
ent danger. That danger— palpable to the most casual observer—is
indisputable.