Chapter 13. Advice for Policy Makers from the Field

One of the many goals of this book is to offer informed advice to those individuals who will ultimately shape U.S. policy in this highly complex domain. To that end, I announced an open call for submissions from individuals who are engaged in protecting their respective nation’s networks from attack on a daily basis, both nationally and internationally.

Providing experts from other countries with a voice symbolizes the international approach to cyber security that has consistently provided the best results in combating cyber intrusions and in identifying the state and non-state actors involved.

This chapter contains thought-provoking pieces of varying lengths from a naval judge advocate who wrote his thesis on cyber warfare, an experienced member of an international law enforcement agency, and a scientific adviser on national security matters to the Austrian government, as well as my own contribution.

When It Comes to Cyber Warfare: Shoot the Hostage

By Jeffrey Carr

Harry: OK, Airport. Gunman with one hostage, using her for cover. Jack?

Jack: Shoot the hostage.

Harry: What?

Jack: Take her out of the equation.

Harry: You’re deeply nuts, Jack.

Speed (1994), written by Graham Yost

The fun of movie scenarios aside, consider the same strategy when the hostage is not a human being but a piece of technology or a legacy policy that no one wants to change.

Here’s a new scenario. A state or non-state hacker attacks U.S. critical infrastructures and ...

Get Inside Cyber Warfare now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.