One of the many goals of this book is to offer informed advice to those individuals who will ultimately shape U.S. policy in this highly complex domain. To that end, I announced an open call for submissions from individuals who are engaged in protecting their respective nation’s networks from attack on a daily basis, both nationally and internationally.
Providing experts from other countries with a voice symbolizes the international approach to cyber security that has consistently provided the best results in combating cyber intrusions and in identifying the state and non-state actors involved.
This chapter contains thought-provoking pieces of varying lengths from a naval judge advocate who wrote his thesis on cyber warfare, an experienced member of an international law enforcement agency, and a scientific adviser on national security matters to the Austrian government, as well as my own contribution.
By Jeffrey Carr
Harry: OK, Airport. Gunman with one hostage, using her for cover. Jack?
Jack: Shoot the hostage.
Jack: Take her out of the equation.
Harry: You’re deeply nuts, Jack.
The fun of movie scenarios aside, consider the same strategy when the hostage is not a human being but a piece of technology or a legacy policy that no one wants to change.
Here’s a new scenario. A state or non-state hacker attacks U.S. critical infrastructures and ...