Browsing by Subject "cyber-threats"
Now showing 1 - 1 of 1
- Results Per Page
- Sort Options
Item Cyber-threats and the Limits of Bureaucratic Control(2013-02-12) Brenner, Susan W.For over half a decade, the author has been writing about how and why the institutions modern nation-states rely on to fend off the threats––war, crime, and terrorism––that can erode their ability to maintain order and compromise their viability as sovereign entities become ineffective when the threats migrate into cyberspace. In a succession of law review articles and books, the author refined her analysis of the essentially unprecedented challenges cybercrime, cyberterrorism and cyberwarfare pose for law enforcement and the military. The goal of this article is to go beyond critiquing the efficacy of the current threat-control structures and outline an alternative approach. The current approach, which appropriately focuses on remediating specific factors that contribute to the inefficacy with which current United States threat-control structures confront cyber-threats, is inadequate because it seeks to “update” systems that were developed to control threats that were simpler and more parochial than the ones we confront now. The author does not believe existing threat-control structures can be modified in ways that will make them effective against the twenty-first century threats many countries already confront, and most, if not all, will eventually confront. Like others, the author believes we need a new threat-control strategy: one that replaces the rigid, hierarchical structures on which we currently rely, with systems that mirror the lateral, networked structures that prosper in cyberspace. This article outlines how such a strategy could be structured and implemented.