Publication

Sep 2011

The Obama administration has recently issued two documents outlining its intended efforts to protect the country against the many real and imagined forms of cyber attack. Both documents are clearly works in progress featuring basic principles and generally worded aspirations with very little specification of plausibly effective operational policy. At the level of computer code, there is, of course, a world of intricate operational detail to which the documents refer, and that level of detail is validly considered to be too abstruse and too sensitive for public discussion.

Download English (PDF, 7 pages, 93 KB)
Author John Steinbruner
Series CISSM Working Papers
Publisher Center for International and Security Studies at Maryland (CISSM)
Copyright © 2011 Center for International and Security Studies at Maryland (CISSM)
JavaScript has been disabled in your browser