"The deeper problem with the nothing-to-hide argument is that it myopically views privacy as a form of secrecy. In contrast, understanding privacy as a plurality of related issues demonstrates that the disclosure of bad things is just one among many difficulties caused by government security measures. To return to my discussion of literary metaphors, the problems are not just Orwellian but Kafkaesque. Government information-gathering programs are problematic even if no information that people want to hide is uncovered."
Speaker: William J. Lynn III Presider: Nicholas Thompson
William Lynn III, Deputy Secretary of Defense at the U.S. Department of Defense and the author of "Defending New Domain: The Pentagon's New Cyberstrategy" discusses cybersecurity with Nicholas Thompson, Senior Editor of The New Yorker.
Cybersecurity expert Knake recommends the United States use international forums to promote mechanisms that address security concerns in cyberspace while ensuring the Internet remains open for the free exchange of ideas across national boundaries.
Robert K. Knake testifies before the House of Representatives Committee on Science and Technology on the role of attack attribution in preventing cyber attacks and how attribution technologies can affect the anonymity and the privacy of Internet users.
Google's decision to end censorship of its search content in China, and Beijing's response, appear to strike a balance between holding to principles and doing business, but U.S.-China clouds continue to gather, writes CFR's Adam Segal.
How well prepared are IT professionals within U.S. government agencies to respond to foreign cyber threats? Will government initiatives, such as the Comprehensive National Cybersecurity Initiative and the creation of the U.S. National Cybersecurity Coordinator role, be effective in addressing the challenges facing U.S. critical IT infrastructure? What is the impact of compliance on security within the federal IT environment?