Cybersecurity and the 2016 Presidential Election: Options for Response

Source: SEC.gov

Source: SEC.gov

The United States intelligence community has concluded that Russian hackers led a cyberespionage and information-warfare campaign in an effort to influence the 2016 presidential election. In an interview with National Public Radio’s (NPR) Steve Inskeep that aired Friday on Morning Edition, President Obama said, “I think there is no doubt that when any foreign government tries to impact the integrity of our elections … we need to take action. And we will — at a time and place of our own choosing. Some of it may be explicit and publicized; some of it may not be.”

What are the options for retaliation when the US is faced with circumstances such as these? Our resources examine the foundational characteristics of cyberattacks and strategies for countering them.

 

Toward a Safer and More Secure Cyberspace

Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit …

[more]

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy

In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation’s important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive …

[more]

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities

The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the …

[more]

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, …

[more]

Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop

In January 2016, the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Data Breach Aftermath and Recovery for Individuals and Institutions. Participants examined existing technical and policy remediations, and they …

[more]