Cyber-based technologies are now ubiquitous around the glob and are emerging as an
"instrument of power" in societies, and are becoming more available to a country's
opponents, who may use it to attack, degrade, and disrupt communications and the flow
of information. The globe-spanning range of cyberspace and no national borders will
challenge legal systems and complicate a nation's ability to deter threats and respond to
contingencies. Through cyberspace, competitive powers will target industry, academia,
government, as well as the military in the air, land, maritime, and space domains of our
nations. Enemies in cyberspace will include both states and non-states and will range from
the unsophisticated amateur to highly trained professional hackers. In much the same way
that airpower transformed the battlefield of World War II, cyberspace has fractured the
physical barriers that shield a nation from attacks on its commerce and communication.
Cyberthreats to the infrastructure and other assets are a growing concern to policymakers.
In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda
or terrorism, by many U.S. intelligence officials. The new United States military strategy
makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist
describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel
and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities
posing a significant threat to the cybersecurity of critical infrastructure assets include
cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists.
These malefactors may access cyber-based technologies in order to deny service, steal or
manipulate data, or use a device to launch an attack against itself or another piece of
equipment. However because the Internet offers near-total anonymity, it is difficult to discern
the identity, the motives, and the location of an intruder. The scope and enormity of the
threats are not just focused to private industry but also to the country’s heavily networked
critical infrastructure.
There are many ongoing efforts in government and industry that focus on making
computers, the Internet, and related technologies more secure. As the national intelligence
institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize
foreign operations that use cyber means as the primary tradecraft methodology, as well as
foreign intelligence service collection efforts that use traditional methods to gauge cyber
capabilities and intentions. However one of the hardest issues in cyber counterintelligence
is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind
an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed
that the United States has the capability to trace attacks back to their sources and hold the
attackers "accountable".
Considering all these cyber security problems, this paper examines closely cyber security
issues through the lessons from that of U.S experience. For that purpose I review the arising
cyber security issues considering changing global security environments in the 21st century
and their implications to the reshaping the government system.
For that purpose this study mainly deals with and emphasis the cyber security issues as
one of the growing national security threats. This article also reviews what our intelligence
and security Agencies should do among the transforming cyber space. At any rate, despite
of all hot debates about the various legality and human rights issues derived from the cyber
space and intelligence service activity, the national security should be secured. Therefore, this
paper suggests that one of the most important and immediate step is to understanding the
legal ideology of national security and national intelligence.