Wednesday, July 17, 2024
Hawai'i Free Press

Current Articles | Archives

Monday, April 8, 2013
Keeping Americans Safe Online
By Heritage Foundation @ 9:23 AM :: 4071 Views :: National News

Everything we do is online. If you’ve been the victim of identity theft or an email phishing scam, you know how quickly your personal data can be stolen or threatened.

It’s important to know the difference between types of cyber threats and the right approach to fighting them.

There are three tiers of cyber threats, as explained by Heritage experts Steven Bucci, Paul Rosenzweig, and David Inserra:

1. Cyber crime. Cyber crime hits many Americans in the form of identity theft, phishing, or cyber vandalism. In 2006, the Government Accountability Office estimated that cyber identity theft cost U.S. citizens and companies almost $50 billion, and the threat has only grown since then. These crimes are usually committed by individual criminals, so-called hacktivists, or criminal organizations, and represent the most common form of cyber threat.

2. Cyber espionage. Espionage pursues large, important targets, such as military blueprints or proprietary business plans, and is often state-sponsored. China, for instance, is a known bad actor in cyberspace. The Chinese not only allow and sponsor hackers, but have entire military and government units dedicated to stealing data from governments and private companies. China has been engaged in a prolonged campaign of stealing U.S. intellectual property and military secrets. Together with other hackers and cyber operations, China has stolen billions, if not trillions of dollars in U.S. intellectual property, not to mention compromising U.S. national security secrets.

3. Cyber warfare. While cyber crime and espionage are serious problems, the U.S. also faces a threat from cyber warfare. Taking down communications, transportation, or other critical systems would severely impair the U.S. response to a physical attack, increasing the damage sustained. While such an event is “unlikely” according to Director of National Intelligence James Clapper, the U.S. must prepare for these threats, since terrorists or isolated states are likely to use such attacks as they gain the capabilities to do so.

Across all three tiers, poor information sharing is one of the main problems—and in this case, the government could offer protection, rather than regulating. Heritage experts recommend that “entities that share information about cyber threats, vulnerabilities, and breaches should have legal protection. The fact that they shared data about an attack, or even a complete breach, with the authorities should never open them up to legal action.”

The government hasn’t meaningfully addressed these problems—and it can’t solve them by regulation. Think about Obamacare: The law passed in 2010, yet we are just now seeing tens of thousands of pages of regulations being written. If cybersecurity regulations were created the same way, online threats would have changed many times by the time the regulations went into effect.

President Obama was dissatisfied with Congress’s lack of action last year, so he went around them with an executive order favoring a regulatory approach to cybersecurity. This was the wrong way to go, but Congress can still help.


To learn more about what Congress can and should do to protect Americans online, read the full report: A Congressional Guide: Seven Steps to U.S. Security, Prosperity, and Freedom in Cyberspace

Read the Morning Bell and more en español every day at Heritage Libertad.



  • “Three members of the military, two US civilians and an Afghan doctor died after being hit by an explosion while travelling to donate books to a school” in Afghanistan, reports Sky News.
  • The “Gang of Eight” may come out with its immigration bill this week.
  • CNN may bring back its debate show “Crossfire” in June.
  • Who is Kim Jong-un, North Korea’s mysterious leader?  Watch this ABC News report featuring Heritage expert Bruce Klingner.
  • We’re embarking on a project to improve Heritage's blog, The Foundry. We’d like to get your feedback on what you like—or don’t.Take our short, anonymous survey.

TEXT "follow HawaiiFreePress" to 40404

Register to Vote


Aloha Pregnancy Care Center


Antonio Gramsci Reading List

A Place for Women in Waipio

Ballotpedia Hawaii

Broken Trust

Build More Hawaiian Homes Working Group

Christian Homeschoolers of Hawaii

Cliff Slater's Second Opinion

DVids Hawaii


Fix Oahu!

Frontline: The Fixers

Genetic Literacy Project

Grassroot Institute

Hawaii Aquarium Fish Report

Hawaii Aviation Preservation Society

Hawaii Catholic TV

Hawaii Christian Coalition

Hawaii Cigar Association

Hawaii ConCon Info

Hawaii Debt Clock

Hawaii Defense Foundation

Hawaii Family Forum

Hawaii Farmers and Ranchers United

Hawaii Farmer's Daughter

Hawaii Federation of Republican Women

Hawaii History Blog

Hawaii Jihadi Trial

Hawaii Legal News

Hawaii Legal Short-Term Rental Alliance

Hawaii Matters

Hawaii Military History

Hawaii's Partnership for Appropriate & Compassionate Care

Hawaii Public Charter School Network

Hawaii Rifle Association

Hawaii Shippers Council

Hawaii Together


Hiram Fong Papers

Homeschool Legal Defense Hawaii

Honolulu Navy League

Honolulu Traffic

House Minority Blog

Imua TMT

Inouye-Kwock, NYT 1992

Inside the Nature Conservancy

Inverse Condemnation

July 4 in Hawaii

Land and Power in Hawaii

Lessons in Firearm Education

Lingle Years

Managed Care Matters -- Hawaii

Missile Defense Advocacy

MIS Veterans Hawaii

NAMI Hawaii

National Parents Org Hawaii

NFIB Hawaii News

NRA-ILA Hawaii


OHA Lies

Opt Out Today

Patients Rights Council Hawaii

Practical Policy Institute of Hawaii

Pritchett Cartoons

Pro-GMO Hawaii

Rental by Owner Awareness Assn

Research Institute for Hawaii USA

Rick Hamada Show

RJ Rummel

School Choice in Hawaii

Talking Tax

Tax Foundation of Hawaii

The Real Hanabusa

Time Out Honolulu

Trustee Akina KWO Columns

West Maui Taxpayers Association

What Natalie Thinks

Whole Life Hawaii