A comparison of cyber security policies of U.S presidents (2000-2020)

Document Type : Original Article

Authors

1 Master of International Relations, Ferdowsi University of Mashhad, Mashhad, Iran.

2 Associate Professor, Department of Political Science and International Relations, Ferdowsi University of Mashhad, Mashhad, Iran.

Abstract

Abstract:
Today, cyber space has been turned into one of the most important dimensions of security in our world. With the development and growth of cyber technology, we face an increase in threats of this arena. According to their goals, governmental and non- governmental actors have taken actions against U.S national security. Therefore, change and evolution in the national security with considering cyberspace and its possible threats, from George W. Bush time, has borne different characteristics. The paper tries to review the characteristics of policy and strategies of the U.S presidents against the threats. To answer the paper`s central question, we show that the U.S cyber strategy, under Bush, was defensive and marginal; had domestic and international development under Obama; and was openly offensive under Trump. This paper has been written by library resources and documents in content analysis method and descriptive approach.
Keywords: Cyber security, US, Bush, Obama, Trump

Keywords


Smiley face

آذری، منیره. (1391الف). امنیت و جنگ سایبری 1؛ ویژه مفاهیم و مبانی. تهران: ابرار معاصر.
بوزان، باری. (1378). مردم، دولت ها و هراس. تهران: پژوهشکده مطالعات راهبردی.
بدیعی، تعیم. (1380). تحلیل محتوا. تهران؛ اداره کل تبلیغات.
جالینوسی، احمد. ابراهیم، شهروز و قنواتی، طیبه. (1393). جایگاه فصای سایبر و تهدیدهای سایبری در استراتژی امنیت ملی ایالات متحده آمریکا»، فصلنامه دانش سیاسی و بین الملل، 2(5)، 24-9.
جانشکی، لچ جی و آندره ام. کلاریک. (1389). مقدمه ای بر جنگ سایبر و تروریسم سایبر(جلد دوم). تهران: دانشگاه جامع امام حسین.
خبرگذاری بی بی سی. (1397). تغییر استراتژی سایبری آمریکا از دفاع به حمله. 30 شهریور، از:
خبرگزاری صدا و سیما. (1397). رویکرد تهاجمی استراتژی ملی سایبری آمریکا. 5 مهر 1397، از:
https://www.iribnews.ir/fa/news/2237732/
شیهان، مایکل. (1388). امنیت بین الملل. ترجمه سید جلال دهقانی فیروز آبادی، تهران :پژوهشکده مطالعات راهبردی.
صدیق، میر ابراهیم. (1395). انقلاب سایبری و تحول در پدیده ی جاسوسی. مطالعات راهبردی، 19(1)، 92-71.
عبدالله خانی، علی. (1383). نظریه‌های امنیت؛ مقدمه‌ای بر طرح ریزی دکترین امنیت ملی(1). تهران: ابرار معاصر.
Beida, David And Leila Halawi. (2015). Cyberspace : Avenue For Terrorism. Issues In Information Systems, 16(3), pp 33-42.
Blake, Andrew. (2019). Bolton: Trump Cyber Policy Broadening Ability Conduct Offensive Campaigns. Washington Times, June 12, Available at: https://m.washingtontimes.com/news/2019/jun/12/john-bolton-trump-cyber-policy-broadening-ability-/
Borghard, Erica D. and Shawn W. Longergan. (2018).  Confidence Building Measures for the Cyber Domain. Strategic Studies Quarterly, 12(3), pp 10-49.
CEA. (2018). The Cost of Malicious Cyber Activity To The U.S Economy, The Council Of Economic Advisers, Executive Office Of The President Of The United States. Available at: https://www.whitehouse.gov/wp-content/uploads/2018/03/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf
Cimpanu, Catalin. (2019). US Launches Cyber-Attack Aimed At Iranian Rocket And Missile Systems. Available at: https://www.zdnet.com/article/us-launches-cyber-attack-aimed-at-iranian-rocket-and-missile-systems/
Coats, Daniel R. (2017). Statement for the Worldwide Threat Assessment of the US Intelligence Community. Senate Select Committee on Intelligence. Available at: https://www.dni.gov/files/documents/Newsroom/Testimonies/SSCI%20Unclassified%20SFR%20-%20Final.pdf
CSO. (2017). Obama`s cybersecurity legacy: Good intentions, Good legacy, limited results. Available at:
Dale, Catherine. (2013). National Security Strategy: Mandates, Execution to Date, and Issues for Congress. CRS, Congressional Research Service, R 43174. Available at: https://apps.dtic.mil/sti/pdfs/ADA584684.pdf
Farwell, James P. and  Rafal Rohozinski. (2012). The New Reality of Cyber War. Servival, 54(4), pp 107-120.
Farwell, James P. and Rafal Rohozinski. (2011). Stuxnet and the Future of Cyber War. Survival, 53(1), pp 23-40.
Finkle, Jim and Rick Rothacker. (2012). Iranian Hackers Target Bank Of America, Jp Morgan, Citi. Reuters, September 21, Available at: https://www.reuters.com/article/us-iran-cyberattacks/exclusive-iranian-hackers-target-bank-of-america-jpmorgan-citi-idUSBRE88K12H20120921
Fischer, Eric A .(2014). Federal Laws Relating to Cybersecurity: Overview of Major Issues, Current Laws and Proposed Legislation. Congressional Research Service. Available at: https://fas.org/sgp/crs/natsec/R42114.pdf
Giantas, Dominika and Dimitrios Stergiou. (2018). From Terrorism to Cyber-terrorism: The Case of ISIS. Greece. University of Peloponnese. Hellenic Institute of Strategic Studies.
Hamby, Janic M. and Thomas C. Wingfield. (2016). Cyberpolicy. pp 149-170.
Hannah, John and David Adesnik. (2019). Midterm Assessment: The Trump Administration`s Foreign Policy and National Security Policies. Foundation for Defense of Democracies. Available at:https://www.fdd.org/wp-content/uploads/2019/01/fdd-report-trump-midterm-assessment.pdf
Harvey, John. (2016). Cybersecurity Policy Tenets: Yesterday and Today. CSEC, 635.
Hjortdal, Magnus. (2011). China`s Use of Cyber Warefare: Espionage Meets Strategic Deterrence. Journal of Strategic Security, 4(2).
International Strategy For Cyberspace (2011). White House. Available at: https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
Jaikaran, Chris. (2018). Cybersecurity: Selected Issues for The 115th Congress. Congressional Research Service. Available at: https://fas.org/sgp/crs/misc/R45127.pdf
James, Kevin(2023). What is the future of cybersecurity? Predictions & trends for 2022-2023. Cyber security. Available at: https://cybersecurityforme.com/what-is-the-future-of-cybersecurity
Kolton, Michael. (2017). Interpreting China`s Pursuit of Cyber Sovereignty and its Views on Cyber Deterrence. Cyber Defense Review, 2(1).pp 119-154.
Krippendorff, Klaus(2004). Content Analysis; An introduction to its methodology, University of Pennsylvania.
 Libicki, Martin C.(2013). Brandishing Cyberattack Capability. National Defense Research Institute. Available at: https://www.rand.org/pubs/research_reports/RR175.html
Liu, Qinghui and Li Yuchong(2021). A comprehensive review study of cyber attacks and cyber security: Emerging trends and recent developments. Elsevier Ltd .Energy reports.
Maker, Simran R. (2017). New Frontier in Defense: Cyber Space and U.S Foreign Policy. National Committee on American Foreign Policy Report. Available at: https://www.ncafp.org/new-frontier-defense-cyberspace-u-s-foreign-policy-report/
National security Archive(2018),Presidential orders. Availabel at: https://nsarchive.gwu.edu/news/cyber-vault/2018-11-07/presidential-orders
Nakasone, Paul M. (2019). Cyber Force for Persistence Operations. JFQ, 92, pp 10-14.
O`Niel, Willian. (2009). Cyberspace and Infrastructures. In Franklin et al. (Ed.). Cyberpower. National Defense University press.
Regester, Virginia C. (2015). An Assessment of Botnets as an Offensive Cyber Weapon for the United States. ProQuest. Utica College.
Schimidt, Lara. (2015). Perspective on 2015 DOD Cyber Strategy. RAND CT439. Available at: https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT439/RAND_CT439.pdf
Spade, Jayson M. (2012). China`s Cyber Power and America`s National Security. Pennsylvania: U.S Army War College.
Stone, Marianne. (2010). Obama`s Cyber Security. Security Technology Policy Pares Series 1. New York: Columbia University.
Tirrell, Willian K. (2012). United States Cybersecurity Strategy, Policy and Organization. Washington DC: U.S Army Command and General Staff College.
Trobisch, Jan. (2014). Challenges In The Protection Of Us Critical Infrastructure In The Cyber Realm. United States Army Command And General Staff College. Available at: https://www.hsdl.org/?view&did=791151
The Newyork Times(2018), Trump`s Reckless Cybersecurity Strategy. February 10. Avalaible at: https://www.nytimes.com/2018/10/02/opinion/trumps-reckless-cybersecurity-strategy.html
Trujillo, Clorinda. (2014). The Limits of Cyberspace Detterance. JFQ: 75, pp 42-52.
Valeriano, Brandon and Benjamin Jensen. (2019). The Myth of the Cyber Offense: The Case for Restraint. Cato Institute. 862. Available at: https://www.cato.org/publications/policy-analysis/myth-cyber-offense-case-restraint
Yang, Jia-hao. (2016). Development of the U.S Cybersecurity Strategy Legislation and the Enlightment for China. China Zhongnan University of Economics and law.
Department of Defense. (2011). Strategy for Operating in Cyberspace. Available at: https://csrc.nist.gov/CSRC/media/Projects/ISPAB/documents/DOD-Strategy-for-Operating-in-Cyberspace.pdf
Department of State. (2016). International Cyberspace Policy Strategy. Available at: https://2009-2017.state.gov/documents/organization/255732.pdf
International Strategy For Cyberspace .(2011). White House. Available at: https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
Lange, Katie. (2018). DOD`s Cyber Strategy. Available at:  https://www.defense.gov/explore/story/Article/1648425/dods-cyber-strategy-5-things-to-know/
National Cyber Strategy of The United States of America. (2018). White House. Available at: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
National Security Strategy. (2017). White House. Available at:  https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf
National Strategy to Secure Cyberspace. (2003). White House. Available at: https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf
Rubenstein, Dana. (2014). Nation State Cyber Espionage And Its Impacts. Available at: https:// www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/index.html
Perlroth, Nicole, David E. Sanger and Scott Shane. (2019). How Chinese Spies Got the NSA`s Hacking Tools, and Used Them for Attacks. Available at: https://www.nytimes.com/2019/05/06/us/politics/china-hacking-cyber.html