Table of Contents
Why Consider Opposing Viewpoints? 11
Introduction 14
Chapter 1 What Is the Most Effective Way to Combat Hacking?
Chapter Preface 19
1 A Clear and Unified Approach Is Needed to Ensure Cybersecurity Mike McConnell 21
2 Hackers Are Not a Threat to Cybersecurity James Andrew Lewis 28
3 US Outgunned in Hacker War Devlin Barrett 37
4 A Multifaceted Strategy Is Best to Ensure Cybersecurity Michael P. Merritt 43
5 Private Sector Isn't Waiting for Feds to Deal with Internet Security John Hayward 57
6 Ethical Hacking Improves Cybersecurity Sue Marquette Poremba 63
7 Exploding the Myth of the "Ethical Hacker" Conrad Constantine Dominique Karg 67
Periodical and Internet Sources Bibliography 73
Chapter 2 Is Hacktivism a Serious Threat?
Chapter Preface 75
1 Hacktivism Is an Effective and Ethical Means of Social Protest Graham Armstrong 77
2 Hacktivist Collectives Are Terrorists Phil Elmore 83
3 Hacktivists Fight for Civil Liberties and Free Expression James Ball 88
4 Old-Time Hacktivists: Anonymous, You've Crossed the Line Elinor Mills 97
Periodical and Internet Sources Bibliography 104
Chapter 3 What Is the Significance of WikiLeaks?
Chapter Preface 106
1 WikiLeaks Provides Transparency and Can Deter Corporate and Government Misbehavior Jesse Walker 109
2 The WikiLeaks Scandal Reveals the Limitations of the Publics Desire for Transparency Alasdair Roberts 114
3 WikiLeaks Is an Unprecedented Threat to US National Security Marc A. Thiessen 127
4 A Defense of Wikileaks John B. Judis 132
5 The WikiLeaks Scandal Reveals the US Government Lacks the Will to Deal with Cyberthreats Cliff May 138
Periodical and Internet Sources Bibliography 143
Chapter 4 What Is the Role of Government in Hacking?
Chapter Preface 145
1 Cyberattacks Require a Military Response 148
US Department of Defense
2 A Military Response to Cyberattacks Is Unwarranted and Inappropriate Benjamin H. Friedman Christopher Preble 153
3 The United States Needs to Develop a Smart and Effective Counterinsurgency Strategy for Cyberspace Paul Rosenzweig 159
4 More Government Regulation Would Impede Innovation and Cybersecurity Tom Ridge 171
5 The United States Should Engage in Cyberwarfare Treaty Talks Alice Slater 180
Periodical and Internet Sources Bibliography 186
For Further Discussion 187
Organizations to Contact 189
Bibliography of Books 196
Index 200