ABSTRACT

This “virtual battleground” in cyberspace has only continued to increase global awareness of security and impact global political stability exponentially, cutting a wide swath across physical geographical boundaries, impacting the security of individuals, commercial enterprises, economies, and the sovereignty and stability of global nations. Many of the international

5.1 Introduction 199 5.2 What Is Cybersecurity? 201 5.3 Current U.S. Comprehensive National Cybersecurity Strategy 205 5.4 Current U.S. Federal Laws Involving Cybersecurity 209 5.5 International Comprehensive Cybersecurity Strategy 226

5.5.1 UN Cybersecurity Policy and Strategy 226 5.5.2 NATO Cybersecurity Policy and Strategy 229 5.5.3 EU Data Protection 229

5.6 Issues Involving Electronic Data Collection for Law Enforcement Purposes 235

5.7 Whistleblower or Criminal Leaker? 238 5.8 Concluding Comments 242 Notes and References 243 Bibliography 251

commerce and business development operations in developed and developing nations are integrally connected to the Internet. For example, Canada’s entire economy is tied to digital technology, with 87% of Canada’s commercial enterprises using the Internet to effectively conduct its business in 2012.2

For those world citizens whose freedom of speech is restricted or prohibited, the Internet provides a nearly anonymous avenue where individuals can associate without government restriction and intervention, can use the Internet to mobilize and inform others about contemporaneous political activities or events affecting those in a specific community, can operate individual water systems for rural farmers, and can provide and mobilize assistance to those affected by natural disasters. However, those same benefits can be accessed and used by mal-intentioned individuals and factions that wish to destabilize or overthrow governments or engage in acts of terrorism.