December 20, 2015 | Posted in Air Force, Author, Blog, Classified, Classified Information, Congress, Cyber attack, Department of Defense, E.O. 12333, FISA, Intelligence, Law Enforcement, Leaks, NSA, PPD-28, President Obama, Privacy, Snowden, U.S. Code Title 10, U.S. Code Title 50, Writing | By Tom Wither
I hope you’ve had a great summer and fall, and are enjoying the holiday season. I’d like to extend my thanks for being fans of my work, and wish you happy holidays and a bright new year.
I’ve been busy crafting my next novel, a project I’ve named ROGUE SENTINEL, and I will finish the manuscript shortly after the New Year. ROGUE SENTINEL will see Shane Mathews take on a solo mission to Jordan to find and capture an Islamic State mission planner known only as ‘Al-Amriki’ – The American.
Up next, I’ll be resuming work on SWIFT JUSTICE, the third and concluding novel of the ‘Aziz Trilogy’ that started with THE INHERITOR and AUTUMN FIRE, with main characters Shane Mathews and Emily Thompson.
During the year I’ve written a few Op-Eds on current issues that have been published in the Baltimore Sun and in The Hill’s Congress Blog. Here’s a list so you can look at them if you’re interested.
‘The NSA data collection program isn’t criminal; ending it is’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-nsa-data-20151203-story.html
‘Open Letter from a cyber terrorist’ – http://thehill.com/blogs/congress-blog/homeland-security/255370-open-letter-from-a-cyber-terrorist
‘Stand with our watchers’ – http://thehill.com/blogs/congress-blog/homeland-security/261237-stand-with-our-watchers
‘Access to encrypted communication, a balancing act’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-encryption-data-20151001-story.html
‘Clinton E-mails: Who else was involved?’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-clinton-emails-20150908-story.html
‘The country is vulnerable without CISPA’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-cispa-redux-20150209-story.html
Thanks again for being fans of my stories, and feel free make them presents for the fiction reader on your holiday list – they can be purchased from Amazon or Barnes & Nobel as e-books or hardcopies in trade paperback. You can even contact me via firstname.lastname@example.org for a signed copy if you like.
Take care and Happy Holidays!
The New York Times reported today that the Obama administration, as part of the military options presented for the initial U.S. action in Libya, considered conducting a cyber attack against the air defense systems in order to protect U.S. and allied war planes. The administration and the Pentagon chose not to exercise that option.
According to the article, “….administration officials and even some military officers balked, citing the precedent it might set for other nations, in particular Russia or China, to carry out cyber raids of their own, and questioning whether the attack could be mounted on such short notice. They were also unable to resolve whether the president had the power to proceed with such an attack without informing Congress.”
It’s gratifying to see well intended people at senior levels in government debating these kinds of issues; the military readiness and ability to conduct such an attack, the legal issues involved, the potential actions of other nations, and the need to coordinate with and keep Congress properly informed.
I only hope nations like Russia and China would actually debate and discuss these issues as thoroughly. I strongly suspect they won’t. Russia and China very likely have cyber attack capabilities that are comparable to whatever the U.S. may have developed, and I strongly suspect we would not see a lively debate within the Russian or Chinese command structures about using such capabilities. They will use them as needed to protect their soldiers and their nation’s interests, and so should we to protect our military forces and our interests.
Cyber warfare is one of the new weapon sets of the 21st Century. We are hardly the only nation on the planet that possesses them, and we should not be hesitant in using them. Our adversaries will not hesitate, and we need not suffer an electronic Pearl Harbor or 9/11 before electing to use the force multiplying advantage that they can afford us when we send our servicemen and women into battle anywhere on the globe, for any reason.