In our "Question of the Day" feature for this year's Ideas Special Report, our readers tackle some of the emerging issues that are defining our time.
The history of American warfare is riddled with enemies both foreign and domestic, both announced and unseen. "The attempts to detect and suppress internal dangers generally look bad in retrospect, because they so often come at the cost of the liberties, absorbency, and flexibility that are America's distinctive strengths," writes James Fallows in the July/August issue. "The Alien and Sedition Acts in the new republic's first decades, the "Red scares" after both World Wars, the propaganda office Woodrow Wilson set up during the First World War, and the Japanese American internment program FDR approved in the Second--these illustrate how much more complicated it is for a democracy to deal with unseen inside threats than to confront enemies on a battlefield." While the past decade of the "global war on terror" has presented the United States with a new form of this old challenge -- of protecting itself without destroying or perverting its essential nature -- Fallows can already sense a new iteration on the horizon:
That challenge is already taking on another and even more complicated form. The biggest change in human interactions in the past generation is the rising importance of "the cloud"--the electronic networks that let us witness disaster or upheaval wherever it happens, connect with friends wherever they are, get a map or see a satellite photo of virtually any point on Earth, and coordinate business, financial, scientific, and educational efforts across the globe all at once. Of course, the indispensability of these systems creates their danger. If the factories, the banks, the hospitals, and the electric and water systems must all be online to function, they are all, in principle, vulnerable to electronic attack.
With last summer's discovery of the insidious Stuxnet virus, we know--or "know," since neither the Israeli nor the U.S. government, nor any other, will come out and say that it developed malicious software to disable Iran's nuclear-weapons program--that this threat is more than hypothetical. We also know that it can be posed by states, as the latest form of war, and not just by bands of scammers trying to steal your credit-card numbers or make you wire money to Nigeria. It is a potential external menace as hard to detect as an internal one, and very hard to control without limiting the fast, open connectivity that gives networks their value.
"Grand-scale geostrategy has always involved locating the opponent's choke points and vulnerabilities, where concentrated damage can produce widespread harm," notes Fallows. "That once meant harbors, railroads, ball-bearing works, airports. Now, it's what comes through the USB connector and the Ethernet port." With the existence of non-governmental, decentralized hacker groups like Anonymous and LulzSec, the possibility exists that a war on cyberterrorism will likely be a war on a handful of individuals.
Question of the Day: As our lives become increasingly dependent on technology, can the government provide for our security without infringing on our rights?