{"id":13367,"date":"2022-06-10T17:00:09","date_gmt":"2022-06-10T17:00:09","guid":{"rendered":"https:\/\/faisalhoque.com\/?p=13367"},"modified":"2022-06-10T17:00:09","modified_gmt":"2022-06-10T17:00:09","slug":"national-and-global-security-a-call-to-action","status":"publish","type":"post","link":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/","title":{"rendered":"National and Global Security \u2014 A Call to Action"},"content":{"rendered":"<h2 id=\"6b23\" class=\"pw-subtitle-paragraph vq kd uu bn b vr vs gu gv vt gy gz vu jo jp vv js jt vw jw jx vx co\" data-selectable-paragraph=\"\">It seems reasonable to agree that digital technology is a decidedly two-edged sword, capable of both significant good and unscrupulous aggression.<\/h2>\n<p><strong>BY\u00a0<a title=\"View user profile.\" href=\"https:\/\/faisalhoque.com\" target=\"_blank\" rel=\"noopener\">FAISAL HOQUE<\/a>\u00a0<\/strong><\/p>\n<div class=\"ja uf ot ug uh\">\n<p id=\"eb93\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il wt\" data-selectable-paragraph=\"\"><span class=\"l wu wv ww od wx wy wz xa xb dq\">M<\/span>isinformation and hacking have by no means limited their victims to businesses and individuals. As is becoming more commonly known, entire nations, political organizations and other public entities are also appealing targets. Most people don\u2019t need to be reminded about Russia\u2019s technical meddling in American elections, not to mention the cyberwar underscoring Russia\u2019s aggression against Ukraine (it was no coincidence that Russia banned Facebook in the first week of its invasion of Ukraine, even though just a small percentage of the population actually uses the platform.)<\/p>\n<p id=\"f939\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">The subsequent debate certainly cuts both ways. On the one hand, given technology\u2019s role in the spread of misinformation and other forms of tech-enabled \u201cwarfare\u201d, critics contend that spreading digitalization has contributed to political and economic instability.<\/p>\n<p id=\"712a\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">An additional argument focuses on who has greater access to such tech tools. The same critics who worry about digitalization\u2019s capacity to foment instability also point out that resources such as digital technology are often more accessible to governments and individuals with ill intent.<\/p>\n<blockquote>\n<p class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">With enough financial means at their disposal, they\u2019re able to readily acquire what they want \u2014 those providing the technology, amply compensated as they are, don\u2019t concern themselves with how it will be used.<\/p>\n<\/blockquote>\n<p id=\"2748\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">The argument has some validity. Again, common examples such as Russian hackers attempting to manipulate democratic processes powerfully illustrate what such technology can do in the wrong hands. As shown in a 2014 breach of the U.S. Office of Personnel and Management by China, foreign adversaries clearly view identity theft as a valuable national intelligence strategy. An Iranian attack on Wall Street, North Korea\u2019s hack of Sony Pictures and other examples further illustrate a consistent, diverse course of action described by some analysts as \u201cdeath by a thousand hacks.\u201d<\/p>\n<p id=\"3e24\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">Such intrusions are increasingly taking place on a more individual level as well. An American\u2019s identity is stolen almost once every minute. According to the Federal Trade Commission, there was a 3,000 percent increase in cases of citizens\u2019 information being used fraudulently to apply for government benefits in 2020 alone.[1]<\/p>\n<p id=\"d205\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">Still another factor that makes digitalization a difficult security issue to address is those who build such technology. More and more, private companies develop products that impact fundamental rights. One such example is facial recognition systems \u2014 a legitimate privacy matter that has only recently come under some form of governmental regulation. Business and companies routinely mine personal data without permission \u2014 yet another common practice that government has been slow to take on.<\/p>\n<blockquote>\n<p id=\"9df4\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">This is a clear call to action to introduce more comprehensive control and legislation \u2014 not merely to rein in danger to individual privacy and safety but to combat digitalization\u2019s increasing threat to political and economic stability. Nor is this an issue that can be best addressed by countries acting exclusively on their own. Entities such as the United Nations, NATO and other inclusive groups can address digital regulation and control as a central element of their overall mission.<\/p>\n<\/blockquote>\n<p id=\"af4c\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">Such groups could agree on regulations and standards for technology that are wholly consistent with core democratic principles. From there, individual countries could implement them in ways that best meet their individual needs and circumstances while remaining consistent with those of other nations.<\/p>\n<p id=\"41b8\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">Another issue is the simple matter of commonly accepted wording. Currently, there is no clear definition that spells out when cyber aggression constitutes an act of war. This emboldens nations to aggressively pursue a program of cyber warfare, since those being targeted don\u2019t seem to know what acts warrant retribution \u2014 not to mention how to carry out any sort of punitive response.<\/p>\n<p id=\"9d31\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">One possible solution that\u2019s been suggested is an independent tribunal empowered to investigate such attacks, perhaps similar to the Hague. Based on the tribunal\u2019s decision, leaders could then decide what sort of response is legally and ethically justified.<\/p>\n<p id=\"a4f3\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">In the United States, government at all levels clearly needs to play a catch up game in terms of ensuring everything from national security to individual privacy. Protective infrastructure must be constantly strengthened and refined, particularly so that terrorist groups and adversarial nations such as North Korea are incapable of compromising national security through cyberattacks. Moreover, leaders need to develop \u2014 and share \u2014 a comprehensive playbook that lays out specific steps to be taken in response to significant cyberattacks.<\/p>\n<p id=\"3121\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">The good news is that the United States can look to other countries which have already implemented cohesive cybersecurity measures. Some nations, such as Israel, have designated a single entity with the overall responsibility of defining and executing the cybersecurity agenda of the entire country. This mandate includes developing a cohesive national cybersecurity strategy consisting of more individualized programs, among them protecting the critical infrastructure of the country, mobilizing response to cyber incidents, defining cybersecurity standards, improving the cyber awareness of citizens and strengthening cybersecurity capabilities throughout a variety of industries.<\/p>\n<p id=\"fec1\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">Domestically, progress is happening. More money has been directed toward agencies such as the Cybersecurity and Infrastructure Security Agency and the General Services Administration\u2019s Technology Modernization Fund. In May 2021, President Joe Biden signed an executive order outlining new federal cybersecurity guidelines, including, among other measures, the creation of a cybersecurity safety review board for examining the aftermath of data breaches and cyberattacks.<\/p>\n<p id=\"8da9\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">Additionally, the United States and other countries can look to partner more closely with the private sector through more consistent cooperation and information sharing. On March 1, 2022, the Senate unanimously passed the <a class=\"au xc\" href=\"https:\/\/www.congress.gov\/bill\/117th-congress\/senate-bill\/3600\/text\" target=\"_blank\" rel=\"noopener ugc nofollow\">Strengthening American Cybersecurity Act of 2022<\/a>. This measure requires critical infrastructure companies to report significant cyber incidents and all ransom payments to the Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security Agency (CISA). President Biden subsequently signed the measure into law.<\/p>\n<p id=\"f244\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">On the other side of the coin, tech leaders say the government can be far more aggressive in reciprocating, such as sharing reports of cybersecurity issues with companies which might be at risk. Since attackers routinely go after many companies with the same strategy, timely sharing of critical data could allow vulnerable companies to put protective measures into place proactively.<\/p>\n<p id=\"8675\" class=\"pw-post-body-paragraph vy vz uu ka b wa wb gv wc wd we gz wf wg wh wi wj wk wl wm wn wo wp wq wr ws ja il\" data-selectable-paragraph=\"\">It seems reasonable to agree that digital technology is a decidedly two-edged sword, capable of both significant good and unscrupulous aggression. Countries throughout the world would do well to recognize this and to address both sides.<\/p>\n<\/div>\n<div class=\"ev ew ex ey ez l\">\n<div class=\"dc rm o dz mu mv\">\n<div class=\"mw eb mx my mz o ao c\">\n<div class=\"nl sn nn l\">\n<div class=\"o dz\">\n<div class=\"eo cf ex ey ez fa fb fc fd fe ff\">\n<article>\n<div class=\"l\">\n<div class=\"l\">\n<section>\n<div>\n<div class=\"ja uf ot ug uh\">\n<h2 id=\"2dd6\" class=\"xn xo uu bn xp jg xq jh gx jk xr jl hb wg xs xt hf wk xu xv hj wo xw xx hn xy il\" data-selectable-paragraph=\"\">REFERENCES<\/h2>\n<p id=\"31fe\" class=\"pw-post-body-paragraph vy vz uu ka b wa xz gv wc wd ya gz wf wg yb wi wj wk yc wm wn wo yd wq wr ws ja il\" data-selectable-paragraph=\"\">[1] <a class=\"au xc\" href=\"https:\/\/warontherocks.com\/2021\/04\/digital-identity-is-a-national-security-issue\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">https:\/\/warontherocks.com\/2021\/04\/digital-identity-is-a-national-security-issue\/<\/a><\/p>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<div class=\"lq l\"><\/div>\n<div><\/div>\n<div class=\"dc iy o dz ye yf\">\n<div class=\"yg eb lg yh yi o ao c\">\n<div class=\"o ao lv\">\n<div class=\"pw-multi-vote-icon dq yj yk yl ym\">\n<div class=\"\">\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"412\" aria-labelledby=\"412\">\n<div class=\"bb yn dt yo yp yq yr ym dg ys yt yu\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"754\" aria-labelledby=\"754\">\n<div class=\"cj\" aria-hidden=\"false\" aria-describedby=\"creatorActionOverflowMenu\" aria-labelledby=\"creatorActionOverflowMenu\">\n<div class=\"cj\" aria-hidden=\"false\" aria-describedby=\"collectionSubmissionPopover\" aria-labelledby=\"collectionSubmissionPopover\">\n<div class=\"sm l hi\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"l\"><\/div>\n<footer class=\"nq nr ns nt o ao nu dd c\">\n<div class=\"l nv\">\n<div class=\"o dz\">\n<div class=\"eo cf fa fb fc fd fe ff fg fh fi\">\n<div class=\"o u nw\">\n<div class=\"o ao gl\">\n<div class=\"nx l\">\n<div class=\"o ao gl\">\n<div class=\"pw-multi-vote-icon dq na nb nc nd\">\n<div class=\"\">\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"756\" aria-labelledby=\"756\">\n<div class=\"bb ne dt nf so nh ni nd dg sp sq sr\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"oc o\">\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"757\" aria-labelledby=\"757\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"o ao\">\n<div class=\"cj\" aria-hidden=\"false\" aria-describedby=\"postFooterSocialMenu\" aria-labelledby=\"postFooterSocialMenu\">\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"758\" aria-labelledby=\"758\"><\/div>\n<\/div>\n<\/div>\n<div class=\"og l hi\">\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"759\" aria-labelledby=\"759\">\n<div class=\"cj cf\" aria-hidden=\"false\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"760\" aria-labelledby=\"760\">\n<div class=\"cj\" aria-hidden=\"false\" aria-describedby=\"creatorActionOverflowMenu\" aria-labelledby=\"creatorActionOverflowMenu\">\n<div class=\"cj\" aria-hidden=\"false\" aria-describedby=\"collectionSubmissionPopover\" aria-labelledby=\"collectionSubmissionPopover\">\n<div class=\"sm l hi\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/footer>\n<\/div>\n<div class=\"o dz\">\n<div class=\"eo cf fa fb fc fd fe ff fg fh fi\">\n<div class=\"ql qk l\">\n<div class=\"sv sw sx sy oh sz th\">\n<div class=\"tb l\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>It seems reasonable to agree that digital technology is a decidedly two-edged sword, capable of both significant good and unscrupulous aggression.<\/p>\n","protected":false},"author":1,"featured_media":13368,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[556,557,531],"tags":[951,530,564,1002,1003,773,516,633,900,652,560,1004,709,537],"class_list":["post-13367","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-most-recent-blogs","category-innovation-blogs","category-leadership","tag-ai","tag-business","tag-business-agility","tag-cybersecurity","tag-dept-of-defense","tag-digital-transformation","tag-faisal-hoque-2","tag-government","tag-growth-hacking","tag-leadership","tag-management","tag-national-defense","tag-strategy","tag-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>National and Global Security \u2014 A Call to Action - Faisal Hoque<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"National and Global Security \u2014 A Call to Action - Faisal Hoque\" \/>\n<meta property=\"og:description\" content=\"It seems reasonable to agree that digital technology is a decidedly two-edged sword, capable of both significant good and unscrupulous aggression.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/\" \/>\n<meta property=\"og:site_name\" content=\"Faisal Hoque\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-10T17:00:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_1936992973.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"610\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Faisal Hoque\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Faisal Hoque\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/\"},\"author\":{\"name\":\"Faisal Hoque\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/c5dc3c9d27147a81ac2d242f7e0cccae\"},\"headline\":\"National and Global Security \u2014 A Call to Action\",\"datePublished\":\"2022-06-10T17:00:09+00:00\",\"dateModified\":\"2022-06-10T17:00:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/\"},\"wordCount\":1080,\"publisher\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#organization\"},\"image\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_1936992973.jpg\",\"keywords\":[\"AI\",\"Business\",\"Business Agility\",\"Cybersecurity\",\"Dept of Defense\",\"Digital Transformation\",\"Faisal Hoque\",\"Government\",\"Growth Hacking\",\"Leadership &amp; Management\",\"Management\",\"National Defense\",\"Strategy\",\"Technology\"],\"articleSection\":[\"Blogs I Articles\",\"Creativity | Innovation\",\"Leadership | Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/\",\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/\",\"name\":\"National and Global Security \u2014 A Call to Action - Faisal Hoque\",\"isPartOf\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_1936992973.jpg\",\"datePublished\":\"2022-06-10T17:00:09+00:00\",\"dateModified\":\"2022-06-10T17:00:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#primaryimage\",\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_1936992973.jpg\",\"contentUrl\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_1936992973.jpg\",\"width\":610,\"height\":343,\"caption\":\"Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/staging.frameroinfotech.com\/fh\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"National and Global Security \u2014 A Call to Action\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#website\",\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/\",\"name\":\"Faisal Hoque\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.frameroinfotech.com\/fh\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#organization\",\"name\":\"Faisal Hoque\",\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2024\/09\/header_logo.png\",\"contentUrl\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2024\/09\/header_logo.png\",\"width\":246,\"height\":54,\"caption\":\"Faisal Hoque\"},\"image\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/c5dc3c9d27147a81ac2d242f7e0cccae\",\"name\":\"Faisal Hoque\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c76e94a5e41cdf353d16911071eb8cef57feea832ed6ccc8e2c43039ee7071f6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c76e94a5e41cdf353d16911071eb8cef57feea832ed6ccc8e2c43039ee7071f6?s=96&d=mm&r=g\",\"caption\":\"Faisal Hoque\"},\"sameAs\":[\"https:\/\/staging.frameroinfotech.com\/fh\"],\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/author\/faisal-hoque\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"National and Global Security \u2014 A Call to Action - Faisal Hoque","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"National and Global Security \u2014 A Call to Action - Faisal Hoque","og_description":"It seems reasonable to agree that digital technology is a decidedly two-edged sword, capable of both significant good and unscrupulous aggression.","og_url":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/","og_site_name":"Faisal Hoque","article_published_time":"2022-06-10T17:00:09+00:00","og_image":[{"width":610,"height":343,"url":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_1936992973.jpg","type":"image\/jpeg"}],"author":"Faisal Hoque","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Faisal Hoque","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#article","isPartOf":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/"},"author":{"name":"Faisal Hoque","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/c5dc3c9d27147a81ac2d242f7e0cccae"},"headline":"National and Global Security \u2014 A Call to Action","datePublished":"2022-06-10T17:00:09+00:00","dateModified":"2022-06-10T17:00:09+00:00","mainEntityOfPage":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/"},"wordCount":1080,"publisher":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/#organization"},"image":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_1936992973.jpg","keywords":["AI","Business","Business Agility","Cybersecurity","Dept of Defense","Digital Transformation","Faisal Hoque","Government","Growth Hacking","Leadership &amp; Management","Management","National Defense","Strategy","Technology"],"articleSection":["Blogs I Articles","Creativity | Innovation","Leadership | Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/","url":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/","name":"National and Global Security \u2014 A Call to Action - Faisal Hoque","isPartOf":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#primaryimage"},"image":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_1936992973.jpg","datePublished":"2022-06-10T17:00:09+00:00","dateModified":"2022-06-10T17:00:09+00:00","breadcrumb":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#primaryimage","url":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_1936992973.jpg","contentUrl":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_1936992973.jpg","width":610,"height":343,"caption":"Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications."},{"@type":"BreadcrumbList","@id":"https:\/\/staging.frameroinfotech.com\/fh\/national-and-global-security-a-call-to-action\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.frameroinfotech.com\/fh\/"},{"@type":"ListItem","position":2,"name":"National and Global Security \u2014 A Call to Action"}]},{"@type":"WebSite","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#website","url":"https:\/\/staging.frameroinfotech.com\/fh\/","name":"Faisal Hoque","description":"","publisher":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.frameroinfotech.com\/fh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#organization","name":"Faisal Hoque","url":"https:\/\/staging.frameroinfotech.com\/fh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/logo\/image\/","url":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2024\/09\/header_logo.png","contentUrl":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2024\/09\/header_logo.png","width":246,"height":54,"caption":"Faisal Hoque"},"image":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/c5dc3c9d27147a81ac2d242f7e0cccae","name":"Faisal Hoque","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c76e94a5e41cdf353d16911071eb8cef57feea832ed6ccc8e2c43039ee7071f6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c76e94a5e41cdf353d16911071eb8cef57feea832ed6ccc8e2c43039ee7071f6?s=96&d=mm&r=g","caption":"Faisal Hoque"},"sameAs":["https:\/\/staging.frameroinfotech.com\/fh"],"url":"https:\/\/staging.frameroinfotech.com\/fh\/author\/faisal-hoque\/"}]}},"_links":{"self":[{"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/posts\/13367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/comments?post=13367"}],"version-history":[{"count":0,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/posts\/13367\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/media\/13368"}],"wp:attachment":[{"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/media?parent=13367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/categories?post=13367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/tags?post=13367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}