Saturday, July 16, 2011

postheadericon Pentagon eyes change to cyber strategy

U.S. Department of Defense wants to go on the offensive after hackers unveiled 24 000 key files obtained in March

The Pentagon can chopped some of its weapons system to a foreign intelligence service systems at the enterprise level was 24 000 contractors and key files in March to redesign.

The incursion was one of the worst single incidents the US defence department has seen. Though it did not name the contractor nor the country suspected of carrying out the attack, Lockheed Martin said in May that it had come under attack. China and Russia have frequently been suspected of carrying out internet espionage, with China the most prominent in recent years.

U.S. defense chiefs now they think they need to become a means to respond to such assaults have. "We 're on a way to predict, is far too predictable," General James Cartwright, vice chairman of the Joint Chiefs of Staff, said on Thursday. "It 's purely defensive. There is no penalty for attacking us. We must find a way to change that." Hours later, Deputy Defense Secretary, William Lynn, a strategy whose thrust presented, he said , is defensive and focused on "deny the benefits of an attack".

Lynn showed that, in the course of your important files, including plans for missile-tracking systems, satellite navigation, reconnaissance drones and even fighter jets have been stolen from systems. "A big part of it relates to our most sensitive systems, including avionics, surveillance, satellite communications systems and network security protocols," he said.

Attacks on the defense in connection with contractors and systems are increasingly demanding. The hackers who broke into Lockheed Martin \ s security subsidiary RSA Security, the cryptographic features 's systems began with the systems of EMC \ raid' \ climb "key" and decrypt files used to access remote access personnel to acquire computers.

Cartwright said US military commanders were now devoting 90% of attention to building better firewalls and only 10% to ways of deterring hackers from attacking. He said a better strategy would be the reverse, focusing almost entirely on attack.

The defence department's new strategy relies on deploying sensors, software and code to detect and stop intrusions before they affect operations. "If an attack will not have its intended effect, those who wish us harm will have less reason to target us through cyberspace in the first place," Lynn said. "Current countermeasures have not stopped this outflow of sensitive information. We need to do more to guard our digital storehouses of design innovation."

Cartwright suggested that greater deterrence would be necessary. "We want to convince people of it offshore, if they attack, it \ won 't be free," he said, adding that opponents should know that the U.S. has "the skills and capacities to do something about it to do ".

James Lewis, an expert on computer network warfare at the Center for Strategic and International Studies, told the New York Times the Pentagon's computer networks were vulnerable to security gaps in the systems of allies with whom the military cooperates. America's allies are "all over the map" on cybersecurity issues, Lewis said. "Some are very, very capable and some are clueless."

Lynn said most of the major efforts to penetrate key military computer networks have made great by rival nations. "Military Power of the United States provides a strong deterrent against openly destructive attacks," he said. "Although attribution in cyberspace can be difficult, the risk of detection and response for a great nation still too large to launch devastating attacks against the risk the United States."

He warned that the technical competence has been migrating to the Internet harmful conduct raids to ensure smaller rogue states and nonstate actors, particularly terrorists.

If a terrorist organization receives "CyberTools or destructive, we assume they will have with some hesitation, strike," said Lynn.

The Democrat Congressman Jim Langevin, Co-founder of the Congressional Caucus cyber-security, told the Washington Post, the plan was a good start, but lacked the most important areas.

"What are red lines for acceptable actions in cyberspace?" Langevin asked. "If data theft or interference rise to the level of warfare, or do we need a physical event, such as seeing an attack on our power grid before we respond militarily?".

Lynn said the US-has not yet been taken by an act of cyber war and it was unclear to remain a deterrent, what would be one. But ultimately, he says, it would be the President and Congress to decide that the human and economic damage is severe enough to consider a cyber-event is an act of war.

Charles Arthur

guardian.co.uk ? Guardian News & Media Limited 2011 | Use of this content is subject to our Terms and Conditions | More Feeds


0 comments:

Blog Archive