Pentagon eyes change to cyber strategy
U.S. Department of Defense wants to go on the offensive after hackers unveiled 24 000 key files obtained in March
The Pentagon can chopped some of its weapons system to a foreign intelligence service systems at the enterprise level was 24 000 contractors and key files in March to redesign.
The incursion was one of the worst single incidents the US defence department has seen. Though it did not name the contractor nor the country suspected of carrying out the attack, Lockheed Martin said in May that it had come under attack. China and Russia have frequently been suspected of carrying out internet espionage, with China the most prominent in recent years.
U.S. defense chiefs now they think they need to become a means to respond to such assaults have. "We 're on a way to predict, is far too predictable," General James Cartwright, vice chairman of the Joint Chiefs of Staff, said on Thursday. "It 's purely defensive. There is no penalty for attacking us. We must find a way to change that." Hours later, Deputy Defense Secretary, William Lynn, a strategy whose thrust presented, he said , is defensive and focused on "deny the benefits of an attack".
Lynn showed that, in the course of your important files, including plans for missile-tracking systems, satellite navigation, reconnaissance drones and even fighter jets have been stolen from systems. "A big part of it relates to our most sensitive systems, including avionics, surveillance, satellite communications systems and network security protocols," he said.
Attacks on the defense in connection with contractors and systems are increasingly demanding. The hackers who broke into Lockheed Martin \ s security subsidiary RSA Security, the cryptographic features 's systems began with the systems of EMC \ raid' \ climb "key" and decrypt files used to access remote access personnel to acquire computers.
Cartwright said US military commanders were now devoting 90% of attention to building better firewalls and only 10% to ways of deterring hackers from attacking. He said a better strategy would be the reverse, focusing almost entirely on attack.
The defence department's new strategy relies on deploying sensors, software and code to detect and stop intrusions before they affect operations. "If an attack will not have its intended effect, those who wish us harm will have less reason to target us through cyberspace in the first place," Lynn said. "Current countermeasures have not stopped this outflow of sensitive information. We need to do more to guard our digital storehouses of design innovation."
Cartwright suggested that greater deterrence would be necessary. "We want to convince people of it offshore, if they attack, it \ won 't be free," he said, adding that opponents should know that the U.S. has "the skills and capacities to do something about it to do ".
James Lewis, an expert on computer network warfare at the Center for Strategic and International Studies, told the New York Times the Pentagon's computer networks were vulnerable to security gaps in the systems of allies with whom the military cooperates. America's allies are "all over the map" on cybersecurity issues, Lewis said. "Some are very, very capable and some are clueless."
Lynn said most of the major efforts to penetrate key military computer networks have made great by rival nations. "Military Power of the United States provides a strong deterrent against openly destructive attacks," he said. "Although attribution in cyberspace can be difficult, the risk of detection and response for a great nation still too large to launch devastating attacks against the risk the United States."
He warned that the technical competence has been migrating to the Internet harmful conduct raids to ensure smaller rogue states and nonstate actors, particularly terrorists.
If a terrorist organization receives "CyberTools or destructive, we assume they will have with some hesitation, strike," said Lynn.
The Democrat Congressman Jim Langevin, Co-founder of the Congressional Caucus cyber-security, told the Washington Post, the plan was a good start, but lacked the most important areas.
"What are red lines for acceptable actions in cyberspace?" Langevin asked. "If data theft or interference rise to the level of warfare, or do we need a physical event, such as seeing an attack on our power grid before we respond militarily?".
Lynn said the US-has not yet been taken by an act of cyber war and it was unclear to remain a deterrent, what would be one. But ultimately, he says, it would be the President and Congress to decide that the human and economic damage is severe enough to consider a cyber-event is an act of war.
- Hacking
- Data and Computer Security
- Internet
- Computing
- United States
- U.S. national security
Blog Archive
- 2013 (265)
- 2012 (367)
-
2011
(503)
- December(82)
- November(71)
- October(168)
- September(55)
- August(57)
-
July(53)
- Revealed: Facebook's iPad app
- Insert Coin: YouTurn accelerometer-based turn sign...
- Firefox 6 Final, Firefox 7 Beta and Firefox 8 Auro...
- Ace Combat 6: Fires of Liberation Hints III (Xbox ...
- Skyfire’s VideoQ standalone Flash video player for...
- Macs and McDonalds - A Match Made in Heaven
- The HTC Status/Salsa Facebook Phone Lands In China...
- Now That Sierra Leone Has Its Own Draconian Copyri...
- Scavenging ambient electromagnetic energy to power...
- Rotary Mechanical Smartphone combines vintage rota...
- 'Sensing skin' could detect cracks in concrete str...
- Researchers cut waste and lower cost of 'CIGS' sol...
- DSLR Solutions brings follow focus to film-makers ...
- TrackMeNot Firefox Add-on Keeps Search Engine Data...
- Indie Awesomeness: New Project from Super Meat Boy...
- AMP aims to bring high dynamic range to videographers
- P & W Rocketdyne aims to make concentrated solar p...
- Implant could wirelessly relay brain signals to pa...
- Tiny $14 Kilobots work by swarming together
- SBIRS GEO-1 Missile Warning Satellite Delivering U...
- DHS Requests $300 Million To Purchase Even More De...
- Download Firefox 6 Beta Refresh
- Pentagon eyes change to cyber strategy
- Switched On: Wanting webOS
- Kindle Spam Is A Filter Issue, Not A Spam Issue
- MSI Wind Top 2420 3D Review
- 16GB Xoom Drops To $499
- Firefox 6 Beta Is Here with Web Developer Tools an...
- Download Firefox 7 Aurora Now, Get Ready for Firef...
- Judge rules Samsung cannot view iPad 3 or iPhone 5...
- Browser Extension of the Week: Click&Clean
- Does Not Compute: 10 PC Myths from Movies and Tele...
- The Frankenhorn Flamebone Flamethrower Trombone
- 11 Tips for Going Viral
- Opera Joins Chrome and Firefox On The Rapid Releas...
- Air Conflicts: Secret Wars – review
- Opera 11.50 revs up performance, tones down its in...
- Opera 12 pre-alpha available now, just days after ...
- TSA Planning New, Even More Invasive Security Meas...
- iOS 5 Beta Reportedly Sets One Developer’s iPhone ...
- Adata Releases Industry's First Single DDR3L-1333 ...
- Six awesome slow-motion explosion videos
- BMW's Advanced Safety Concept: moving towards a sa...
- IM Showdown 2011: Four Chat Clients Face Off
- How to Keep Dogs Safe on the Fourth of July
- Construction of first-of-class Mobile Landing Plat...
- Download Mozilla Thunderbird 5.0 Beta 2, the Final...
- Baltimore IT guy sentenced for hacking boss’s Powe...
- Mozilla launches Firefox 5, adds Do Not Track to a...
- Monster Announces Washable iSport And True-To-The-...
- Google+ 'blocked in China'
- Asus Announces F1A75 Motherboard Series for Fusion...
- PCI Express Developing Blazing-Fast External Standard
- June(17)
- 2010 (2)
0 comments:
Post a Comment