[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

"Pete Rose, 'Shoeless' Joe Reinstated by MLB, Eligible for HOF"

"'Major Breakthrough': Here Are the Details on the China Trade Deal"

Freepers Still Love war

Parody ... Jump / Trump --- van Halen jump

"The Democrat Meltdown Continues"

"Yes, We Need Deportations Without Due Process"

"Trump's Tariff Play Smart, Strategic, Working"

"Leftists Make Desperate Attempt to Discredit Photo of Abrego Garcia's MS-13 Tattoos. Here Are Receipts"

"Trump Administration Freezes $2 Billion After Harvard Refuses to Meet Demands"on After Harvard Refuses to Meet Demands

"Doctors Committing Insurance Fraud to Conceal Trans Procedures, Texas Children’s Whistleblower Testifies"

"Left Using '8647' Symbol for Violence Against Trump, Musk"

KawasakiÂ’s new rideable robohorse is straight out of a sci-fi novel

"Trade should work for America, not rule it"

"The Stakes Couldn’t Be Higher in Wisconsin’s Supreme Court Race – What’s at Risk for the GOP"

"How Trump caught big-government fans in their own trap"

‘Are You Prepared for Violence?’

Greek Orthodox Archbishop gives President Trump a Cross, tells him "Make America Invincible"

"Trump signs executive order eliminating the Department of Education!!!"

"If AOC Is the Democratic Future, the Party Is Even Worse Off Than We Think"

"Ending EPA Overreach"

Closest Look Ever at How Pyramids Were Built

Moment the SpaceX crew Meets Stranded ISS Crew

The Exodus Pharaoh EXPLAINED!

Did the Israelites Really Cross the Red Sea? Stunning Evidence of the Location of Red Sea Crossing!

Are we experiencing a Triumph of Orthodoxy?

Judge Napolitano with Konstantin Malofeev (Moscow, Russia)

"Trump Administration Cancels Most USAID Programs, Folds Others into State Department"

Introducing Manus: The General AI Agent

"Chinese Spies in Our Military? Straight to Jail"

Any suggestion that the USA and NATO are "Helping" or have ever helped Ukraine needs to be shot down instantly

"Real problem with the Palestinians: Nobody wants them"

ACDC & The Rolling Stones - Rock Me Baby

Magnus Carlsen gives a London System lesson!

"The Democrats Are Suffering Through a Drought of Generational Talent"

7 Tactics Of The Enemy To Weaken Your Faith

Strange And Biblical Events Are Happening

Every year ... BusiesT casino gambling day -- in Las Vegas

Trump’s DOGE Plan Is Legally Untouchable—Elon Musk Holds the Scalpel

Palestinians: What do you think of the Trump plan for Gaza?

What Happens Inside Gaza’s Secret Tunnels? | Unpacked

Hamas Torture Bodycam Footage: "These Monsters Filmed it All" | IDF Warfighter Doron Keidar, Ep. 225

EXPOSED: The Dark Truth About the Hostages in Gaza

New Task Force Ready To Expose Dark Secrets

Egypt Amasses Forces on Israel’s Southern Border | World War 3 About to Start?

"Trump wants to dismantle the Education Department. Here’s how it would work"

test

"Federal Workers Concerned That Returning To Office Will Interfere With Them Not Working"

"Yes, the Democrats Have a Governing Problem – They Blame America First, Then Govern Accordingly"

"Trump and His New Frenemies, Abroad and at Home"

"The Left’s Sin Is of Omission and Lost Opportunity"


Status: Not Logged In; Sign In

Corrupt Government
See other Corrupt Government Articles

Title: Pentagon may apply preemptive warfare policy to the Internet
Source: [None]
URL Source: http://www.rawstory.com/rs/2010/082 ... tive-warfare-tactics-internet/
Published: Sep 1, 2010
Author: Stephen C. Webster
Post Date: 2010-09-01 10:05:44 by Capitalist Eric
Keywords: None
Views: 275

Grappling with matters of law and policy governing the United States military's cyber-warfare capabilities, Pentagon planners are eying ways of making preemptive strikes across the Internet part of America's toolbox.

In a piece for Foreign Affairs, the publication of globalist policy group The Council on Foreign Relations, Deputy Secretary of Defense William J. Lynn III paints a picture of dire threat to American infrastructure, disclosing for the first time details of a devastating cyber-attack on U.S. infrastructure.

While not giving many specifics, Lynn described how malicious code on a USB thumb drive managed to spread across the Department of Defense network, establishing a "digital beachhead" that could siphon key data.

"It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary," he wrote. "This previously classified incident was the most significant breach of U.S. military computers ever, and it served as an important wake-up call. The Pentagon's operation to counter the attack, known as Operation Buckshot Yankee, marked a turning point in U.S. cyberdefense strategy."

However, "Operation Buchshot Yankee," commenced in 2008 and lasting some 14 months, saw the Department of Defense scramble over what was essentially a very minor security threat that caught their network experts completely by surprise.

The Defense Department quickly issues an outright ban on the use of flash drives. The file which infected Pentagon computers was actually quite common -- a derivative of the "SillyFDC" worm, according to Wired, which is listed by anti-virus software developer Symantec as a lowest tier threat. Users who wanted to remove the threat could have simply scanned their drives for the file "Agent.btz," which was at the source of the Pentagon's dilemma.

Naturally, the operation to eradicate the worm was kept secret, requiring a much larger effort on part of a smaller group.

Wired continued:

The havoc caused by agent.btz has little to do with the worm’s complexity or maliciousness — and everything to do with the military’s inability to cope with even a minor threat. “Exactly how much information was grabbed, whether it got out, and who got it — that was all unclear,” says an officer who participated in the operation. “The scary part was how fast it spread, and how hard it was to respond.”

U.S. Strategic Command, which is supposed to play a key role in military network defense, couldn’t get simple answers about the number of infected computers — or the number of computers, period.

“We got into Buckshot Yankee and I asked simple questions like how many computers do we have on the network in various flavors, what’s their configuration, and I couldn’t get an answer in over a month,” U.S. Strategic Command chief Gen. Kevin Chilton told a conference last May.

All of which, Lynn wrote in Foreign Affairs, led to the creation of the U.S. Cyber Command and the beginning of rules governing the military's conduct of online warfare.

The Washington Post, in a Saturday report on the development of rules to govern cyber-warfare, added:

"We have to have offensive capabilities, to, in real time, shut down somebody trying to attack us," Gen. Keith Alexander, the head of the Pentagon's new Cyber Command, told an audience in Tampa this month.

[...]

Military officials have declared that cyberspace is the fifth domain - along with land, air, sea and space - and is crucial to battlefield success.

"We need to be able to protect our networks," Lynn said in a May interview. "And we need to be able to retain our freedom of movement on the worldwide networks."

That line of thinking has led Pentagon planners to weigh weather or not the United States can legally reach across the Internet to attack "adversary information systems," according to Defense Dept. documents examined by the Post. The capabilities being sought would allow U.S. cyber-warriors to "deceive, deny, disrupt, degrade and destroy" information and computers around the globe.

While it is legal for the Pentagon to block malicious software on the edges of its networks, preemptive strikes on systems thought to be in the employ of those who would harm America or its interests are still a gray area and could be subject to international escalation, should the U.S. take an overtly offensive stance.

"We are having a big debate about what constitutes the use of force or an armed attack in cyberspace," said Herbert S. Lin, a cyber expert who spoke to the Post. "We need to know where those lines are so that we don't cross them ourselves when we conduct offensive actions in cyberspace against other nations."

The U.S. Cyber Command, comprised of 1,000 hackers and spies, will assume command on Oct. 1, led by NSA director General Keith Alexander. The group's creation was announced in 2009, with the full support of President Obama.

Civil liberties’ activists have warned against allowing the secretive NSA to take the lead in overseeing cyber security, saying it would place too much power in one agency with the NSA policing the same networks that it exploits to carry out eavesdropping.

In unveiling his plans to create a new White House post to oversee cyber security, Obama promised privacy rights would be carefully safeguarded even as the government moves to step up efforts to protect sensitive civilian and military networks.

There have been reported breaches of the US electricity grid and the F-35 fighter jet program, and Obama mentioned a cyber attack — blamed by some accounts on foreign spy services — on the computer hub for his own 2008 presidential campaign.

Audio of a round-table interview with Deputy Defense Secretary Lynn on U.S. cyber-security is available online [mp3 link].

With AFP.

Served from: www.rawstory.com @ 2010-09-01 13:09:30 --> (1 image)

Post Comment   Private Reply   Ignore Thread  


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com