Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking

    U.S. Military Expanding Arsenal of Cyber-Warfare Capabilities

    Written by

    Fahmida Y. Rashid
    Published June 23, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The federal government is increasingly using cyber-tactics to defend its IT assets against attackers and to protect its interests. It’s about time, since enemies are already relying on an extensive arsenal of cyber-weapons, experts said.

      President Obama has signed executive orders outlining how far the United States military can go when launching cyber-attacks and other cyber-operations against enemies and as part of routine espionage activities, the Associated Press reported June 22.

      The orders, which were signed more than a month ago and cap a two-year Pentagon effort to draft rules for the U.S. military, detail when the military needs to seek presidential approval for a specific cyber-assault and how the Department of Defense will integrate cyber-capabilities into military strategy, defense officials said.

      The strategy document outlines some of the approved activities, such as planting a computer virus on adversaries’ computers to launching attacks that bring down a target electrical grid or defense network. When under attack, the United States can defend itself by blocking cyber-intrusions and taking down servers in another country. And similar to a missile attack, the military can pursue attackers across national boundaries, the AP reported.

      “We must have the capability to defend against the full range of cyber-attacks,” Deputy Defense Secretary William Lynn said. Terror groups will eventually learn how to launch crippling cyber-attacks, so the United States needs to be more aggressive in offensive and defensive countermeasures, he said.

      Many of the attacks on American businesses, critical infrastructure and defense systems are a “direct challenge” to our military superiority, Charles Dodd, a government consultant for cyber-defense and an adviser to the House of Representatives Homeland Security Subcommittee on Emerging Threats, Cybersecurity, Science and Technology, told eWEEK. State-sponsored attacks are going after military secrets without any fear of retaliation, he said.

      Cyber-attacks aren’t always “money-making,” but often a military tool, according to Dodd, noting that China built its networks with a tactical mindset. “It’s only a matter of time before the attackers take any of this to the next level,” Dodd said, noting that cyber-attacks are expected to escalate into much more serious threats.

      The Department of Defense and other federal agencies are preparing to meet the threat. In the “International Strategy for Cyber-Space” policy document released mid-May, the White House said the United States would respond to “hostile acts in cyberspace” in the same manner as any other threat against the country.

      Viruses, IT Sabotage Now Sanctioned Cyber-Weapons

      “We reserve the right to use all necessary means-diplomatic, informational, military, and economic-as appropriate and consistent with applicable international law, in order to defend our Nation, our allies, our partners, and our interests,” the policy said. Military force would be used only after all other options have been exhausted.

      The Pentagon has also developed a list of cyber-weapons and tools, including viruses that can sabotage foreign critical infrastructure, that the United States can use “to deter or deny a potential adversary the ability to use its computer systems,” an anonymous official recently told the Washington Post.

      The techniques to launch a cyber-attack are similar to those of any other military operation, according to Dodd. Extensive reconnaissance, surveillance and research are required before launching a cyber-attack, he said. The executive orders apparently allow the military to transmit code to another country’s network to test the route and make sure connections work, much like using satellites to take pictures of a location to scout out specific sites.

      Elsewhere on Capitol Hill, government officials have been discussing how to protect critical infrastructure. The federal government is considering creating a separate Internet domain for private-sector critical infrastructure, one that would be subject to monitoring by the government for cyber-threats, Ari Schwartz, Internet policy adviser at the National Institute of Standards and Technology, said before a panel of the Senate Judiciary Crime and Terrorism subcommittee on June 21.

      The panel’s chairman, Sen. Sheldon Whitehouse, D-R.I., has long supported the creation of a .secure domain, arguing that the government would be able to closely monitor Internet traffic without violating the Fourth Amendment. “You just say, ‘OK, look, if you want to go look at these electrical grid things, you’ve got to be aware that the government is going to be keeping an eye of what’s going in and out of there to protect the electrical grid.’ I don’t think people mind that,” Whitehouse said.

      Attackers can easily “prove a point” by taking out critical infrastructure, Dodd said.

      Whitehouse also said publicly traded companies should be required to disclose their cyber-security risks in Securities and Exchange Commission filings. There is no point in promoting cyber-security awareness if actual attacks are classified if they hit .gov and .mil domains and are treated as proprietary information when businesses are hit so as not to alarm customers, Whitehouse said, calling it a “real information deficit.”

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×