We are looking for Europeans of different nationalities that can speak about the refugee invasion in your country and how this REALLY is affecting you. Are you in Hungary, Greece, Germany, France, Italy, Austria or another country being heavily invaded? Please reach out: views@redicecreations.com or @rediceradio We want to speak with you!

Cyber Command: We Don’t Wanna Defend the Internet (We Just Might Have To)
2010-07-09 0:00

By Noah Shachtman | Wired.com

Members of the military’s new Cyber Command insist that they’ve got no interest in taking over civilian Internet security – or even in becoming the Pentagon’s primary information protectors. But the push to intertwine military and civilian network defenses is gaining momentum, nevertheless. At a gathering this week of top cybersecurity officials and defense contractors, the Pentagon’s number two floated the idea that the Defense Department might start a protective program for civilian networks, based on a deeply controversial effort to keep hackers out of the government’s pipes.

U.S. Cyber Command (“CYBERCOM“) officially became operational this week, after years of preparation. But observers inside the military and out still aren’t quite sure what the command is supposed to do: protect the Pentagon’s networks, strike enemies with logic bombs, seal up civilian vulnerabilities, or some combination of all three.

To one senior CYBERCOM official, the answer is pretty simple: nothing new. Smaller military units within U.S. Strategic Command coordinated and set policies for the armed forces’ far-flung teams of network operators and defenders. Those coordinators and policy-makers have now been subsumed into CYBERCOM. They’ll still do the same thing as before, only more efficiently. “Doesn’t expand any authorities. It doesn’t have any new missions,” the official told Danger Room. “It really doesn’t add any significant funding… And really, it’s not a significant increase in personnel; we just reorganized the personnel have we had in a smarter and more effective way.”

That may soon change, however. A 356-page classified plan outlining CYBERCOM’s rise is being put into action. A team of about 560 troops, headquartered at Ft. Meade, Maryland, will eventually grow to 1093. Each of the four armed services are assembling their own cyber units out of former communications specialists, system administrators, network defenders, and military hackers. Those units – Marine Forces Cyber Command, the 24th Air Force, the 10th Fleet, and Army Forces Cyber Command – are then supposed to supply some of their troops to CYBERCOM as needed. It’s similar to how the Army and Marines provide Central Command with combat forces to fight the wars in Afghanistan and Iraq. Inside the military, there’s a sense that CYBERCOM may take on a momentum of its own, its missions growing more and more diverse.

Most importantly, perhaps, procedures are now being worked out for CYBERCOM to help the Department of Homeland Security defend government and civilian networks, much like the military contributed to disaster recovery efforts after Hurricane Katrina and the Gulf of Mexico oil spill.

In those incidents, it took days, even weeks for the military to fully swing into action. In the event of an information attack, those timelines could be drastically collapsed. “There’s probably gonna be a very temporal element to it. It’s gonna need to be pretty quick,” the CYBERCOM official said.

Exactly what kind of event might trigger CYBERCOM’s involvement isn’t clear. “From our perspective the threshold is really easy: it’s when we get a request from DHS,” the official noted. “What’s their threshold? I couldn’t tell you what their threshold is.”

The Pentagon might not even wait for an information disaster to move in. The National Security Agency is developing threat-monitoring systems for government networks dubbed Einstein 2 and Einstein 3. Deputy Secretary of Defense William Lynn believes those programs ought to extended to cover key private networks, as well.

“We are already using our technical capabilities… to protect government networks,” Lynn announced at the Strategic Command Cyber Symposium here. “We need to think imaginatively about how this technology can also help secure a space on the Internet for critical government and commercial applications.”

Einstein 2 is supposed to inspect data for threat signatures as it enters federal networks. Einstein 3 goes even further — alerting DHS and the NSA before the attacks hit. “You’re starting to anticipate intrusions, anticipate threat signatures, and try and preventing things from getting to the firewalls rather than just stopping at the firewalls,” Lynn told Danger Room after his Cyber Symposium speech. (Full disclosure: I ran a panel at the event, and the military paid my travel costs.)

Given the NSA’s history of domestic surveillance, civil liberties groups fear that the Einstein programs could become a new way to snoop on average Americans’ communications. Lynn said not to worry: “Individual users who do not want to enroll could stay in the ‘wild, wild west’ of the unprotected internet.”

“I think it’s gonna have to be voluntary,” he added. “People could opt into protection – or choose to stay out. Individual users may well choose to stay out. But in terms of protecting the nation’s security, it’s not the individual users [that matter most]. I mean, they have to worry about their individual [data], their credit rating, and all that. But it’s the vulnerability of certain critical infrastructure – power, transportation, finance. This starts to give you an angle at doing that.”

Privacy rights organizations and military insiders also wonder whether CYBERCOM is just another way to extend the NSA’s reach. After all, both organizations are headquartered at Ft. Meade. And both are headed by Gen. Keith Alexander.

The CYBERCOM official swears that won’t happen. “It’s not NSA taking over military cyber,” he said. “And it’s not military cyber taking over NSA.”

Article from: wired.com

Related Articles
The Launching of U.S. Cyber Command - CYBERCOM (2009)
Code Cracked! Cyber Command Logo Mystery Solved
Report Reveals Cyberattacks on Oil Companies
Former US officials fend off simulated cyberattack
IMPACT, ITU calls for borderless effort on cybersecurity
US holds largest simulated cyber-attack exercise [2008]
Could a Massive “False-Flag” Cyberattack Be On The Horizon?
Russian hackers penetrate Pentagon computer system in cyber attack

Latest News from our Front Page

German Schoolchildren will Cook and Clean for “Refugees” as Part of Work Experience
2015-10-13 0:44
Schoolchildren from an undisclosed school in the city of Lübeck, Schleswig-Holstein, will spend a week doing housework for so-called “refugees”. Unknown Object. The idea was sold to parents at a parents’ meeting as a “practical internship“, but has sparked outrage online. A letter to the parents said their children will be going to “refugee” accommodations and will be making beds, sorting clothes, and ...
MTV: Saying "No Can Do" Or "Long Time No See" Is Racist
2015-10-12 23:04
Harmless terms have offensive origins, asserts Franchesca Ramsey According to MTV News, using the phrases “long time no see,” “peanut gallery” and “no can do” is offensive because the terms have “racist beginnings.” Host Franchesca Ramsey begins by claiming that the term “peanut gallery” is offensive because it was once the place where black people were “forced” to sit at the theater ...
Migrants Dump Garbage from Their Balconies at German Asylum Center
2015-10-12 23:35
German authorities expect up to 1.5 million asylum seekers to arrive in Germany this year – up from 750,000 last month. So they can expect more of this– Migrants Dump Garbage from their Balconies : Augsburg Asylum Center, Germany In a recent poll, the number of “frightened” Germans jumped from 38% to 51% in three weeks. Muslim Statistics reported, via Religion of Peace: The latest ...
US Paradrops 50 Tons Of Ammo To Syrian Rebels
2015-10-12 22:32
As we noted over the weekend, the US has now thrown in the towel on the ill-fated (and that’s putting it lightly) strategy of training Syrian fighters and sending them into battle only to be captured and killed by other Syrian fighters who the US also trained.  The Pentagon’s effort to recruit 5,400 properly “vetted” anti-ISIS rebels by the end of ...
Migrant Crisis stand-up routine - Sam Hyde
2015-10-10 18:07
YouTube description: "Migrant" "Crisis" AKA Muslim Road Trip. Hundreds of thousands of astronauts, doctors, sciencemen, and peaceful clock inventors descend upon the countries with the most collective guilt and free stuff. This was pretty good man... I wasn't expecting this reaction from the same Boston college audience who so thoroughly disapproved of my 'Mike Brown' routine. I think the invasion of ...
More News »