Cyber Command: We Donít Wanna Defend the Internet (We Just Might Have To)
By Noah Shachtman | Wired.com
Members of the militaryís new Cyber Command insist that theyíve got no interest in taking over civilian Internet security Ė or even in becoming the Pentagonís primary information protectors. But the push to intertwine military and civilian network defenses is gaining momentum, nevertheless. At a gathering this week of top cybersecurity officials and defense contractors, the Pentagonís number two floated the idea that the Defense Department might start a protective program for civilian networks, based on a deeply controversial effort to keep hackers out of the governmentís pipes.
U.S. Cyber Command (ďCYBERCOMď) officially became operational this week, after years of preparation. But observers inside the military and out still arenít quite sure what the command is supposed to do: protect the Pentagonís networks, strike enemies with logic bombs, seal up civilian vulnerabilities, or some combination of all three.
To one senior CYBERCOM official, the answer is pretty simple: nothing new. Smaller military units within U.S. Strategic Command coordinated and set policies for the armed forcesí far-flung teams of network operators and defenders. Those coordinators and policy-makers have now been subsumed into CYBERCOM. Theyíll still do the same thing as before, only more efficiently. ďDoesnít expand any authorities. It doesnít have any new missions,Ē the official told Danger Room. ďIt really doesnít add any significant fundingÖ And really, itís not a significant increase in personnel; we just reorganized the personnel have we had in a smarter and more effective way.Ē
That may soon change, however. A 356-page classified plan outlining CYBERCOMís rise is being put into action. A team of about 560 troops, headquartered at Ft. Meade, Maryland, will eventually grow to 1093. Each of the four armed services are assembling their own cyber units out of former communications specialists, system administrators, network defenders, and military hackers. Those units Ė Marine Forces Cyber Command, the 24th Air Force, the 10th Fleet, and Army Forces Cyber Command Ė are then supposed to supply some of their troops to CYBERCOM as needed. Itís similar to how the Army and Marines provide Central Command with combat forces to fight the wars in Afghanistan and Iraq. Inside the military, thereís a sense that CYBERCOM may take on a momentum of its own, its missions growing more and more diverse.
Most importantly, perhaps, procedures are now being worked out for CYBERCOM to help the Department of Homeland Security defend government and civilian networks, much like the military contributed to disaster recovery efforts after Hurricane Katrina and the Gulf of Mexico oil spill.
In those incidents, it took days, even weeks for the military to fully swing into action. In the event of an information attack, those timelines could be drastically collapsed. ďThereís probably gonna be a very temporal element to it. Itís gonna need to be pretty quick,Ē the CYBERCOM official said.
Exactly what kind of event might trigger CYBERCOMís involvement isnít clear. ďFrom our perspective the threshold is really easy: itís when we get a request from DHS,Ē the official noted. ďWhatís their threshold? I couldnít tell you what their threshold is.Ē
The Pentagon might not even wait for an information disaster to move in. The National Security Agency is developing threat-monitoring systems for government networks dubbed Einstein 2 and Einstein 3. Deputy Secretary of Defense William Lynn believes those programs ought to extended to cover key private networks, as well.
ďWe are already using our technical capabilitiesÖ to protect government networks,Ē Lynn announced at the Strategic Command Cyber Symposium here. ďWe need to think imaginatively about how this technology can also help secure a space on the Internet for critical government and commercial applications.Ē
Einstein 2 is supposed to inspect data for threat signatures as it enters federal networks. Einstein 3 goes even further ó alerting DHS and the NSA before the attacks hit. ďYouíre starting to anticipate intrusions, anticipate threat signatures, and try and preventing things from getting to the firewalls rather than just stopping at the firewalls,Ē Lynn told Danger Room after his Cyber Symposium speech. (Full disclosure: I ran a panel at the event, and the military paid my travel costs.)
Given the NSAís history of domestic surveillance, civil liberties groups fear that the Einstein programs could become a new way to snoop on average Americansí communications. Lynn said not to worry: ďIndividual users who do not want to enroll could stay in the Ďwild, wild westí of the unprotected internet.Ē
ďI think itís gonna have to be voluntary,Ē he added. ďPeople could opt into protection Ė or choose to stay out. Individual users may well choose to stay out. But in terms of protecting the nationís security, itís not the individual users [that matter most]. I mean, they have to worry about their individual [data], their credit rating, and all that. But itís the vulnerability of certain critical infrastructure Ė power, transportation, finance. This starts to give you an angle at doing that.Ē
Privacy rights organizations and military insiders also wonder whether CYBERCOM is just another way to extend the NSAís reach. After all, both organizations are headquartered at Ft. Meade. And both are headed by Gen. Keith Alexander.
The CYBERCOM official swears that wonít happen. ďItís not NSA taking over military cyber,Ē he said. ďAnd itís not military cyber taking over NSA.Ē
Article from: wired.com
The Launching of U.S. Cyber Command - CYBERCOM (2009)
Code Cracked! Cyber Command Logo Mystery Solved
Report Reveals Cyberattacks on Oil Companies
Former US officials fend off simulated cyberattack
IMPACT, ITU calls for borderless effort on cybersecurity
US holds largest simulated cyber-attack exercise 
Could a Massive ďFalse-FlagĒ Cyberattack Be On The Horizon?
Russian hackers penetrate Pentagon computer system in cyber attack
Latest News from our Front Page
Better Identification of Viking Corpses Reveals: Half of the Warriors Were Female
Shieldmaidens are not a myth! A recent archaeological discovery has shattered the stereotype of exclusively male Viking warriors sailing out to war while their long-suffering wives wait at home with baby Vikings. (We knew it! We always knew it.) Plus, some other findings are challenging that whole ‚Äúrape and pillage‚ÄĚ thing, too.
Researchers at the University of Western Australia decided ...
Off Your Knees, Germany! Ernst Zundel 1983 - 2003
For more information on the holocaust, how the war was forced upon Germany, and the REAL victims of the second world war see:
IRS Drops Attack For Six Years ‚Äď No Evidence of Jurisdiction
A big congrats to a friend I‚Äôve been working with for several years, he stood up to the predators commonly called the ‚ÄúIRS‚ÄĚ and they dropped their attack. Thanks also for providing me with the proof below.
The criminals called the ‚ÄúIRS‚ÄĚ initiated an attack claiming my friend was required to file six tax returns, or explain how he made ...
Into Eternity - Finland's 100,000 Year Massive Underground Spent Nuclear Fuel Program
Into Eternity is a documentary about a deep geological repository for nuclear waste. The concept of long-term underground storage for radioactive waste has been explored since the 1950s. The inner part of the Russian doll-like storage canisters is to be composed of copper. Hence in the case of Onkalo it is tightly linked to experiments on copper corrosion in running ...
SPLC Accuses Oath Keepers of Inciting ‚ÄúArmed Confrontation‚ÄĚ Over Sugar Pine Mine
The Southern Poverty Law Center has accused Oath Keepers of inciting an armed confrontation with BLM authorities over the Sugar Pine Mine dispute in Oregon, despite the fact that the organization has explicitly stated that it is not promoting armed confrontation with the feds.
In an article provocatively posted on the organization‚Äôs ‚ÄėHatewatch‚Äô section entitled Oath Keepers Descend Upon Oregon with ...
|More News » |