Defense

March 27, 2012

DOD needs industry’s help to catch cyber attacks

The Defense Department needs private-sector cooperation in reporting computer network attacks in real time to stop what has been the “greatest transfer of wealth in history” that U.S. companies lose to foreign hackers, the head of U.S. Cyber Command told a Senate committee March 27.

Army Gen. Keith B. Alexander, who also is the National Security Agency director, told the Senate Armed Services Committee that he supports legislation that would require private companies to report attacks, and added that such reporting needs to happen before an attack is complete.

“We need to see the attack,” he said. “If we can’t see the attack, we can’t stop it. We have to have the ability to work with industry – our partners – so that when they are attacked, they can share that with us immediately.”

Many cyber defense bills have stalled in Congress over concerns about privacy, over regulation and the military’s role in cyber protection, Alexander and the senators noted.

The general compared the current situation, where DOD computers receive some 6 million threatening probes each day, to a missile being fired into U.S. airspace with no radars to see it. “Today, we’re in the forensics mode,” he said. “When an attack occurs, we’re told about it after the fact.”

Alexander added, though, that industry should be monitoring their own systems with help from Cyber Command and the Department of Homeland Security. “I do not believe we want the NSA or Cyber Command or the military in our networks, watching it,” he said.

Alexander explained the federal partnership of U.S. cyber security as one in which Homeland Security leads in creating the infrastructure to protect U.S. interests, Cyber Command defends against attacks, FBI conducts criminal investigations, and the intelligence community gathers overseas information that could indicate attacks.

“Cyber is a team sport,” he said. “It is increasingly critical to our national and economic security. … The theft of intellectual property is astounding.”

The Defense Department’s request of $3.4 billion for Cyber Command in fiscal 2013 is one of the few areas of growth in the DOD budget, senators noted. The command has made progress toward its goals of making cyber space safer, maintaining freedom of movement there, and defending the vital interests of the United States and its allies, Alexander said. The command also is working toward paring down the department’s 15,000 separate networks, he said.

Cyber threats from nations – with the most originating in China – and non-state actors is growing, Alexander said.

“It is increasingly likely, as we move forward, that any attack on the U.S. will include a cyber attack,” he said. “These are threats the nation cannot ignore. What we see … underscores the imperative to act now.”




All of this week's top headlines to your email every Friday.


 
 

 
Untitled-2

Tactical reconnaissance vehicle project eyes hoverbike for defense

The U.S. Army Research Laboratory, or ARL, has been exploring the tactical reconnaissance vehicle, or TRV, concept for nearly nine months and is evaluating the hoverbike technology as a way to get Soldiers away from ground thre...
 
 
Air Force photograph by SSgt. William Banton

Upgraded AWACS platform tested at Northern Edge

Air Force photograph by SSgt. William Banton Maintenance crew members prepare an E-3G Sentry (AWACS) for takeoff during exercise Northern Edge June 25, 2015. Roughly 6,000 airmen, soldiers, sailors, Marines and Coast Guardsmen ...
 
 
Air Force photograph by SSgt. Marleah Robertson

First Marine graduates Air Force’s F-35 intelligence course

Air Force photograph by SSgt. Marleah Robertson Marine Corps 1st Lt. Samuel Winsted, an F-35B Lightning II intelligence officer, provides a mock intelligence briefing to two instructors during the F-35 Intelligence Formal Train...
 

 
Air Force photograph by SrA. James Richardson

5,000 days of war

Air Force photograph by SrA. James Richardson Airmen from the 17th Special Tactics Squadron out of Fort Benning, Ga., control airspace operations during exercise Jaded Thunder Oct. 29, 2014, in Salina, Kansas. Joint special ope...
 
 
Huntington Ingalls photograph

Navy’s new aircraft launch system tested on future carrier CVN 78

Huntington Ingalls photograph Aboard the aircraft carrier Pre-Commissioning Unit Gerald R. Ford (CVN 78), Susan Ford Bales, the ship’s sponsor and daughter of the late President Ford for whom the ship is named, rejoices i...
 
 
Navy photograph by JO2 John Hetherington

Prowler retires following 45 years of naval service

Navy photograph by PO3 Brian Stephens An EA-6B Prowler assigned to the Garudas of Electronic Attack Squadron (VAQ) 134 lands on the flight deck of the aircraft carrier USS George H.W. Bush (CVN 77). George H.W. Bush is supporti...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>