U.S. Military Wants To Exert Influence Over Private Cyber Infrastructure

Let's not forget that "cyber" comes from the Greek word "cybernisis" meaning "government"

The U.S. military wants to exert more influence over the protection of power grids, transportation networks and financial network systems, a Pentagon official says in a broad-ranging essay published in Foreign Affairs. In cyberwar, who's in charge?

To do so the Pentagon is urging that its defense expertise be put in play beyond the .mil domain to include .gov and .com and wants policy makers to figure out how best to do that.

The reasons are that the military relies on these networks to deal with suppliers and that these networks could become military targets, says William J. Lynn III, undersecretary of defense, in the essay called "Defending a New Domain."

"Protecting those networks and the networks that undergird critical U.S. infrastructure must be part of Washington's national security and homeland defense missions," Lynn says.

Because the military relies on these networks, the expertise it has developed should be made available to them, he says, but he doesn't describe exactly how that would happen in practice.

"The best-laid plans for defending military networks will matter little if civilian infrastructure -- which could be directly targeted in a military conflict or held hostage and used as a bargaining chip against the U.S. government -- is not secure," he says. "The Defense Department depends on the overall information technology infrastructure of the United States... The Pentagon is therefore working with the Department of Homeland Security and the private sector to look for innovative ways to use the military's cyberdefense capabilities to
protect the defense industry."

Some of these defenses are being developed by the National Security Agency and include blending U.S. intelligence capabilities with network security so that networks can react to threats detected by other means than network intrusion-detection tools.

"The National Security Agency has pioneered systems that, using warnings provided by U.S. intelligence capabilities, automatically deploy defenses to counter intrusions in real time," Lynn says.

"They work by placing scanning technology at the interface of military networks and the open Internet to detect and stop malicious code before it passes into military networks."

The Pentagon is also relying on Defense Advanced Research Projects Agency (DARPA) to come up with ways to blunt the capabilities of intruders. DARPA is trying to figure out a new basic design for Pentagon networks that would result in a generation-long overhaul to make hardware, software and computer languages less susceptible to cyber attack, he says.

Gaining the authority to impose military security on civilian assets is still in its infancy. "The U.S. government has only just begun to broach the larger question of whether it is necessary and appropriate to use national resources, such as the defenses that now guard military networks, to protect civilian infrastructure," Lynn says.

"Information networks connect a variety of institutions, so the effort to defend the United States will only succeed if it is coordinated across the government, with allies, and with partners in the commercial sector."

Read more about wide area network in Network World's Wide Area Network section.

Original story: NetWorkWorld.com

Views: 83

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted a blog post

Our Crazy Modern World

I'll be your host tonight in our first episode of "Our Crazy Modern World". Join us now!Apparently…See More
1 hour ago
Burbia commented on cheeki kea's blog post BREAKING: The Epstein Files Illuminate a 20-Year Architecture Behind Pandemics as a Business Model.
"What a bummer. Can't tell thie 'dead' guy to eat shit now."
yesterday
Burbia commented on rlionhearted_3's photo
Thumbnail

2DF36465-A826-443C-A3A8-6638BC1D4FFA

"Venezuela under Chavez had cut ties with the IMF and World Bank. He had suggested that the US had…"
yesterday
Burbia commented on Doc Vega's photo
Thumbnail

G_LrzqtXMAAhT7w

"Derelict of duty should be reason for removal of these judges. That would go against what is in…"
yesterday
Doc Vega posted blog posts
Friday
tjdavis favorited Parrhesia's video
Thursday
tjdavis favorited UnitedWeStand's video
Thursday
tjdavis favorited Sandy's video
Thursday
tjdavis posted a photo
Thursday
Doc Vega commented on rlionhearted_3's photo
Thumbnail

2DF36465-A826-443C-A3A8-6638BC1D4FFA

"You can't subvert a nation that has already been subverted by Marxists and drug cartles who…"
Wednesday
Doc Vega commented on rlionhearted_3's photo
Thumbnail

2DF36465-A826-443C-A3A8-6638BC1D4FFA

"Venezuela was once a thriving nation until the left and Communism infiltrated the government, and…"
Wednesday
tjdavis posted a photo
Wednesday
tjdavis posted a video

Jacob Collier Improvises With Orchestra (Live in San Francisco)

A few months ago, I had the joy of performing with the world's first Audience Symphony Orchestra in San Francisco, a gathering of fans from all over North Am...
Wednesday
Doc Vega posted blog posts
Tuesday
Роман posted a blog post

Архітектура для мегаполісів: виклики та рішення урбаністики

Сучасні мегаполіси — це складні живі організми, де переплітаються економіка, культура, технології…See More
Feb 9
Tori Kovach posted a discussion

Pumpkin Face

Is he dead yet?See More
Feb 8
cheeki kea posted a blog post
Feb 8
cheeki kea commented on Sandy's photo
Thumbnail

FB_IMG_1770501160448

"Thumbs up find. So what ever do we have here then? Revolving doors of corruption and deceit that…"
Feb 8
cheeki kea left a comment for Роман
"Greetings and well wishes to you POMaH, great that you've joined us all here at the site. May…"
Feb 8
Sandy posted photos
Feb 8

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted