. Military Space News .
CYBER WARS
FBI chief sees better cyber cooperation from China
by Staff Writers
Washington (AFP) April 26, 2016


US military conducts cyber attacks on IS
Washington (AFP) April 26, 2016 - The US military is now conducting cyber attacks on the Islamic State group, a general said Tuesday as the Pentagon looks to accelerate the fight against the jihadists.

A US-led coalition has been striking IS fighters in Iraq and Syria since August 2014, and officials have long stated the importance of using cyber techniques such as overloading IS networks to limit the group's communications and ability to reach potential new recruits.

"We have now begun to use our exquisite cyber capabilities in this fight against Daesh," Baghdad-based Major General Peter Gersten told Pentagon reporters, using an acronym that comes from the group's name in Arabic.

He did not elaborate except to say the effort is "highly coordinated" and has been "very effective."

In February, Defense Secretary Ashton Carter and the US military's top officer, General Joe Dunford, said the United States was determined to "accelerate" the anti-IS campaign, and indicated cyber warfare would play an increasingly important role in doing so.

Earlier this month, Deputy Secretary of Defense Robert Work said: "We are dropping cyberbombs" on the IS group.

The New York Times published a story Sunday saying the US Cyber Command had placed "implants" in IS networks that let experts monitor the group's behavior and ultimately imitate or alter commanders' messages so they unwittingly direct fighters to areas likely to be hit by drone or plane strikes.

The US Cyber Command is charged with protecting America's military and some civilian networks from attacks, as well as deploying its own offensive cyber strategies if needed.

By 2018, it will have more than 6,000 military and civilian technical experts working across 133 teams.

One such team, comprising about 65 people, today works in the Middle East and carries out cyber operations against IS networks.

Admiral Michael Rogers, head of both Cyber Command and the National Security Agency, declined to provide any additional information Tuesday.

"We have publicly acknowledged that we are using cyber as another tool against ISIL," Rogers said at a Georgetown University cybersecurity conference, using an acronym for the IS group.

"I want them to be aware: We are going to contest you on the kinetic battlefield, we are going to contest you with information dynamics, we are committed to this fight," he added.

FBI Director James Comey said Tuesday he has seen some improvement in cooperation from China in fighting cybercrime following last year's bilateral agreement on the issue.

Chinese authorities "seem to have an agreed upon framework for what is nation-state action appropriate, that is intelligence collection, and what is theft," Comey told a cybersecurity event in Washington, when asked about international cooperation on cybercrime.

"There are signs of progress in the Chinese helping us impose costs on active engagement and theft. I'm reasonably optimistic (about China), less so with Russia."

Comey's comments were far more upbeat than those from National Security Agency chief Michael Rogers earlier this month on the implementation of last year's accord between President Barack Obama and his Chinese counterpart Xi Jinping.

The two leaders agreed on principles aimed at stemming what has been seen as a wave of hacking directed against US companies and organizations.

Rogers told Congress earlier this month that Chinese hackers remain "engaged in activity directed against US companies" and that the "jury is still out" on whether China indeed passes intel to the business world.

Comey, speaking at the Georgetown International Conference on Cyber Engagement, said the FBI was ramping up its ability to combat hacking and cybercrime.

"We think we have to be more predictive and less reactive," he said.

Part of this strategy, he said involves "naming people and shaming them" to demonstrate costs of hacking into US computer systems.

The FBI, he said, wants to "make people feel our breath on the back of their neck --- physically ideally, but metaphorically" to deter hacking.

- Talking encryption 'costs' -

Comey also reiterated concerns about the impact of strong encryption in the wake of the legal battle over access to the iPhone used by a California attacker.

"I'm very glad that the litigation between the FBI and Apple on San Bernardino has ended, because it really was about getting access to that phone," Comey said, referring to the court case in which the FBI sought to compel Apple to help unlock the phone used by one of the shooters in last year's deadly attack.

But Comey said it was still important to have a discussion on the topic because "there is a collision going on between values of all shades between privacy and security."

Comey said encryption and privacy are important but "there has never been a time in the 240 years of our country when privacy has been absolute."

He added that he is concerned that defenders of strong encryption, which allows only the users to access data, have failed to consider all the implications.

"We are moving to a place in American life, because we live our lives on these devices, (where they) will be immune to the judicial process," he said.

"My only request is that we talk about the costs ... We should not drift to a place where wide swaths of American life become off limits to the judicial process without a serious, adult conversation."

Comey had previously expressed concerns about "warrant-proof" spaces that allow criminals to evade detection as he debated Apple and its backers. Apple argued that enabling access would weaken security for all iPhone users and open doors for hackers and others.

The government ended its request after finding a way to access the phone with the help of a third party.

Comey said the FBI has not yet decided whether to tell Apple about how it accessed the data.

Some activists have said the FBI should tell Apple under a US policy aimed at helping tech companies plug security vulnerabilities.

Comey said that "we are in the process of sorting it out, we are close to a resolution but I'm not ready to make news on this."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
FBI paid over $1 mn for iPhone hack
Washington (AFP) April 21, 2016
The Federal Bureau of Investigation paid hackers more than $1 million to break into the iPhone used by one of the San Bernardino attackers, director James Comey said Thursday. Asked at the Aspen Security Forum in London how much the US agency paid for help to get into the phone, Comey replied, "A lot." "More than I will make in the remainder of this job, which is seven years and four mon ... read more


CYBER WARS
Planned US Missile Defense Units in Asia-Pacific Threaten China, Russia

Lockheed Martin tests Aegis on Australian destroyer

S. Korea, US open missile shield talks

Israeli Air Force deploying 'David's Sling' missile defense system

CYBER WARS
China defends right to carry out 'normal' missile tests

U.S. Air Force orders 100 more JASSM-ER missiles

Russian Tornado-S rocket systems delivers powerful blow

Russia successfully fires cruise missile from Iskander missile launcher

CYBER WARS
Dutch students open world's first pop-up drone cafe

China exported military drones to 10 nations: report

Drone command center set up on U.S. aircraft carrier

XFLY introduces an intelligent flight control navigator

CYBER WARS
Haigh-Farr showcases Antenna Solutions at DATT Summit

U.S. Army orders radios for Mid-East, African countries

Harris supplies tactical radios to African country

In-orbit delivery of Laos' 1st satellite launched

CYBER WARS
Sagem forming Indian JV for AASM Hammer bomb kits

Northrop's new battle command system proves its worth

Orbital ATK making non-U.S. standard ammo for U.S. allies

Britain halts use of 105mm rounds after contamination

CYBER WARS
Saudi Arabia seeks major boost to its defence industry

US approves billion-dollar arms deal with Australia

Safran selling Morpho Detection to the Smith Group

Critics dismiss S.African graft probe clearing arms deal

CYBER WARS
Obama calls on China to increase pressure on N.Korea

Indonesian navy impounds Chinese trawler for illegal fishing

China to build on disputed Scarborough Shoal this year: report

Chinese state media name Xi 'commander in chief'

CYBER WARS
Ultra-long, one-dimensional carbon chains are synthesised for the first time

Rice introduces Teslaphoresis to help assemble Nanotubes

Intracellular recordings using nanotower electrodes

'Honeycomb' of nanotubes could boost genetic engineering









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.