Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
US Army reviews rules of engagement over cyber threat
by Staff Writers
Washington (AFP) June 27, 2013


The US military is reviewing its rules of engagement to deal with the growing threat of cyber crime, military chief Martin Dempsey said Thursday.

Dempsey, the Chairman of the Joint Chiefs of Staff, the highest-ranking officer in the US military, said the review was in response to soaring cyber attacks.

"The Department of Defense has developed emergency procedures to guide our response to imminent, significant cyber threats," Dempsey said in a speech at the Brookings Institution, a Washington-based think tank.

"We are updating our rules of engagement - the first update for cyber in seven years - and improving command and control for cyber forces."

Dempsey said that since his appointment as head of the Joint Chiefs in 2011 "intrusions into our critical infrastructure have increased 17-fold."

Some 4,000 cyber-security experts would join the ranks over the next four years, while some $23 billion would be spent on tackling the threat.

Dempsey said Cybercom -- the US command responsible for combatting cyber-crime -- was now organized in three divisions.

One team was in charge of countering enemy attacks, another was tasked with offering regional support while a third was responsible for protecting some 15,000 US military computer networks.

In addition following a presidential directive, the military now had a manual which allowed it to cooperate with the Department of Homeland Security and the FBI in the event of attacks on civilian networks.

Dempsey meanwhile lamented what he described as inadequate safeguards by the private sector.

"Our nation's effort to protect civilian critical infrastructure is lagging," he said. "Too few companies have invested adequately in cyber security."

In a reference to concerns over the levels of government surveillance on private individuals since the revelations by leaker Edward Snowden, Dempsey said he believed a balance could be struck.

"I understand that the country is debating the proper purpose, and limits, of intelligence collection for national security," he said.

"Let me be clear -- these are two different things. One is collecting intelligence to locate foreign terrorists and their domestic co-conspirators; the other is sharing information about malware to protect our critical infrastructure from a different kind of attack."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Snowden: a very modern spy thriller
Hong Kong (AFP) June 27, 2013
A lone hero is on the run, eluding a spy-hunt across a globe-trotting storyboard as he strives to expose wrongdoing at the heart of Washington's vengeful intelligence apparatus. The script's ending is not yet written but that, for his supporters at least, is the Jason Bourne-style narrative of Edward Snowden. For them, the former National Security Agency (NSA) contractor's exposure of a many ... read more


CYBER WARS
Raytheon awarded contract to keep Patriot capabilities ahead of evolving threats

Israel fast-tracks Arrow 3 over Iran nuclear fears

US Missile Shield Threatens Balance in Asia-Pacific Region

US to send Patriot missiles, F-16s to Jordan for drill

CYBER WARS
Raytheon delivers first NASAMS High Mobility Launcher to Norway

BAE tests cost-saving multiservice guided projectile

U.S. seeks to buy into Israeli missile programs

Enhanced Paveway II provides improved capability, performance

CYBER WARS
UAV interest grows in Middle East, but suppliers few

Researchers Use Video Game Tech to Steer Roaches on Autopilot

A new trophallactic strategy for multiple unmanned aerial vehicles flying in formation

Raytheon delivers mini transponders for Identification Friend or Foe on Korean Air UAV

CYBER WARS
USAF Awards Lockheed Martin Contract for IT and Telecommunications Services

Northrop Grumman Provides Fuel Quantity Indicator For E-3D AWACS

Canada Makes First Call On AEHF

Mutualink Deploys Full Range of Communications Capabilities

CYBER WARS
Hints of 'messy quagmire' over Israeli arms sales

Kalashnikov to be airlifted to Moscow in new health scare

Germany orders Eagle V vehicles

MEADS Tactical BMC4I Software Demonstrates Interoperability in NATO Exercises

CYBER WARS
Finland charges three with bribery in Croatian arms deal

Lakota sale to Thailand gets green light

German cabinet approves 2013, 2014 budget plans

Obama renominates general Dempsey as military chief

CYBER WARS
Commentary: New world disorder

Philippines, US hold war games near China flashpoint reef

Outside View: Too many archdukes, too many bullets

Colombia signs deal with NATO in Latin America first

CYBER WARS
Nanotechnology holds big potential for NMSU faculty

Sound waves precisely position nanowires

Nanoparticle Opens the Door to Clean-Energy Alternatives

Spot-welding graphene nanoribbons atom by atom




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement