Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
US military not ready to wage digital attack: official
by Staff Writers
Washington (AFP) April 14, 2015


US 'aggressively' raising cybersecurity with China: official
Beijing (AFP) April 14, 2015 - Washington is "aggressively" warning Beijing over the repercussions of its demand that US tech firms should hand over their encryption keys if they want to do business in China, a top US official said Tuesday.

The statement by US Commerce Secretary Penny Pritzker comes one month after President Obama rebuked Beijing over a new anti-terror law that would require companies to give Beijing details of their encryption methods or be denied access to the Chinese market.

The law, recently drafted by Chinese lawmakers, is expected to be adopted this year.

"The approach that we've taken with the Chinese government is, one, to first of all aggressively talk about the challenges that some of the regulations might do to impede trade," said Pritzker, who is leading a clean energy trade mission to China with executives from 24 US companies.

She added that she had had "pointed conversations" with Chinese leaders about the issue on Monday.

China operates a vast security and surveillance apparatus, with the ruling Communist Party maintaining a resolute grip on power, while Washington and Beijing frequently trade accusations of state-sponsored cyber-spying.

Beijing is tightening its grip on information after a series of deadly attacks which authorities have blamed on separatists from the far-western, mainly Muslim region of Xinjiang.

The foreign ministry in Beijing says China is a victim of hacking and has defended the law as purely internal and "a requirement for the Chinese government to prevent and combat terrorism".

Yet the measure has alarmed some US-based tech companies and has drawn criticism from Obama, who said last month that he had raised the issue directly with Chinese President Xi Jinping.

The row comes amid reports that Beijing has expanded its Internet censorship efforts beyond its borders with a new strategy, dubbed the "Great Cannon", that attacks websites across the globe.

In a roundtable with Chinese and foreign media, Pritzker said that Washington wants to ensure US firms in China can "keep the promises they've made to their customers".

"What we talked about is having a dialogue -- a dialogue being where two governments come together to really seriously have a conversation about how to address these issues," she said. "And there seemed to be some receptivity to doing that."

The US military is well equipped to defend the country against cyberattacks but is not yet ready to wage digital warfare, a senior defense official told lawmakers on Tuesday.

The military's cyber command, created in 2009, lacks the means to lead an offensive campaign in a fast-moving digital conflict, said Eric Rosenbach, the Pentagon's principal adviser on cyber security.

Asked by Senator Bill Nelson if the command lacks the computer network infrastructure to carry out a cyber offensive "effectively," Rosenbach said: "Yes, they currently do not have a robust capability."

But when it comes to defending US networks, "we are in good shape," he told a Senate Armed Services subcommittee on emerging threats.

His comments were unusual because officials previously have suggested the military was ready to lead an offensive digital campaign if necessary.

Rosenbach told senators there was no shortage of resources or funding for cyber command but there were technical and manpower problems that had to be tackled.

Pentagon chief Ashton Carter was following the issue closely and was ready to support more investment in cyber command as needed, he added.

Carter is reviewing a new cyber strategy for the military that is due to be released next week, he said.

Cyber command, in preparing options for offensive digital operations, was prepared to go after some civilian targets, Rosenbach said, "but in a very precise and confined way."

Any offensive action would adhere to the laws of war and seek to avoid causing civilian casualties, he said.

But in response to questions from lawmakers on what a possible offensive operation might entail, Rosenbach said he would prefer to discuss the subject in a closed door, classified hearing.

Experts and former officials have cited the computer worm Stuxnet that disrupted Iran's nuclear program in 2010 as an example of a suspected joint US-Israeli digital operation.

US cyber command is supposed to create a force of about 6,000 personnel for all the branches of the armed forces.

The Pentagon recently said it hoped to reach that by 2016 but Rosenbach said the military will not meet that objective until 2018. He blamed automatic budget cuts in recent years that had undermined training efforts.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Chinese hackers targeted SE Asia, India for last decade: report
Singapore (AFP) April 13, 2015
A cyber espionage group most likely sponsored by China has been snooping on governments and businesses in Southeast Asia and India undetected for the last 10 years, Internet security company FireEye said Monday. FireEye said the hackers, dubbed APT30, have been systematically stealing "sensitive information" since 2005, targeting governments, corporations and journalists with interests invol ... read more


CYBER WARS
Romania 'Agression Platform' Against Russia With US Missile Defense Systems

David's Sling successsfully intercepts targets

Raytheon modernizing South Korean Patriot system

N. Korea says US missile system seeks to contain China, Russia

CYBER WARS
Russia lifts ban on supplying S-300 missiles to Iran

Raytheon, Kongsberg team for naval missile

Israel Tests David's Sling Missile System Amid Iran Nuclear Talks

Australia tests BAE Systems rocket

CYBER WARS
ECA Group develops illegal-drone detection system

Operating in Contested Environments

US approves drone flights for insurer AIG

French energy company invests in drones

CYBER WARS
Thales supplying intercoms for Australian military vehicles

Army issues draft RFP for manpack radios

Rockwell Collins intros new military communications system

NATO country orders tactical radios

CYBER WARS
ECA Group joins project for underwater counter-mine vehicle

Boeing acquires 2d3 Sensing

German army to recommission 100 tanks

Army receives new self-propelled Howitzer

CYBER WARS
US military worries about losing hi-tech edge

FLIR Systems settles SEC charges

US State Dept approves $1bn military sale to Pakistan

Raytheon UK, Home Office settle contract dispute

CYBER WARS
Taiwan rejected as founding member of AIIB: Beijing

China, Russia and eastern Europe boost defence spending: study

Russia supplying weapons, troops to Ukraine separatists

Philippines says Chinese reclamation damaged reefs

CYBER WARS
Optics, nanotechnology combined to create low-cost sensor for gases

Water makes wires even more nano

Light-powered gyroscope is world's smallest

Nanoscale worms provide new route to nano-necklace structures




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.