Truth is missing. Those who turn away from evil make themselves victims. The LORD sees it, and He’s angry because there’s no justice…
Pentagon declares the Internet a war domain
By John T. Bennett – 07/14/11 06:58 PM ET
The Pentagon released a long-promised cybersecurity plan Thursday that declares the Internet a domain of war but does not spell out how the U.S. military would use the Web for offensive strikes.
The Defense Department’s first-ever plan for cyberspace states that DOD will expand its ability to thwart attacks from other nations and groups, beef up its cybersecurity workforce and expand collaboration with the private sector.
Like major corporations and the rest of the federal government, the military “depends on cyberspace to function,” the DOD strategy states. The U.S. military uses cyberspace for everything from carrying out military operations to sharing intelligence data internally to managing personnel assignments.
“The department and the nation have vulnerabilities in cyberspace,” the document states. “Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity.”
Other nations “are working to exploit DOD unclassified and classified networks, and some foreign intelligence organizations have already acquired the capacity to disrupt elements of DOD’s information infrastructure,” the plan states. “Moreover, non-state actors increasingly threaten to penetrate and disrupt DOD networks and systems.”
Groups are capable of this largely because “small-scale technologies” that have “an impact disproportionate to their size” are relatively inexpensive and readily available.
The Pentagon plans to focus heavily on three areas under the new strategy: The theft or exploitation of data, attempts to deny or disrupt access to U.S. military networks, and any attempts to “destroy or degrade networks or connected systems.”
Another problem highlighted in the strategy is a baked-in threat: “The majority of information technology products used in the United States are manufactured and assembled overseas.”
To address those issues, DOD revealed a multi-pronged approach.
As expected and foreshadowed by Pentagon officials’ comments in recent years, the plan etches in stone that cyberspace is now an “operational domain” just as land, air, sea and space have been for decades for the military.
“This allows DOD to organize, train and equip for cyberspace” as in those other areas, the plan states. It also notes the 2010 establishment of U.S. Cyber Command to oversee all DOD work in the cyberspace.
By crafting a this strategy, “the Department of Defense is acknowledging what all observers of the IT revolution have known for years: cyberwar is already a reality,” Lexington Institute analyst Daniel Goure, a former Army official, wrote recently.
“The publication of the cyberwar strategy may also help jumpstart a long-postponed public debate over the nature of such a war and how it should be deterred, if possible, or fought if necessary,” Goure wrote. “The last technology to revolutionize warfare to the same extent as IT is doing was that which led to the creation of nuclear weapons.”
The second leg of the plan is to employ new defensive ways of operating in cyberspace, first by enhancing the DOD’s “cyber hygiene.” That term covers ensuring that data on military networks remains secure, using the Internet wisely and designing systems and networks to guard against cyberstrikes.
The military will continue its “active cyber defense” approach of “using sensors, software and intelligence to detect and stop malicious activity before it can affect DOD networks and systems.” It also will look for new “approaches and paradigms” that will include “development and integration … of mobile media and secure cloud computing.”
The plan devotes more than a page to mostly underscore efforts long under way to work with other government agencies and the private sector.
Notably, it calls the Department of Homeland Security the lead for “interagency efforts to identify and mitigate cyber vulnerabilities in the nation’s critical infrastructure.” Some experts have warned against DOD overstepping on domestic cybersecurity.
The Pentagon also announced a new pilot program with industry designed to encourage companies to “voluntarily [opt] into increased sharing of information about malicious or unauthorized cyber activity.”
The strategy calls for a larger DOD cybersecurity workforce.
One challenge, Pentagon experts say, will be attracting top IT talent because the private sector can pay much larger salaries — especially in times of shrinking defense budgets. To that end, “DOD will focus on the establishment of dynamic programs to attract talent early,” the plan states.
On IT acquisition, the plan lays out several changes, including: faster delivery of systems; moving to incremental development and upgrading instead of waiting to buy “large, complex systems”; and improved security measures.
Finally, the strategy states an intention to work more closely with “small- and medium-sized business” and “entrepreneurs in Silicon Valley and other U.S. technology innovation hubs.”
The reaction from Capitol Hill in the immediate wake of the plan’s unveiling was mostly muted. Cybersecurity is not a polarizing political issue in the way some defense issues are, like missile defense.
Claude Chafin, a spokesman for House Armed Services Committee Chairman Buck McKeon (R-Calif.), called the strategy “the next step in an important national conversation on securing critical systems and information, one that the Armed Services Committee has been having for some time.”
That panel already has set up its own cybersecurity task force, which Chafin said would “consider this [DOD] plan in its sweeping review of America’s ability to defend against cyber attacks.”
As the Pentagon tweaks its approaches to cybersecurity, Senate Armed Services Committee ranking member John McCain (R-Ariz.) on Wednesday wrote Senate leaders saying that chamber must as well. McCain asked Majority Leader Harry Reid (D-Nev.) and Minority Leader Mitch McConnell (R-Ky.) to establish a temporary Select Committee on Cyber Security and Electronic Intelligence Leaks.
“Cybersecurity proposals have been put forth by numerous Senate committees, the White House and various government agencies; however, the Senate has yet to coalesce around one comprehensive proposal that adequately addresses the government-wide threats we face,” McCain’s office said in a statement. “A select committee would be capable of drafting comprehensive cybersecurity legislation quickly without needing to work through numerous and in some cases competing committees of jurisdiction.”
Update… Internet censorship bill…
Issa: Piracy bill would give Holder ‘broad new powers to police the Internet’
By Josh Peterson Published: 6:23 PM 12/13/2011 | Updated: 1:34 PM 12/15/2011
In a statement released Tuesday, House Oversight Committee Chairman Darrell Issa criticized an amendment proposed by Texas Republican Rep. Lamar Smith to the controversial Stop Online Piracy Act, saying it does not fix anything and would give “Attorney General Eric Holder’s Department of Justice broad new powers to police the Internet.”
SOPA, which is Smith’s bill, would place authority over websites that facilitate copyright infringement under Justice Department jurisdiction. Under SOPA, the Justice Department would have to lay out its case before a federal court that the foreign site is illegal and infringes upon copyright law before obtaining a court order to block the site or sever its financial ties.
The bill — heavily criticized by politicians, social networking sites and political advocacy groups for its “broad reach” — is expected to see full committee markup before Smith’s House Judiciary Committee Thursday. The bill currently has the support of 31 bipartisan cosponsors, in addition to many groups, including the U.S. Chamber of Commerce, MPAA, RIAA, Comcast and Go Daddy.
“The manager’s amendment retains the fundamental flaws of its predecessor by blocking Americans’ ability to access websites, imposing costly regulation on web companies and giving Attorney General Eric Holder’s Department of Justice broad new powers to police the internet,” said Issa.
Smith, Chairman of the House Judiciary Committee, responded to Issa in a statement to The Daily Caller. Smith said that critics of SOPA “continue to rely upon fiction rather than the facts.”
“Comments that the entire Justice Department cannot be trusted because of Attorney General Eric Holder demean the hard work of thousands of career prosecutors and attorneys-in-the-field who have no political, personal or professional affiliation with the Obama administration,” said Smith.
The Obama administration — through the Federal Trade Commission’s recent settlements with Google and Facebook, and the Federal Communications Commission’s passage of its so-called “net neutrality” regulations — has slowly expanded the executive branch’s power over the Internet.
“But cowards, unbelievers, the corrupt, murderers, the immoral, those who practice witchcraft, idol worshipers, and all liars–their fate is in the fiery lake of burning sulfur. This is the second death.”